Public Service Commission Open Competitive Written Examination for Civil Service Hospital, Technician, Engineering & Maintenance, Computer, Fifth, Computer Technician Posts 2080/05/21



Public Service Commission

Open Competitive Written Examination for Civil Service Hospital, Technician, Engineering & Maintenance, Computer, Fifth, Computer Technician Posts

2080/05/21

 

1. Which of the following is the most common internet protocol?
A) PPP
B) FTP
C) TCP/IP
D) SMTP

2. A framework of policies and technologies to ensure that the right users have the appropriate access to technology is known as.......... management.
A) Identity
B) Host based
C) Digitl right
D) Lifecycle

3. IDS stands for.....
A) Interruption Detection System
B) Intrution Detection System
C) Invasion Detection System
D) Incident Detection System

4. 2FA stands for.....
A) 2 Form Access
B) 2 Factor Access
C) 2 Factor Authentication
D) 2 Form Authentication

5. Which of the following is not a cyber security threat?
A) Malware
B) Man in the middle
C) Denial of service
D) AES

6. Which of the following is not required during requirement engineering?
A) Analysis
B) Elicitation
C) Design
D) Documentation

7. Agile software development model is based on..... development.
A) Linear
B) Incremental
C) Iterative
D) Both B and C

8. In software engineering, the term CMM stands for.........
A) Capability Maturity Model
B) Computational Maturity Model
C) Competence Maturity Model
D) Capacity Maturity Model

9. RAD stands for..........
A) Rigorous Application Development
B) Reliable Application Development
C) Rapid Application Development
D) Realistic Application Development

10. Chairman of NITC is ..........
A) Minister of Communication and Information Technology
B) Secretary of Ministry of Communication and Information Technology
C) Chief Secretary
D) Deputy Prime Minister

11. One of the goal of ICT Policy, 2072 is "To make..... percentage of people digitally literate by 2020".
A) 60
B) 65
C) 75
D) 90

12. Which of the following is not correct goal of ICT Policy, 2072 of Nepal?
A) 75% of Nepali will be digitally literate by 2020
B) 90% of people shall have access to the broadband services by 2020
C) All Nepali will have access to Internet by 2020
.D) 90% of government services will be online by 2020

13. As per ITERT Operation and Management Directive, the emergency response team is located in which ministry?
A) Ministry of Home Affairs
.B) Ministry of Education, Science and Technology
C) Ministry of Communication and Information Technology
D) Ministry of Defense

14. How many characters are represented by ASCII 8?
A) 127
B) 128
C) 255
D) 256

15. The process of producing useful information for the user is called.........
A) controlling
B) outputting
C) inputting
D) Processing

16. Which of the following has the fastest
access time?
A) SSD
B) RAM
C) ROM
D) CPU Register

17. There are three elements of the communication systems, two are transmitter and receiver, what is the third one?
A) Protocol
B) Channel
C) Space
D) Periphery

18. The term used with memory of computer is DDR4, DDR stands for......
A) Designated Data Rate:
B) Defined Data Rate.
C) Double Data Rate
D) Dedicated Data Rate

19. HDMI 2.1 version supports upto Vaishna
A) HD
B) 4K
C) 8K
D) 16K

20. What are the most common a backup types?
A) Full backup
B) Incremental backup
C) Differential backup
D) All of the above

21. Point out the connector that transmits both audio and video.
A) BNC

B) HDMI
C) RJ45
D) DVI

22. Where is BIOS stored?
A) CPU
B) RAM
C) ROM
D) Hard Drive

23. FAT stands for......
A) File Access Table
B) File Allocation Table
C) File Activity Table
D) File Accommodation Table

24. Device driver requires.....
A) Register
B) Main Memory
C) Disk
D) Cache

25. To eliminate unnecessary fragments and rearrange files and unused disk space to optimize operations is.....
A) Restore
B) Disk Scan
C) Disk Defragmenter
D) Disk Clean-up

26. Which of the following file system is not supported by Windows OS?
A) exFAT
B) FAT32
C) NTFS
D) NTFS32

27. What is the number of layers in the OSI model?
A) 2
B) 4
C) 7
D) 9

28. Which of the following is an unreliable and connectionless protocol?
A) TCP
B) UDP
C) FTP
D) HTTP

29. In.... topology, every node has a dedicated point to point link to all nodes within the network.
A) Star
B) Bus
C) Ring
D) Mesh

30. A network security device that monitors and filters incoming and outgoing network traffic based on security policies is......
A) Access point
B) Router
C) Firewall
D) Controller

31. Which of the following is lowest in memory hierarchy?
A) Secondary memory
B) Registers
C) RAM
D) Cache memory

32. The 8085 microprocessor has address bus of length..
A) 8
B) 12
C) 16
D) 32

33. What is used to increase the apparent size of physical memory?
A) Disks
B) Hard Disk
C) Virtual Memory
D) Secondary Memory

34...... is the average time required to reach a storage location in memory and obtain its contents.
A) Latency
B) Turnaround time
C) Response time
D) Access time

35. Which of the following defines the structure of schema of the database?
A) Data Definition Language
B) Data Manipulation Language
C) Data Control Language
D) Data Structuring Language

36. "GROUP BY" statement can be used with..... function.
A) COUNT
B) SUM
C) AVG
D) All of the above

37. Select the correct order of keywords for SQL SELECT statements.
A) SELECT, WHERE, FROM
B) SELECT, FROM, WHERE
C) FROM, SELECT, WHERE
D) FROM, WHERE, SELECT

38. The objective of normalization is  to..... data duplication.
A) eliminate
B) reduce
C) increase
D) maximize

39. How do you present slideshow from current slide?
A) F5
B) Shift+F5
C) Alt+F5
D) Ctrl+F5

40. A portion of a document where one can set certain page formatting options as default is
A) Page Setup
B) Page
C) Paragraph
D) Section

41. Which of the following is the file extension of the PowerPoint application?
A) .ppt
B).jpg
C).html
D) .docs

42. In spreadsheet, shortcut key used to Open tab is.....
A) Ctrl+S
B) Ctrl+M
C) Ctrl+O
D) Ctrl+T

43. Which symbol is used for absolute cell reference?
.A)$
B) %
C) #
D) &

44. Which feature of OOP is exhibited by the function overriding?
.A) Polymorphism
B) Abstraction
C) Inheritance
D) None of the above

45. A pop() operation is performed on an empty stack. What is the condition called?
A) Overflow
B) Underflow
C) Syntax error
D) Garbage collection

46. Which of the following is the correct syntax for array initialization in C?
A) int a = {3,4,5)
B) int a[] = new int (3,4,5)
C) int a[3] = [3,4,5)
D) int a(3) (3,4,5}

47. Which one of the following is a loop construct that will always be executed once?
A) do while
B) for
C) while
D) switch

48. A web server delivers web pages on the request of client using
A) FTP
B) SMTP
C) ICMP
D) HTTP

49. On which model is www based upon?
A) Client-Server
B) Local Server
C) 3 tier
D) Peer to Peer

50. What are the basic features of a CMS?
A) Content creation
B) Content Storage
C) Workflow management
D) All of above


1 Comments

Post a Comment
Previous Post Next Post

ADS 1

ADS 2