NTWC Computer Operator 2081/09/22


Public Service Commission
Nepal Transit and Warehousing Company Limited, Open Competitive Written Examination for the post of Technician, Technician, Fifth, Computer Assistant 2081/09/22

KEY (B)
Paper: First
Time: 45 Minutes
Subject: Service-related


1. The type of application which is used to create and format text documents is known as:

a. Electronic Sheet
b. Electronic Spreadsheet
c. Electronic Processing
d. Word Processing

2. What is the blank space outside the printing area on a page?
a. Clipart
b. Margins
c. Header
d. Footer

3. What is a gutter margin?
a. Margin added to the left margin when printing
b. Margin added to the right margin when printing
c. Margin added to the binding side of the page when printing
d. Margin added to the outside of the page when printing

4. Which of the following is not essential for performing a mail merge operation?
a. Word Fields
b. Main Document
c. Data source
d. Merge Fields

5. Which of the following is true?
a. Footer repeats the same information on every page
b. Footnote repeats the same information on every page
c. Both Footer and Footnote repeat the same information on every page
d. Footer appears on only one page

6. What is the function of 'Thesaurus' in Word Processing?
a. To suggest synonyms
b. To suggest antonyms
c. To suggest synonyms and antonyms
d. To create a table of contents

7. How is a bulleted list in Microsoft Word created?
a. Go to the Insert list and select Bullet
b. Right-click and select Insert Bullet
c. Go to the Page Layout tab and choose Bullets
d. Click on the Home tab and select the Bullets icon

8. In Microsoft Word, what is the task of 'Format Painter'?
a. It copies formatting from one part of the document and applies it to another
b. It paints a color over the selected text
c. It pastes only the style of the selected text
d. It formats an entire paragraph

9. What do letters represent in a spreadsheet?
a. Blocks
b. Columns
c. Cells
d. Rows

10. How would you quickly find all cells in a worksheet that contain formulas?
a. Use Find Feature
b. Filter by Color
c. Go to Special
d. Use Trace Precedents

11. How many cells will be selected if cells are selected as D3:F5?
a. 3
b. 5
c. 8
d. 9

12. Which feature would you use to capture and analyze data from multiple sheets into one sheet?
a. Pivot Table
b. Data Form
c. Consolidate
d. Template

13. What is the preprogrammed formula in spreadsheet software?
a. Cell
b. Graph
c. Function
d. Range

14. Which of the following represents an absolute cell referencing in spreadsheet?
a. $D$6
b. D6
c. D$6
d. $D6

15. Which of the following features is used to get data from a cell located in a different sheet of a spreadsheet?
a. Addressing
b. Referencing
c. Accessing
d. Updating

16. What does the =COUNTA () function in Excel do?
a. Counts cell as specified
b. Counts blank cells in a range
c. Counts cells with numbers in a range
d. Returns values based on a TRUE or FALSE condition

17. Which shortcut key is used to insert a new blank slide below the current slide in PowerPoint?
a. Ctrl + L
b. Ctrl + M
c. Ctrl + N
d. Ctrl + C

18. Which shortcut key is used to start a PowerPoint slide show from the beginning?
a. Ctrl + F5
b. Shift + F5
c. Alt + F5
d. F5

19. Which is the best view to set your thoughts for presentation on the computer?
a. Slide View
b. Slide Sorter View
c. Notes Page View
d. Outline View

20. Which is the use of index in database systems?
a. To access data quickly
b. To delete data
c. To bookmark data
d. To update data

21. The process of organizing data into tables and establish in relationship between them is known as:
a. Data mining
b. Data modeling
c. Data warehousing
d. Database design

22. Which of the following commands is used to create a new table in a database?
a. ALTER
b. SELECT
c. MODIFY
d. CREATE

23. Data integrity in database application is to ensure that data is:
a. Accurate, consistent and valid throughout its lifecycle
b. Stored securely
c. Backed up regularly
d. Encrypted and protected

24. When a record in one table can relate to multiple records in another table, what type of relationship is it?
a. Many-to-many
b. One-to-many
c. Many-to-one
d. One-to-one

25. Which of the following HTML tags is used to display a picture in a webpage?
a. Picture
b. img
c. image
d. src

26. Which of the following tags is used to make a text bold in HTML?
a. <bold>
b. <br>
c. <b>
d. <bd>

27. Which attribute is used to add video controls like play, pause and volume in video?
a. Autoplay
b. Play
c. Video
d. Control

28. Which of the following is NOT a Content Management System?
a. Joomla
b. WordPress
c. Magento
d. Spring

29. What does the term HTTP stand for?
a. Hyper Terminal Transfer Program
b. Hypertext Transfer Protocol
c. High Tracing Protocol
d. Hypertext Transfer Program

30. For what purpose is the "TRACERT" command used in a computer network?
a. To trace the path between two system on a network
b. To check if the specified server is available in the network
c. To modify the IP address and subnet mask
d. To display the current TCP/IP connections in the network

31. What is the function of DNS server in a computer network?
a. To translate domain names into IP addresses
b. To assign addresses to device
c. To secure network from external threats
d. To monitor network traffic

32. Which of the following network utilities is used to test the reachability of host on Internet Protocol network?
a. IPCONFIG
b. PING
c. TRACERT
d. NSLOOKUP

33. Which of the following is a security threat?
a. Distributed System
b. Application Software
c. Distributed Denial of Service
d. Social Gathering

34. What is a Zero-day vulnerability?
a. A known vulnerability with a patch
b. A vulnerability exploited before a patch is available
c. A vulnerability found in an old system
d. An encrypted system flaw

35. Which of the following malware types does not clone or replicate itself through infection?
a. Viruses
b. Worms
c. Trojans
d. Rootkits

36. When did the Government of Nepal release its latest National ICT Policy?
a. 2061 BS
b. 2062 BS
c. 2071 BS
d. 2072 BS

37. Under the Electronic Transaction Act, 2063, who is responsible for ensuring the authentication of electronic records and signatures?
a. The Controller of Certifying Authority
b. Nepal Rastra Bank
c. The Ministry of Home Affairs
d. The Supreme Court

38. How much share does the Government of Nepal, Finance Ministry have in Nepal Transit and Warehousing Co. Ltd?
a. 25%
b. 30%
c. 50%
d. 100%

39. The word ASCII stands for:
a. Applied Standard Code for Information Interchange
b. American Standard Code for Information Interchange
c. Associated Standard Code for Information Interchange
d. Aggregated Standard Code for Information Interchange

40. What does the term 'physical structure of disks' refer to in file management?
a. The logical organization of files and folders
b. The metadata stored on disks
c. The arrangement of sectors, tracks and cylinders on the disk
d. The naming convention of files

41. Which generation does Universal Automatic Computer (UNIVAC) belong to?
a. First
b. Second
c. Third
d. Fourth

42. In computer systems, the motherboard is the:
a. Central circuit board that holds and connects all the other components
b. Main processing unit
c. Storage device
d. Peripheral device

43. Which of the following is a procedural programming language?
a. C++
b. Java
c. Prolog
d. C

44. What is the purpose of multimedia in computing?
a. To store large files efficiently
b. To enhance structure and diverse forms of content
c. To enhance CPU performance
d. To ensure data security

45. Which of the following is an extension of a video file?
a. JPEG
b. DOCX
c. AVI
d. TXT

46. The purpose of ALU is to:
a. Store data temporarily
b. Perform the calculation and logical operations
c. Manage input and output operation
d. Control the computer's clock speed

47. What is the primary function of an operating system?
a. Compile program
b. Display graphical images
c. Manage hardware resources
d. Browse the internet

48. Which tool in Windows is used for checking and repairing disk errors?
a. Disk Cleanup
b. Backup and Restore
c. Disk Defragmenter
d. Disk Scanning

49. Where does a file go when you delete a file in your computer?
a. Recycle Bin
b. Hard disk
c. Taskbar
d. RAM

50. Which of the following tasks allows the user to restore the system in an earlier state without affecting the personal files?
a. Windows Update
b. Windows Backup
c. System Restore
d. Disk Cleanup

-The End- 

Also Read

Post a Comment (0)
Previous Post Next Post