You are on page 1of 6

1.

In analog computer
A. Input is first converted to digital form
B. Input is never converted to digital form
C. Output is displayed in digital form
D. All of the above
2. Integrated Circuit is related to ……………………. generations computers.
A. Second
B. Third
C. Fourth
D. Fifth
3. Which of the following storage is the fastest?
A. Register
B. RAM
C. ROM
D. Blu-ray disc
4. Cache Memory ……
A. Helps to store more data in hard disk
B. Stores data permanently
C. Holds last time visited a website only
D. Placed between main memory and microprocessor
5. Which type of software is focused on supporting communication, collaboration, and coordination?
A. E-business software
B. CRM software
C. groupware
D. SCM software
6. A data Structure where elements can be added or removed at either end but not in the middle.
A. Linked list
B. Stacks
C. Queues
D. Deque
7. Which of the following sorting algorithms is of divide and conquer type?
A. Bubble sort
B. Insertion sort
C. Quick sort
D. None of the above
8. ……………….. of binary search tree starts by visiting the current node’s left child, then its right child, and
finally the current node itself.
A. Preorder
B. In-order
C. Linear-order
D. Post-order
9. In the ……………. traversal we process all of a vertex’s descendants before we move to an adjacent
vertex.
A. depth-first
B. breadth-first
C. with-first
D. depth-limited
10. The Design Phase of the System Life Cycle does not include,
A. Identify the functions to be performed
B. Design the input/output and file design
C. Defining basic parameters for system design
D. Deciding the hardware and software
11. ………… develop an agenda, act as facilitator, and lead the JAD session.
A. Project Leader
B. Record Keeper
C. Time Keeper
D. Top Manager
12. A data flow can
A) Only emanate from an external entity
B) Only terminate in an external entity
C) Emanate and terminate in an external entity
D) Either emanate or terminate in an external entity but not both
13. 4. In the E-R Diagram, the derived attribute is represented by
A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Triangle
14. Determining if employees, managers, and clients will resist a proposed new system is part of this
feasibility study
A. technical feasibility
B. economic feasibility
C. organizational feasibility
D. operational feasibility
15. Which scheduling policy is most suitable for a time-shared operating system?
A) Shortest job first
B) Round-robin
C) Elevator
D) First-come-first-serve
16. Which of the following is the most suitable scheduling scheme in a real-time operating system?
A) Round robin
B) First come first serve
C) Preemptive scheduling
D) Random Scheduling
17. Which of the following is/are the operating system policies for virtual memory management?
i) fetch policy ii) placement policy iii) replacement policy iv) cleaning policy
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv
18. 4. A direct method of deadlock prevention is to prevent the occurrence of ………….
A) Mutual exclusion
B) Hold and wait
C) Circular waits
D) No preemption
19. Failure during inter-process communication may be due to …...
A. loss of request transfer unit
B. single datagram messages
C. multi datagram messages
D. message passing
20. To select all columns from the table the syntax is:
A) select all from table_name
B) select * from table_name
C) select from table_name
D) None of the above
21. In a relational schema, each tuple is divided into fields called
A) Relations
B) Domains
C) Queries
D) All of the above
22. The number of tuples in a relation is called its …………. While the number of attributes in a relation is
called its ………………...
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
23. The main task carried out in the …………… is to remove repeating attributes to separate tables.
A) First Normal Form
B) Second Normal Form
C) Third Normal Form
D) Fourth Normal Form
24. In SQL Server, ………………… is based on relationships between foreign keys and primary keys or
between foreign keys and unique keys.
A) Entity integrity
B) Domain integrity
C) Referential integrity
D) User-defined integrity
25. Which of the following is not a database recovery technique?
A. Deferred update
B. Immediate update
C. Two-phase commit
D. Undoing
26. What is a data integrity?
A. It is the data contained in the database that is non-redundant.
B. It is the data contained in the database that is accurate and consistent.
C. It is the data contained in the database that is secured.
D. It is the data contained in the database that is shared.
27. ……………. is concerned with realizing a software design using an object-oriented
programming language.
A) Object-oriented analysis
B) Object-oriented methods
C) Object-oriented design
D) Object-oriented programming
28. Which of the following is allowed in a C Arithmetic Instruction?
A) [ ]
B) { }
C) ( )
D) None of the above
29. In C++, the keyword void was used ………...
A) To specify the return type of function when it is not returning any value.
B) To indicate an empty argument list to a function.
C) To declare the generic pointers.
D) All of the above.
30. All Java classes are derived from
A) java.lang.Class
B) java.util.Name
C) java.lang.Object
D) java.awt.Window
31. What is the size of the IPv6 address?
A. 32-Bit
B. 64-Bit
C. 96-Bit
D. 128-Bit
32. Which of the following devices is used to connect different networks?
A. Router
B. Switch
C. Hub
D. Gateway
33. FDDI used which type of physical topology?
A. Bus
B. Ring
C. Star
D. Tree
34. The ………. of TCP/IP protocol is responsible for figuring out how to get data to its destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
35. The …………………………. is a collection of protocols designed by the Internet Engineering Task Force
(IETF) to provide security for a packet at the Network level.
A. IPsec
B. SSL
C. PGP
D. TLS
E. Firewalls
36. The unit that decodes and translates each instruction and generates the necessary enable signals for
ALU and other units is called.
A. arithmetic unit
B. logical unit
C. control unit
D. CPU
37. Pipelining increases the CPU instruction ……….
A. efficiency
B. latency
C. throughput
D. Both a and c
38. What is a compiler?
A. system program that converts instructions to machine language
B. system program that converts machine language to high-level language
C. system program that writes instructions to perform
D. None of the mentioned
39. The E-commerce domain that involves business activity initiated by the consumer and targeted to
business is known as
A. Business to Business (B2B)
B. Consumer to Consumer (C2C)
C. Consumer to Business (C2B)
D. Business to Consumer (B2C)
40. SWIFT stands for:
A) Society for Worldwide Interbank Financial Telecommunication
B) Society for Worldwide International Financial Telecommunication
C) Society for Worldwide Interbank Financial Transmission
D) Society for Worldwide Interbank Financial Transfer
41. Which of the following is not a data mining functionality?
A) Characterization and Discrimination
B) Classification and regression
C) Selection and interpretation
D) Clustering and Analysis
42. Deciding how to carry out specific tasks by strategic and middle management and establishing
criteria for completion and resource allocation best describes
A. strategic decision making
B. operational control
C. knowledge level decision making
D. management control
43. A data warehouse is ………………….
A) updated by end users.
B) contains numerous naming conventions and formats
C) organized around important subject areas
D) contain only current data
44. Decision support systems usually
A) serve managers interested in weekly, monthly, and yearly results, not day-to-day activities.
B) help managers make decisions that are unique, rapidly changing, and not easily specified in
advance.
C) provide managers with a generalized computing and telecommunications capacity that can be
applied to a changing array of problems.
D) perform and record the daily routine transactions necessary to the conduct of business.
45. Which of the following is the correct way of linking an external style sheet in an HTML
document?
A) <link rel=“stylesheet” href=“universal.css” type=“text/css”>
B) <link rel=“sheet” href=“universal.css” type=“text/css”>
C) <link rel=“externalsheet” href=“universal.css” type=“text/css”>
D) <link rel=“css” href=“universal.css” type=“text/css”>
46. The first computer was introduced in Nepal was….
A. IBM1400
B. IBM1401
C. IBM1402
D. IBM1501
47. Which of the following objectives is incorrect from the IT Policy of Nepal 2072?
A. By the year 2020, 75 percent of Nepalese will be digitally literate.
B. By the year 2020, access to broadband services will be ensured to 90 percent of people.
C. By the year 2020, internet access will be ensured for all Nepalese.
D. By the year 2020, according to the concept of electronic government, at least 90 percent of
citizen-targeted services will be provided online.
48. According to the Electronic Transaction Act 2063, which of the following is not the function of the
controller?
A. Providing digital signature certificates.
B. Issuing a license to the certifying Authority
C. Specifying the format of the certificate
D. maintaining a record of information disclosed by the certifying authority
49. According to the copyright act of Nepal, In the following circumstances the copyrighted materials can
be used without authorization.
i. Reproduction allowed for personal purpose
ii. Reproduction allowed for teaching and learning.
iii. Reproduction by library and archives
iv. Reproduction of computer program
A. i, ii and iii only
B. ii, iii and iv only
C. i, iii and iv only
D. All i, ii, iii and iv
50. What is the default keyboard shortcut key is to switch languages in Windows?
A. Ctrl+Shift
B. Alt+Left Arrow
C. Alt+Shift
D. Alt+Ctrl

You might also like