Solved Question of Computer Operator of Industrial Districts Management Ltd. 2075-02-29

Nff]s ;]jf cfof]u
cf}Bf]lus If]q Joj:yfkg lnld6]8, k|fljlws, kfFrf}, ;"rgf k|ljlw÷;j–OlGhlgo/ kbsf]
k|ltof]lutfTds lnlvt k/LIff
@)&%÷)@÷@(
KEY [B]                                  
;do M ! 306f                                                                                               k"0f{fÍ M %)                                 
ljifo M sDKo'6/ ;DaGwL

pQ/k'l:tsfdf k|Zgkqsf] KEY clgjfo{ ?kn] pNn]v ug{'k5{ . pNn]v gu/]df pQ/k'l:tsf /2 x'g]5 . k/LIffdf calculator, mobile k|of]u ug{ kfOg]5}g .

Multiple choice

1  which feature is used for monitoring all document changes?
A)    Edit document             B) Monitor change      C) Track change          D) Track all

2  which language is used to create macros in excel?
A)    Visual Basic                B) C                             C) visual C++              D) Java

3. What does the VLOOKUP function do ?
    A) find related records
    B) Check whether text is the same in one cell as in the text
    C) Looks up text that contain 'V'
    D) All of the above

4. Where can you find the Draw table tool button?
    A) Formatting toolbar                                             B)Drawing toolbar
    C) Standard toolbar                                                 D) Tables and formatting toolbar

5. What does WWW stands for?
     A) World  Wide Webster                                        B) World With Web
     C) World Wide Web                                               D) World  Without Web

6. Which of the following tag is used to mark a beginning of paragraph?
     A) <TD>                          B) <br>                          C) <P>                        D) <TR>

7. A webpage displays a picture . What tag is used to display that picture?
    A) picture                         B) image                        C) img                         D) src

8. Text within <EM></EM> tag is displayed as
     A) bold                           B) italic                           C) list                          D) indented

9. As per the Electronic Transaction Act , which of the following is not the provision    
    Relating to electronic record and digital signature?
A)    Authenticity of electronic record                       B) Legal recognition of electronic record
C) Secured digital signature                                     D) Appointment of the controller

10. Which of the following is /are the DDL statement/s?
      A) create                      B) drop                              C) alter                        D) all of the above

11. What are the columns in a Microsoft Access table called?
     A) Rows                       B) fields                            C) cells                        D) records

12. Cascade deletes option
     A) is used to delete all the records of all tables in a database
     B) will repeat the recent delete operate to all the records of current table
     C) is available in edit relationship dialog box which makes sure that all the related records Will be            delete automatically when the record from parent table is delete
    D) none of the above

13. How will you write query parameter to retrieve records having item ID less than 100, Greater              than 50 ?
     A) <100 and>50             B) <100 or>500                 C) Both A and B          D) none of the above

14. Authentication refers to
     A) methods of restricting user access to system
     B) controlling access to portions of data
     C) controlling the operation on the data
     D) all of the above

15. To control access to the database, SQL statement/s is /are used
     A) Grant                        B) Revoke                           C) Both  A and B           D) Deny

16. Which of the following memory needs refreshing?
     A) SRAM                     B) DRAM                           C) ROM                          D) all of the above

17. The instructions that tell a computer how to carry out the processing takes are referred as
    A) programs                  B) processors                     C) input devices               D) memory modules

18. In computer security, ........... means that computer system assets can be modified only by authorized parties.
      A) confidentially          B) integrity                      C) availability                   D) authenticity   

19. A computer program that converts an entire program into machine language is called a/ an
     A) interpreter                 B) simulator                   C) compiler                        D) commander

20. Which of the following controls the process of interaction between the user and the operating              system?             
     A) User interface          B) Language translator    C) platform                        D) screen saver

21. A program that copies itself over network connection moving from one computer to
      another computer is usually called
     A) Worm                       B) Virus                           C) Trojan horse                  D) Trap door

22. Which of the following technology was used in 3rd  generation computer?
     A) transistor                  B) vacuum tube               C) magnetic tape                 D) IC

23. What is compiler?
     A) A compiler does a conversion line by line as the program is run
     B) A compiler converts the whole of a higher level program code into machine code in one Step
    C) A compiler is a general purpose language providing very efficient execution
    D) None of the above

24. From what location are that 1st  computer instructions available on boot up?
     A) ROM BIOS            B) CPU                            C) boot.ini                          D) CONFIG.SYS

25. Which of the following device can be used to directly input printed text?
     A) OC                         B) OMR                           C) MICR                            D) None of the above

26. Which of the following have the fastest access time?
     A) Semiconductor memories    B) magnetic disks  C) magnetic tapes           D) compact disks

27. What is/are the essential element/s that protect computer and computer room?
     A) Door lock              B) password                     C) air conditioner                D) all of the above

28. Personal computers can be connected together to form a
      A) server                  B) supercomputer             C) network                           D) enterprise

29. the command allows you to create logical drive
     A) sort                        B) path                            C) subst                       D) bath

30. A hard disk is divide into tracks which are further subdivided into
     A) clusters                 B) sectors                          C) vectors                    D) heads

31. Which statement is false?
    A) you can find deleted files in recycle bin
    B) you can restore any files in recycle bin if you ever need
    C) you can increase free space of disk by sending files in recycle bin
    D) you can right click and choose empty recycle bin to clean it at once

32. What could cause a fixed disk error?
    A) No-CD installed             B) bad ram                C) slow processor         D) incorrect CMOS setting

33. What to make the computer boot from CD drive?
     A) configure in setup at the start of  the computer B) configure in window's registry
     C) configure in window's control panel                 D) all of the above

34. Which of the following is a private IP address?
     A) 190.168.1.1                    B) 191.168.l.1             C) 192.168.1.1           D) 193.168.1.1

35. Multiprocessor system have advantage of
    A) increased throughput                                           B) expensive hardware
    C) operating system                                                  D) both A and B

36. CPU fetches the instruction from memory according to the value of 
     A) program counter                                                 B) status register
     C) instruction register                                              D) program status word

37. Only file names and extensions are to be displayed in wide format, which command you'll
       use?
      A) Dir/w                        B) Dir a:                          C) Dir/s                          D) Dir/b

38. Which of the following is a program group ?
     A) Accessories              B) paint                             C) word                         D) all of the above

39. which of the following method is used to speed up the computer performance?
    A) Disk scanning          B) Disk formatting            C) Disk fragmentation   D) all of the above

40. The networking topology with highest reliability is ........ topology
     A) bus                           B) star                                C) ring                            D) mesh

41. IPv6 has....... bit address.
      A) 32                           B) 64                                   C) 128                            D) variable

42. Which one of the following extends a private network across public networks?
    A) local area network                                              B) virtual private  network
     C) enterprise private network                                 D) storage area network

43. Which of the following is used to convert computer's binary digits to signals suitable for
       transmission over the telephone lines?
    A) Direct cable                B) LAN                          C) CPU                       D) Modem

44. The maximum number of IP address that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask is
   A) 14                                  B) 15                           C) 16                           D) 30

45. How do you change column width to fit the contents in Ms-Excel?
     A) Single click the boundary to the left to the column heading
     B) Double click the boundary to the left to the column heading
     C) Press Alt and single click anywhere in the column
     D) all of the above

46. What does mail merge means:
     A) same content to different address                      B) different content to different address
     B) different content to same address                     D) same content to same address

47. Where is footnote located?
     A) top of the page                                                   B) bottom of the document
     C) bottom of the page                                             D) none of the above

48. In Microsoft PowerPoint in order to see all the slides on one screen use
     A) view,slide sorter        B) view,slide                   C) view,master            D) view,slide show

49. In the formula, which symbol specifies the fixed columns or rows?
    A) $                                   B) *                               C) %                             D) &

50. Which function do you use to return the remainder after a number is divided by a divisor ?
      A) ROUND( )                B) FACT( )                     C) MOD( )                  D) DIV( )


Answer sheet

1.      C
2.      A
3.      A
4.      D
5.      C
6.      C
7.      C
8.      B
9.      D
10.  D
11.  B
12.  C
13.  B
14.  D
15.  C
16.  B
17.  A
18.  B
19.  C
20.  A
21.  B
22.  D
23.  B
24.  A
25.  A
26.  A
27.  D
28.  C
29.  C
30.  B
31.  C
32.  D
33.  C
34.  C
35.  A
36.  A
37.  A
38.  A
39.  D
40.  D
41.  C
42.  B
43.  D
44.  D
45.  B ?
46.  A
47.  C
48.  A
49.  A
50.  C







Click Here to Download............... Download PDF





No comments:

Post a Comment