Karnali Province, Computer Operator 2081-01-08




Karnali Province

Computer Operator Post

2081-01-08

 Part-A: Objective Questions

 1. Which command divides the surface of the blank disk into sectors and assign a unique address to each one.

A. Ver

B. Format

C. Fat

D. Chkdsk

2. Shortcut key for creating a new folder is

A. F2

B. Ctrl+C

C. Alt+Ctrl

D. Ctrl+Shift+N

 

3. Which tool in control panel is used to adjust your computer setting to control computer with voice command?

A. System and security

B. Appearance and personalization

C. Hardware and sound

D. Ease of access

4. …………..tag is used to create a numbered list in HTML.

A. <ol>

B. <ul>

C. <li>

D. <II>

 

5. The element holds two or more frame elements.

A. Frameset

B. Frame

C. Frmbody

D. Frmelement

 

6. Which of the following input device interprets pencil marks on paper media?

A. Punch card reader

B. Optical scanner

C. Hand writing defector

D. O.M.R. (optical mark reader)

 

7. The term GIGO is related to which characteristics of computers?

A. Speed

B. Automatic

C. Accuracy

D. Reliability

 

8. Dot matrix printer is an example of

A. Impact printer

B. Non-Impact printer

C. Thermal printer

D. Laser printer

 

9. is a translator which translates the program written in high level language into machine level language.

A. Assembler

B. Compiler

C. Machine level language

D. Software

 

10. The cache memory works between 

A. ROM and CPU

B. RAM and ROM

C. CPU and RAM

D. Random and secondary memory

 

11. Which of the following is valid statement?

A. Data in itself is useless unless it is processed

B. The data that is processed is called a program

C. The data which is not yet processed is information

D. Information is processed by computer to generate data

 

12. The delay that occur during the playback of a stream is called; 

A. Stream delay

B. Playback delay

C. Jitter

D. Event delay

 

13. Which of the following cables can trans data at high speed?

A. UTP cable

B. Coaxial cable

C. Optic fiber cable

D. Twisted pair cable

 

14. Which of the following is considered as the unsolicited commercial email?

A. Virus

B. Malware

C. Spam

D. All of the above

 

15. Firewalls are to protect against

A. Virus attacks

B. Phishing attacks

C. Data driven attacks

D. Unauthorized attacks

 

16. The purpose of the macros feature in won processing application is

A. To insert hyperlink

B: To record and automate task

C. To create header and footer

D. To apply predefined styles to text


17. The space left between the margin and the start of a paragraph is called;

A. Spacing

B. Gutter

C. Indentation

D. Alignment

 

18. In which view, headers and footers are visible?

A. Normal view

B. Page layout view

C. Print layout view

D. Draft view


19. The ability to combine name and addresses with a standard document is called;

A. Form letters

B. Document formatting

C. mail merge

D. Data management

 

20. Which of the following tab is used to add the document citation?

A. Home

B. Insert

C. Page layout

D. References

 

21. Which of the following shortcut key is used to check spelling?

A. F9

B. F1

C. F2

D. F7


22. A4 sized paper is

A. 21.59 cm x 27.94 cm

B. 21.59 cm x 35.56 cm

C. 21 x 29.7 cm

D. 14.8 cm x 21 cm


23. In excel, Cells are labeled as

А. І,ІІ,ІІІ

B. 1,2,3

C. A1,B1,C1

D. A,B,C

 

24. The basic unit of worksheet into which you enter data is called a

A. Tab

B. Cell

C. Box

D. Range

 

25. Which of the following is NOT the correct method of editing the cell content?

A. Press the Alt key

B. Press the F2 key

C. Click the formula bar

D. Double click the cell


26. The formula in the cell B5 is =A4+C3. This is copied to cell D8. What will be the formula in D8?

A. =C7+E6

B. =C4+E3

C. =E7+C5

D. =A4+C3

 

27. Which tab contains the tool "Freeze panes"?

A. Home

B. View

C. Page layout

D. Review

 

28 . Absolute reference of third row of E column in excel is;

A. E3

B. $E3

C. $E$3

D. None of the above


29. Which of the following feature displays only the data in column(s) according to specified criteria?

A. Pivot

B. Sorting

C. Filtering

D. Formula

 

30. The PowerPoint view that displays only text (title and bullet) is

A. Outline view

B. Notes page view

C. Slide sorter

D. Slide show


31. A is an area reserved for a specific piece of data.

A. Report

B. Key

C. Record

D. Field


32. A field that uniquely identifies each record in a table is

A. Index key

B. Main field

C. Primary key

D. Key field

 

33. Which is NOT a valid data type in MS access?

A. Memo

B Picture

C. Currency

D. Auto number

 

34. Record of the table is also called;

A. Field

B. Text

C. Field

D. Tuple


35. Runs on a computer hardware and serve as platform for other

software to run on. 

A. System software

B. Operating system

C. Application software

D. All of the above


Part-B: Subjective Questions

 

1. What are the common computer security threats and protection measures?

= Common Computer Security Threats and Protection Measures:

   - Threats:

     - Malware (viruses, worms, Trojans)

     - Phishing attacks

     - DDoS attacks

     - Insider threats

     - Ransomware

     - Zero-day exploits

 

   Protection Measures:

     - Use of antivirus and antimalware software

     - Firewalls

     - Regular software updates and patches

     - Strong authentication mechanisms (password policies, multi-factor authentication)

     - Employee training and awareness programs

     - Encryption of sensitive data

     - Backup and disaster recovery plans

2. Explain the importance of relationships in a relational database system. Describe the types of relationships commonly used in database design, and provide examples of how they are implemented in Ms-Access.

=Importance of Relationships in a Relational Database System:

   - Relationships in a relational database system are crucial for organizing and managing data efficiently. They ensure data integrity, reduce redundancy, and enable complex queries.

 

Types of Relationships:

     - One-to-One: Each record in one table is related to only one record in another table.

     - One-to-Many: One record in a table can be related to multiple records in another table.

     - Many-to-Many: Multiple records in one table are related to multiple records in another table.

 

Examples of Implementation in MS-Access:

     - One-to-One: Employee to Employee Details (Employee ID links to Employee Details ID)

     - One-to-Many: Customer to Orders (One customer can have multiple orders)

     - Many-to-Many: Students to Courses (Many students can enroll in multiple courses, and each course can have multiple students)

 

3. What is an operating system? List down its major functions.

= Operating System:

An operating system is software that manages computer hardware and provides services for computer programs.

Its major functions include:

 1. Process Management: Handling running programs, scheduling tasks, and managing resources.

 2. Memory Management: Allocating memory to processes, swapping data between memory and disk.

3. File System Management: Organizing and managing files and directories on storage devices.

4. Device Management: Managing input/output devices such as keyboards, monitors, printers, etc.

5. User Interface: Providing a user-friendly interface for interacting with the computer.

6. Security: Enforcing access control policies, protecting resources from unauthorized access.

7.  Networking: Facilitating communication between devices in a network.

8. Error Detection and Handling: Detecting and responding to errors and failures in hardware or software components.

Post a Comment (0)
Previous Post Next Post

ADS 1

ADS 2