Assistant IT Operator Question paper of TSC

Assistant IT Operator Question paper of TSC

Old set Blogs

1. Which of the following storage is fastest?

a) RAM

b) Register

c) ROM

d) blu-ray disc

2. Which register holds the information before it goes to the decoder?

a) Control register

c) Accumulator

b) Data register

d) Address register

3.Which of the following printer creates characters by striking pins against an ink ribbon?

a) Dot matrix

b) Laser

c) Ink jet

d) Thermal

4. Which of the following memories must be refreshed many times per second?

a) Static RAM

b) ROM

c) Dynamic RAM

d) EPROM

5. Legacy BIOS system in computer is replaced by:

a) NTFS

b) BFS

c) UEFI

d) EIFS

6. Which of the following components of CPU coordinates and controls the operations of a computer system?

a) ALU

b) MU

c) CU

d) Register

7. Which of the following is system software?

a) Word processor

b) Compiler

c) Spreadsheet

d) Photo editor

8. SSD Stand for:

a) Semi Solid Device

b) Solid State Drive

c) Semiconductor Specified Device

d) Silicon State Drive

9. A smaller version of an image is called:

a) Clipart

b) Bitmap

c) Thumbnail

d) JPEG

10 In display unit………. is the ratio of the horizontal length to the vertical length.

a) Aspect Ratio

b) Resolution

c) Contrast

d) Bit

11. Where are local variables defined?

a) body of a function

c) outside of a function

b) anywhere in the program

d) main function only

12. All statement in C** program should end with

a) A Comma (,)

b) A Full stop (.)

c) A Colon ( : )

d) A Semicolon ( ; )

13. In C/C” programming language CHAR type is of length

a) I byte

b) 2 byte

c) 4 byte

d) 3 byte

14. The conversion specification for the “unsigned INT” type of the data used

in C language is

a) % d

b) % u

c) % ud

d) % iu

15. What will be the output of the following C code?

#include<sidio.h>

int main()

int c= 2 & 3;

print(“%d\n”,c);

  1. 1          b) 2                  c) 3                  d) 4

Computer Operator MCQ Click Here

16. Which is the process of explicitly converting one data type to another data

type ?

a) Data Type converting

b) Data converting

c) Type converting

d) Type Casting

17. Which of the following statement DOES NOT increase the value of variable by one?

a) d+t;

b) d+1 => d;

c) d+=1

d) d=d +1;

18. Which of the following is a loop construct that will always be executed once?

a) for

b) switch

c) while

d) do while

19. Which of the following concepts in OOP allows to reuse the prewritten code?

a) Encapsulation

b) Inheritance

c) Abstraction

d) Polymorphism

20. Wrapping data and its related functionality into a single entity is known as

a) Encapsulation

b) Inheritance

c) Abstraction

d) Polymorphism

21. Which key should be pressed to start a new paragraph in Ms-Word document?

a) Down cursor key

b) Shift + Enter

c) Enter key

d) Ctrl + Enter

22. Which of the following break in MS Word ends the current line and forces the text to continue below a picture, table, or other item?

a) Page break

b) Colum break

c) Text wrapping break

d) Continuous break

23. Which feature enables to send same letter to different person in Microsoft word?

a) Macros

c) Template

b) Mail merge

d) None of the above

24. Which feature is not available in MS word font spacing?

a) Shrink

b) Normal

b) Condensed

d) Expanded

25. The shortcut key to set line space to 1.5 in office word is

a) CTRL +3

b) CTRL +5

c) CTRL +2

d) CTRL +4

26. Which of the following functions in MS Excel returns a logical TRUE response if all of its arguments are true and false otherwise?

a) SUM

b) OR

c) IF

d) AND

27. The cell reference M$4 is a .

a) Relative cell reference

b) Mixed cell reference

c) Absolute cell reference

d) Link cell reference

28. Pivot table is tool to

a) Set printing preferences

b) Calculate sub total

c) Extract data from a large, detailed data set

d) Export data into other formats

29. The feature to display only the data based on selected parameters in Excel is….

a) Formula

b) Filtering

c) Pivot

d) Sorting

30. Which function displays current date and time in MS Excel?

a) Today ()

b) Date ()

c) Time ()

d) Now ()

31. Which of the following feature in MS Power Point affects the way one slide goes to the next slide?

a) Slide show

b) Slide master

c) Slide transition

d) Slide sorter

32. Timing of slide show can be programmed using

a) Program Timing

b) Set Timing

c) Prefix Timing

d) Rehearse Timing

33. Who is making Web standards?

a) Mazilla

b) Microsoft

c) W3C

d) Google

34 Each cell of the table can be represented by using

a) <tr>

b) <th>

c) <td>

d) <thead>

35. Which of the following HTML tag is used to display the text with scrolling effect?

a) <marquee>

b) <Div>

c) <scroll>

d) <span>

36. Which of the following is correct commenting form in HTML?

a) <!- and ->

b) <*- and ->

c) <&- and ->

d) <#- and ->

37. RGB value of RED is

a) FFFFFF

c) FF0OFF

b) FFF000

d) FF0000

38. Which HTML tag is used to define internal style sheet?

a) <css>

c) <script>

b) <style>

d) <link>

39. What is CSS Float?

a) Allows other elements to wrap around an element

b) Element can be pushed to the left or right

c) Element can be pushed to the up and down

d) Element can’t be moved

40. What does PHP stand for?

a) Personal Home Page

b) Hypertext Preprocessor

c) Personal Hypertext Processor

d) Private Home Page

41. In PHP, which of the below symbols is a newline character?

a) \r

b) \n

c) /n

d) /r

42. The tags elements in XML are

a) browser dependent

b) Case-sensitive

c) Case-insensitive

d) Client device sensitive

43. Form validation traditionally was performed by

a) PHP

b) JavaScript

c) HTML

d) jQuery

44 Which SQL statement is used to extract data from the database?

a) SELECT

b) EXTRACT

c) GET

d) OPEN

45. GUI stands for

a) Graphic User Interface

b) Great User Interface

c) Grammatical User Interface

d) Geometrical User Interface

46. Moving process from main memory to disk is called

a) spooling

b) scheduling

c) caching

d) swapping

47. DLL stand for

b) Dynamic Link Libraries

b) Dynamic Link Loader

c) Dynamic Loader Link

c) Dynamic Loader Libraries

48. Which of the following is NOT the state of a process?

a) Waiting

b) Old

c) Running

d) New

49. Which of the following is the deadlock avoidance algorithm?

a) Thread algorithm

b) Banker’s algorithrn

c) Traffic Light algorithm

d) Round-robin algorithm

50. Which one of the following commands in MS DOS divides the surface of blank disk into sectors and assign a unique address to each one?

a) Chkdsk

b) Ver

c) Far

d) Format

51. If a process fails, most operating system write the error information to a:

a) Log file

b) New file

c) Register

d) BIOS

52. To allow only one user to work with a particular file at a particular time, one has to use

a) Semaphore

b) Locking

c) Critical region

d) Dedicated mode

53 Which of the following boot loaders is NOT used by Linux?

a) GRUB

b) NTLDR

c) LILO

d) All of the above

54 What is the primary job of operating system?

a) Manage resources

b) User friendly

c) Provide utilities

d) Command Resources

55. Which of the following is used to define the structure of the relation, deleting relations and relating schemas?

a) Master Query Language

b) Data Manipulation Language

c) Relational Schema Language

d) Data Definition Language

56. In the relational modes, cardinality is termed as:

a) Number of tables

b) Number of servers

c) Number of tuples

d) Number of attributes

57. Command that combines the records from one or more tables is called

a) SELECT

b) PRODUCT

c) JOIN

d) PROJECT

58. Which of the sql statement is correct?

a) Select *from<table_name> where <condition>

b) Select from*<table_name>where <condition>

c) Select from <table_name> where <condition>

d) Select < table_name> where <condition>

59. Which of the following SQL operation demands the use of wild card comparisons?

a) IN

b) EXISTS

c) BETWEEN

d) LIKE

60. Which of the following makes the transaction permanent in the database?

a) Rollback

b) View

c) Commit

d) Flashback

61. In a RDMS, relationship between tables are created by using:

a) Alternate key

b) Composite key

c) Candidate key

d) Foreign key

62. Which of the following recovery technique requires undo operation?

a) Deferred update

b) Immediate update

c) Shadow paging

d) Checkpoint

63 Which of the following normal form is based on the concept of fully functional dependency?

a) 4NF

b) 3NF

c) 2NF

d) INF

64. Which symbol in ER diagram represent Entity Set?

a) Rectangle

b) Ellipse

c) Dotted Rectangle

d) Diamond

65. CISC stands for

a) Complete Instruction Sequential Compilation

b) Computer Integrated Sequential Compiler

c) Complex Instruction Set Computer

d) Complex Instruction Sequential Compilation

66 The addressing mode which makes use of in-direction pointers is

a) Indirect addressing mode

b) Relative addressing mode

c) Index addressing mode

d) Offset addressing mode

67. The instruction “JUMP” belongs to:

a) Sequential control flow instructions

b) Control transfer instructions

c) Branch instructions instructions

d) Control transfer & branch

68. How many buses are connected as part of the 8085A microprocessor?

a) 1

b) 3

c) 2

d) 4

69 The decoded instruction is stored in:

a) IR

b) Registers

c) PC

d) MDR

70. Registers used to keep track of address of the memory location where the next instruction is located is.

a) Memory Address Register

c) Instruction Register

b) Memory Data Register

d) Program Register

71. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as:

a) Spooling

b) 1/0 wait

c) Contention

d) Buffering

72. Arithmetic pipeline is used for

a) Floating point operations

b) Integer operations

c) Character operations

d) None of the above

73 For converting a virtual address into the physical address, the programs are divided into

a) Frames

b) Blocks

c) Segments

d) Pages

74 To overcome the lag in the operating speeds of the I/O device and the processor we use

a) Buffer spaces

b) Interrupt signals

c) Status flags

d) Exceptions

75. A topology that involves Tokens is…………. topology

a) Star

b) Bus

c) Ring

d) Rocket

76 Which OSI layer provides security, encryption and compression for the data?

a) Network

b) Presentation

c) Transport

d) Application

77. Address that is used by a host to test itself without going into network is called

a) Self Address

b) Loopback Address

c) Identity Address

d) Compatible Address

78 Which of the following networks is accessible to only authorize parties outside the organization?

a) Internet

b) Intranet

c) Extranet

d) All of the above

79 Which of the following switching technique requires a dedicated path between sender and receiver?

a) Message switching

b) Circuit switching

c) Packet switching

d) Time switching

80. In OSI network architecture, the dialogue control and token management are responsibilities of:

a) Network layer

b) Transport layer

c) Data layer

d) Session layer

81. Which of the following is the size of IPV6 address?

a) 32 bits

b) 128 bits

c) 64 bits

d) 256 bits

82. The class B IPV4 address is :

a) 11.120.210.35

c) 202.70.68.93

b) 176.16.82.243

d) 192.168.0.114

83. The X,25 standard specifies a

a) Technique for start-stop data

b) DTE/DCE interface

c) Technique for dialup access

d) Data bit rate

84. Which protocol is responsible for the logical addressing of each packet created by the transport layer?

a) IP

b) RIP

c) TCP

d) UDP

85. Transport Layer function is/are:

a) Optimal path finding

b) Packet switching

c) Port multiplexing

d) Dialogue control

86. DHCP stands for

a) Dynamic Host Control Protocol

b) Dynamic Host Configuration Protocol

c) Different Host Control Protocol

d) Dynamic Host Configuration Procedure

87. The DOS attack is which the attacker establishes a large number of half-open or full open TCP connections at the target host:

a) Botnet flooding

b) Bandwidth flooding

c) Vulnerability attack

d) Connection flooding

88. IMAP is

a) An email protocol

b) DNS protocol

c) Security standard

d) Routing protocol

89. The Open Shortest Path First (OSPF) protocol is an intra domain routing protocol based on…….. routing.

a) Link state

b) Path vector

c) Distance vector

d) Non distance vector

90. A digital signature is a mathematical technique which validates Except which of the following property?

a) Authenticity

b) Non-repudiation

c) Integrity

d) Accuracy

91. An Artificial Neural Network is based on?

a)  Cognitive Artificial Intelligence approach

b) Bio-Neural Intelligence approach

c) Strong Artificial Intelligence approach

d) Weak Artificial Intelligence approach

92. When two companies are linked together by computers and they send business transactions through these computers, they are probably using.

a) Digital wallets

b) Electronic data interchange (some other website specified answered B)

c) Smart cards

d) B2C

93. In gird computing model, servers or personal computers run

a) Dependently

b) Concurrently

c) Independently

d) Horizontally

94. What is the role of Gateway in small grid architecture of IoT?

a) Store data

b) Collect data

c) Manage data

d) Security

95. Which is not supported in web?

a) GIF

b) PNG

c) BMP

d) JPG

96. Who is the responsible for digital signature?

a) NRB

b) NITC

c) NTA

d) OCCA

97. When was the first IT policy promulgated in Nepal?

a) 2057 B.S

b) 2069 B.S

c) 2016 B.S.

d) 2049 B.S.

98 According to Electronic Transaction Act, 2063 B.S. a license obtained by Certifying Authority shall have to renew in:

a) Each year

b) Every three years

c) Every two years

d) Every four years

99 Who is the member secretary of executive council of Tribhuvan University?

a) Vice Chancellor

b) Register

c) Rector

d) Dean

100. When was Tribluvan University Act enacted?

a) 2016 B.S

b) 2049 B.S

c) 2039 B.S.

d) 2055 B.S.

If we have make mistake please comment we will correct them.

Leave a Reply

Your email address will not be published. Required fields are marked *