nf]s
;]jf cfof]u
g]kfn /fi6« a}s, k|fljlws, ;xfos -;'=k|=_ kbsf]
k|ltof]lutfTds lnlvt kl/Iff
@)&%÷)#÷@@
Key [A]
;do M # 306f k"0ff{Í
M !))
ljifo M ;]jf ;DaGwL
pQ/k'l:tsfdf k|Zgkqsf] KEY clgjfo{ ?kn] pNn]v ug'{kg]{5 .
pNn]v gu/]df pQ/k'l:tsf /2 x'g]5 . k/LIffdf Calculator,
Mobile k|of]u ug{
kfO{g]5}g . k|To]s Section sf] pQ/ 5'§f5'§} pQ/k'l:tsfdf n]Vg'kg]{5 . cGoyf
pQ/k'l:tsf /2 x'g]5 . Section 'B' sf] !@ k|ZgdWo] s'g} !) k|Zgsf] pQ/ lbg'k]{5 .
Section 'A' : Objective
Multiple Choice 50×1=50
Marks
1. A JFET has three terminals,
namely
A) Cathode, anode, grid B) emitter, base,
collector
C) Source, gate, drain D) none of the above
2. The reverse current in a diode is usually
A) Very small B)
Very Large C) Zero D)
in the breakdown region
3. The voltage gain of a CC (Common Collector) transistor arrangement is
A) equal to 1 B)
more than 10 C) more than 100 D) less than 1
4. The output impedance of a transistor is
A) high B)
zero C)
low D)
very low
5. Which one of these is characteristic of RAID 5?
A) Distributed Parity B)
No Parity
C) All Parity in a single disk D) Double
Parity
6. The two phases of executing an instruction are
A) instruction decoding and storage B) instruction
fetch and instruction execution
C) instruction execution and storage D) instruction fetch
and instructing processing
7. If one or more devices use a common set of wires to communicate with the computer system, the connection is called
A) CPU B) Monitor C)
Wirefull D) BUS
8. The addressing mode used in an instruction of the form ADD X, Y is
A) Absolute B) immediate C) indirect D) relative
9. The reason for the implementation of the cache memory is
A) to increase the internal memory
of the system
B) the different in speeds of
operation of the processor and memory
C) to reduce the memory access and
cycle time
D) all of the above
10. Using CHMOD if we want to give ALL permissions to a user, which mode is used?
A) 666 B) 777 C) 776 D)
667
11. How can you optimize performance of your computer ?
A) Delete unused file B)
Defrag disk
C) Scan for virus D)
All of above
12. Dispatch latency is
A) the time taken by the
dispatcher to stop one process and start another
B) the time taken by the processor to write a file into disk
C) the whole time taken by all processor
D) non of above
13. To access the services of operating system, the interface is provided is by the
A) System calls B) API C) Library D) Assembly instructions
14. Which class of IP address provided a maximum of only 254 host addresses per network ID ?
A) Class A B) Class B C) Class C D) Class D
15. Which of the following devices assigns IP address to devices connected to a network that uses TCP/IP ?
A) DHCP Server B) NIC C) Gateway D) DNS server
16. Dual-stack approach refers to
A) implementing IPv4 with 2 stacks B) implementing IPv6 with 2 stacks
C) node has both IPv4 & IPv6
support D) none of above
17. What is the most common ICMP command ?
A) Ping B) Trace C) Netstat D) NBTstat
18. This layer is an addition to OSI model when compared with TCP IP model
A) Application Layer B)
Presentation Layer
C) Session Layer D)
Both B and C
19. A DNS client is called
A)DNS updater B) DNS resolver C) DNS handler D) none of the above
20. Which server in the DMZ needs only list of limited number of public IP Address ?
A) DNS B) NAT C)
Proxy D) Firewall
21. Which one of the following is a cryptographic protocol used to secure HTTP connection ?
A) Stream Control Transmission
Protocol B) Transport Layer
Security
C) Explicit Congestion Notification D) Resource Reservation Protocol
22. A packet filter firewall filters at the
A) Application or transport B) Data Link layer
C) Physical Layer D)
Network or Transport Layer
23. Who issues a digital certificate ?
A) Digital Certificate Controller B) Certification Authority
C) Ministry of information and
communication D) ISP
24. Digital signature cannot provide ......... for the message.
A. integrity B) confidentially C) nonrepudiation D)
authentication
25. There are several reason why a company would develop and implement a business continuity plan. Which of the following property describe the best reason?
A) to increase liability B) the continuation
of a company
C) compliancy with regulations D) Properly react to
disasters
26. Which of the following cables can be used to connect a PC and switch?
A) Straight cables B) Cross cables C) Rollover Cables D)
All of the above
27. What could cause a fixed disk error?
A) No-CD installed B) Bad
RAM
C) Slow processor D)
Incorrect CMOS setting
28. What is SMPS used for?
A) obtaining controlled ac power
supply B) obtaining controlled
dc power supply
C) storage of dc power D) switch
from one source to another
29. From what location are the 1st computer instructions available on boot up?
A) ROM BIOS B)
CPU C) boot.ini D) CONFIG.SYS
30. MIDI stands for
A) Musical Instrument Digital
Interface B) Musical Instrument
Digital Instruction
C) MP3 Instrument Digital Interface D) Musical Instrument
Design Interface
31. Before audio or video signals can be send on the internet, they need to be
A) Channelized B)Managed C) Digitized D)
Organized
32. Moving Pictures Export Group (MPEG) is used to compress
A) Frames B) Images C)
Audio D) Video
33. Multimedia system require hard real time scheduling
A) to ensure critical tasks will
be serviced within timing deadlines
B) to deliver the media file to the client
C) to minimize the delay
D) for security
34. The delay that occur during the playback of a stream is called
A) stream delay B) Playback delay C) jitter D) event delay
35. Which of the following statements is false about event handlers in JavaScript?
A) They can be include with input
tags
B) They can be associated with end
of file processing for a database application
C) They can be included with the
form tag
D) They are generally used to call
functions when triggered
36. Which of the tag is used to creates a number list?
A) <LI> B) <OL> C) <UL> D)
<DL>
37. AJAX stands for
A) asynchronous JavaScript and
xml B) advanced JSP and xml
C) asynchronous JSP and xml D) advanced JavaScript
and xml
38. Which is the correct CSS syntax?
A) {body:color=black} B)
body:color=black;
C) body{color:black} D)
{body;color:black;}
39. How can you open a link in a new browser window?
A) <a href = "url"
target = "new"> B)
<a href = "url" target = "_blank">
C) <a href = "url"
.new> D)
<a href = "target ="open">
40. What is called to entry effect as one slide replace another in a show on presentation?
A) Animation B) Slide transition C) Custom animation D) Show
41. Which of the following syntax is correct regarding the SUM function in Excel?
A) =SUM(A1,B1) B)
SUM(A1:B9)
C) =SUM(A1:A9, B1:B9) D) All of the
above
42. What PowerPoint feature will you use to apply motion effects to different objects of a slide?
A) Slide transition B) Slide design C) Animation Object D)
Animation Scheme
43. how many columns can you use to apply motion effects to different objects of a slide?
A) 40 B) 45 C) 50 D)
55
44. What database key uniquely identifies a record within a table?
A) Primary key B) Foreign key C) Secondary key D)
Relational key
45. Given then basic ER and relational models, which of the following is incorrect?
A) An attribute of an entity can
have more than one value
B) An attribute of an entity can be composite
C) In a row of a relational
table, an attribute can have more than one value
D) In a row of a relational table,
an attribute can have exactly one value or a NULL value
46. .......... is used to define the structure of the relation, deleting relations and relating schemas.
A) Data Manipulation Language B) Data Definition
Language
C) Query D)
Relational Schema
47. To remove a relation from an SQL database at a given instant in time.
A) Delete B) Purge C)
Remove D) Drop table
48. Database ........... which is the logical design of the database, and the database ............ which is a snapshot of the data n the database at a given instant in time.
A) instant, Schema B) Relation, Schema C) Relation, Domain D)
Schema, Instance
49. In National Information and Communication technology (ICT) Policy, 2015, ........ goals are mentioned as the goals of the proposed policy.
A) 10 B) 11 C) 12 D)
13
50. How many year imprisonment is defined to computer source code theft, destruction or changing case of cyber crime in Nepal?
A) 3 years B) 2
years C) 2.5 years D) 1.5 years
Answer Sheet
1.
C
|
2.
A
|
3.
A
|
4.
C
|
5.
A
|
6.
B
|
7.
D
|
8.
A
|
9.
B
|
10. B
|
11. D
|
12. A
|
13. A
|
14. C
|
15. A
|
16. C
|
17. A
|
18. D
|
19. B
|
20. A
|
21. B
|
22. D
|
23. C
|
24. B
|
25. B
|
26. A
|
27. D
|
28. B
|
29. A
|
30. A
|
31. C
|
32. D
|
33. A
|
34. C
|
35. B
|
36. B
|
37. A
|
38. C
|
39. B
|
40. B
|
41. D
|
42. D
|
43. B
|
44. A
|
45. C
|
46. B
|
47. D
|
48. D
|
49. B
|
50. A
|
Click Here to Download............ Download PDF
No comments:
Post a Comment