Citizen Investment Fund, Technician, Computer Operator 2080/06/03


Public Service Commission

Citizen Investment Fund, Technician,

Technician, 4th, Open Competitive Written Examination

for the post of Assistant Computer Operator 2080/06/03

1. Which of the followings is not a programming language?
B) Python
D) Fortran

2. Access time is......
A) Seek time + Latency time
B) Seek time
C) Seek time Latency time
D) Latency time

3. Which of the following is the smallest unit of data in a computer?
A) Byte
B) Bit
D) Nibble

4. Java is............level programming language.
A) Machine
B) Low
C) High
D) None of the above

5. Cache memory is part of......
A) Random Access Memory
B) Read Only Memory
C) Central Processing Unit
D) Hard Disk

6. What is the main purpose of an internet browser?
A) To create and manage website
B) To provide internet connectivity to device
C) To search and index websites for search engine
D) To access and display web pages and content on the internet

7. What is the primary function of the CPU in a computer?
A) Displaying graphics on the monitor
B) Storing data for long-term use
C) Managing network connections
D) Performing calculations and executing instructions

8. Integrated circuits (ICs) made of silicon chips were introduced in which generation of computers, significantly reducing their size and improving performance?
A) First
B) Second
C) Third
D) Fourth

9. ..... is one of protocol used for  email communication.


10. In which of the following types of memory we don't write Firmware?
D) Flash Memory

11. Which wild card character indicates a single character in the search pattern?
C) []
D) &

12. Which is not the function of Operating System?
A) Process management
B) Memory management
C) Job scheduling
D) Data backup and recovery

13. In DOS.... command is used to display the contents of a text file.

14. What is the extension of font file?

15. The process of swapping data between RAM and a storage device to free up memory
is known as .....
A) Defragmentation
B) Paging
C) Virtualization
D) Overclocking

16. LaTeX is a specialized word processor commonly used in which field? and Technical Writing
A) Business
C) Personal Use
D) Graphic Design

17. What feature in Microsoft Word automatically corrects common spelling mistakes as you type?
A) Thesaurus
B) AutoFormat
C) AutoSummarize
D) AutoCorrect

18. Function key used for spell check in Microsoft Word is .....
A) F2
B) F5
C) F6
D) F7

19. Which of the following is one of the file extension for word processor file?
A) odf
B) odp
C) owp
D) odt

20. Which is not the word processor application?
A) Microsoft Word
B) Notepad
C) Word Star
D) Google Docs

21. Which is valid option of line spacing in MS Word program?
A) At least
B) Exactly
C) Multiple
D) All of the above

22. The explanatory notes or references placed at the end of the document is called ...........
A) Footnote
B) Endnote
C) Bottom Note
D) None of the above

23 . What is the keyboard shortcut to undo the last action in Microsoft Word?
A) Ctrl+C
B) Ctrl+Z
C) Ctrl+V
D) Ctrl+X

24. Which option in the Page Setup dialog box allows you to set the margins in Microsoft
A) Size
B) Orientation
C) Layout
D) Margins

25. How can you create a bulleted list in Microsoft Word?
A) Press the Tab key
B) Press the Enter key
C) Use the Bullets button in the Home tab
D) Use the Numbering button in the Home tab

26. What is the extension of a Microsoft Excel file?

27. What does the "Wrap Text" option in Excel do?
A) It applies a text wrap-around effect to cell contents
B) It forces text to fit within the width of the cell by automatically adjusting the font size
C) It aligns cell contents to the right side of the cell
D) It automatically adjusts the height of the cell to fit the text

28 . What does the function AVERAGE() do in Microsoft Excel?
A) Adds up a range of values
B) Finds the smallest value in a range
C) Calculates the average of a range
D) Checks a condition and returns a value

29. Which of the following is the correct syntax for referring cell B6 of Sheet1 for Sheet2?
A) Sheet1@B6
B) Sheet1#B6
C) Sheet1$B6
D) Sheet1!B6

30. In Microsoft Excel, a single data point in a cell is referred to as .....
A) Worksheet
B) Workbook
C) Cell
D) Range

31. In Excel a collection of cells is referred to as......
A) Worksheet
B) Workbook
C) Cell

32. Which is the shortcut key to recalculate the excel formula?
A) F2
B) F7
C) F9
D) F10

33. "Countif" function in MS Excel counts the number of.....
A) cells in a range that contain numbers
B) cells in a range that are not empty
C)cells within a range that meet the given condition
D) empty cells in a specified range of cells

34. The shortcut key of insert table in MS Excel is......
A) Ctrl+T
B) Alt+T
C) Ctrl+Alt+T
D) Ctrl+Shift+T

35. Suppose you have an excel sheet having more than 1000 records with duplicate values. How can you remove the duplicate values?
A) Go to Formula menu and click on remove duplicates
B) Go to Review menu and click on remove duplicates
C) Go to Data menu and click on remove duplicates
D) Go to Home menu, click conditional formatting and click on remove duplicates

36. Which is invalid relationship type in MS Access database?
A) One to one
B) One to two
C) One to many
D) Many to many

37. An organized collection of logically related data is known as ......
A) Data
B) Meta Data
C) Database
D) Information

38. Which data type is invalid in MS Access?
A) Hyperlink
B) OLE object
C) Yes/No
D) Varchar2

39. In Microsoft Access, what is a database object that stores data in rows and columns?
A) Query
B) Table
C) Form
D) Report

40. In MS Access if you select AutoNumber data type for a field then new values for this
field could be generated in..... manner.
A) incremental
B) decrementa
C) random
D) incremental or random

41. Each record is constituted by a number of individual data items which are called.....
A) Fields
B) Data types
C) Relations
D) Tables

42. When you want all your slides to contain same fonts and images (e.g. logos) by making
changes in one place, then you should use ......
A) Slide Template
B) Slide Formatter
C) Slide Designer
D) Slide Master

43. Which of the following sections does not exist in a slide layout?
A) Titles
B) Lists
C) Charts
D) Animation

44. Which view in Microsoft PowerPoint allows you to rearrange slides and apply slide transitions?
A) Slide Show view
B) Normal view
C) Slide Sorter view
D) Reading view

45. How can you preview animations on a slide in PowerPoint?
A) Click on the Preview button in the Animations tab to see a live preview of animations
B) Press the Ctrl+P shortcut keys to preview animations
C) Right click on the slide and select Preview Animations
D) None of the above

46. As per ETA, 2063, which of the following is not a function of Controller?
A) To issue a license to the Certifying Authority

B) To issue a digital certificate to customers
C) To exercise the supervision and monitoring over the activities of Certifying Authority

D) To fix the standards to be maintained by certifying authority in respect to the verification of digital signature


47. Which of the following is the goal of ICT Policy, 2072?
A) Nepal will be at least in the top second quartile of the International Network Readiness Index and e-government ranking by 2020
B) At least of 75% of the population will have digital literacy by the end of 2020

C) 90% of the population will be able to access the broadband services by 2020
D) All of the above

48. नागरिक लगानी कोषको सञ्चालक पदमा नियुक्ति हुन कम्तीमा कति उमेर हुनुपर्ने हुन्छ ?
A) २१ वर्ष

B) २५ वर्ष
३० वर्ष
३५ वर्ष


49. In which year, Department of Information Technology was established by Government of Nepal?

 A) 2065 BS
B) 2069 BS
C) 2072 BS
D) 2075 BS

50. नागरिक लगानी कोष ऐन, २०४७ बमोजिम गठन हुने सञ्चालक समितिमा कति जना सदस्य रहने व्यवस्था ?
A) जना
C) जना
D) जना

Subjective Section "B"
1 Define mail merge in MS Word application. Write steps to prepare letter for mail merge.
= Mail merge is a feature in Microsoft Word that allows you to create personalized documents, such as letters, envelopes, or labels, by merging a template document with a data source, such as an Excel spreadsheet or a database. The result is a set of documents where each document contains unique information from the data source. Here are the steps to prepare a letter for mail merge:


   a. Start Word Document: Open Microsoft Word and create a new document or open an existing one that you want to use as the template for your letter.


   b. Select Mailings Tab: Go to the "Mailings" tab in the Word ribbon.


   c. Select Start Mail Merge: Click on the "Start Mail Merge" button and choose the type of document you want to create (e.g., Letters).


   d. Select Recipients: Click on the "Select Recipients" button to choose your data source. You can use an existing list or create a new one in Word.


   e. Insert Merge Fields: Place the cursor where you want to insert personalized information (e.g., recipient's name), and click on "Insert Merge Field" to select the fields from your data source.


   f. Preview Results: Click on "Preview Results" to see how each merged document will look.


   g. Complete the Merge: Click on "Finish & Merge" and choose the option that suits your needs (e.g., "Edit Individual Documents" to create a new document with merged data).


   h. Merge Output: Word will generate the merged documents with personalized information from your data source.

2 What is cell in spreadsheet? Explain about Relative Cell and Absolute Cell Reference in MS Excel.
 =  A cell in a spreadsheet, such as Microsoft Excel, is the basic unit of data storage. It is the intersection of a row and a column and can contain various types of data, including numbers, text, formulas, or functions.


   - Relative Cell Reference: When you use a relative cell reference in a formula (e.g., A1), the reference adjusts automatically when you copy the formula to another cell. For example, if you copy a formula from cell B1 to B2, the reference changes from A1 to A2 because it's relative to the position of the formula.


   - Absolute Cell Reference: An absolute cell reference is indicated by adding a "$" symbol before the column letter and/or row number (e.g., $A$1 or A$1 or $A1). When you use an absolute reference in a formula, the reference remains fixed even if you copy the formula to other cells. It won't change when you copy it.

3. What are the advantages of DBMS over traditional file system in data management Explain.

= Advantages of DBMS over Traditional File System:

   Database Management Systems (DBMS) offer several advantages over traditional file systems in data management:


   a. Data Integrity: DBMS ensures data integrity by enforcing data constraints and providing mechanisms for data validation.


   b. Data Security: DBMS offers user authentication and access control to protect data from unauthorized access.


   c. Data Consistency: DBMS maintains data consistency through transactions, ensuring that data remains accurate even in the presence of concurrent operations.


   d. Data Redundancy Reduction: DBMS minimizes data redundancy by storing data in a centralized repository, reducing the chances of inconsistent data.


   e. Data Retrieval Efficiency: DBMS uses indexing and optimized query processing to retrieve data efficiently, improving performance.

4. What is the difference between slide animation and slide transition in MS PowerPoint? Write the process to insert picture into PowerPoint Presentation. remedies.2+3=5
= Slide Animation: Slide animation refers to the movement or effects applied to individual objects (e.g., text, images) on a slide. For example, you can make text appear one word at a time or have an image fade in gradually. To apply slide animations, select an object, go to the "Animations" tab, and choose an animation effect.


   - Slide Transition: Slide transition, on the other hand, controls how one slide transitions to the next slide in a presentation. It determines the visual effect between slides. To add slide transitions, go to the "Transitions" tab and select a transition effect.


   Insert Picture into PowerPoint Presentation:

   To insert a picture into a PowerPoint presentation:


   a. Click on the slide where you want to insert the picture.


   b. Go to the "Insert" tab.


   c. Click on "Picture" to open the file dialog and select the image you want to insert.


   d. Adjust the size and position of the picture on the slide as needed.

5. What is computer security threats? Explain its types. What are the effective and protection measures to safeguard against them? 2+5+3=10
=   Computer security threats are risks and potential dangers to the confidentiality, integrity, and availability of computer systems and data. Types of computer security threats include:


   - Malware: Malicious software like viruses, worms, Trojans, and ransomware that can infect and harm systems.


   - Phishing: Deceptive emails or websites used to trick users into revealing sensitive information.


   - Hacking: Unauthorized access to computer systems or networks to steal data or disrupt operations.


   - Distributed Denial of Service (DDoS): Overwhelming a network or website with traffic to make it unavailable.


   - Data Breaches: Unauthorized access or theft of sensitive data.


   Protection Measures: To safeguard against these threats, use antivirus software, employ strong passwords, keep software updated, use firewalls, educate users about phishing, and regularly back up data.

6. Explore the relationship between application software, system software and the operating system. Define the Disk Operating System (DOS). Explain the types of DOS commands with their examples. 5+2+3=10
= Application Software: These are programs designed for specific tasks or functions, such as word processors, spreadsheets, and web browsers. They rely on the operating system and system software to function.


   - System Software: System software includes the operating system and utility programs that manage computer hardware and provide services to application software. Examples include device drivers, system utilities, and the OS itself.


   - Operating System (OS): The OS is the core software that manages computer hardware, provides a user interface, and controls the execution of application software. It acts as an intermediary between hardware and software.


   Disk Operating System (DOS): DOS is an older type of operating system that uses a command-line interface for user interaction. It was widely used on personal computers in the past.


   Types of DOS Commands:

   - Internal Commands: These are commands built into the DOS shell. Examples include DIR (list files), CD (change directory), and COPY (copy files).


   - External Commands: These are standalone executable files that extend the functionality of DOS. For example, FORMAT (to format disks) and CHKDSK (to check and repair disk drives).

सूचना तथा सञ्चार नीति, २०७२ अनुसार नेपाल सरकारले सूचना सञ्चारको क्षेत्रमा विकास गर्नको लागि कस्तो परिदृश्य (Mission) राखेको ? यस नीतिका प्रमुख उद्देश्यहरू संक्षिप्तमा वर्णन गर्नुहोस्

Post a Comment (0)
Previous Post Next Post