In This portion, here we are trying to collect Old Question of computer operator form Institute of Madhan Bhandari Health and Science 2078/12/06, here we give set name Computer Operator Old Set-1. For finding others old set of computer operator you can search Computer Operator Old set-1,2,3 and so on .
Notes: If we have make some mistake in question and answer please comment below with question number and right answer we will correct this. Thank You !!!
1. When you use the $_GET variable to collect data , the data is visible to:
A. None
B. Only you
C. Everyone
D. Selected few
2. To allow only one user to work with a particular time, one has to use.
A. Semaphore
B. Critical region
C. Locking
D. Dedicated mode
3. The least secure method of authentication is:
A. Fingerprint
B. Password
C. Key Card
D. Retina Pattern
4. Point out an open-source operating system used for Personal Computer:
A. Microsoft Windows
B. Solaris
C. Linux
C. Mac OS X
5. What type of scheduling is round-robin scheduling?
A. Linear data scheduling
B. Non-linear data scheduling
C. Preemptive scheduling
D. Non-preemptive scheduling
6. The size of virtual memory is based on which of the follwoing?
A. CPU
B. RAM
C. Address Bus
D. Data bus
7. Mutual exclusion problem occurs:
A. Between two disjoint process that do not internet
B. Among processes that share resources
C. Among processes that do not use the same resource
D. None of the above
8. Page fault occurs when:
A. The page is corrupted by application software
B. The page is not in main memory
C. The page is in main memory
D. One tires to divide a number by 0
9. Which of the following statement are true?
I. Shortest remaining time first scheduling may cause starvation
II. Preemptive scheduling may cause starvation
III. Round robin is better than FCFS in terms of response time
A. I only
B. I and II only
C. II and III only
D. I, II and III
10. Which of the following algorithms tends to minimize the process flow time?
A. First Come First Served
B. Shortest Job First
C. Earliest Deadline First
D. Longest Job First
11. A problem encountered in multitasking when a process is perpetually denied necessary resources is called.
A. Deadlock
B. Starvation
C Inversion
D. Aging
12. A ……… is used to logically group data together.
A. Database
B. Tablespace
C. Data file
D. Object
13. ……. operator is used to compare a value to a list of literals values that have been specified.
A. Like
B. Compare
C. Between
D. In
Visit this: Computer Operator Multiple choice question (MCQ)
14. A relation is in ……….. if an attribute of a composite key is dependent on an attribute of other composite key.
A. 2NF
B. 3NF
C. BCNF
D. 1NF
15. The rule that a value of a foreign key system must appear as a value of some specific table is called:
A. Referential constraint
B. Index
C. Integrity constraint
D. Functional dependency
16. Normalization is:
A. Removing data redundancy
B. Remove update anomalies
C. Remove delete anomalies
D. All of the above
17. What is DBMS?
A. DBMS is a collection of queries
B. DBMS is a high-level language
C. DBMS is a programming language
D. DBMS stores, modifies and retrieves data
18. Which one of the following command is used to modify a column inside a table?
A. Drop
B. Update
C. Alter
D. Set
19. SQL server is developed by:
A. Oracle
B. Intel
C. Microsoft
D. Michael Stonebreaker
20. Backing up database is essential for ………. data
A. Protecting
B. Preventing
C. Replication
D. None of these
21. Which of the following is not integrity constraint in DBMS?
A. Domain Integrity Constraints
B. Relational Integrity Constraints
C. Referential Integrity Constraints
D. Key Constraints
22. In the case of Zero-address instruction method the operands are stored in:
A. Registers
B. Accumulators
C. Push down stack
D. Cache
23. The circuit used to store one bit data is referred as:
A. OR Gate
B. Decoder
C. Flip-Flop
D. Encoder
24. Ina memory-mapped I/O system, which of the following will not be there?
A. IN
B. LDA
C OUT
D. ADD
25. ……….. is an interface that provides a method for transferring binary information between internal storage and external device
A. Input interface
B. I/O interface
C. Output interface
D. I/O bus
26. The system is notified of a read or write operation by.
A. appending an extra bit of the address
B. enabling read or write bit of the device
C. raising an appropriate interrupt signals
D. sending a special signal along the BUS
27. The register used to store the flags is called as:
A. Flag register
B. Status register
C. Test register
D. Log register
28. The Instruction “JUMP” belongs to:
A. Sequential control flow instruction
B. Control transfer instructions
C. branch instructions
D. control transfer and branch instructions
29. The addressing mode which makes use of in-direction pointers is
A. indirect addressing mode
B. Index addressing mode
C. Relative addressing mode
D. Offset addressing mode
30. The addressing mode, where you directly specify the operand value is
A. Intermediate
B. Direct
C. Definite
D. Relative
31. In CISC architecture most of the complex instructions are stored in
A. Register
B. Diodes
C. SMOS
D. Transistors
32. “Parity bits” are used for which of the following purpose?
A. Encryption of data
B. To transmit faster
C. To detect errors
D. To identify the users
33. Which one of the following network is an example of a local telephone network?
A. Packet-Switched
B. Circuit-Switched
C. Message-Switched
D. None of the above
34. To deliver a message to the correct application program running on a host, the …………… address must be consulted.
A. IP
B. MAC
C. Port
D. None of these
Computer Operator Subjective and Objective Notes for Karnali Pradesh; Click Here
35. IPSec is designed to provide security at the:
A. Transport layer
B. Network layer
C. Application layer
D. Session layer
36. The DoS attack, in which the attacker establishes a large number of half-one of full open TCP connections at the target host is:
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. UDP flooding
37. Which is not an application layer protocol?
A. HTTP
B. SMTP
C. FTP
D. TCP
38. ……….. is a set of rules that governs data communication
A. Protocol
B. Standards
C. RFCs
D. Servers
39. Network congestion occurs
A. In case of traffic overloading
B. When a system terminates
C. When connection between two nodes terminates
D. In case of transfer failure
40. When two companies are linked together by computer and they send business transactions through these computers, they are probably using:
A. Digital wallets
B. Smart cards
C. Electronic data interchange
D. B2C
41. To which TCT/IT architecture layer do e-mail and web browser protocols beling?
A. Application
B. Internet
C. Network Interface
D. Transport
42. The method of communication in which transmission takes place in both directions. But only in one direction at a time is called:
A. Simplex
B. Four wire circuit
C. Full duplex
D. Half duplex
43. DHCP port number for Server is
A. 67
B. 68
C. 80
D. 110
44. Internet Protocol version 4 uses:
A. 64 bit logical address
B. 32bit logical address
C. 16 bit logical address
D. 128 bit logical address
45. All are the advantages of computer network except:
A. Share data and information
B. Share software
C. Complexity
D. Share hardware
46. Digital signature is a mathematical technique which validates:
A. Integrity
B. Authenticity
C. Non-repudiation
D. All of these
47. The combination of text, graphic art, sound, animation and video delivered by computer or other electronic devices is called:
A. Multimedia
B. Hypermedia
C. Visual media
D. None of these
48. What is term used when the government employs technology to deal with citizen, business and other government agencies?
A. G2BC
B. Web
C. E-government
D. Service delivery
49. An Artificial Intelligence Technique that allows computers to understand associations and relationship between objects and events is called:
A. Cognitive science
B. pattern matching
C. Heuristic processing
D. Relative symbolism
50. Which of the following is perceptron?
A. A neural network that contains feedback
B. An auto-associative neural network
C. A double layer auto-associative neural network
D. A single layer feed-forward neural network with pre-processing
51. Windows Azure is an Example of:
A. IaaS
B. PaaS
C. SaaS
D. Both A and B
52. On which article of the constitution of Nepal, the right to communication is mentioned?
A. 13
B. 15
C. 19
D. 21
53. An extension of the hypertext is
A. Hypermedia
B. Multimedia
C. Social media
D. None of the above
54. A video consists of a sequence of:
A. Frames
B. packets
C. Signals
D. Pulses
55. The ration of horizontal length to the vertical length in monitor is called
A. Aspect Ratio
B. Scale
C DPI
D. Resolution
56. Which is not involved in debugging?
A. Identifying
B. Isolating
C. Test
D. Fixing
57. A protocol is:
A. Interconnection pattern of computers
B. Set of rules for communication
C. A device for internet
D. An operating system
58. Integrated Circuit is related to …………… generation computer
A. Second
B. Third
C. Fourth
D. Fifth
59. A computer program that converts an entire program into machine language is called a/an:
A. Interpreter
B. Simulator
C. Compiler
D. Commander
60. How to prevent computer virus?
A. Install an antivirus software
B. Don’t open executable email attachments
C. Don’t use pirated software
D. All of the above
61. …………. is the middleman between the hardware and the operating system
A. Firmware
B. Middleware
C. Cache memory
D. Main memory
62. Speedometer is an example of ………….. computer
A. Micro computer
B. Hybrid computer
C. Analog computer
D. None of the above
Computer Operator Syllabus for All Level Click Here.
63. A./An …… encapsulate data and functionality:
A. Structured program
B. Selection statement
C. Object
D. Program
64. Which is the best file organization when data is frequently added or deleted from a file?
A. Sequential
B. Direct
C. Index sequential
D. None of the above
65. Abstract class can ……….. instances
A. Never have
B. Always have
C. Have array of
D. Have pointer of.
66. A constructor is called whenever:
A. An object is used
B. A class is used
C. A class is declared
D. An object is declared
67. ………. is the process of explicitly converting one data type to another data type:
A. Data type converting
B. Type converting
C. Data converting
D. Type casting
68. Procedural language contains systematic order of
A. Statement
B. Objects
C. Classes
D. Operations
69. The member of a class bey default are
A. Private
B. Public
C. Protected
D. None of these
70. Which of the following is of characteristic of OOP?
A. Encapsulation
B. Polymorphism
C. Abstraction
D. Exception
71. How many types of control statements are in procedural programming language?
A. 2
B. 3
C. 5
D. 4
72. Which class cannot create its instance?
A. Parent class
B. Nested class
C. Anonymous class
D. Abstract class
73. If you want to print slides without color and background which option, do you select?
A. Gray scale
B. Pure black and white
C. Black
D. White
74. Word wrap feature…………..
A. Set text inside the fixed margin
B. Appears at the bottom of the document
C. Marks the paragraph center
D. Applies border around text
75. Indentation in computer word processing is used to:
A. Make the text readable
B. Change the paragraph color
C. apply border around text
D. Change line spacing
76. A new presentation can be created from
A. Existing presentation
B. Blank presentation
C. design template
D. All of the above
77. Which one of the following can change the physical structure of the document?
A. Font
B. Formatting
C. Approach
D. Debug
78. Which command brings you to the first slide in your presentation?
A. Next slide button
B. Page up
C. Ctrl+Home
D. Ctrl+End
79. How can you create a uniform appearance by adding a background image to all slides?
A. Create a template
B. Edit the slide master
C. Use the autocorrect wizard
D. All of the above
80. Thesaurus tool in MS-Word is used for:
A. Spelling suggestions
B. Grammar options
C. Synonyms and Antonyms words
D. All of the above
81. Which of the following effects can be used to fill the background of the slide?
A. Gradient
B. Picture
C. Texture
D. All of these
82. K5 denotes:
A. Relative Cell Reference
B. Absolute Cell Reference
C. Mixed Cell Reference
D. None of the above
83. Merge document is said to be the combination of ……. and data source:
A. Mail Merge
B. Word Fields
C. Main Document
D. Merger Fields
84. HTML is:
A. Scripting Language
B. Markup Language
C. Programming Language
D. None of the above
85. To create a check box for a form in HTML, which command is used?
A. <input checkbox>
B. <input type=”checkbox”>
C. <checkbox>
D. <input=checkbox>
86. PHP stands for:
A. Hypertext Preprocessor
B. Pretext Hypertext Preprocessor
C. Personal Home Preprocessor
D. None of the above
87. What is the color of an unvisited link?
A. Red
B. Blue
C. Purple
D. Green
88. CSS stands for:
A. Cascade Style Sheet
B. Color and Style Sheet
C. Cascading Style Sheet
D. None of the above
89. To execute the contents of a query file ‘exec.sql’ by feeding it to mysql which command is used?
A. mysql exec.sql>sampdb
B. mysql sampdb <exec.sql
C. mysql exec.sql
D. mysql exec
90. ………. typically refers to a suite of technologies that allow developers to store data in a readable format
A. HTML
B. XSL
C. XML
D. PHP
91. The CSS property used to control the element’s text size is:
A. text-style
B. text-size
C. font-size
D. font-style
92. In the JavaScript, which one of the following is not considered as an error?
A. Syntax error
B. Missing of semicolons
C. Division by zero
D. Missing of bracket
Notes: If we have make some mistake in question and answer please comment below with question number and right answer we will correct this. Thank You !!!