लोक सेवा आयोग
औद्योगिक क्षेत्र व्यवस्थापन लिमिटेड, प्राविधिक, पाँचौ, सूचना प्रविधि/सव–इन्जिनियर पदको
प्रतियोगितात्मक लिखित परीक्षा
KEY [B]
समय : १ घण्टा पूर्णाङ्क : ५०
विषय : कम्प्युटर सम्बन्धी
उत्तरपुस्तिकामा प्रश्नपत्रको प्भ्थ् अनिवार्य रुपले उल्लेख गर्नुपर्छ । उल्लेख नगरेमा उत्तरपुस्तिका रद्द हुनेछ । परीक्षामा अबअिगबितयच, mयदष्भि प्रयोग गर्न पाइनेछैन ।
Multiple choice
1 which feature is used for monitoring all document changes?
A) Edit document B) Monitor change C) Track change D) Track all
2 which language is used to create macros in excel?
A) Visual Basic B) C C) visual C++ D) Java
3. What does the VLOOKUP function do ?
A) find related records
B) Check whether text is the same in one cell as in the text
C) Looks up text that contain ‘V’
D) All of the above
4. Where can you find the Draw table tool button?
A) Formatting toolbar B)Drawing toolbar
C) Standard toolbar D) Tables and formatting toolbar
5. What does WWW stands for?
A) World Wide Webster B) World With Web
C) World Wide Web D) World Without Web
6. Which of the following tag is used to mark a beginning of paragraph?
A) <TD> B) <br> C) <P> D) <TR>
7. A webpage displays a picture . What tag is used to display that picture?
A) picture B) image C) img D) src
8. Text within <EM></EM> tag is displayed as
A) bold B) italic C) list D) indented
9. As per the Electronic Transaction Act , which of the following is not the provision
Relating to electronic record and digital signature?
A) Authenticity of electronic record B) Legal recognition of electronic record
C) Secured digital signature D) Appointment of the controller
10. Which of the following is /are the DDL statement/s?
A) create B) drop C) alter D) all of the above
11. What are the columns in a Microsoft Access table called?
A) Rows B) fields C) cells D) records
12. Cascade deletes option
A) is used to delete all the records of all tables in a database
B) will repeat the recent delete operate to all the records of current table
C) is available in edit relationship dialog box which makes sure that all the related records Will be delete automatically when the record from parent table is delete
D) none of the above
13. How will you write query parameter to retrieve records having item ID less than 100, Greater than 50 ?
A) <100 and>50 B) <100 or>500 C) Both A and B D) none of the above
14. Authentication refers to
A) methods of restricting user access to system
B) controlling access to portions of data
C) controlling the operation on the data
D) all of the above
15. To control access to the database, SQL statement/s is /are used
A) Grant B) Revoke C) Both A and B D) Deny
16. Which of the following memory needs refreshing?
A) SRAM B) DRAM C) ROM D) all of the above
17. The instructions that tell a computer how to carry out the processing takes are referred as
A) programs B) processors C) input devices D) memory modules
18. In computer security, ……….. means that computer system assets can be modified only by authorized parties.
A) confidentially B) integrity C) availability D) authenticity
19. A computer program that converts an entire program into machine language is called a/ an
A) interpreter B) simulator C) compiler D) commander
20. Which of the following controls the process of interaction between the user and the operating system?
A) User interface B) Language translator C) platform D) screen saver
21. A program that copies itself over network connection moving from one computer to
another computer is usually called
A) Worm B) Virus C) Trojan horse D) Trap door
22. Which of the following technology was used in 3rd generation computer?
A) transistor B) vacuum tube C) magnetic tape D) IC
23. What is compiler?
A) A compiler does a conversion line by line as the program is run
B) A compiler converts the whole of a higher level program code into machine code in one Step
C) A compiler is a general purpose language providing very efficient execution
D) None of the above
24. From what location are that 1st computer instructions available on boot up?
A) ROM BIOS B) CPU C) boot.ini D) CONFIG.SYS
25. Which of the following device can be used to directly input printed text?
A) OC B) OMR C) MICR D) None of the above
26. Which of the following have the fastest access time?
A) Semiconductor memories B) magnetic disks C) magnetic tapes D) compact disks
27. What is/are the essential element/s that protect computer and computer room?
A) Door lock B) password C) air conditioner D) all of the above
28. Personal computers can be connected together to form a
A) server B) supercomputer C) network D) enterprise
29. the command allows you to create logical drive
A) sort B) path C) subst D) bath
30. A hard disk is divide into tracks which are further subdivided into
A) clusters B) sectors C) vectors D) heads
31. Which statement is false?
A) you can find deleted files in recycle bin
B) you can restore any files in recycle bin if you ever need
C) you can increase free space of disk by sending files in recycle bin
D) you can right click and choose empty recycle bin to clean it at once
32. What could cause a fixed disk error?
A) No-CD installed B) bad ram C) slow processor D) incorrect CMOS setting
33. What to make the computer boot from CD drive?
A) configure in setup at the start of the computer B) configure in window’s registry
C) configure in window’s control panel D) all of the above
34. Which of the following is a private IP address?
A) 190.168.1.1 B) 191.168.l.1 C) 192.168.1.1 D) 193.168.1.1
35. Multiprocessor system have advantage of
A) increased throughput B) expensive hardware
C) operating system D) both A and B
36. CPU fetches the instruction from memory according to the value of
A) program counter B) status register
C) instruction register D) program status word
37. Only file names and extensions are to be displayed in wide format, which command you’ll
use?
A) Dir/w B) Dir a: C) Dir/s D) Dir/b
38. Which of the following is a program group ?
A) Accessories B) paint C) word D) all of the above
39. which of the following method is used to speed up the computer performance?
A) Disk scanning B) Disk formatting C) Disk fragmentation D) all of the above
40. The networking topology with highest reliability is …….. topology
A) bus B) star C) ring D) mesh
41. IPv6 has……. bit address.
A) 32 B) 64 C) 128 D) variable
42. Which one of the following extends a private network across public networks?
A) local area network B) virtual private network
C) enterprise private network D) storage area network
43. Which of the following is used to convert computer’s binary digits to signals suitable for
transmission over the telephone lines?
A) Direct cable B) LAN C) CPU D) Modem
44. The maximum number of IP address that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask is
A) 14 B) 15 C) 16 D) 30
45. How do you change column width to fit the contents in Ms-Excel?
A) Single click the boundary to the left to the column heading
B) Double click the boundary to the left to the column heading
C) Press Alt and single click anywhere in the column
D) all of the above
46. What does mail merge means:
A) same content to different address B) different content to different address
B) different content to same address D) same content to same address
47. Where is footnote located?
A) top of the page B) bottom of the document
C) bottom of the page D) none of the above
48. In Microsoft PowerPoint in order to see all the slides on one screen use
A) view,slide sorter B) view,slide C) view,master D) view,slide show
49. In the formula, which symbol specifies the fixed columns or rows?
A) $ B) * C) % D) &
50. Which function do you use to return the remainder after a number is divided by a divisor ?
A) ROUND( ) B) FACT( ) C) MOD( ) D) DIV( )
Answer sheet
| 1. C | 2. A | 3. A | 4. D | 5. C | 6. C |
| 7. C | 8. B | 9. D | 10. D | 11. B | 12. C |
| 13. B | 14. D | 15. C | 16. B | 17. A | 18. B |
| 19. C | 20. A | 21. B | 22. D | 23. B | 24. A |
| 25. A | 26. A | 27. D | 28. C | 29. C | 30. B |
| 31. C | 32. D | 33. C | 34. C | 35. A | 36. A |
| 37. A | 38. A | 39. D | 40. D | 41. C | 42. B |
| 43. D | 44. D | 45. B ? | 46. A | 47. C | 48. A |
| 49. A | 50. C |
What do you feel about this post?

Like

Love

Happy

Haha

Sad

