Nepal Rastra Bank, Open Competitive Written Examination for Technician, Information Technology Assistant Data, Assistant (Information Technology) 2081/09/14
KEY (A)
Paper: First
Time: 30 Minutes
Subject: Information Technology
Multiple Choice 25x1=25 Marks
1. Which of the following keys is an example of Toggle key?
a. Alt
b. Shift
c. Control
d. Caps Lock
2. How many color dots make up one color pixel on a screen?
a. 3
b. 8
c. 16
d. 256
3. What is the function of the operating system in a computer?
a. To perform mathematical calculations
b. To manage hardware and software resources
c. To create graphics and animation
d. To connect to the internet
4. Possible threat to any systems/services cannot be___
a. reduced
b. protected
c. transferred
d. ignored
5. The purpose of "safe mode" in Windows troubleshooting is___
a. To install/uninstall the critical software
b. To operate the computer with minimal sets of application and drivers
c. To test hardware and software
d. To maximize the performance of the computer
6. While comparing LED and LCD screen, LED is efficient in ____ and less efficient in ____ with LCD.
a. Power, cost
b. Cost, response time
c. Response time, power
d. Cost, power
7. What is the purpose of BIOS in a computer?
a. To store software applications
b. To manage hardware and initialize the computer's hardware components
c. To connect peripherals
d. To access internet
8. If your computer is experiencing frequent crashes and displaying a "blue screen" error message, what should you check for?
a. Overheating
b. Graphics card drivers
c. Monitoring setting
d. Keyboard connectivity
9. Which of the following BJT regions does amplification?
a. Active
b. Cut-off
c. Saturation
d. One
10. Which of the following components is used to store electrical energy in an electric field?
a. Resistor
b. Inductor
c. Capacitor
d. Diode
11. Which type of source device is BJT?
a. Current driven
b. Voltage driven
c. Load driven
d. Power driven
12. What type of biasing is it when voltage is applied across cathode to anode?
a. Cyclic
b. Forward
c. Reverse
d. Backward
13. Which of the following statements about level 1 (L1) cache is not correct?
a. It is shared between multiple cores
b. It is used to store frequently accessed instructions for quick access
c. It is closest to CPU core
d. It is faster than L2 cache
14. Which one is RISC architecture?
a. Complex micro-code architecture
b. Load-store architecture
c. Refined instruction set computing architecture
d. Right and intensive set computing architecture
15. What type of addressing mode does the instruction LOAD R1, 200 represent?
a. Immediate
b. Direct
c. Definite
d. Relative
16. The major characteristic of disk fragmentation is _____
a. Breaking down files into smaller components
b. Increasing the disk's capacity
c. Storing files in non-contiguous locations on disk
d. Storing files in a single contiguous location on disk
17. What is the meaning of booting in the operating system?
a. Restarting computer
b. Install the program
c. To scan the computer
d. To return the computer
18. Which type of operating system allows multiple users to access the system simultaneously?
a. Real-time OS
b. Single-user OS
c. Multi-user OS
d. Embedded OS
19. ____ is responsible for managing hardware resources of the Linux architecture.
a. Application layer
b. Shell
c. Utilities layer
d. Kernel
20. The term "hashing" refers to _____ in cryptography.
a. Encrypting an unsecure message
b. Compressing a large file
c. Converting data into a fixed-size string of characters
d. Verifying a user's identity
21. Which protocol is used to send email messages from a client to a server?
a. FTP
b. HTTP
c. SNMP
d. SMTP
22. Which of the following can be used as both source and destination?
a. 198.168.1.255
b. 10.0.0.1
c. 127.0.0.1
d. 255.255.255.255
23. Who among the following keeps the private key in asymmetric key cryptography?
a. Receiver
b. Sender
c. Sender and receiver
d. Third party
24. What is the most common aspect ratio for widescreen videos?
a. 1:1
b. 16:9
c. 4:3
d. 21:9
25. Which of the following image formats uses lossy compression technique?
a. GIF
b. PNG
c. BMP
d. JPEG
-The End-
Also Read
