TU Chief Technician Asst. 2082/05/13


त्रि. वि. सेवा आयोग
मुख्य प्राविधिक सहायक (सूचना प्रविधि) पदको खुला प्रतियोगितात्मक लिखित परिक्षा

२०८२/०५/१३

पत्र:प्रथम                                              KEY (A)
समय: 2 घण्टा 15 मिनेट                      पूर्णाङ्क: 100
विषय: सेवा सम्बन्धी

1. What is the primary function of the chipset on a motherboard?

a. To provide power to the CPU
b. To manage communication between the CPU and other components
c. To store the BIOS setting
d. To cool the system

2. What does a 'NO POST' error indicate?
a. Software crash
b. Full hard drive
c. Internet connection
d. Hardware failure during boot

3. What is the function of CMOS battery on a motherboard?
a. To provide power to the CPU
b. To maintain system time and BIOS setting
c. To power the RAM
d. To store data

4. Which of the following is not a type of software maintenance?
a. Predictive
b. Adaptive
c. Corrective
d. Preventive

5. What does the term 'Northbridge' refer to in a chipset?
a. The part of the chipset that handles input/output operations
b. The part of the chipset that manages the hard drive
c. The part of the chipset that connects to the CPU, RAM and graphics controller
d. The part of the chipset that controls the graphic card

6. Which emerging technology is primarily associated with decentralized digital ledgers?
a. Artificial Intelligence
b. Internet of Things
c. Blockchain
d. Augmented Reality

7. Which of the following is a use case of Augmented Reality (AR)?
a. Virtual reality gaming
b. Overlaying digital information on the real world
c. Mining crypto currencies
d. Training AI models

8. What does back propagation do in a neural network?
a. Updates weights to minimize loss
b. Initializes weights
c. Preprocesses input data
d. Visualizes model output

9. What is the primary purpose of the Electronic Transaction Act, 2063?
a. To promote the use of electronic devices in government offices
b. To provide free internet access to all citizens
c. To regulate the sale of electronic goods in Nepal
d. To ensure the reliability and security of electronic transactions

10. How many constituent campuses does Tribhuvan University currently serve?
a. 59
b. 60
c. 61
d. 62

11. Who appoints the chairperson of Service Commission of Tribhuvan University?
a. Registrar
b. Chancellor
c. Pro-chancellor
d. Vice-chancellor

12. As per Public Procurement Rule, 2064, which of the following details is not true for procurement master plan?
a. Shall be prepared for projects to be operated for a period of more than one year or in making a procurement of an amount exceeding two hundred million rupees annually
b. Shall contain details of tentative numbers of contracts to be concluded and major activities
c. Shall be approved by secretary level of a public entity
d. Shall be updated once a year

13. Which entity issues Digital Signature Certificates in Nepal?
a. Nepal Rastra Bank
b. Certifying Authorities licensed by the controller
c. Local government
d. Internet service providers

14. ___ is responsible for transmitting the actual data between the system components.
a. Address Bus
b. Data Bus
c. Control Bus
d. Memory

15. Which device is both an input and output device?
a. Speaker
b. Microphone
c. Touch screen
d. Monitor

16. Which memory hierarchy level is the fastest but has the smaller capacity?
a. L3 Cache
b. RAM
c. SSD
d. CPU Registers

17. The operating system component that provides a user interface is called ___
a. Computer
b. Shell
c. Scheduler
d. Memory Manager

18. When would you use a section break instead of a page break in Word document?
a. To start new chapter with different footer text
b. To add a table in the middle of a page
c. To insert an image between paragraphs
d. To mark the point at which one page ends

19. What does the 'Format Painter' tool do in a word processor?
a. Changes the page orientation
b. Copies formatting from one text and applies it to another
c. Paints the current format
d. Deletes unwanted formatting

20. A workbook is collection of ___ and ___ is combination of rows and columns.
a. Worksheet, Worksheet
b. Worksheet, Excel
c. Spreadsheet, Worksheet
d. Worksheet, Workbook

21. Which of the following can be used as data source for Mail Merge?
a. A PDF file
b. A web browser
c. An Excel spreadsheet
d. A video file

22. To make a logo appear on every slide automatically in MS PowerPoint, the best method is to ___
a. Paste the logo on each slide manually
b. Use slide sorter view
c. Use the header/footer option
d. Insert the logo on the Slide Master

23. Which of the following tools helps to analyze complex decision logic by mapping conditions and outcomes in a matrix format?
a. Flowchart
b. Decision tree
c. Decision table
d. Pseudocode

24. Which of the following loops checks the condition at the end of each iteration?
a. for loop
b. while loop
c. for each loop
d. do ___ while loop

25. Which feature of OOP ensures that internal object details can be hidden from the outside world?
a. Encapsulation
b. Polymorphism
c. Abstraction
d. Inheritance

26. What is dynamic binding in OOP?
a. Linking a function call to its definition at compile time
b. Linking a function call to its definition at runtime
c. Creating dynamic variables
d. Allocating memory dynamically

27. Which variable declaration is preferred in modern JavaScript for block scope and reassignment?
a. Let
b. Const
c. Var
d. Final

28. Which HTML tag is used to insert an image?
a. <img>
b. <image>
c. <picture>
d. <src>

29. Which PHP function is used to execute an SQL query?
a. query()
b. execute()
c. mysqli_query()
d. run_query()

30. Which is the right way of declaring a variable in PHP?
a. $3hello
b. $_hello
c. $this
d. $hello-world

31. What does the Critical Path Method (CPM) help determine in project management?
a. The longest path of dependent tasks affecting project duration
b. The number of developers required
c. Software licensing costs
d. User interface design

32. Which software development life cycle (SDLC) model is best for a large project where the requirement keeps changing?
a. Waterfall
b. RAD
c. Incremental
d. Spiral

33. Which SDLC model follows a strict linear and sequential approach where each phase must be completed before the next phase?
a. Prototyping
b. Spiral
c. Sequential
d. Waterfall

34. Which testing is performed first?
a. System
b. Unit
c. Acceptance
d. Regression

35. What is the relationship between schema and instance?
a. Schema changes as data changes
b. Schema changes frequently, instance remains fixed
c. The instance follows the structure defined by the schema
d. Schema is data at a moment, instance is design structure

36. Which query operation filters rows from a table based on a specified condition?
a. Join
b. Protection
c. Selection
d. Aggregation

37. Which of these is not a typical operation in query processing?
a. Selection
b. Projection
c. Join
d. Data Encryption

38. Which of the following is true?
a. A relation in 3NF is always in BCNF
b. A relation in BCNF is always in 3NF
c. BCNF and 3NF are totally different
d. A relation in BCNF is in 2NF but not in 3NF

39. Which architecture uses separate memories and buses for instruction and data?
a. Harvard
b. CISC
c. RISC
d. Both B and C

40. In which addressing mode does the instruction contain the memory address of the operand?
a. Immediate
b. Direct
c. Indirect
d. Register

41. Which of the following is the correct sequence of operations in a microprocessor?
a. Opcode fetch, memory read, memory write, I/O read, I/O write
b. Opcode fetch, memory write, memory read, I/O read, I/O write
c. I/O read, opcode fetch, memory read, memory write, I/O write
d. I/O read, opcode fetch, memory write, memory read, I/O write

42. What will be the contents of register B after executing: MVIA, OSH followed by MOV B, A?
a. 00H
b. 05H
c. Address of A
d. Undefined

43. Which of the following statements is true about UDP compared to TCP?
a. UDP provides reliable data transfer
b. UDP is connection oriented
c. UDP has lower overhead than TCP
d. UDP guarantees in-order delivery of packets

44. Which of the following network devices operates at the physical layer of the OSI model?
a. Router
b. Switch
c. Gateway
d. Hub

45. Which is not a private IP range?
a. 10.0.0.0
b. 192.168.1.0
c. 172.132.0.0
d. 172.16.0.0

46. Which of the following is the multiple access protocol for channel access control?
a. CSMA/CD
b. CSMA/CA
c. Both A and B
d. HDLC

47. What is firewall primarily used for in a network?
a. To filter traffic based on security rules
b. To connect different networks
c. To amplify signals
d. To assign IP addresses

48. In a paging-based operating system, what is the primary role of the page table when a page fault occurs?
a. To allocate additional virtual memory to the process
b. To map the virtual address of the requested page to its physical address in memory
c. To store the entire process data temporarily on disk
d. To determine the priority of the process causing the page fault

49. Which of the following is a visual way to determine the deadlock occurrence?
a. Resource allocation graph
b. Starvation graph
c. Inversion graph
d. Deadlock monitoring graph

50. What is a deadlock in an Operating System?
a. A situation where two or more processes are waiting indefinitely for each other
b. A process that runs indefinitely
c. A type of memory leak
d. A system shutdown due to overheating

-The End- 

Also Read

Post a Comment (0)
Previous Post Next Post