Computer Operator Old Set-1

Computer Operator Old Set-1

Computer Operator Old Sets

In This portion, here we are trying to collect Old Question of computer operator form Institute of Madhan Bhandari Health and Science 2078/12/06, here we give set name Computer Operator Old Set-1. For finding others old set of computer operator you can search Computer Operator Old set-1,2,3 and so on .

Notes: If we have make some mistake in question and answer please comment below with question number and right answer we will correct this. Thank You !!!

1. When you use the $_GET variable to collect data , the data is visible to:

A. None
B. Only you
C. Everyone
D. Selected few

2. To allow only one user to work with a particular time, one has to use.

A. Semaphore
B. Critical region
C. Locking
D. Dedicated mode

3. The least secure method of authentication is:

A. Fingerprint
B. Password
C. Key Card
D. Retina Pattern

4. Point out an open-source operating system used for Personal Computer:

A. Microsoft Windows
B. Solaris
C. Linux
C. Mac OS X

5. What type of scheduling is round-robin scheduling?

A. Linear data scheduling
B. Non-linear data scheduling
C. Preemptive scheduling
D. Non-preemptive scheduling

6. The size of virtual memory is based on which of the follwoing?

C. Address Bus
D. Data bus

7. Mutual exclusion problem occurs:

A. Between two disjoint process that do not internet
B. Among processes that share resources
C. Among processes that do not use the same resource
D. None of the above

8. Page fault occurs when:

A. The page is corrupted by application software
B. The page is not in main memory
C. The page is in main memory
D. One tires to divide a number by 0

9. Which of the following statement are true?

I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time

A. I only
B. I and II only
C. II and III only
D. I, II and III

10. Which of the following algorithms tends to minimize the process flow time?

A. First Come First Served
B. Shortest Job First
C. Earliest Deadline First
D. Longest Job First

11. A problem encountered in multitasking when a process is perpetually denied necessary resources is called.

A. Deadlock
B. Starvation
C Inversion
D. Aging

12. A ……… is used to logically group data together.

A. Database
B. Tablespace
C. Data file
D. Object

13. ……. operator is used to compare a value to a list of literals values that have been specified.

A. Like
B. Compare
C. Between
D. In

Visit this: Computer Operator Multiple choice question (MCQ)

14. A relation is in ……….. if an attribute of a composite key is dependent on an attribute of other composite key.

A. 2NF
B. 3NF
D. 1NF

15. The rule that a value of a foreign key system must appear as a value of some specific table is called:

A. Referential constraint
B. Index
C. Integrity constraint
D. Functional dependency

16. Normalization is:

A. Removing data redundancy
B. Remove update anomalies
C. Remove delete anomalies
D. All of the above

17. What is DBMS?

A. DBMS is a collection of queries
B. DBMS is a high-level language
C. DBMS is a programming language
D. DBMS stores, modifies and retrieves data

18. Which one of the following command is used to modify a column inside a table?

A. Drop
B. Update
C. Alter
D. Set

19. SQL server is developed by:

A. Oracle
B. Intel
C. Microsoft
D. Michael Stonebreaker

20. Backing up database is essential for ………. data

A. Protecting
B. Preventing
C. Replication
D. None of these

21. Which of the following is not integrity constraint in DBMS?

A. Domain Integrity Constraints
B. Relational Integrity Constraints
C. Referential Integrity Constraints
D. Key Constraints

22. In the case of Zero-address instruction method the operands are stored in:

A. Registers
B. Accumulators
C. Push down stack
D. Cache

23. The circuit used to store one bit data is referred as:

A. OR Gate
B. Decoder
C. Flip-Flop
D. Encoder

24. Ina memory-mapped I/O system, which of the following will not be there?


25. ……….. is an interface that provides a method for transferring binary information between internal storage and external device

A. Input interface
B. I/O interface
C. Output interface
D. I/O bus

26. The system is notified of a read or write operation by.

A. appending an extra bit of the address
B. enabling read or write bit of the device
C. raising an appropriate interrupt signals
D. sending a special signal along the BUS

27. The register used to store the flags is called as:

A. Flag register
B. Status register
C. Test register
D. Log register

28. The Instruction “JUMP” belongs to:

A. Sequential control flow instruction
B. Control transfer instructions
C. branch instructions
D. control transfer and branch instructions

29. The addressing mode which makes use of in-direction pointers is

A. indirect addressing mode
B. Index addressing mode
C. Relative addressing mode
D. Offset addressing mode

30. The addressing mode, where you directly specify the operand value is

A. Intermediate
B. Direct
C. Definite
D. Relative

31. In CISC architecture most of the complex instructions are stored in

A. Register
B. Diodes
D. Transistors

32. “Parity bits” are used for which of the following purpose?

A. Encryption of data
B. To transmit faster
C. To detect errors
D. To identify the users

33. Which one of the following network is an example of a local telephone network?

A. Packet-Switched
B. Circuit-Switched
C. Message-Switched
D. None of the above

34. To deliver a message to the correct application program running on a host, the …………… address must be consulted.

C. Port
D. None of these

Computer Operator Subjective and Objective Notes for Karnali Pradesh; Click Here

35. IPSec is designed to provide security at the:

A. Transport layer
B. Network layer
C. Application layer
D. Session layer

36. The DoS attack, in which the attacker establishes a large number of half-one of full open TCP connections at the target host is:

A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. UDP flooding

37. Which is not an application layer protocol?


38. ……….. is a set of rules that governs data communication

A. Protocol
B. Standards
D. Servers

39. Network congestion occurs

A. In case of traffic overloading
B. When a system terminates
C. When connection between two nodes terminates
D. In case of transfer failure

40. When two companies are linked together by computer and they send business transactions through these computers, they are probably using:

A. Digital wallets
B. Smart cards
C. Electronic data interchange
D. B2C

41. To which TCT/IT architecture layer do e-mail and web browser protocols beling?

A. Application
B. Internet
C. Network Interface
D. Transport

42. The method of communication in which transmission takes place in both directions. But only in one direction at a time is called:

A. Simplex
B. Four wire circuit
C. Full duplex
D. Half duplex

43. DHCP port number for Server is

A. 67
B. 68
C. 80
D. 110

44. Internet Protocol version 4 uses:

A. 64 bit logical address
B. 32bit logical address
C. 16 bit logical address
D. 128 bit logical address

45. All are the advantages of computer network except:

A. Share data and information
B. Share software
C. Complexity
D. Share hardware

46. Digital signature is a mathematical technique which validates:

A. Integrity
B. Authenticity
C. Non-repudiation
D. All of these

47. The combination of text, graphic art, sound, animation and video delivered by computer or other electronic devices is called:

A. Multimedia
B. Hypermedia
C. Visual media
D. None of these

48. What is term used when the government employs technology to deal with citizen, business and other government agencies?

B. Web
C. E-government
D. Service delivery

49. An Artificial Intelligence Technique that allows computers to understand associations and relationship between objects and events is called:

A. Cognitive science
B. pattern matching
C. Heuristic processing
D. Relative symbolism

50. Which of the following is perceptron?

A. A neural network that contains feedback
B. An auto-associative neural network
C. A double layer auto-associative neural network
D. A single layer feed-forward neural network with pre-processing

51. Windows Azure is an Example of:

A. IaaS
B. PaaS
C. SaaS
D. Both A and B

52. On which article of the constitution of Nepal, the right to communication is mentioned?

A. 13
B. 15
C. 19
D. 21

53. An extension of the hypertext is

A. Hypermedia
B. Multimedia
C. Social media
D. None of the above

54. A video consists of a sequence of:

A. Frames
B. packets
C. Signals
D. Pulses

55. The ration of horizontal length to the vertical length in monitor is called

A. Aspect Ratio
B. Scale
D. Resolution

56. Which is not involved in debugging?

A. Identifying
B. Isolating
C. Test
D. Fixing

57. A protocol is:

A. Interconnection pattern of computers
B. Set of rules for communication
C. A device for internet
D. An operating system

58. Integrated Circuit is related to …………… generation computer

A. Second
B. Third
C. Fourth
D. Fifth

59. A computer program that converts an entire program into machine language is called a/an:

A. Interpreter
B. Simulator
C. Compiler
D. Commander

60. How to prevent computer virus?

A. Install an antivirus software
B. Don’t open executable email attachments
C. Don’t use pirated software
D. All of the above

61. …………. is the middleman between the hardware and the operating system

A. Firmware
B. Middleware
C. Cache memory
D. Main memory

62. Speedometer is an example of ………….. computer

A. Micro computer
B. Hybrid computer
C. Analog computer
D. None of the above

Computer Operator Syllabus for All Level Click Here.

63. A./An …… encapsulate data and functionality:

A. Structured program
B. Selection statement
C. Object
D. Program

64. Which is the best file organization when data is frequently added or deleted from a file?

A. Sequential
B. Direct
C. Index sequential
D. None of the above

65. Abstract class can ……….. instances

A. Never have
B. Always have
C. Have array of
D. Have pointer of.

66. A constructor is called whenever:

A. An object is used
B. A class is used
C. A class is declared
D. An object is declared

67. ………. is the process of explicitly converting one data type to another data type:

A. Data type converting
B. Type converting
C. Data converting
D. Type casting

68. Procedural language contains systematic order of

A. Statement
B. Objects
C. Classes
D. Operations

69. The member of a class bey default are

A. Private
B. Public
C. Protected
D. None of these

70. Which of the following is of characteristic of OOP?

A. Encapsulation
B. Polymorphism
C. Abstraction
D. Exception

71. How many types of control statements are in procedural programming language?

A. 2
B. 3
C. 5
D. 4

72. Which class cannot create its instance?

A. Parent class
B. Nested class
C. Anonymous class
D. Abstract class

73. If you want to print slides without color and background which option, do you select?

A. Gray scale
B. Pure black and white
C. Black
D. White

74. Word wrap feature…………..

A. Set text inside the fixed margin
B. Appears at the bottom of the document
C. Marks the paragraph center
D. Applies border around text

75. Indentation in computer word processing is used to:

A. Make the text readable
B. Change the paragraph color
C. apply border around text
D. Change line spacing

76. A new presentation can be created from

A. Existing presentation
B. Blank presentation
C. design template
D. All of the above

77. Which one of the following can change the physical structure of the document?

A. Font
B. Formatting
C. Approach
D. Debug

78. Which command brings you to the first slide in your presentation?

A. Next slide button
B. Page up
C. Ctrl+Home
D. Ctrl+End

79. How can you create a uniform appearance by adding a background image to all slides?

A. Create a template
B. Edit the slide master
C. Use the autocorrect wizard
D. All of the above

80. Thesaurus tool in MS-Word is used for:

A. Spelling suggestions
B. Grammar options
C. Synonyms and Antonyms words
D. All of the above

81. Which of the following effects can be used to fill the background of the slide?

A. Gradient
B. Picture
C. Texture
D. All of these

82. K5 denotes:

A. Relative Cell Reference
B. Absolute Cell Reference
C. Mixed Cell Reference
D. None of the above

83. Merge document is said to be the combination of ……. and data source:

A. Mail Merge
B. Word Fields
C. Main Document
D. Merger Fields

84. HTML is:

A. Scripting Language
B. Markup Language
C. Programming Language
D. None of the above

85. To create a check box for a form in HTML, which command is used?

A. <input checkbox>
B. <input type=”checkbox”>
C. <checkbox>
D. <input=checkbox>

86. PHP stands for:

A. Hypertext Preprocessor
B. Pretext Hypertext Preprocessor
C. Personal Home Preprocessor
D. None of the above

87. What is the color of an unvisited link?

A. Red
B. Blue
C. Purple
D. Green

88. CSS stands for:

A. Cascade Style Sheet
B. Color and Style Sheet
C. Cascading Style Sheet
D. None of the above

89. To execute the contents of a query file ‘exec.sql’ by feeding it to mysql which command is used?

A. mysql exec.sql>sampdb
B. mysql sampdb <exec.sql
C. mysql exec.sql
D. mysql exec

90. ………. typically refers to a suite of technologies that allow developers to store data in a readable format


91. The CSS property used to control the element’s text size is:

A. text-style
B. text-size
C. font-size
D. font-style

92. In the JavaScript, which one of the following is not considered as an error?

A. Syntax error
B. Missing of semicolons
C. Division by zero
D. Missing of bracket

Notes: If we have make some mistake in question and answer please comment below with question number and right answer we will correct this. Thank You !!!

Leave a Reply

Your email address will not be published. Required fields are marked *