Send Question & Get Answer Send Here

[SOLVED] Lumbini Pradesh Computer Operator MCQ SOLVED by AI ChatGPT

Bookmark This Page For Future Use !

प्रदेश लोक सेवा आयोग

लुम्बिनी प्रदेश

स्थानीय सरकारी सेवा अन्तर्गत विविध सेवा, सहायक पाँचौं तह, कम्प्युटर अपरेटर पदको प्रतियोगितात्मक लिखित परीक्षा
मिति : २०८०/०१/३० गते

KEY:(B) पूर्णाङ्क :१००
समय :४५ मिनेट
विषय: सेवा सम्बन्धी
उत्तरपुस्तिकामा प्रश्नपत्र KEY अनिवार्यरुपले उल्लेख गर्नुपर्दछ । उल्लेख नगरेमा उत्तरपुस्तिका रद्ध हुनेछ ।परीक्षण मोबाइल, CALCULATOR आदिको प्रयोग गर्न पाइने छैन ।

1.The program embbed on chip is called :

A
Live ware
B
Firm ware
C
Shareware
D
Operating System
Answer:

The correct option is B. Firm ware

Reason
The program embedded on a chip is called firmware. Firmware refers to a type of software that is embedded in a hardware device, typically in non-volatile memory, to control its basic functions. It is different from software installed on a computer's hard drive, which can be easily modified or updated.

2.Which of the following terms refers to the physical path over which a messeage travels in a computer network ?

A
Path
B
Medium
C
Route
D
Protocal
Answer:

The correct option is B. Medium

Reason
The term that refers to the physical path over which a message travels in a computer network is "Medium".

3. Conversion of an octal number 20 to it's binary number is :

A
10000
B
10111
C
10110
D
11110
Answer:

The correct option is A. 10000

Reason
The octal number 20 can be converted to binary as follows: 2 0 2^1 2^0 010 000 Therefore, the binary representation of the octal number 20 is 010000. So, the answer is 010000.

4.Fat stands for:

A
File accomodation table
B
File access type
C
File allocation table
D
File activity table
Answer:

The correct option is C. File Allocation Table

Reason
FAT stands for "File Allocation Table".

5.Which command will be used to display a file within the specified directory of pathname ?

A
Dir \pathname
B
Dir \pathname\pathname
C
Dir/ch
D
Dir \pathname\filename
Answer:

The correct option is D. Dir \pathname\filename

Reason
The correct command to display a file within the specified directory or pathname in Windows operating system is: ``` dir pathname\filename ``` For example, if you want to display a file named "example.txt" located in a directory named "Documents" on the C: drive, the command would be: ``` dir C:\Documents\example.txt ``` This command will display the file name, size, and other details of the specified file in the command prompt window.

6.Which of the following is a component of Microsoft windows that enables to view and change system settings?

A
Windows control
B
Control panel
C
Windows setting
D
Windows panel
Answer:

The correct option is B. Control Panel

Reason
The Control Panel is a component of Microsoft Windows that allows users to view and change various system settings and controls. It provides a graphical user interface to access functions and settings that are otherwise difficult to locate or access through the Windows operating system. The Control Panel can be used to adjust display settings, manage user accounts, install or uninstall programs, configure hardware devices, and more. It is a central hub for many important system management functions in Windows.

7.Windows control panel is used to :

A
Removing hardware and software
B
Controlling user account
C
Accessing networking settings
D
All of the above
Answer:

The correct option is D. All of the above

Reason
All of the above. The Windows Control Panel provides a centralized place to view and change system settings, including managing hardware and software, controlling user accounts, and accessing networking settings.

8.Which of the following is not of the merge process ?

A
Sort the data source records
B
Merge the two files to print or create a new document
C
Edit a data source
D
Format a main document
Answer:

The correct option is Not in option

Reason
None of the options is correct, as all four steps are part of the merge process.
The typical merge process involves the following steps:
1. Sort the data source records: This involves organizing the data source records in a particular order, typically by a unique identifier, such as a customer ID.
2. Edit a data source: This step involves making any necessary changes or updates to the data source, such as adding new records or updating existing ones.
3. Format a main document: This step involves creating a main document, such as a letter or report, and formatting it appropriately for merging with the data source.
4. Merge the two files to print or create a new document: This is the final step of the merge process, where the data source is merged with the main document to create a new document that contains customized information for each record in the data source.

9.Which of the following command can be used to access the Font size tool on formatting toolbar ?

A
Ctrl + s
B
Ctrl + shift + s
C
Ctrl + p
D
Ctrl + shift + p
Answer:

The correct option is D. Ctrl + shift + p

Reason
In Microsoft Word, when you press Ctrl + Shift + P, it opens the Font dialog box, which allows you to change the font, size, style, color, and other formatting options for the selected text or the current paragraph. From this dialog box, you can also apply advanced formatting options, such as underline styles, strikethrough, superscript, and subscript. The Font dialog box can also be accessed by right-clicking on the selected text and choosing "Font" from the context menu.

10. Which of the following typically appear at the end of document for citation of source ?

A
End Note
B
Foot Note
C
Header
D
Footer
Answer:

The correct option is A. End Note

Reason
Citations are typically included at the end of a document or paper as an End Note or a Bibliography to provide credit and reference to the sources that were used in writing the document. This is important because it shows that the author has done research and has based their work on credible sources, and it also allows readers to find and read those sources for further information. Footnotes, on the other hand, are usually used to provide additional information or clarification about a particular point in the text and are placed at the bottom of the page on which the information appears. Headers and footers, meanwhile, are areas at the top or bottom of a document page that can be used to display information such as page numbers, dates, or author names.

11. Superscript, subscript, outline, emboss, engrave are known as :

A
Font styles
B
Font Effects
C
Word art
D
Text effects
Answer:

The correct option is B. Font Effects

Reason
These terms are known as "Font Effects" because they modify the appearance of text in a specific way without changing the actual font used. Font effects are applied to text in addition to the font style, size, and color, and can be used to add visual interest or emphasis to text. Superscript and subscript change the text's position above or below the baseline, outline adds a border around the text, emboss and engrave create a three-dimensional effect, and word art adds stylized graphical effects to the text.

12.Which of the following can be picked as reference type while inserting a cross - reference?

A
Bookmark
B
Foot Note
C
End Note
D
All of the above
Answer:

The correct option is D. All of the above

Reason
When inserting a cross-reference in a Microsoft Word document, a reference type must be selected. One of the reference types that can be selected is a bookmark, which is a location or selection in the document that has been given a name for easy reference. Another reference type that can be selected is a footnote, which is a note or citation placed at the bottom of a page in a document. The third option, Endnote, is similar to a footnote but is placed at the end of a document. So, all of the above options can be selected as reference types while inserting a cross-reference.

13. Search a text to change and replace it with something other can be done by :

A
Ctrl + F
B
Ctrl + H
C
Ctrl + C
D
All of the above
Answer:

The correct option is B. Ctrl + H

Reason
The correct answer is Ctrl + H. It opens the "Find and Replace" dialog box, which allows you to search for specific text and replace it with something else.
Ctrl + F is used to open the "Find" dialog box, which allows you to search for specific text in a document.
Ctrl + C is used to copy selected text or objects to the clipboard.

14. Which of the following security technique helps to maintain integrity of a document ?

A
File Password
B
Digital signature
C
File encryption
D
All of the above
Answer:

The correct option is D. All of the above

Reason
All of the above security techniques can help to maintain the integrity of a document. A file password can prevent unauthorized access and changes to a document, while digital signatures can verify the authenticity and integrity of a document. File encryption can protect the contents of a document from unauthorized access or modification during transmission or storage.

15.Header and footer are visible in:

A
Draft view
B
Normal view
C
Page layout view
D
Print layout view
Answer:

The correct option is D. Print Layout View

Reason
The correct answer is "Print layout view". In Word, the "Print Layout" view allows you to see how your document will look when it is printed, including any headers and footers that you have added. The "Draft" view is a simplified view of the document without many of the formatting elements displayed, and the "Normal" view is a default view that shows the document without headers and footers.

16.What happenes when dollar signs($) are entered in a cell address? ($B$2:$B$10) ?

A
An absolute cell address is created
B
Cell address will change when it is copied to another cell.
C
The sheet tab changed
D
The status bar does not display the cell address.
Answer:

The correct option is A. an absolute cell address is created

Reason
When dollar signs ($) are entered in a cell address like ($B$2:$B$10), an absolute cell address is created. It means that when this cell address is copied to another cell, it will not change. The dollar signs in front of the column letter and row number make the cell reference absolute, which means that it will always refer to the same cell. The sheet tab and status bar do not change based on the use of dollar signs in a cell address.

17.When a number does not fit in a cell of excel, it displays ?

A
###
B
#DIV/0!
C
# NAME?
D
All of the above
Answer:

The correct option is A. ###

Reason
When a number is too large to fit within a cell in Excel, it will display as "###". This occurs because Excel has a limited amount of space available to display data within a cell. To fix this, you can either widen the column to make more space for the number, or you can change the formatting of the cell to display the number in scientific notation or a smaller unit (e.g. thousands or millions).
The other options (#DIV/0! and #NAME?) are error messages that appear in Excel when a formula or function is not entered correctly or is referencing cells that don't exist. #DIV/0! occurs when a formula attempts to divide a value by zero, and #NAME? occurs when a function or formula contains a misspelled or undefined name.

18.The formula "=county(value1, value2...) Counts the number of cells in a range that :

A
Are not empty
B
Contain numbers
C
Empty cells
D
Contain text
Answer:

The correct option is A. Are not empty

Reason
The formula "=count(value1, value2...)" counts the number of cells in a range that contain numbers. It does not count empty cells or cells that contain text. If you want to count the number of non-empty cells in a range, you can use the formula "=counta(value1, value2...)".

19.Identify the invalid method of editing the cell content :

A
Press the F12 key
B
Press the alt key
C
Double click the cell
D
Click the formula bar
Answer:

The correct option is A. Press the F12 key

Reason
1. Press the F12 key: This option is not an invalid method of editing cell content. The F12 key is a shortcut key that opens the "Save As" dialog box in Excel, allowing you to save a copy of your current workbook with a new name or in a different location. It is not related to editing cell content.
2. Press the alt key: This option is also not an invalid method of editing cell content. The Alt key is a modifier key that can be used in combination with other keys to perform various actions in Excel, such as accessing the ribbon menu, activating shortcut keys, or selecting cells. However, it does not directly allow you to edit cell content.
3. Double click the cell: This option is a valid method of editing cell content. Double-clicking a cell in Excel activates the cell editing mode, which allows you to modify the content of the cell directly. You can also press the F2 key or click the formula bar to enter cell editing mode.
4. Click the formula bar: This option is also a valid method of editing cell content. Clicking the formula bar in Excel selects the entire content of the active cell, including any text or formulas, and places the cursor at the end of the content, allowing you to edit it. You can also use this method to copy or paste the content of a cell to another location.

20. You can specify _____ To format a cell value as currency :

A
Currency symbol
B
Decimal places
C
Decimal places and currency symbol
D
Neither currency symbol nor decimal
Answer:

The correct option is C. Decimal places and currency symbol

Reason
You can specify "Decimal places and currency symbol" to format a cell value as currency.
To format a cell value as currency, you can select the cell or range of cells and then go to the "Home" tab in the Excel ribbon. In the "Number" group, click on the drop-down arrow next to the "Number Format" box. From the list of options that appears, select "Currency". This will open the "Format Cells" dialog box, where you can specify the currency symbol and the number of decimal places you want to display.
You can also use the "Accounting" format to format a cell value as currency, which includes a currency symbol, comma separators, and decimal places.

21 What is the universal file format for importing and exporting data in excel ?

A
XML
B
CSV
C
SPSS
D
Text
Answer:

The correct option is B. CORRECT OPTION

Note
- XML: XML stands for Extensible Markup Language and is a markup language used for encoding documents in a format that is both human-readable and machine-readable. XML is a flexible file format that can be used for exchanging data between different systems and applications, including Excel. Excel allows users to import and export data in XML format.
- CSV: CSV stands for Comma-Separated Values and is a simple file format used for storing tabular data, such as a spreadsheet or database. In a CSV file, each line represents a row of data, and each value within the row is separated by a comma. Excel supports CSV as a universal file format for importing and exporting data.
- SPSS: SPSS stands for Statistical Package for the Social Sciences and is a software package used for statistical analysis in social sciences. SPSS uses its own proprietary file format, but it can also import and export data in other file formats, including Excel.
- Text: Text file format is a simple file format that stores text data in ASCII format. In a text file, data is stored in a plain text format, which makes it easy to read and edit using any text editor. Excel can import and export data in text file format.

22. Generating series of numbers/specific squential number codes can be done manually by:

A
Selecting two numbers that are in the right sequence
B
Dragging the full handle to the end of the numbered range
C
Use the ROW function together with the TEXT function
D
All of the above
Answer:

The correct option is D. All of the above

Note
Generating a series of numbers or sequential number codes can be done manually using any of the following methods:
1. Selecting two numbers that are in the right sequence: Enter the first two numbers in the sequence in adjacent cells. Select both cells, and drag the fill handle (the small black square at the bottom right corner of the selection) to the end of the range you want to fill. The pattern will be automatically filled.
2. Dragging the fill handle to the end of the numbered range: Enter the first number in the sequence in a cell and format it the way you want. Select the cell and drag the fill handle to the end of the range you want to fill.
3. Using the ROW function together with the TEXT function: Enter the first number in the sequence in a cell and format it the way you want. In the next cell, enter the formula =TEXT(ROW()-n,"format"), where n is the row number of the first cell in the sequence and format is the format you want. Drag the fill handle to the end of the range you want to fill.

23 Which of the following ways filters data from pivot table ?

A
Inserting slicer
B
Using auto filter
C
Using reports filter
D
All of the above
Answer:

The correct option is D. All of the above

Reason
1. Inserting slicer: Slicers are visual filters that you can use to quickly filter data in a pivot table. You can insert a slicer by selecting the pivot table, going to the "Insert" tab in the ribbon, and clicking on "Slicer". From there, you can choose which fields to create slicers for.
2. Using auto filter: Auto filter is a feature in Excel that allows you to filter data in a range of cells based on specific criteria. To use auto filter with a pivot table, click on any cell within the pivot table, go to the "Data" tab in the ribbon, and click on "Filter". From there, you can choose which fields to filter by.
3. Using report filter: Report filters allow you to filter the entire pivot table by selecting specific criteria. To use a report filter, click on any cell within the pivot table, go to the "PivotTable Analyze" tab in the ribbon, and click on "Insert Slicer". From there, you can choose which fields to filter by.

24. Which of the following search a table for a particular value and then find the associated value in the same row, but different column ?

A
VLOOKUP
B
CONCATENATE
C
SUMIFS
D
All of the above
Answer:

The correct option is B. CORRECT OPTION

Note

The function that searches a table for a particular value and then finds the associated value in the same row, but different column is VLOOKUP.
VLOOKUP stands for Vertical Lookup, and it is a useful function in Excel for looking up information in large data tables. It takes four arguments:
- Lookup_value: the value you want to look up in the first column of the table
- Table_array: the range of cells that contains the table data
- Col_index_num: the column number (relative to the table array) that contains the value you want to return
- Range_lookup: an optional argument that specifies whether the lookup value should be an exact match or an approximate match
Here's an example of how to use the VLOOKUP function to find a value in a table and return the associated value in a different column:
Suppose we have the following table in cells A1:B4:
| Fruit | Quantity |
| ------- | -------- |
| Apples | 10 |
| Oranges | 15 |
| Bananas | 20 |
To find the quantity of oranges, we could use the following VLOOKUP function:
``` =VLOOKUP("Oranges", A1:B4, 2, FALSE) ```
This would search for "Oranges" in the first column of the table (A1:A4), and return the value in the second column (B1:B4) of the same row, which is 15.

25. A composite key is :

A
The primary key with auto number as the field type.
B
Is a foreign key that uniquely idenfies records.
C
Made up of two or more fields to uniquely identify records .
D
None of the above
Answer: C

The correct option is . Made up of two or more fields to uniquely identify records .

Note

1. The primary key with auto number as the field type:
A primary key is a field or a set of fields that uniquely identifies each record in a table. Auto number is a field type in Microsoft Access that automatically generates a unique number for each record in a table. When a primary key is set to the AutoNumber data type, Access automatically assigns a unique, incremental value to each new record added to the table.
2. Is a foreign key that uniquely identifies records:
A foreign key is a field in a table that is a primary key in another table. It is used to link two tables together. In a one-to-many relationship between two tables, the primary key of the "one" table is added as a foreign key to the "many" table. The foreign key is used to uniquely identify the records in the "many" table that are related to a specific record in the "one" table.
3. Made up of two or more fields to uniquely identify records:
A composite key is a primary key that is made up of two or more fields in a table. It is used when a single field cannot uniquely identify a record, but the combination of two or more fields can. For example, in a table that stores information about books, a combination of the book title and the author's name could be used as a composite key to uniquely identify each book.
4. None of the above:
This option does not apply to any of the definitions of a composite key.

26.Which of the following command is used to delete an existing row in table ?

A
Erase
B
Drop
C
Delete
D
Remove
Answer:

The correct option is C. Delete

Reason
The correct command used to delete an existing row in a table in SQL is the DELETE command. The syntax for the DELETE command is as follows:
``` DELETE FROM table_name
WHERE some_column = some_value;
``` The `table_name` is the name of the table from which you want to delete the row, and the `some_column = some_value` specifies the condition for deleting the row.
Note that the `DROP` command is used to delete the entire table, while the `ERASE` and `REMOVE` commands are not valid commands in SQL.

27. Using the keywoord ______Will return records in which the field value equals a defined text.

A
Like
B
Between
C
Is null
D
Equal
Answer:

The correct option is D. Equal

Reason
The keyword that will return records in which the field value equals a defined text is "Equal". The Equal operator is used in SQL to match a specific value in a field with the specified value. It is used in conjunction with the WHERE clause to filter records in a table. For example, to retrieve all records where the value of the "City" field is "New York", the SQL statement would be:
SELECT * FROM Customers WHERE City = 'New York';
This would return all records where the "City" field equals "New York".
Sure, here are the explanations for each option:
- Like: This keyword is used in SQL to search for a specified pattern in a column. It is used with the '%' and '_' wildcards. For example, to find all records where the first name starts with the letter "J", you would use the query "SELECT * FROM employees WHERE first_name LIKE 'J%';".
- Between: This keyword is used to retrieve values within a specific range. It is used in the WHERE clause of a SELECT statement. For example, to find all employees with salaries between $50,000 and $70,000, you would use the query "SELECT * FROM employees WHERE salary BETWEEN 50000 AND 70000;".
- Is null: This keyword is used to retrieve records where a column contains no value or null value. For example, to find all employees who do not have a manager, you would use the query "SELECT * FROM employees WHERE manager_id IS NULL;".
- Equal: This keyword is used to retrieve records where a column's value is equal to a specific value. It is used in the WHERE clause of a SELECT statement. For example, to find all employees whose first name is "John", you would use the query "SELECT * FROM employees WHERE first_name = 'John';".

28.______Is used to represent relationships between tables.

A
Primary key
B
Secondary key
C
Foreign key
D
Tertiary key
Answer:

The correct option is C. Foreign Key

Reason
Foreign key is used to represent relationships between tables in a database. A foreign key is a field in a table that refers to the primary key of another table. It is used to create a link between two tables and enforce referential integrity, which ensures that data is consistent and accurate across different tables.
- Primary key: A primary key is a column or a combination of columns that uniquely identifies each row or record in a table. It is used to enforce data integrity and ensure that each row in the table is unique. Primary keys can be used to create relationships between tables, and they are often used as the basis for indexing and searching within a table.
- Secondary key: A secondary key is a column or a combination of columns that is used to provide additional indexing and searching capabilities for a table. Unlike primary keys, secondary keys are not required to be unique, but they are often used to speed up queries and improve performance when searching through large tables.
- Foreign key: A foreign key is a column or a combination of columns that is used to establish a relationship between two tables in a relational database. It is based on the values in a primary key column in one table and is used to link that table to another table. The foreign key column in the second table refers to the primary key column in the first table, and this linkage helps to ensure referential integrity between the two tables.
- Tertiary key: There is no such thing as a tertiary key in relational databases. Primary keys, secondary keys, and foreign keys are the three most common types of keys used to establish relationships between tables and enforce data integrity.

29.Which is the relationship between tables represent the case where there are many people involved in each project And every person can involve more than one project ?

A
One to one relationship
B
One to many or many to one relationship
C
Many to many realtioship
D
None of the Above
Answer:

The correct option is C. Many to many realtioship

Note
In a many-to-many relationship between two tables, each record in the first table can have multiple related records in the second table, and each record in the second table can have multiple related records in the first table.
In the given scenario, it means that many people can be involved in multiple projects, and each project can involve multiple people. This relationship can be modeled using a junction table or an associative entity table that includes foreign keys from both tables.
The relationship between tables that represents the case where there are many people involved in each project and every person can involve more than one project is a many-to-many relationship. In a many-to-many relationship, each record in one table can be related to many records in another table and vice versa. To establish such a relationship, a third table called a junction table is used to store the related data from both tables. The junction table consists of foreign keys from both tables that are used to establish the relationship between them.

30.A _____In access is a database object that you can use to create a user interface for a database application

A
Form
B
Reports
C
Macro
D
All of the above
Answer:

The correct option is A. Form

Reason
A form in Access is a database object that you can use to create a user interface for an Access application. Forms allow you to enter, view, and edit data in a more user-friendly way than directly interacting with tables. Reports, on the other hand, are used to summarize and present data from tables or queries in a printable format. Macros are used to automate tasks in Access, such as opening a form or running a query, by recording a series of actions. So the correct answer is "Form".

31. Which of the following section does not exits in a slide layout ?

A
Animation
B
Chart
C
List
D
Title
Answer:

The correct option is A. Animation

Note
The section that does not exist in a slide layout is "Animation".
A slide layout is a pre-designed template that contains placeholders for text, graphics, and other content. It helps to organize the content on a slide and makes it easier to create consistent-looking presentations. The slide layout typically includes sections such as Title, Subtitle, Text, Picture, and Chart. These sections provide placeholders for the content and help to guide the placement of the elements on the slide.
Animation is not a section in the slide layout but rather a feature in PowerPoint that allows you to add visual effects and motion to the objects on a slide. It is applied to individual objects or groups of objects on the slide, and it determines how they appear and disappear during the presentation.

32. ______ Allows to create new presentation by selecting reaady-made fonr and graphics effects.

A
Design templates
B
Master slide
C
Animation scheme
D
Presentation templates
Answer:

The correct option is A. Design templates

Note
- Design templates: These are pre-designed templates that come with various color schemes, font styles, and layouts to give a consistent look to your presentation. Design templates can be applied to an entire presentation or to selected slides.
- Master slide: It is a template for creating slides in a presentation that contains placeholder elements for adding text, images, videos, etc. Master slides provide a consistent look and feel to a presentation and can be used to apply formatting changes to all slides in a presentation at once.
- Animation scheme: It is a predefined set of animations that can be applied to objects on a slide to add visual interest and help communicate ideas more effectively. Animation schemes can be customized to adjust the timing, direction, and duration of the animation effects.
- Presentation templates: These are pre-designed templates that come with content already inserted, such as text, images, and charts. Presentation templates can be used as a starting point for creating new presentations quickly.

33. HTML is what type of language ?

A
Scripting language
B
Markup language
C
Programming language
D
Network protocol
Answer:

The correct option is B. Markup language

Reason
HTML is a markup language.

34. The tag used to add images to HTML document is :

A
<HTML>
B
<HR>
C
<HL>
D
<IMG>
Answer:

The correct option is D. <IMG>

Note
The correct tag used to add images to an HTML document is `<img>`. The `img` tag is an empty tag, which means it does not require a closing tag. It is used to display images on a web page. The `img` tag has several attributes that can be used to customize the way the image is displayed, such as `src` (to specify the image source), `alt` (to provide a text description of the image), `width` and `height` (to set the dimensions of the image), and more.
The other tags mentioned in the question are:
- `<HTML>`: This is the opening tag used at the beginning of an HTML document to indicate that it is an HTML file.
- `<HR>`: This tag is used to create a horizontal rule (a line) on a web page.
- `<HL>`: This is not a valid HTML tag.


35. According to electronic transaction act, who appoints controller ?

A
Nepal government
B
Ministry of general administration
C
Office of company registrar
D
Department of information technology
Answer:

The correct option is A. Nepal Government

Note
The Electronic Transaction Act is a law passed by the Government of Nepal in 2004 A.D. to provide legal recognition to electronic transactions and documents. As per the act, the Government of Nepal appoints a Controller of Certifying Authorities to regulate and supervise the activities of Certifying Authorities in the country. Therefore, the answer to the question is the Nepal government.

36. Which of the following is not major objective of ICT policy , 2072?

A
To create ICT easily accessible and affordable to all
B
To develop new and upgrade the existing ICT infrastructure
C
To promote good governance using ICT
D
To develop and implenent 5G network all over the country
Answer:

The correct option is D. To develop and implenent 5G network all over the country

Reason
The objective "To develop and implement 5G network all over the country" is not a major objective of the ICT policy, 2072.

37. Which of the following is/are the provincial power ?

A
Operation of radio , FM., Television
B
Housing and land registration fee
C
Mato vehicle tax
D
All of the above
Answer:

The correct option is D. All of the above

Reason
All of the above - Operation of radio, FM, television, housing and land registration fee, and motor vehicle tax are among the list of provincial powers in Nepal.

38. Provisions realted to computer offenses / crimes are mentioned in:

A
The constitution of Nepal
B
Local government operation act
C
IT policy
D
Electronic transaction act
Answer:

The correct option is D. Electronic transaction act

Reason
Provisions related to computer offenses/crimes are mentioned in the Electronic Transaction Act of Nepal.

39. The application of machine learning methods to a large database is called :

A
Artificial intelligence
B
Data mining
C
Big data computing
D
Internet if things
Answer:

The correct option is B. Data Mining

Note
The application of machine learning methods to a large database is called "Data mining".
- Artificial intelligence: Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. AI involves the development of computer algorithms that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, and language translation.
- Data mining: Data mining is the process of discovering patterns and insights in large datasets using various mathematical and computational techniques. It involves analyzing and extracting information from data sets to identify patterns, relationships, and trends that can be used to make informed business decisions.
- Big data computing: Big data computing refers to the processing and analysis of large datasets using advanced computing technologies such as distributed computing, cloud computing, and parallel processing. Big data computing involves the use of specialized software tools and algorithms to manage and analyze large volumes of data from diverse sources, including social media, sensors, and mobile devices.
- Internet of things: The Internet of Things (IoT) refers to the network of physical objects, devices, and machines that are connected to the internet and can exchange data with each other. IoT devices can collect and transmit data on a range of variables, such as temperature, humidity, location, and movement. This data can be used to automate processes, monitor and control equipment, and optimize operations in various industries.

40. Which of the following is /are allocation of natural language processing (NPL) ?

A
Speech recognition
B
Speech segmentation
C
Text to speech
D
All of the above
Answer:

The correct option is D. All of the above

Reason
The correct allocation of natural language processing (NLP) is:
- Speech recognition: The process of converting spoken language into text or machine-readable format.
- Speech segmentation: The process of dividing a continuous stream of speech into distinct words or phrases.
- Text to speech: The process of converting written text into spoken language using synthetic voices or speech synthesizers.
Therefore, all of the above options are allocation of natural language processing (NLP).

41. जिन्सी व्यवस्थापनको पहिलो प्रकिया तलका मध्ये कुन हो ?

A
खरीद योजना
B
माग सङ्कलन
C
खरीद आदेश
D
दाखिला
Answer:

The correct option is A. खरीद योजन

Reason
जिन्सी व्यवस्थापनको पहिलो प्रकिया हो खरीद योजना हो । यो व्यवस्थापनले उत्पादन वा सेवाको लागि आवश्यक सामग्री र साधनहरूको विस्तार तथा विवरण तोकेको योजना हो। यस योजनामा कुन उत्पादन वा सेवा कति मात्रामा र कुन समयमा र कस्ता शर्तहरूका साथ खरिद गर्नु पर्ने भएको व्यवस्थापनले लेख्नु पर्छ। यो योजना अनुसारै खरिद आदेश बनाउन सकिन्छ।
खरीद योजना (Purchase Plan): यसले सामग्री व्यवस्थापनको प्रक्रियाको पहिलो चरणलाई जनाउँछ, जहाँ संगठनका आवश्यकताहरू पूरा गर्न खरिद गर्न आवश्यक पर्ने वस्तुहरू वा सामग्रीहरू निर्धारण गर्न योजना बनाइन्छ।
माग सङ्कलन (Demand Collection): यसले वस्तु वा सेवाको मागसँग सम्बन्धित डाटा सङ्कलन र विश्लेषण गर्ने प्रक्रियालाई जनाउँछ। यसमा आवश्यक वस्तु वा सेवाहरूको मात्रा, तिनीहरूको डेको लागि समय सीमा पहिचान गर्न समावेश छ
खरीद आदेश (Purchase Order): यसले खरिदकर्ताद्वारा विक्रेतालाई जारी गरेको कानुनी कागजातलाई जनाउँछ, जसमा खरिद गरिने वस्तु वा सेवाहरूको विवरण, मूल्य, डेलिभरी मिति र अन्य सान्दर्भिक सर्तहरू समावेश हुन्छन्।
दाखिला (Receipt): यसले वस्तु वा सेवाहरूको प्राप्तिलाई स्वीकार गर्ने कागजातलाई जनाउँछ। यसले सामान्यतया विवरणहरू समावेश गर्दछ जस्तै आपूर्तिकर्ताको नाम, डेलिभरीको मिति, मात्रा र विवरण।

42. सार्वजनिक सेवा प्रबहाहरुलाई प्रभावकारी तुल्याउन स्थापना गरिएको हेलो सरकारको निःशुल्क फोन नम्बर तलका मध्ये कुन हो ?

A
१००१
B
१००४
C
१०११
D
११११
Answer:

The correct option is D. ११११

Note
११११ हेलो सरकारको निःशुल्क फोन नम्बर हो।

43. नेपालमा भित्राइएको पहिलो कम्प्युटर कुन हो ?

A
आइसिएल 2950/10
B
IBM 1401
C
Facit
D
UNIVAC
Answer:

The correct option is B. IBM 1401

Reason
नेपालमा भित्राइएको पहिलो कम्प्युटर IBM 1401 हो। २०७३ वर्षमा नेपाल सरकारले त्यसको स्मारक मान्यता दिएको थियो।

44. चलानी रजिस्टरमा तलका मध्ये कुन कुरा कुलाइनु पर्दैन ?

A
पत्रको मिति
B
चलानी नम्बर
C
विषय
D
हस्ताक्षर गर्ने पदाधिकारीको नाम, थर
Answer:

The correct option is D. हस्ताक्षर गर्ने पदाधिकारीको नाम, थर

Reason
हस्ताक्षर गर्ने पदाधिकारीको नाम, थर चलानी रजिस्टरमा खुलाउनुपर्दछ किनकि यसले आफ्नो निजी जानकारी हो जुन अन्यले जान्न सक्दैन। त्यसैले, यसलाई निजी रूपमा सुरक्षित राख्नुपर्छ।

45. उत्प्रेरणाको दुई तत्त्व सिद्धान्त कसले प्रतिपादन गरेका हुन् ?

A
फ्रेडरिक हर्जबर्ग
B
अब्राहाम मस्लो
C
म्याक ग्रेगर
D
जोन एडम्स
Answer:

The correct option is A. फ्रेडरिक हर्जबर्ग

Reason
उत्प्रेरणाको दुई तत्त्व सिद्धान्त फ्रेडरिक हर्जबर्गले प्रतिपादन गरेका हुन्। उनले उत्प्रेरणाको दुई तत्त्व सिद्धान्त "एक्साइटेमेंट तथा दु:ख" र "घातकता र सम्पन्नता" भन्ने नामकरण गरेका हुन्। एक्साइटेमेंट तथा दु:खको सिद्धान्तमा, उनले उत्प्रेरणाको सुखदु:खको सामान्य संघटन, व्यवहार र प्रेरणाप्रति खुलासा गरेका हुन्। घातकता र सम्पन्नताको सिद्धान्तमा, उनले सकारात्मक र नकारात्मक उत्प्रेरणाको अनुभव गरेर उत्प्रेरणाको उत्पत्ति र विस्तारको बारेमा विचार गरेका हुन्।

46. _____ developed the basic computer architecture .

A
Cherles Babbage
B
John vin Neumann
C
Blaisc pascal
D
Garden Moore
Answer:

The correct option is B. John vin Neumann

Reason
John von Neumann developed the basic computer architecture, which is also known as the Von Neumann architecture.
1. Charles Babbage - Charles Babbage is known as the "Father of the Computer" for his work on mechanical computing devices in the 1800s. He is credited with inventing the first mechanical computer, called the Difference Engine, and designing the Analytical Engine, which is considered to be the first general-purpose computer. While Babbage's work was groundbreaking, it did not establish the basic computer architecture as we know it today.
2. John von Neumann - John von Neumann was a Hungarian-American mathematician and physicist who made significant contributions to a variety of fields, including computer science. He is credited with developing the basic computer architecture, which is also known as the Von Neumann architecture. This architecture is characterized by a central processing unit (CPU) that retrieves instructions and data from memory, performs operations on the data, and stores the results back in memory. The Von Neumann architecture is still used in most computers today.
3. Blaise Pascal - Blaise Pascal was a French mathematician, physicist, and inventor who lived in the 17th century. He is best known for his contributions to probability theory, but he also invented the mechanical calculator, which was the first machine that could perform addition and subtraction. While Pascal's work on the mechanical calculator was groundbreaking, it did not establish the basic computer architecture as we know it today.
4. Gordon Moore - Gordon Moore is a co-founder of Intel Corporation and is known for Moore's Law, which states that the number of transistors on a microchip doubles approximately every two years, leading to exponential growth in computing power. While Moore's Law has had a significant impact on the development of computer technology, it does not relate directly to the basic computer architecture.

47. Which computer memory is used to for storing program and data currently being processed by the CPU ?

A
Mass memory
B
Internal memory
C
Non - volatile memory
D
PROM
Answer:

The correct option is B. Internal memory

Reason
The computer memory used for storing program and data currently being processed by the CPU is internal memory, also known as primary memory or main memory. This memory is directly accessible to the CPU and is used for holding the instructions and data that the CPU needs to access and manipulate in real-time. It is a volatile memory, which means that its contents are lost when the power is turned off or during a system crash. Non-volatile memory, such as hard disk drives or solid-state drives, is used for long-term storage of programs and data. PROM (Programmable Read-Only Memory) is a type of non-volatile memory that can only be programmed once by the manufacturer, typically to store firmware or BIOS code.

48. Which of the following technology is used by hard disk drive ?

A
Semiconductors
B
Laser Beam
C
Magnetic disk
D
Magnetic tape
Answer:

The correct option is C. Magnetic Disk

Note
The technology used by hard disk drives is magnetic disk. Hard disk drives use magnetic disks to store and retrieve digital data. The data is read and written on the magnetic disks using a read/write head that moves across the disk surface. Semiconductors are used in other components of the computer such as the processor and memory, while laser beams are used in optical storage devices like CDs and DVDs. Magnetic tape is a storage medium that uses a long strip of magnetic tape to store data.

49. ______ is formed when computers are networkde with a with a switch in a LAN.

A
Bus topology
B
Ring topology
C
Star topology
D
Mesh topology
Answer:

The correct option is B. Star Topology

Reason
Star topology is formed when computers are networked with a switch in a LAN. In a star topology, all devices are connected to a central switch, which manages the flow of data between the devices.
1. Bus Topology: In a bus topology, all the devices in a network are connected to a single, shared communication line called a bus. Data is transmitted across the bus from one device to another in a linear fashion. Each device is responsible for detecting the data intended for it and accepting it while ignoring the rest. A fault or break in the bus cable can disable the entire network.
2. Ring Topology: In a ring topology, devices are connected in a circular configuration with each device connected to two other devices, forming a closed loop. Data travels around the loop in one direction, and each device repeats the signal before passing it on to the next device. Each device on the ring topology is responsible for detecting the data intended for it and accepting it while ignoring the rest. A fault or break in the cable can disable the entire network.
3. Star Topology: In a star topology, all devices are connected to a central switch or hub, which manages the flow of data between the devices. The central switch or hub acts as a relay, forwarding data to the intended recipient device. In this topology, a fault in a single cable or device does not affect the rest of the network, as each device is connected directly to the central switch.
4. Mesh Topology: In a mesh topology, each device is connected to every other device in the network, forming a fully connected network. This topology is highly fault-tolerant, as there are multiple paths for data to travel from one device to another. However, the cost of cabling and complexity of configuration increases as the number of devices increases.

50. ____ connector is used at ends of twisted pair Cable to connect a NIC card and a port in a switch.

A
RJ 45
B
BNC
C
HDMI
D
USB
Answer:

The correct option is B. RJ 45

Reason
The connector used at ends of twisted pair cable to connect a NIC card and a port in a switch is RJ45 connector.
1. RJ45: This is a type of connector commonly used for Ethernet cables, which are made up of twisted pairs of wires. RJ45 connectors have eight pins and are used to connect networking devices like switches, routers, and NICs (Network Interface Cards). They are widely used in both residential and commercial settings for wired internet connections.
2. BNC: BNC stands for Bayonet Neill–Concelman and is a type of connector used for coaxial cables. BNC connectors are commonly used in video and audio applications, as well as for computer networking. However, they are not commonly used for connecting NIC cards and switches.
3. HDMI: This is a type of connector used for high-definition multimedia devices like televisions, monitors, and projectors. HDMI cables are used to transmit audio and video signals from one device to another, and they are commonly used in home entertainment systems.
4. USB: This is a type of connector used for connecting devices like printers, external hard drives, and other peripherals to a computer. USB connectors come in several different sizes and shapes, and are widely used in both consumer and professional settings.
In summary, the correct answer to the question is RJ45, which is the most commonly used connector for Ethernet cables.


Best Of Luck for your bright future
Laxman Nepal is a multi-talented individual with expertise in computer teaching, blogging, video editing, and more. With years of experience in his field, Laxman has established himself as a reliable…

Post a Comment

-->

Disqus