Computer Operator Questions and Answers SET - 5 | MCQs | PSC

MCQs for Computer Science

Computer Operator Model Question Set - 5

1. Transistor is associated with the..... generation of computer.
a. First
b. Second
c. Third
d. Fourth
Correct Answer: b. Second
Transistors were used in the second generation of computers (1950s-1960s), replacing vacuum tubes, which made computers smaller, faster, and more reliable.
2. In data processing, GIGO stands for
a. Gigabyte Input Gigabyte Output
b. Goal In Global Output
c. Garbage In Garbage Out
d. Garbage In Graphic Out
Correct Answer: c. Garbage In Garbage Out
GIGO refers to the principle that the quality of output is determined by the quality of input. Poor input data leads to poor output results.
3. The digits of .... Number System are 0 to 9 and A to F.
a. Binary
b. Octal
c. Decimal
d. Hexadecimal
Correct Answer: d. Hexadecimal
The hexadecimal number system uses digits 0-9 and letters A-F to represent values 0-15 in a single character.
4. What is the full form of CD-ROM?
a. Compact Disk Read-One Memory
b. Compact Disk Read-Only Memory
c. Compact Data Read-Only Memory
d. Compatible Disk Read-Only Memory
Correct Answer: b. Compact Disk Read-Only Memory
CD-ROM stands for Compact Disk Read-Only Memory, a storage medium that can only be read, not written to, after manufacturing.
5. A malicious code hidden inside a seemingly harmless piece of code is
a. Trojan Horse
b. Worm
c. Bomb
d. Virus
Correct Answer: a. Trojan Horse
A Trojan Horse is malicious code disguised as legitimate software, tricking users into executing it.
6. Which of the following virus does infect the master boot record?
a. Trojan virus
b. Multipartite virus
c. Boot sector virus
d. All of the above
Correct Answer: c. Boot sector virus
Boot sector viruses specifically target the master boot record (MBR) of a storage device, affecting system boot processes.
7. The decimal number 10 is equivalent to octal value
a. 8
b. 10
c. 12
d. 14
Correct Answer: c. 12
The decimal number 10 converts to 12 in octal (base-8) because 1*8 + 2*1 = 10.
8. The first Network is
a. CNNET
b. NSFNET
c. ASAPNET
d. ARPANET
Correct Answer: d. ARPANET
ARPANET, developed in the late 1960s, is considered the first network and a precursor to the modern internet.
9. Which of the following is not a hardware?
a. Magnetic Tape
b. VDU Terminal
c. Printer
d. Assembler
Correct Answer: d. Assembler
An assembler is software that converts assembly language into machine code, whereas the others are physical hardware components.
10. The ICT Policy of Nepal, 2072 has envisioned target for the year
a. 2020
b. 2025
c. 2030
d. 2050
Correct Answer: b. 2025
The ICT Policy of Nepal, 2072 (2015), set targets for improving information and communication technology infrastructure by 2025.
11. Which of the following are Main Memory?
a. Primary and Secondary
b. Sequential and Random
c. Hard disk and Pendrives
d. RAM and ROM
Correct Answer: d. RAM and ROM
Main memory refers to RAM (Random Access Memory) and ROM (Read-Only Memory), which are directly accessible by the CPU.
12. Which of the following has low failure rate?
a. Mechanical devices
b. Electronic devices
c. Electro-mechanical devices
d. None of the above
Correct Answer: b. Electronic devices
Electronic devices, such as solid-state components, have lower failure rates compared to mechanical or electro-mechanical devices due to fewer moving parts.
13. The primary job of the operating system is to manage
a. Commands
b. Users
c. Programs
d. Resources
Correct Answer: d. Resources
The operating system manages system resources like CPU, memory, and I/O devices to ensure efficient operation of programs.
14. Which of the following is not a type of user interface?
a. Command line
b. System interface
c. Design interface
d. Both B and C
Correct Answer: d. Both B and C
Common user interfaces include command line, graphical, and menu-driven interfaces. System and design interfaces are not standard types.
15. Which of the following is not an executable file extension in Windows Operating system?
a. .exe
b. .msi
c. .apk
d. .bat
Correct Answer: c. .apk
.apk is used for Android applications, not Windows. .exe, .msi, and .bat are executable file extensions in Windows.
16. Which command is used to fix the minor errors of the disk?
a. FDISK
b. CHKDSK/f
c. FORMAT
d. ATTRIB
Correct Answer: b. CHKDSK/f
CHKDSK /f checks and fixes minor file system errors on a disk, unlike FDISK (partitions), FORMAT (erases), or ATTRIB (file attributes).
17. Fragmentation of the file system .....
a. Occurs only if the file system is used improperly
b. Can always be prevented
c. Can be temporarily removed by compaction
d. Is a characteristic of all file systems
Correct Answer: c. Can be temporarily removed by compaction
Fragmentation occurs when files are split into non-contiguous blocks. Compaction (defragmentation) temporarily reorganizes files to reduce fragmentation.
18. The .... of software contains lists of commands and options.
a. Menu bar
b. Tool bar
c. Title bar
d. Formula bar
Correct Answer: a. Menu bar
The menu bar in software displays lists of commands and options for user interaction.
19. Windows 2000 server uses the
a. FAT 16
b. NTFS
c. FAT 64
d. FAT 32
Correct Answer: b. NTFS
Windows 2000 Server primarily uses NTFS (New Technology File System) for better security and performance compared to FAT systems.
20. Which statement is false regarding the recycle bin?
a. You can find deleted files in recycle bin.
b. You can restore any files in recycle bin if you ever need.
c. You can increase free space of disk by sending files in recycle bin.
d. You can right click and choose Empty Recycle Bin to clean it at once.
Correct Answer: c. You can increase free space of disk by sending files in recycle bin.
Sending files to the recycle bin does not free up disk space until the recycle bin is emptied. The other statements are true.
21. Which of the following is not of the merge process?
a. Sort the data source records
b. Merge the two files to print or create a new document
c. Edit a data source
d. Format a main document
Correct Answer: a. Sort the data source records
Sorting data source records is not a required step in the mail merge process, though it may be done for organization.
22. Which enables us to move directly to specific location?
a. Subdocuments
b. Bookmarks
c. Cross-references
d. Outlines
Correct Answer: b. Bookmarks
Bookmarks in documents allow users to navigate directly to a specific location or section.
23. One way to add additional rows to a table is to click in the last cell of the table and press
a. Enter
b. Space
c. Tab
d. Shift+Enter
Correct Answer: c. Tab
Pressing Tab in the last cell of a table in MS Word adds a new row to the table.
24. Portrait and Landscape are
a. Page Orientation
b. Paper Size
c. Page Layout
d. Page Margin
Correct Answer: a. Page Orientation
Portrait and Landscape refer to the orientation of a page, either vertical or horizontal, respectively.
25. The size of A4 paper is
a. 8.5 x 11 inches
b. 8.5 x 11.5 inches
c. 8.27 x 11.69 inches
d. 8.27 x 11.5 inches
Correct Answer: c. 8.27 x 11.69 inches
A4 paper measures 210 x 297 mm, equivalent to approximately 8.27 x 11.69 inches.
26. Which of the following is used for "Find and Replace" dialog box?
a. F5
b. F6
c. F7
d. F8
Correct Answer: c. F7
In MS Word, the "Find and Replace" dialog box is not directly tied to a single function key like F7, but this option is commonly used in some contexts or software. Typically, Ctrl+H is used for "Find and Replace" in MS Word.
27. Which is not a valid layout of MS-Word?
a. Web layout
b. Normal layout
c. Form layout
d. Print layout
Correct Answer: c. Form layout
MS Word includes Web Layout, Normal Layout (older versions), and Print Layout, but Form Layout is not a standard view.
28. What function is used to convert row data into column or column data into row?
a. Convert
b. Index
c. Data
d. Transpose
Correct Answer: d. Transpose
The Transpose function in Excel switches rows to columns or vice versa.
29. Macros are run or executed from...... menu.
a. Insert
b. Format
c. Tools
d. Data
Correct Answer: c. Tools
In older versions of MS Office, macros are managed and executed from the Tools menu. In newer versions, it’s under the Developer tab.
30. Which of the following shortcut key is used to insert the chart?
a. F7
b. F11
c. F2
d. F12
Correct Answer: b. F11
In MS Excel, pressing F11 creates a default chart from selected data.
31. What does the function MOD() returns?
a. Returns the remainder
b. Returns the result of division
c. Returns the factorial number
d. Returns nothing
Correct Answer: a. Returns the remainder
The MOD() function in Excel returns the remainder of a division operation.
32. Which chart would be better to track the progress of the stock market on daily basis?
a. Pie chart
b. Row chart
c. Line chart
d. Column chart
Correct Answer: c. Line chart
Line charts are ideal for tracking trends over time, such as daily stock market progress.
33. Which of the following is not a logical database structure?
a. Chain
b. Network
c. Tree
d. Relational
Correct Answer: a. Chain
Network, Tree, and Relational are logical database structures, while Chain is not a standard database structure.
34. The third stage in designing a database is when we analyze our tables more closely and create a ... between tables.
a. Relationship
b. Join
c. Query
d. None of the above
Correct Answer: a. Relationship
In database design, the third stage involves defining relationships (e.g., one-to-many) between tables to ensure data integrity.
35. COMMIT and ROLLBACK commands are .... control commands.
a. Data access
b. Transaction
c. Table
d. File
Correct Answer: b. Transaction
COMMIT and ROLLBACK are transaction control commands used to save or undo changes in a database transaction.
36. In a database table, the category of information is called
a. Tuple
b. Record
c. Field
d. All of the above
Correct Answer: c. Field
A field in a database table represents a category of information, such as a column for names or ages.
37. Function which causes retrieval of any kind of data from database is considered as
a. Key
b. Query
c. Structure
d. Storing cycle
Correct Answer: b. Query
A query is a request to retrieve specific data from a database, typically using SQL.
38. Which one is not a valid attribute type of entity?
a. Simple
b. Null
c. Composite
d. Relationship
Correct Answer: b. Null
Simple, Composite, and Relationship are valid attribute types in a database entity. Null is a value, not an attribute type.
39. Which of theChess following operations is performed when a trigger is fired?
a. Insert
b. Update
c. Delete
d. All of the above
Correct Answer: d. All of the above
Triggers in a database can be set to fire on Insert, Update, or Delete operations, performing predefined actions.
40. How can you define a field so that when entering data, it is displayed as #fff##?
a. Input Mask
b. Validation Rule
c. Index Mask
d. Ime Mode Input
Correct Answer: a. Input Mask
An Input Mask in a database defines the format for data entry, such as #fff## for specific character patterns.
41. Which view shows all slides at once?
a. Normal view
b. Outline view
c. Slide sorter view
d. Reading view
Correct Answer: c. Slide sorter view
Slide Sorter view in PowerPoint displays all slides at once, allowing for easy rearrangement.
42. To insert a new slide in the current presentation, we can choose
a. Ctrl + M
b. Ctrl + N
c. Ctrl + O
d. Ctrl + F
Correct Answer: a. Ctrl + M
Ctrl + M in PowerPoint inserts a new slide in the current presentation.
43. What should be the first tag in any HTML document?
a. <head>
b. <title>
c. <html>
d. <document>
Correct Answer: c. <html>
The <html> tag is the first tag in any HTML document, enclosing all other tags.
44. <ul> tag is interpreted as
a. Unified list
b. Under line
c. Union line
d. Unordered list
Correct Answer: d. Unordered list
The <ul> tag in HTML stands for unordered list, used to create bulleted lists.
45. Which of the following is not a type of broadband internet connection?
a. Satellite
b. DSL
c. Dial up
d. Cable
Correct Answer: c. Dial up
Dial-up is a slow, non-broadband connection, while Satellite, DSL, and Cable are broadband types.
46. What is the name of the location address of the hypertext documents?
a. Uniform Resource Locator
b. Web Server
c. File
d. Web Address
Correct Answer: a. Uniform Resource Locator
A Uniform Resource Locator (URL) is the address used to locate hypertext documents on the web.
47. Which of the following languages is related to web pages design?
a. JSP
b. ASP
c. PHP
d. All of the above
Correct Answer: d. All of the above
JSP, ASP, and PHP are server-side scripting languages used for designing dynamic web pages.
48. Networking within an Organization is called
a. Internet
b. LAN
c. Extranet
d. Intranet
Correct Answer: d. Intranet
An intranet is a private network within an organization, used for internal communication and resource sharing.
49. Email uses .... protocol to transfer data from client to email server.
a. HTTP
b. SMTP
c. WWW
d. All of the above
Correct Answer: b. SMTP
SMTP (Simple Mail Transfer Protocol) is used to send emails from a client to an email server.
50. IPv6 has .... bit addresses.
a. 16
b. 32
c. 64
d. 128
Correct Answer: d. 128
IPv6 uses 128-bit addresses, allowing for a vastly larger number of unique IP addresses compared to IPv4’s 32-bit addresses.
Post a Comment (0)
Previous Post Next Post