Solved Question of Nepal Rastra Bank 2075-03-22 (Assistant of IT)

nf]s  ;]jf cfof]u
g]kfn /fi6« a}s, k|fljlws, ;xfos -;'=k|=_ kbsf]
k|ltof]lutfTds lnlvt kl/Iff
@)&%÷)#÷@@
Key [A]
;do M # 306f                                                      k"0ff{Í M !))
ljifo M ;]jf ;DaGwL
pQ/k'l:tsfdf k|Zgkqsf] KEY clgjfo{ ?kn] pNn]v ug'{kg]{5 . pNn]v gu/]df pQ/k'l:tsf /2 x'g]5 . k/LIffdf Calculator, Mobile k|of]u ug{ kfO{g]5}g . k|To]s Section sf] pQ/ 5'§f5'§} pQ/k'l:tsfdf n]Vg'kg]{5 . cGoyf pQ/k'l:tsf /2 x'g]5 . Section 'B' sf] !@ k|ZgdWo] s'g} !) k|Zgsf] pQ/ lbg'k]{5 .

Section 'A' : Objective
            Multiple Choice                                                                                             50×1=50 Marks


1.  A JFET has three terminals, namely
A) Cathode, anode, grid                                  B) emitter, base, collector
C) Source, gate, drain                                      D) none of the above

2. The reverse current in a diode is usually
            A) Very small             B) Very Large             C) Zero            D)  in the breakdown region

3. The voltage gain of a CC (Common Collector) transistor arrangement is
            A) equal to 1              B) more than 10          C) more than 100        D) less than 1

4.  The output impedance of a transistor is
            A) high                        B) zero                        C) low                         D) very low    

5. Which one of these is characteristic of RAID 5?
            A) Distributed Parity                                        B) No Parity
            C) All Parity in a single disk                            D) Double Parity

6. The two phases of executing an instruction are
            A) instruction decoding and storage                 B) instruction fetch and instruction execution
            C) instruction execution and storage                D) instruction fetch and instructing processing

7. If one or more devices use a common set of wires to communicate with the computer system, the connection is called
            A) CPU                       B) Monitor                  C) Wirefull                  D) BUS

8. The addressing mode used in an instruction of the form ADD X, Y is
            A) Absolute                B) immediate              C) indirect                   D) relative

9. The reason for the implementation of the cache memory is
            A) to increase the internal memory of the system
            B) the different in speeds of operation of the processor and memory
            C) to reduce the memory access and cycle time
            D) all of the above

10. Using CHMOD if we want to give ALL permissions to a user, which mode is used?
            A) 666                         B) 777                         C) 776                         D) 667

11. How can you optimize performance of your computer ?
            A) Delete unused file                                       B) Defrag disk
            C) Scan for virus                                              D) All of above

12. Dispatch latency is
            A) the time taken by the dispatcher to stop one process and start another
B) the time taken by the processor to write a file into disk
C) the whole time taken by all processor
D) non of above

13. To access the services of operating system, the interface is provided is by the
           A) System calls           B) API                         C) Library                   D) Assembly instructions

14. Which class of IP address provided a maximum of  only 254 host addresses per network ID ?
           A) Class A                  B) Class B                   C) Class C                  D) Class D

15. Which of the following devices assigns IP address to devices connected to a network that uses TCP/IP ?  
A) DHCP Server       B) NIC                        C) Gateway                 D) DNS server

16. Dual-stack approach refers to
            A) implementing IPv4 with 2 stacks               B) implementing IPv6 with 2 stacks
            C) node has both IPv4 & IPv6 support           D) none of above

17. What is the most common ICMP command ?
            A) Ping                       B) Trace                      C) Netstat                   D) NBTstat

18. This layer is an addition to OSI model when compared with TCP IP model
            A) Application Layer                                      B) Presentation Layer
            C) Session Layer                                             D) Both B and C

19. A DNS client is called
            A)DNS updater          B) DNS resolver        C) DNS handler          D) none of the above

20. Which server in the DMZ needs only list of limited number of public IP Address ?
            A) DNS                       B) NAT                       C) Proxy                      D) Firewall

21. Which one of the following is a cryptographic protocol used to secure HTTP connection ?
            A) Stream Control Transmission Protocol      B) Transport Layer Security
            C) Explicit Congestion Notification               D) Resource Reservation Protocol

22. A packet filter firewall filters at the
            A) Application or transport                             B) Data Link layer
            C) Physical Layer                                            D) Network or Transport Layer

23. Who issues a digital certificate ?
            A) Digital Certificate Controller                                 B) Certification Authority
            C) Ministry of information and communication         D) ISP

24. Digital signature cannot provide ......... for the message.
            A. integrity                  B) confidentially        C) nonrepudiation       D) authentication

25. There are several reason why a company would develop and implement a business continuity plan. Which of the following property describe the best reason?
            A) to increase liability                                     B) the continuation of a company
            C) compliancy with regulations                      D) Properly react to disasters

26. Which of the following cables can be used to connect a PC and switch?
            A) Straight cables      B) Cross cables           C) Rollover Cables      D) All of the above

27. What could cause a fixed disk error?
            A) No-CD installed                                        B) Bad RAM
            C) Slow processor                                          D) Incorrect CMOS setting

28. What is SMPS used for?
            A) obtaining controlled ac power supply        B) obtaining controlled dc power supply
            C) storage of dc power                                    D) switch from one source to another

29. From what location are the 1st computer instructions available on boot up?
            A) ROM  BIOS          B) CPU                       C) boot.ini                   D) CONFIG.SYS

30. MIDI stands for
            A) Musical Instrument Digital Interface     B) Musical Instrument Digital Instruction
            C) MP3 Instrument Digital Interface               D) Musical Instrument Design Interface

31. Before audio or video signals can be send on the internet, they need to be
            A) Channelized           B)Managed                 C) Digitized                D) Organized

32. Moving Pictures Export Group (MPEG) is used to compress
            A) Frames                   B) Images                    C) Audio                     D) Video

33. Multimedia system require hard real time scheduling
            A) to ensure critical tasks will be serviced within timing deadlines
            B)  to deliver the media file to the client
            C) to minimize the delay
            D) for security

34. The delay that occur during the playback of a stream is called
            A) stream delay           B) Playback delay       C) jitter                       D) event delay

35. Which of the following statements is false about event handlers in JavaScript?
            A) They can be include with input tags
            B) They can be associated with end of file processing for a database application
            C) They can be included with the form tag
            D) They are generally used to call functions when triggered

36. Which of the tag is used to creates a number list?
            A) <LI>                      B) <OL>                     C) <UL>                     D) <DL>

37. AJAX stands for
            A) asynchronous JavaScript and xml             B) advanced JSP and xml
            C) asynchronous JSP and xml                        D) advanced JavaScript and xml

38. Which is the correct CSS syntax?
            A) {body:color=black}                                   B) body:color=black;
            C) body{color:black}                                      D) {body;color:black;}

39. How can you open a link in a new browser window?
            A) <a href = "url" target = "new">                 B) <a href = "url" target = "_blank">
            C) <a href = "url" .new>                                 D) <a href = "target ="open">

40. What is called to entry effect as one slide replace another in a show on presentation?
            A) Animation              B) Slide transition      C) Custom animation             D) Show         

41. Which of the following syntax is correct regarding the SUM function in Excel?
            A) =SUM(A1,B1)                                           B) SUM(A1:B9)
            C) =SUM(A1:A9, B1:B9)                              D) All of the above

42. What PowerPoint feature will you use to apply motion effects to different objects of a slide?
            A) Slide transition       B) Slide design           C) Animation Object  D) Animation Scheme

43. how many columns can you use to apply motion effects to different objects of a slide?
            A) 40                           B) 45                           C) 50                           D) 55

44. What database key uniquely identifies a record within a table?
            A) Primary key          B) Foreign key            C) Secondary key       D) Relational key

45. Given then basic ER and relational models, which of the following is incorrect?
            A) An attribute of an entity can have more than one value
            B) An attribute of an entity can be composite
            C) In a row of a relational table, an attribute can have more than one value
            D) In a row of a relational table, an attribute can have exactly one value or a NULL value

46. .......... is used to define the structure of the relation, deleting relations and relating schemas.
            A) Data Manipulation Language                    B) Data Definition Language
            C) Query                                                         D) Relational Schema

47. To remove a relation from an SQL database at a given instant in time.
            A) Delete                    B) Purge                      C) Remove                  D) Drop table

48. Database ........... which is the logical design of the database, and the database ............ which is a snapshot of the data n the database at a given instant in time.
            A) instant, Schema      B) Relation, Schema   C) Relation, Domain   D) Schema, Instance

49. In National Information and Communication technology (ICT) Policy, 2015, ........ goals are mentioned as the goals of the proposed policy.
            A) 10                           B) 11                           C) 12                           D) 13

50. How many year imprisonment is defined to computer source code theft, destruction or changing case of cyber crime in Nepal?
            A) 3 years                   B) 2 years                    C) 2.5 years                 D) 1.5 years

  
Answer Sheet

1.      C
2.      A
3.      A
4.      C
5.      A
6.      B
7.      D
8.      A
9.      B
10.  B
11.  D
12.  A
13.  A
14.  C
15.  A
16.  C
17.  A
18.  D
19.  B
20.  A
21.  B
22.  D
23.  C
24.  B
25.  B
26.  A
27.  D
28.  B
29.  A
30.  A
31.  C
32.  D
33.  A
34.  C
35.  B
36.  B
37.  A
38.  C
39.  B
40.  B
41.  D
42.  D
43.  B
44.  A
45.  C
46.  B
47.  D
48.  D
49.  B
50.  A






                            

Click Here to Download............      Download PDF
  

            

No comments:

Post a Comment