Karnali Province, Computer Operator 2081-01-08

Karnali Province

Computer Operator Post


 Part-A: Objective Questions

 1. Which command divides the surface of the blank disk into sectors and assign a unique address to each one.

A. Ver

B. Format

C. Fat

D. Chkdsk

2. Shortcut key for creating a new folder is

A. F2

B. Ctrl+C

C. Alt+Ctrl

D. Ctrl+Shift+N


3. Which tool in control panel is used to adjust your computer setting to control computer with voice command?

A. System and security

B. Appearance and personalization

C. Hardware and sound

D. Ease of access

4. …………..tag is used to create a numbered list in HTML.

A. <ol>

B. <ul>

C. <li>

D. <II>


5. The element holds two or more frame elements.

A. Frameset

B. Frame

C. Frmbody

D. Frmelement


6. Which of the following input device interprets pencil marks on paper media?

A. Punch card reader

B. Optical scanner

C. Hand writing defector

D. O.M.R. (optical mark reader)


7. The term GIGO is related to which characteristics of computers?

A. Speed

B. Automatic

C. Accuracy

D. Reliability


8. Dot matrix printer is an example of

A. Impact printer

B. Non-Impact printer

C. Thermal printer

D. Laser printer


9. is a translator which translates the program written in high level language into machine level language.

A. Assembler

B. Compiler

C. Machine level language

D. Software


10. The cache memory works between 

A. ROM and CPU

B. RAM and ROM

C. CPU and RAM

D. Random and secondary memory


11. Which of the following is valid statement?

A. Data in itself is useless unless it is processed

B. The data that is processed is called a program

C. The data which is not yet processed is information

D. Information is processed by computer to generate data


12. The delay that occur during the playback of a stream is called; 

A. Stream delay

B. Playback delay

C. Jitter

D. Event delay


13. Which of the following cables can trans data at high speed?

A. UTP cable

B. Coaxial cable

C. Optic fiber cable

D. Twisted pair cable


14. Which of the following is considered as the unsolicited commercial email?

A. Virus

B. Malware

C. Spam

D. All of the above


15. Firewalls are to protect against

A. Virus attacks

B. Phishing attacks

C. Data driven attacks

D. Unauthorized attacks


16. The purpose of the macros feature in won processing application is

A. To insert hyperlink

B: To record and automate task

C. To create header and footer

D. To apply predefined styles to text

17. The space left between the margin and the start of a paragraph is called;

A. Spacing

B. Gutter

C. Indentation

D. Alignment


18. In which view, headers and footers are visible?

A. Normal view

B. Page layout view

C. Print layout view

D. Draft view

19. The ability to combine name and addresses with a standard document is called;

A. Form letters

B. Document formatting

C. mail merge

D. Data management


20. Which of the following tab is used to add the document citation?

A. Home

B. Insert

C. Page layout

D. References


21. Which of the following shortcut key is used to check spelling?

A. F9

B. F1

C. F2

D. F7

22. A4 sized paper is

A. 21.59 cm x 27.94 cm

B. 21.59 cm x 35.56 cm

C. 21 x 29.7 cm

D. 14.8 cm x 21 cm

23. In excel, Cells are labeled as


B. 1,2,3

C. A1,B1,C1

D. A,B,C


24. The basic unit of worksheet into which you enter data is called a

A. Tab

B. Cell

C. Box

D. Range


25. Which of the following is NOT the correct method of editing the cell content?

A. Press the Alt key

B. Press the F2 key

C. Click the formula bar

D. Double click the cell

26. The formula in the cell B5 is =A4+C3. This is copied to cell D8. What will be the formula in D8?

A. =C7+E6

B. =C4+E3

C. =E7+C5

D. =A4+C3


27. Which tab contains the tool "Freeze panes"?

A. Home

B. View

C. Page layout

D. Review


28 . Absolute reference of third row of E column in excel is;

A. E3

B. $E3

C. $E$3

D. None of the above

29. Which of the following feature displays only the data in column(s) according to specified criteria?

A. Pivot

B. Sorting

C. Filtering

D. Formula


30. The PowerPoint view that displays only text (title and bullet) is

A. Outline view

B. Notes page view

C. Slide sorter

D. Slide show

31. A is an area reserved for a specific piece of data.

A. Report

B. Key

C. Record

D. Field

32. A field that uniquely identifies each record in a table is

A. Index key

B. Main field

C. Primary key

D. Key field


33. Which is NOT a valid data type in MS access?

A. Memo

B Picture

C. Currency

D. Auto number


34. Record of the table is also called;

A. Field

B. Text

C. Field

D. Tuple

35. Runs on a computer hardware and serve as platform for other

software to run on. 

A. System software

B. Operating system

C. Application software

D. All of the above

Part-B: Subjective Questions


1. What are the common computer security threats and protection measures?

= Common Computer Security Threats and Protection Measures:

   - Threats:

     - Malware (viruses, worms, Trojans)

     - Phishing attacks

     - DDoS attacks

     - Insider threats

     - Ransomware

     - Zero-day exploits


   Protection Measures:

     - Use of antivirus and antimalware software

     - Firewalls

     - Regular software updates and patches

     - Strong authentication mechanisms (password policies, multi-factor authentication)

     - Employee training and awareness programs

     - Encryption of sensitive data

     - Backup and disaster recovery plans

2. Explain the importance of relationships in a relational database system. Describe the types of relationships commonly used in database design, and provide examples of how they are implemented in Ms-Access.

=Importance of Relationships in a Relational Database System:

   - Relationships in a relational database system are crucial for organizing and managing data efficiently. They ensure data integrity, reduce redundancy, and enable complex queries.


Types of Relationships:

     - One-to-One: Each record in one table is related to only one record in another table.

     - One-to-Many: One record in a table can be related to multiple records in another table.

     - Many-to-Many: Multiple records in one table are related to multiple records in another table.


Examples of Implementation in MS-Access:

     - One-to-One: Employee to Employee Details (Employee ID links to Employee Details ID)

     - One-to-Many: Customer to Orders (One customer can have multiple orders)

     - Many-to-Many: Students to Courses (Many students can enroll in multiple courses, and each course can have multiple students)


3. What is an operating system? List down its major functions.

= Operating System:

An operating system is software that manages computer hardware and provides services for computer programs.

Its major functions include:

 1. Process Management: Handling running programs, scheduling tasks, and managing resources.

 2. Memory Management: Allocating memory to processes, swapping data between memory and disk.

3. File System Management: Organizing and managing files and directories on storage devices.

4. Device Management: Managing input/output devices such as keyboards, monitors, printers, etc.

5. User Interface: Providing a user-friendly interface for interacting with the computer.

6. Security: Enforcing access control policies, protecting resources from unauthorized access.

7.  Networking: Facilitating communication between devices in a network.

8. Error Detection and Handling: Detecting and responding to errors and failures in hardware or software components.

Post a Comment (0)
Previous Post Next Post