Lok Sewa Aayog: Nepal Rastra Bank Technical Assistant Past Paper

Lok Sewa Aayog

Nepal Rastra Bank, Technical Assistant Second, Assistant Post

Key ( D )

Time: 45 mins

Full marks: 100

Subject: Computer Related

Multiple Choice

  1. You want to track the progress of the stock market on a daily basis. Which type of chart do you use ?
  1. Pie chart
  2. Row chart
  3. Line chart
  4. Column chart
  1. A feature that display only the data in column(s) according to specified criteria
  1. Formula
  2. Sorting
  3. Filtering
  4. Pivot
  1. Cell range A3 through G3 should be written as
  1. A3-G3
  2. A3?G3
  3. A3:G3
  4. A3 to G3
  1. Which is used to replace a repetitive series of keyboard and mouse actions ?
  1. Mail merge
  2. Auto shape
  3. Macros
  4. OLE
  1. Word processor commad which issued to move selected text to another part of a document is
  1. Drag and drop
  2. Copy and paste
  3. Find and replace
  4. Cut and paste
  1. Indention in computer word processing is used to
  1. Make the text readable
  2. Change the paragraph color
  3. Apply border around text
  4. Change line spacing
  1. A structure of linked elements through which the user can navigate, interactive multimedia becomes
  1. Hypermedia
  2. Hypertext
  3. Inter media
  4. Digital media
  1. A video consists of a sequence of 
  1. Frames
  2. Packets
  3. Signals
  4. Pulses
  1. Which of the following extends and attends private network across public
  1. Modeling
  2. Morphing
  3. Animating
  4. Wraping
  1. Which one of the following extends and attends private network across public networks
  1. WAN
  2. MAN
  3. SAN
  4. VPN
  1. A firewall is installed at the point where the secure internal network and untrusted network meet which is also known as
  1. Chock point
  2. Meeting point
  3. Firewall point
  4. Secure point

D-2

  1. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
  1. Added
  2. Removed
  3. Rearranged
  4. Modified
  1. Network connectivity is tested by following command
  1. Ipconfig
  2. Nslookup
  3. Dig
  4. Ping
  1. Operating system does not perform
  1. Managing I/O
  2. Managing file system
  3. Running programs
  4. Translation of programs
  1. Which one is system threat?
  1. Port Scanning
  2. Logic Bomb
  3. Trap Door
  4. Trojan Horse
  1. To accesss the services of operating system, the interface is provided by the
  1. System calls
  2. Library
  3. Instructions
  4. All of the above
  1. Which desktop enviroment is not used in any linux distribution?
  1. Gnome
  2. Kde
  3. Unity
  4. None of the above
  1. Parity and data are shared among all N+1 disks in RAID level
    1. 2
    2. 4
    3. Unity
    4. 6
  2. The addressing mode, where you directly specify the operand value is
    1. Direct
    2. Relative
    3. Indirect
    4. Immediate
  3. RISC machines have
    1. Less number of registers and less instructions
    2. Large number of register and less instructions
    3. Less number of registers and more instructions
    4. Large number of registers and more instructions
  4. The associatively mapped virtual memory makes use of
    1. Translation Look-aside Buffer
    2. Page Table
    3. Frame Table
    4. None of the above
  5. The capacitance of a reverse biased PN junction
    1. Increases as reverse bias is increased
    2. Decreases as reverse bias is increased
    3. Increases as reverse bias is decreased
    4. Is significantly low
  6. Which of the following controls voltage?
    1. Resister
    2. Diode
    3. Transistor
    4. LED
  7. The value of α in a transistor is
    1. Equal to 1
    2. Less than 1 and more than 0.9
    3. About 0.4
    4. About 0.1
  8. ….… can not be fabricated on an IC.
    1. Transistors
    2. Diodes
    3. Resistors
    4. Large inductors and transformers
       
  9. When a pentavalent impurity is added to pure semiconductor, it becomes
    1. An insulator
    2. An intrinsic semiconductor
    3. P-type semiconductor
    4. N-type semicondutor
  10. External devices that are connected to a computer system are known as
    1. Expansion cords
    2. Peripheral devices
    3. Buses
    4. Slots
  11. Which of the following is not a type of motherboard expansion slot?
    1. ISA
    2. PCI
    3. AGP
    4. ATX
  12. Boot sequence is changed from
    1. Setting
    2. Control panel
    3. Taskbar
    4. BIOS
  13. Which would you have to upgrade to install an EIDE drive?
    1. RAM BIOS
    2. A 286 CPU
    3. Controller Board
    4. ISA Motherboard
  14. Which backup is useful for high end system?
    1. 4 mm helical
    2. AIT
    3. 8 mm helical
    4. DVD
  15. Where should you look to interpret different beep codes?
    1. CPU manufacturer
    2. BIOS manufacturer
    3. Memory manufacturer
    4. Flash manufacturer
  16. Which one displays fake virus alerts?
    1. Keylogger
    2. Computer worm
    3. Scareware
    4. Computer virus
  17. Storage capacity of magnetic disk depends on
    1. Tracks per inch of surface
    2. Bits per inch of tracks
    3. Disk pack in disk surface
    4. All of the above
  18. ….….. are main memory.
    1. Primary and secondary
    2. Sequential and Random 
    3. Disk pack in disk surface
    4. RAM and ROM
  19. As per Electronic Transaction Act-2063, which orgnization issues digital signature/digital certificate to end users?
    1. OCC
    2. DOIT
    3. CA
    4. NTA
  20. When was Nepal Rastra Bank established?
    1. 1952 AD
    2. 1954 AD
    3. 1956 AD
    4. 1958 AD
  21. CSS comes in …… types.
    1. 2
    2. 3
    3. 4
    4. 5
  22. Client and web server have a connection of type
    1. Continuous
    2. Dependent
    3. Permanent
    4. Non continuous
  23. An alternative of Javascript on windows platform is
    1. VBScript
    2. ASP.NET
    3. JSP
    4. AJAX
  24. Which notation is used to end any HTML tag?
    1. //
    2. /
    3. *
    4. !
  25. Function which causes retrieval of any kind of data from database is considered as
    1. Key
    2. Query
    3. Structure
    4. Storing cycle
  26. The basic data type char(n) is a ……… length character string and varchar(n) is …. length character string and varchar(n) is ……. length character.
    1. Fixed, Equal
    2. Equal, Variable
    3. Fixed, Variable
    4. Variable, Equal

D-4

  1. Commit and rollback are related to
    1. Data integrity
    2. Data consistency
    3. Data sharing
    4. Data checking
  2. The term attribute is referred by
    1. Row
    2. Record
    3. Key
    4. Column

  3. In which Normal Form there exists transitive dependency?
    1. First Normal Form
    2. Second Normal Form
    3. Third Normal Form
    4. All of the above
  4. Feature which allows as to view slides in a slide show without manually advancing each slide is
    1. Adding build effect
    2. Setting slide time
    3. Adding transition
    4. Adding bullets
  5. If you want to print slides without color and background which options do you select?
    1. Grayscale
    2. Pure black and white
    3. Black
    4. White
  6. The arrangement of elements such as title and subtitle text, pictures, tables etc is called PowerPoint?
    1. Layout
    2. Presentation
    3. Design
    4. Scheme
  7. Which option is there when you click menu and then Table button in MS PowerPoint?
    1. Insert table
    2. Draw table
    3. Excel Spreadsheet
    4. All of the above

Leave a Comment

Your email address will not be published. Required fields are marked *

Let us Help You!!!

We value your inquiries, send us a message and we'll get back to you