Solved Question of Nepal Rastra Bank 2075-03-22 (Assistant of IT)

Question Bank

लोक सेवा आयोग

नेपाल राष्ट्र बैंक, प्राविधिक, सहायक (सु.प्र.) पदको प्रतियोगितात्मक लिखित परीक्षा

२०७५/०३/२२

Key [A] समय : ३ घण्टा पूर्णाङ्क : १००

विषय : सेवा सम्बन्धी

उत्तरपुस्तिकामा प्रश्नपत्रको KEY अनिवार्य रुपले उल्लेख गर्नुपर्नेछ । उल्लेख नगरेमा उत्तरपुस्तिका रद्द हुनेछ । परीक्षामा Calculator, Mobile प्रयोग गर्न पाइनेछैन । प्रत्येक Section को उत्तर छुट्टाछुट्टै उत्तरपुस्तिकामा लेख्नुपर्नेछ । अन्यथा उत्तरपुस्तिका रद्द हुनेछ । Section ‘B’ को १२ प्रश्नमध्ये कुनै १० प्रश्नको उत्तर दिनुपर्नेछ ।

Section ‘A’ : Objective

            Multiple Choice                                                                                             50×1=50 Marks


1.  A JFET has three terminals, namely

A) Cathode, anode, grid                                  B) emitter, base, collector

C) Source, gate, drain                            D) none of the above
2. The reverse current in a diode is usually

            A) Very small             B) Very Large             C) Zero            D)  in the breakdown region
3. The voltage gain of a CC (Common Collector) transistor arrangement is

          A) equal to 1          B) more than 10          C) more than 100        D) less than 1
4.  The output impedance of a transistor is

            A) high                        B) zero                        C) low                         D) very low    
5. Which one of these is characteristic of RAID 5?

            A) Distributed Parity                                        B) No Parity

            C) All Parity in a single disk                            D) Double Parity
6. The two phases of executing an instruction are

            A) instruction decoding and storage                 B) instruction fetch and instruction execution

            C) instruction execution and storage                D) instruction fetch and instructing processing
7. If one or more devices use a common set of wires to communicate with the computer system, the connection is called

            A) CPU                       B) Monitor                  C) Wirefull                  D) BUS
8. The addressing mode used in an instruction of the form ADD X, Y is

            A) Absolute                B) immediate              C) indirect                   D) relative
9. The reason for the implementation of the cache memory is

            A) to increase the internal memory of the system

            B) the different in speeds of operation of the processor and memory

            C) to reduce the memory access and cycle time

            D) all of the above
10. Using CHMOD if we want to give ALL permissions to a user, which mode is used?

            A) 666                         B) 777                         C) 776                         D) 667
11. How can you optimize performance of your computer ?

            A) Delete unused file                                       B) Defrag disk

            C) Scan for virus                                              D) All of above
12. Dispatch latency is

A) the time taken by the dispatcher to stop one process and start another

B) the time taken by the processor to write a file into disk

C) the whole time taken by all processor

D) non of above
13. To access the services of operating system, the interface is provided is by the

           A) System calls           B) API                         C) Library                   D) Assembly instructions
14. Which class of IP address provided a maximum of  only 254 host addresses per network ID ?

           A) Class A                  B) Class B                   C) Class C                  D) Class D
15. Which of the following devices assigns IP address to devices connected to a network that uses TCP/IP ?  

A) DHCP Server       B) NIC                        C) Gateway                 D) DNS server
16. Dual-stack approach refers to

            A) implementing IPv4 with 2 stacks               B) implementing IPv6 with 2 stacks

            C) node has both IPv4 & IPv6 support           D) none of above
17. What is the most common ICMP command ?

            A) Ping                       B) Trace                      C) Netstat                   D) NBTstat
18. This layer is an addition to OSI model when compared with TCP IP model

            A) Application Layer                                      B) Presentation Layer

            C) Session Layer                                             D) Both B and C
19. A DNS client is called

            A)DNS updater          B) DNS resolver        C) DNS handler          D) none of the above
20. Which server in the DMZ needs only list of limited number of public IP Address ?

            A) DNS                       B) NAT                       C) Proxy                      D) Firewall
21. Which one of the following is a cryptographic protocol used to secure HTTP connection ?

            A) Stream Control Transmission Protocol      B) Transport Layer Security

            C) Explicit Congestion Notification               D) Resource Reservation Protocol
22. A packet filter firewall filters at the

            A) Application or transport                             B) Data Link layer

            C) Physical Layer                                            D) Network or Transport Layer
23. Who issues a digital certificate ?

            A) Digital Certificate Controller                                 B) Certification Authority

            C) Ministry of information and communication         D) ISP
24. Digital signature cannot provide ……… for the message.

            A. integrity                  B) confidentially        C) nonrepudiation       D) authentication
25. There are several reason why a company would develop and implement a business continuity plan. Which of the following property describe the best reason?

            A) to increase liability                                     B) the continuation of a company

            C) compliancy with regulations                      D) Properly react to disasters
26. Which of the following cables can be used to connect a PC and switch?

            A) Straight cables      B) Cross cables           C) Rollover Cables      D) All of the above
27. What could cause a fixed disk error?

            A) No-CD installed                                        B) Bad RAM

            C) Slow processor                                          D) Incorrect CMOS setting
28. What is SMPS used for?

            A) obtaining controlled ac power supply        B) obtaining controlled dc power supply

            C) storage of dc power                                    D) switch from one source to another
29. From what location are the 1st computer instructions available on boot up?

            A) ROM  BIOS          B) CPU                       C) boot.ini                   D) CONFIG.SYS
30. MIDI stands for

            A) Musical Instrument Digital Interface     B) Musical Instrument Digital Instruction

            C) MP3 Instrument Digital Interface               D) Musical Instrument Design Interface
31. Before audio or video signals can be send on the internet, they need to be

            A) Channelized           B)Managed                 C) Digitized                D) Organized
32. Moving Pictures Export Group (MPEG) is used to compress

            A) Frames                   B) Images                    C) Audio                     D) Video
33. Multimedia system require hard real time scheduling

            A) to ensure critical tasks will be serviced within timing deadlines

            B)  to deliver the media file to the client

            C) to minimize the delay

            D) for security
34. The delay that occur during the playback of a stream is called

            A) stream delay           B) Playback delay       C) jitter                       D) event delay
35. Which of the following statements is false about event handlers in JavaScript?

            A) They can be include with input tags

            B) They can be associated with end of file processing for a database application

            C) They can be included with the form tag

            D) They are generally used to call functions when triggered
36. Which of the tag is used to creates a number list?

            A) <LI>                      B) <OL>                     C) <UL>                     D) <DL>
37. AJAX stands for

            A) asynchronous JavaScript and xml           B) advanced JSP and xml

            C) asynchronous JSP and xml                        D) advanced JavaScript and xml
38. Which is the correct CSS syntax?

            A) {body:color=black}                                   B) body:color=black;

            C) body{color:black}                           D) {body;color:black;}
39. How can you open a link in a new browser window?

            A) <a href = “url” target = “new”>                 B) <a href = “url” target = “_blank”>

            C) <a href = “url” .new>                                 D) <a href = “target =”open”>
40. What is called to entry effect as one slide replace another in a show on presentation?

            A) Animation              B) Slide transition      C) Custom animation             D) Show         
41. Which of the following syntax is correct regarding the SUM function in Excel?

            A) =SUM(A1,B1)                                           B) SUM(A1:B9)

            C) =SUM(A1:A9, B1:B9)                              D) All of the above
42. What PowerPoint feature will you use to apply motion effects to different objects of a slide?

            A) Slide transition       B) Slide design           C) Animation Object  D) Animation Scheme
43. how many columns can you use to apply motion effects to different objects of a slide?

            A) 40                           B) 45                           C) 50                           D) 55
44. What database key uniquely identifies a record within a table?

            A) Primary key          B) Foreign key            C) Secondary key       D) Relational key
45. Given then basic ER and relational models, which of the following is incorrect?

            A) An attribute of an entity can have more than one value

            B) An attribute of an entity can be composite

            C) In a row of a relational table, an attribute can have more than one value

            D) In a row of a relational table, an attribute can have exactly one value or a NULL value
46. ………. is used to define the structure of the relation, deleting relations and relating schemas.

            A) Data Manipulation Language                    B) Data Definition Language

            C) Query                                                         D) Relational Schema
47. To remove a relation from an SQL database at a given instant in time.

            A) Delete                    B) Purge                      C) Remove                  D) Drop table
48. Database ……….. which is the logical design of the database, and the database ………… which is a snapshot of the data n the database at a given instant in time.

            A) instant, Schema      B) Relation, Schema   C) Relation, Domain   D) Schema, Instance
49. In National Information and Communication technology (ICT) Policy, 2015, …….. goals are mentioned as the goals of the proposed policy.

            A) 10                           B) 11                           C) 12                           D) 13
50. How many year imprisonment is defined to computer source code theft, destruction or changing case of cyber crime in Nepal?

            A) 3 years             B) 2 years                    C) 2.5 years                 D) 1.5 years

1.      C2.      A3.      A4.      C5.      A6.      B
7.      D8.      A9.      B10.  B11.  D12.  A
13.  A14.  C15.  A16.  C17.  A18.  D
19.  B20.  A21.  B22.  D23.  C24.  B
25.  B26.  A27.  D28.  B29.  A30.  A
31.  C32.  D33.  A34.  C35.  B36.  B
37.  A38.  C39.  B40.  B41.  D42.  D
43.  B44.  A45.  C46.  B47.  D48.  D
49.  B50.  A

What do you feel about this post?

0%
like

Like

0%
love

Love

0%
happy

Happy

0%
haha

Haha

0%
sad

Sad

0%
angry

Angry