NOC [ २०७९/१२/२ ] नेपाल आयल निगम लिमिटेड, प्राविधिक, विज्ञ, लेखा, सहायक (कम्प्युटर सम्बन्धी) लिखित परीक्षा २०७९/१२/२

Anil Pandit
0



लोक सेवा आयोग

नेपाल आयल निगम लिमिटेड, प्राविधिक, विज्ञ, लेखा, सहायक (कम्प्युटर सम्बन्धी) पदको
प्रतियोगितात्मक लिखित परीक्षा
२०७९/१२/२

KEY [D]
समयः २ घण्टा ३० मिनेट

पूर्णाङ्क : १००

विषयः कम्प्युटर सम्बन्धी


Section 'A': Objective

Multiple Choice

50x1=50 Marks

FOR NOTE PDF - Visit End of the page

WhatsApp Group Join

कुनै Answer गलत भएमा Comment गर्नु होला 


  1. Which of the following do not replicate automatically?
    • A) Worm
    • B) Virus
    • C) Trojan Horse
    • D) Bomb
  2. How many columns can you insert in a Word document in maximum?
    • A) 40
    • B) 50
    • C) 45
    • D) 55
  3. Which of the following statement is false?
    • A) You can set different header and footer for the last page of a section
    • B) You can set different header footer for even and odd pages
    • C) You can set different page number formats for different sections
    • D) You can set different header and footer for the first page of a section
  4. To autofit the width of a column
    • A) Double click the left border of column
    • B) Double click the right border of column
    • C) Double click the column header
    • D) All of the above
  5. MS Word automatically moves the text to the next line when it reaches the right edge of the screen and is called
    • A) Carriage Return
    • B) Enter
    • C) Word Wrap
    • D) None of the above
  6. If the width of a page is more than the height of a page, such orientation is called
    • A) Portrait
    • B) Landscape
    • C) Outline
    • D) Print Layout
  7. Superscript, subscript, outline, emboss, engrave are known as
    • A) Text effects
    • B) Word art
    • C) Font styles
    • D) Font effects
  8. In MS Word document, you can force a page break by
    • A) Positioning your cursor at the appropriate place and pressing the F1 key
    • B) Using the insert > section break on the insert tab
    • C) Positioning your cursor at the appropriate place and pressing Ctrl + Enter
    • D) Changing the font size of your document
  9. What is the default file extension for Microsoft Word document?
    • A) .txt
    • B) .word
    • C) .docx
    • D) .docs
  10. In MS Word you can insert hyperlink by
    • A) Pressing Ctrl + K
    • B) Pressing Ctrl + Shift + K
    • C) Pressing Shift + K
    • D) None of the above
  11. ___ is created to fill in blank forms.
    • A) Data source
    • B) Style
    • C) Template
    • D) Macro
  12. Gutter margin is added to ___.
    • A) left margin when printing
    • B) right margin when printing
    • C) top margin when printing
    • D) binding side of page when printing
  13. The shortcut key for spell check in document is ___.
    • A) F7
    • B) Shift + F7
    • C) Ctrl + F7
    • D) Alt + F7
  14. An Excel Workbook is a collection of ___.
    • A) Workbooks
    • B) Worksheets
    • C) Charts
    • D) Worksheets and Chart
  15. Which of the following is not true about Find and Replace in Excel?
    • A) You can search for bold and replace with italics
    • B) You can decide whether to look for the whole word or not
    • C) You can search in formula too
    • D) You can search by rows or columns or sheets
  16. Formatting a cell in Number format you can't set ___.
    • A) decimal places
    • B) use 1000 separator
    • C) negative numbers
    • D) currency symbol
  17. In maximum, how many sheets can be set as default while creating a new workbook?
    • A) 254
    • B) 255
    • C) 256
    • D) No limit
  18. Which function is used to calculate depreciation, rates of return, future values and loan payment amounts?
    • A) Logical
    • B) Math and Trigonometry
    • C) Statistical
    • D) Financial
  19. How do you display current date only in MS Excel?
    • A) Date()
    • B) Today()
    • C) Now()
    • D) Time()
  20. In MS Excel the following displays the contents of the active cell ___.
    • A) Active cell
    • B) Formula bar
    • C) Menu bar
    • D) None of the above
  21. Concatenation of text can be done using ___.
    • A) &
    • B) !
    • C) #
    • D) @
  22. SUMIF() function is used to ___.
    • A) Sum the cells in range
    • B) Sum the cells with given criteria
    • C) None of the above
    • D) Both A and B
  23. You can group non-contiguous worksheet by pressing ___.
    • A) Alt + mouse
    • B) Shift + mouse
    • C) Ctrl + mouse
    • D) Group button on standard toolbar
  24. The shortcut key ___ inserts current date in cell in Excel.
    • A) Alt + ;
    • B) Ctrl + ;
    • C) Ctrl + Shift + ;
    • D) Shift + ;
  25. ___ is not a valid data type in Excel.
    • A) Number
    • B) Label
    • C) Character
    • D) Date/Time
  26. In MS Access, "Hyperlink" data type can store ___.
    • A) Web address
    • B) Email address
    • C) Path of a file
    • D) All of the above
  27. The key uniquely identifies each record in a table.
    • A) primary key
    • B) key word
    • C) field name
    • D) all of the above
  28. What are the columns in a Microsoft Access table called?
    • A) Rows
    • B) Fields
    • C) Cells
    • D) Records
  29. The metadata about the structure of the database is stored in
    • A) data files
    • B) indices
    • C) data dictionary
    • D) metadata files
  30. Minimal super keys are called
    • A) schema keys
    • B) candidate keys
    • C) domain keys
    • D) attribute keys
  31. ........ data type allows special symbols and alphanumeric characters.
    • A) Text
    • B) Memo
    • C) Auto number
    • D) None of the above
  32. How to insert tables in a slide?
    • A) insert table from insert menu
    • B) both A and B
    • C) click on insert table in content pane of blank slide
    • D) none of the above
  33. Which view in PowerPoint can be used to enter speaker comments?
    • A) Normal
    • B) Slide show
    • C) Slide sorter
    • D) Notes page views
  34. In Microsoft PowerPoint, in order to see all the slides on one screen use
    • A) View, Slide Sorter
    • B) View, Slide
    • C) View, Master
    • D) View, Slide show
  35. An animation scheme can be applied in ........ slides.
    • A) all
    • B) selected
    • C) current
    • D) all of the above
  36. Which of the following require large computer's memory?
    • A) Imaging
    • B) Graphics
    • C) Voice
    • D) All of the above
  37. Firmware is contained in
    • A) SRAM
    • B) DRAM
    • C) ROM
    • D) Cache
  38. Each time you turn on your computer, it will check on the control file
    • A) Command.com, io.sys
    • B) Command.com, date.com, dir.com
    • C) Command.com, io.sys, msdos.sys
    • D) Chkdsk.exe
  39. USB is a device used to store data and it stands for
    • A) Unlimited Service Band
    • B) Unlimited Serial Bus
    • C) Universal Serial Bus
    • D) Universal Service Bus
  40. Which of the following holds RAM, ROM, CPU in the computer?
    • A) ALU
    • B) Cache
    • C) Hard disk
    • D) Motherboard
  41. The access method used in magnetic tape is
    • A) direct
    • B) random
    • C) sequential
    • D) none of the above
  42. Computer Network is
    • A) a collection of hardware components and computers
    • B) interconnected by communication channels
    • C) sharing of resources and information
    • D) all of the above
  43. The first Network is
    • A) CNNET
    • B) NSFNET
    • C) ASAPNET
    • D) ARPANET
  44. How many layers does OSI Reference Model have?
    • A) 4
    • B) 5
    • C) 6
    • D) 7
  45. Which one of the following extends a private network across public networks?
    • A) Local Area Network
    • B) Virtual Private Network
    • C) Enterprise Private Network
    • D) Storage Area Network
  46. Email address is made up of
    • A) single part
    • B) two parts
    • C) three parts
    • D) four parts
  47. You can get files from another computer on the internet by using
    • A) HTTP
    • B) TELNET
    • C) UTP
    • D) FTP
  48. When computer virus starts to impact the data, it is known as
    • A) virus infection
    • B) virus spreading
    • C) data losing
    • D) shutting down
  49. Malicious software is known as
    • A) Badware
    • B) Malware
    • C) Maliciousware
    • D) Illegalware
  50. ........ is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
    • A) CAPTCHA
    • B) Human Intelligence Test
    • C) FIREWALL
    • D) Anti-virus

Section 'B': Subjective (50 Marks)

1. Write short notes on System Software and Application Software. 5+5=10
System Software

System software refers to the programs that manage and control the hardware components of a computer system, enabling the application software to function. It provides a platform for other software to operate and manages the hardware resources.

Key examples include:
  • Operating System (OS): Manages hardware, software resources, and provides essential services to run application software (e.g., Windows, macOS, Linux).
  • Utility Programs: Help in system maintenance and optimization, such as antivirus software, disk cleaners, and file management tools.
  • Device Drivers: Facilitate communication between the operating system and hardware devices like printers, keyboards, and monitors.
Characteristics:
  • Acts as an interface between hardware and application software.
  • Ensures efficient resource management.
  • Runs in the background and is essential for system stability.
Application Software

Application software is designed to perform specific tasks for users, catering to their needs for productivity, entertainment, or communication. It operates on top of the system software and is used for practical purposes like word processing, gaming, or browsing the internet.

Examples include:
  • Productivity Software: Word processors, spreadsheets, and presentation tools (e.g., MS Word, Excel, PowerPoint).
  • Multimedia Software: Used for creating or playing audio, video, and images (e.g., Adobe Photoshop, VLC Media Player).
  • Web Browsers: Used to access the internet and browse websites (e.g., Chrome, Firefox, Safari).
Characteristics:
  • User-oriented, developed to solve specific problems or perform specific tasks.
  • Can be installed or uninstalled based on the user’s needs.
  • Requires system software (OS) to run.
2. What are the different types of topology used for Networking? Explain in detail with major characteristics. 10
Types of Topology in Networking

Network topology refers to the arrangement or layout of different elements (nodes, links, etc.) in a computer network. It defines how devices are interconnected and communicate with each other. Below are various types of network topologies with their characteristics:

1. Bus Topology

In a bus topology, all devices are connected to a single central cable, known as the bus or backbone. Data transmitted by one device is available to all devices on the network, but only the intended recipient processes it.

Characteristics:
  • Simple and Cost-Effective: Easy to set up and requires less cabling than other topologies.
  • Broadcasting Nature: Data is sent to all devices, but only the intended recipient accepts it.
  • Limited Scalability: Adding more devices can degrade network performance due to increased traffic.
  • Failure of Backbone: If the main cable fails, the entire network is affected.
2. Star Topology

In a star topology, all devices are connected to a central hub or switch. The hub acts as a central point, managing data transmission between devices.

Characteristics:
  • Centralized Management: The hub or switch controls communication between devices, making the network easy to manage.
  • High Performance: Performance remains stable even with many devices since each communication goes through the hub.
  • Easy Troubleshooting: Individual device or cable failures do not affect the entire network, making it easy to isolate issues.
  • Hub Dependency: If the hub fails, the entire network is down.
3. Ring Topology

In a ring topology, devices are connected in a circular manner where each device is linked to two other devices. Data travels in one or both directions along the ring.

Characteristics:
  • Token Passing: A token circulates in the network to control which device can send data, preventing data collisions.
  • Equal Access: Every device has equal access to the network, and performance remains consistent even with more devices.
  • Simple but Fragile: A break in the ring (a single point of failure) can take down the entire network.
  • Difficult to Reconfigure: Adding or removing devices can disrupt the network.
4. Mesh Topology

In a mesh topology, every device is connected to every other device, allowing for direct communication between all nodes.

Characteristics:
  • High Reliability: Since devices have multiple connections, failure of one link does not affect the entire network.
  • Efficient Data Transmission: Direct communication between devices reduces delays.
  • Expensive and Complex: Requires a large amount of cabling and is complex to set up and maintain.
  • Ideal for Critical Systems: Often used in networks where high reliability is crucial (e.g., military networks).
5. Tree (or Hierarchical) Topology

Tree topology is a combination of star and bus topologies. It has a hierarchical structure with multiple star-configured networks connected to a central backbone.

Characteristics:
  • Scalable: Allows for expansion by adding more branches (nodes) to the hierarchy.
  • Hierarchical Management: The root node manages the network, with branching nodes controlling their sub-nodes.
  • High Cabling Requirement: Uses more cable compared to star and bus topologies.
  • Centralized Failure Risk: If the root node or backbone fails, large parts of the network can be disrupted.
6. Hybrid Topology

Hybrid topology combines two or more different types of topologies, creating a more complex and flexible network layout.

Characteristics:
  • Flexible and Scalable: Can be designed to meet the specific needs of the organization by combining various topologies.
  • High Performance: Can optimize the network by combining the advantages of different topologies.
  • Complex Design: Requires careful planning and can be more expensive to implement and maintain.
Summary of Characteristics
Topology Characteristics
Bus Simple, cost-effective, but a single point of failure.
Star Centralized, high performance, easy troubleshooting, but hub failure is critical.
Ring Token-based access, equal performance, but one failure affects the network.
Mesh Highly reliable, direct communication, but expensive and complex.
Tree Scalable, hierarchical, but requires a lot of cabling and has a central failure risk.
Hybrid Flexible and scalable, combines advantages, but complex to design.
3. What is antivirus? What is the major difference between Trojan horse and Worm virus? (10 Marks)
Antivirus

Antivirus is a type of software designed to detect, prevent, and remove malware, including viruses, worms, trojan horses, and other malicious programs. It protects computer systems by scanning files, emails, and websites for suspicious activity or code. Antivirus software continuously monitors the system to detect threats and can perform the following tasks:

  • Real-time Protection: Scans for threats as they occur in the background.
  • Scheduled Scanning: Performs regular scans to ensure no malware is present.
  • Quarantine and Removal: Isolates and removes identified malicious software.
  • Virus Definitions Updates: Continuously updates its database to recognize new threats.

Common antivirus software includes Norton, McAfee, Kaspersky, and Avast.

Difference Between Trojan Horse and Worm Virus
Aspect Trojan Horse Worm Virus
Definition A Trojan horse is a type of malware disguised as legitimate software, tricking users into installing it. Once inside, it can steal data, create backdoors, or give unauthorized access. A worm is a self-replicating malware that spreads through networks without needing to attach itself to a host program. It can cause network congestion or system failure by overwhelming systems.
How It Spreads A Trojan does not spread on its own. It requires users to install or execute it, thinking it’s a legitimate file or program (e.g., attachments, software downloads). A worm spreads automatically across networks, exploiting vulnerabilities. It doesn't need user intervention to replicate.
Intent Trojans are often used to steal sensitive information (passwords, personal data) or to create a backdoor for remote access. Worms primarily aim to replicate themselves across multiple systems, causing system overload and slowing down networks.
Execution The Trojan horse remains hidden, often lying dormant until triggered. It relies on social engineering or deception to be installed. Worms act immediately, spreading without the need for a host file or user action. They exploit network vulnerabilities.
Damage Caused Trojans can lead to data theft, unauthorized control of the system, or installation of further malware. Worms usually cause system crashes, loss of network bandwidth, and slowing down of systems, but they may also carry a payload to execute malicious actions.
Example Examples include fake software installers, such as "Free Anti-virus" or "System Cleaners" that contain malware. Examples include the “ILOVEYOU” and “Slammer” worms that spread rapidly across the internet, affecting millions of systems.
4. Describe Mail Merge feature in MS Word. Write the steps that you follow in order to create a Macro in MS Word. (5 + 5 = 10 Marks)
Mail Merge in MS Word

Mail Merge is a feature in MS Word that allows users to create personalized documents, such as letters, labels, envelopes, or emails, for multiple recipients using a template and a data source. It is commonly used for sending mass communications while keeping each message unique by inserting personalized information, like names and addresses, from a data source into the document.

Key Components of Mail Merge:
  1. Main Document: This is the template that holds the fixed text and placeholders for variable data (e.g., letters, emails, labels).
  2. Data Source: This is the list of variable information (e.g., names, addresses) that will be inserted into the placeholders of the main document. It can be a spreadsheet, database, or a table in Word.
  3. Merge Fields: These are placeholders within the main document where the data from the data source will be inserted (e.g., <<Name>>, <<Address>>).
  4. Merged Document: The final output with the personalized information filled in for each recipient.
Steps for Mail Merge:
  1. Open MS Word and go to the "Mailings" tab.
  2. Click on "Start Mail Merge" and select the type of document you want (e.g., letters, labels).
  3. Click on "Select Recipients" and choose a data source (e.g., Excel spreadsheet, CSV file, or enter a new list).
  4. Insert Merge Fields like <<First Name>>, <<Address>>, etc., into the main document.
  5. Click on "Finish & Merge" to preview the documents or send the output directly to the printer or email.
Steps to Create a Macro in MS Word

A macro in MS Word is a series of commands or instructions that you record to automate repetitive tasks. Once recorded, you can run the macro to perform the same set of actions with a single click.

Steps to Create a Macro:
  1. Open MS Word and go to the "View" tab.
  2. Click on "Macros" in the right corner and select "Record Macro."
  3. In the Record Macro dialog box:
    • Name your macro (e.g., "InsertHeader").
    • Choose where to store the macro: You can save it in "All Documents" (global) or "This Document" (for the current document only).
    • Assign a Button or Keyboard Shortcut: To quickly access the macro, assign it to a button on the toolbar or a keyboard shortcut.
  4. Start recording: Once you click "OK," Word will start recording all the actions you perform.
  5. Perform the task you want to automate (e.g., formatting text, inserting a header, etc.).
  6. When done, go back to "Macros" and click on "Stop Recording."
  7. To run the macro, go to "View > Macros > View Macros", select your macro, and click "Run" or use the assigned shortcut.
5. A) What is the difference between primary key and foreign key? Explain with examples. (5 Marks)
Difference Between Primary Key and Foreign Key
  1. Primary Key:

    A primary key is a column (or a set of columns) in a database table that uniquely identifies each record in that table. It ensures that no duplicate values or null values exist in the primary key column.

    Key Features of Primary Key:
    • Uniquely identifies each record in the table.
    • Cannot contain null values.
    • A table can have only one primary key, but it can be composed of multiple columns (composite key).
    Example: Consider a table Students:
    StudentID (Primary Key) Name Age
    1 John 22
    2 Sarah 21
    3 Alex 23

    Here, StudentID is the primary key that uniquely identifies each student.

  2. Foreign Key:

    A foreign key is a column (or set of columns) in one table that refers to the primary key in another table. It creates a relationship between two tables by linking the data in the foreign key column to the data in the referenced primary key column.

    Key Features of Foreign Key:
    • Establishes a relationship between two tables.
    • The foreign key value must match an existing value in the referenced primary key or be null (depending on constraints).
    • Ensures referential integrity, meaning the foreign key must refer to a valid record in the related table.
    Example: Consider a second table Orders that references the StudentID in the Students table:
    OrderID (Primary Key) StudentID (Foreign Key) OrderDate
    101 1 2023-09-12
    102 2 2023-09-13
    103 1 2023-09-14

    Here, StudentID in the Orders table is a foreign key that references the StudentID primary key in the Students table. This ensures that every order is linked to a valid student.

Differences:
Aspect Primary Key Foreign Key
Purpose Uniquely identifies each record in a table. Establishes a relationship between two tables.
Uniqueness Values must be unique in the primary key column. Values can be duplicated and null (if allowed).
Null Values Cannot contain null values. Can contain null values (depending on constraints).
Number per Table Only one primary key per table. A table can have multiple foreign keys.
Referencing Self-contained in its table. Refers to a primary key in another table.
b) What do you mean by Database Management System? Explain with example of DBMS. (5 Marks)
Database Management System (DBMS)

A Database Management System (DBMS) is software that allows users to create, manage, and interact with databases efficiently. It provides tools for defining, manipulating, retrieving, and managing data in a structured way. A DBMS ensures that data is stored, organized, and maintained securely, supporting multi-user environments and allowing different users to access and manipulate the data simultaneously without conflict.

Functions of a DBMS:
  • Data Storage and Retrieval: Efficiently stores large volumes of data and retrieves it quickly based on user queries.
  • Data Manipulation: Allows users to insert, update, delete, and query data.
  • Data Security: Ensures that only authorized users have access to certain data.
  • Data Integrity: Enforces rules to maintain the accuracy and consistency of the data.
  • Concurrency Control: Manages simultaneous data access by multiple users, ensuring consistency and avoiding conflicts.
  • Backup and Recovery: Provides mechanisms for recovering data in case of system failure.
Example of a DBMS: MySQL

MySQL is a popular open-source DBMS that uses Structured Query Language (SQL) to manage data in a relational database. It is commonly used for web applications and services, including content management systems like WordPress and e-commerce platforms like Magento.

Example: Imagine an e-commerce website using MySQL to store customer information. The DBMS manages tables like Customers, Orders, and Products, where data is stored and linked:
Customers Table:
CustomerID (PK) Name Email
1 Alice alice@gmail.com
2 Bob bob@gmail.com
Orders Table:
OrderID (PK) CustomerID (FK) OrderDate TotalAmount
101 1 2023-10-01 100
102 2 2023-10-02 150

In this example:

  • CustomerID in the Customers table is the Primary Key (PK).
  • CustomerID in the Orders table is a Foreign Key (FK) linking each order to a customer.

Other DBMS examples include PostgreSQL, Oracle, and Microsoft SQL Server.

Post a Comment

0Comments

Post a Comment (0)