लोक सेवा आयोग
नेपाल प्रहरी, प्राविधिक, इञ्जिनियरिङ्ग, सूचना प्रविधि/कम्प्युटर प्राविधिक प्रहरी सहायक निरीक्षक पदको खुला प्रतियोगितात्मक लिखित परिक्षाामिति: 2082/04/22
नेपाल प्रहरी, प्राविधिक, इञ्जिनियरिङ्ग, सूचना प्रविधि/कम्प्युटर प्राविधिक प्रहरी सहायक निरीक्षक पदको खुला प्रतियोगितात्मक लिखित परिक्षाा
Subject: Computer
Multiple Choice 45x2=90 Marks
1. Which feature in MS Word allows you to combine multiple revisions
into one document?
a. Computer
b. Track change
c. Merge documents
d. Combine
2. In Mail
Merge, what is the purpose of the "data source"?
a. To format the documents with specific fonts and styles
b. To serve as the template for the main document
c. To provide the variable information such as names, addresses and others
d. To send the merged document to recipients
3. You want
to make sure that a paragraph always has 18 pt. of space before it. How can you
do this?
a. Use a more sophisticated page layout program, like Adobe PageMaker
b. Open the paragraph dialog box and enter 18 pt. in the spacing before
c. Type 18 pt. on the line before the paragraph
d. Open the paragraph dialog box and enter 18 pt. in the line spacing box
4. How
does the Thesaurus feature in a word processor assist a user?
a. It automatically corrects spelling mistakes as the user types
b. It suggests synonyms and antonyms for a selected word
c. It checks the grammar of entire paragraphs
d. It adjusts the formatting of text to match the document's style
5. You
can adjust table alignment and text wrapping in the:
a. Table options dialog box
b. Table dialog box
c. Table properties dialog box
d. Table alignment dialog box
6. What
is the intersection of a row and a column in a spreadsheet called?
a. Field
b. Cell
c. Box
d. Data point
7. Which
function is used to count the number of numerical values in a range?
a. COUNTA()
b. COUNTN()
c. COUNT()
d. COUNTIF()
8. In a
spreadsheet application, what is a workbook?
a. A single cell containing data
b. A collection of worksheets within a single file
c. A row of cells with the same formatting
d. The entire workspace including all open applications
9. Which
of the following is not a conditional format that can be applied to cells?
a. Data bars
b. Characters
c. Color scales
d. Icon sets
10.
Which of the following options in a spreadsheet application allows you to
restrict edits to a cell while still allowing it to be viewed?
a. Alignment
b. Protection
c. Border
d. Pattern
11. How
do you sort Excel data alphabetically or numerically?
a. Conditional formatting
b. Pivoting
c. Sort
d. Data validation
12. What
happens when you hide a row or column?
a. It is permanently deleted
b. It becomes invisible but remains in the sheet
c. The contents are erased
d. It is copied to another sheet
13. How
do you display current date and time in MS Excel?
a. Today()
b. Date()
c. Time()
d. Now()
14. Which
Excel view allows you to see and edit headers and footers directly?
a. Normal view
b. Page layout view
c. Page break view
d. Custom view
15. What
is the purpose of the HLOOKUP function?
a. To search for data in columns
b. To search for data in rows
c. To create horizontal tables
d. To sort horizontal data
16.
Which of the following is not a tab in the PowerPoint option dialog box?
a. Proofing, which changes how PowerPoint corrects your text.
b. Display, which changes how content appears on the screen
c. General Center, which changes your privacy options
d. Trust Center, which changes your privacy options
17. The
use of slide master in PowerPoint is to
a. Animate text
b. Create new slides
c. Set default designs and layout for slides
d. Manage transitions
18.
Which keyboard key is commonly used to start a slide show from the beginning in
PowerPoint?
a. F2
b. F5
c. F8
d. Esc
19.
Objects on the slides that hold text are called
a. Object holders
b. Place holders
c. Auto layout
d. Text holders
20.
Which tool allows you to insert a pre-formatted table with customizable row and
column dimensions into a slide?
a. Chart wizard
b. Insert table
c. SmartArt gallery
d. Picture layout
21. The
generation of computers using transistor technology is
a. First
b. Second
c. Third
d. Fourth
22. What
is the primary role of data processing in a computer system?
a. To store large amounts of data permanently
b. To convert raw data into meaningful information
c. To display output on a monitor
d. To manage hardware components
23. What
is the primary function of the Central Processing Unit (CPU)?
a. To store data
b. To display output on the screen
c. To process data and execute instructions
d. To manage peripheral devices
24. What
is the most powerful type of computer?
a. Micro computer
b. Mainframe computer
c. Mini computer
d. Super computer
25.
Which of the following is an example of firmware?
a. A video game program
b. An operating system
c. The Basic Input/Output system
d. A web browser
26. Which of the below malware types permits the hackers to access
administrative controls and do nearly everything he wants with the infected
systems?
a. Worms
b. Remote Access Trojans
c. Rootkits
d. Botnets
27. Which
type of software acts as an intermediary between the user and computer hardware?
a. Application software
b. System software
c. Utility software
d. Firmware
28. What
does MBR stand for?
a. Main buffer register
b. Memory buffer routine
c. Main buffer routine
d. Memory buffer register
29. Which of
the following file systems is commonly used in modern Windows operating systems?
a. FAT32
b. NTFS
c. HFS+
d. ext4
30. Which of
the following is an example of a file extension that indicates a document?
a. .mp3
b. .jpg
c. .avi
d. .docx
31. Which
type of network spans a large geographical area, such as a city or country?
a. Local Area Network (LAN)
b. Metropolitan Area Network (MAN)
c. Wide Area Network (WAN)
d. Personal Area Network (PAN)
32. Word
length of personal computer is
a. 16 bits
b. 32 bits
c. 8 bits
d. 64 bits
33.
Which of the following is not a function of an operating system?
a. Memory management
b. Processor management
c. Application management
d. Device management
34. In a
command-line interface, which command would you use to change the read-only
attribute of a file name 'report.txt' to allow modifications?
a. attrib -r report.txt
b. chmod +w report.txt
c. setattr report.txt +r
d. modify -r report.txt
35. What
does the MOVE command do in DOS?
a. Delete files
b. Copies files to a different drive
c. Moves files from one location to another
d. Rename files
36. What
is the name of the core engine of an OS?
a. Shell
b. Kernel
c. BIOS
d. Root
37. What
is the purpose of a shortcut icon on the desktop?
a. To organize files on the desktop
b. To quickly open the original file or program
c. To create backup of original file
d. To rename the original file
38.
Which is the lowest level of abstraction that describes how the data are
actually stored?
a. Physical
b. Abstract
c. View
d. User
39. In a
relational database, what is the primary purpose of indexing, and what is a
potential trade-off?
a. Indexing ensures data integrity but slows down data retrieval due to
additional checks
b. Indexing speeds up data retrieval but may slow down data modification
operations like inserts and updates
c. Indexing establishes relationships between tables but increases storage
requirements significantly
d. Indexing compresses data to save storage space but requires frequent
rebuilding to maintain accuracy
40.
Which data type would you use to store a person's full name in a database?
a. Integer
b. Varchar
c. Date
d. Float
41.
Which of the following is a feature of word processing software?
a. Ability to process images
b. Ability to manipulate and format text
c. Ability to compile code
d. Ability to edit videos
42. How
do you apply bold formatting to selected text?
a. Ctrl + U
b. Ctrl + B
c. Ctrl + N
d. Ctrl + P
43.
Which of the following statements is not true?
a. You can remove a tab stop by dragging it off the ruler.
b. You can adjust a tab stop by clicking and dragging it on the ruler.
c. You can add, remove, and adjust tab stops from the tabs dialog box.
d. You can't adjust a tab stop once it is set.
44. The
shortcut key to open, find and replace command in MS Word is
a. Ctrl + F
b. Ctrl + N
c. Ctrl + H
d. Ctrl + R
45. What
is the purpose of using encryption on a document?
a. To make the document easier to edit
b. To make the document inaccessible to unauthorized users
c. To change the file format
d. To insert hyperlinks
-The End-
Also Read
