1. What is the characteristic of anomaly based IDS?
A) It models the normal usage of network as a noise characterization
B) It doesn’t detect novel attack
C) Anything distinct from the noise is not assumed to be intrusion activity
D) It detects based on signature
2. Which layer of the OSI reference model is responsible for ensuring end-to-end communication and error recovery?
A) Physical
B) Data link
C) Transport
D) Application
3. In a Client-Server network model, what is the primary role of the ‘Server’?
A) Initiating network connections
B) Providing resources and services to clients
C) Managing network cables and connectors
D) Performing network encryptions
4. ‘Parity bits’ are used for which of the following purpose?
A) Encryptions of data
B) To transmit faster
C) To detect errors
D) To identify the user
5. ICMP is primarily used for ……….
A) Error and diagnostic function
B) Addressing
C) Forwarding
D) Routing
6. In the context of data encryption standard, which of the following algorithm is commonly used for secure communication over the internet?
A) DES
B) MDS
C) RSA
D) AES
7. What is the purpose of multiplexing in networking?
A) Secure data transmission
B) Efficiently utilize network resources by transmitting multiple signals over a single channel
C) Translate domain name to IP address
D) Manage network printing
8. How is power factor defined in an AC circuit?
A) The ratio of real power to apparent power
B) The ratio of reactive power to real power
C) The ratio of apparent power to reactive power
D) The ratio of apparent power to real power
9. Which of the following is used to smooth out and filter fluctuations of voltage in UPS?
A) Battery
B) Relay
C) Electrolytic capacitor
D) Fans
10. Master slave flip flop is also referred to as …………. Triggered flip flop.
A) Level
B) Pulse
C) Edge
D) Edge-Level
11. What is the primary function of a multiplexer in digital circuits?
A) Performing addition operations
B) Selecting one of several input lines and directing it to a single output
C) Generating parity bits for error detection
D) Storing binary numbers
12. What type of computing technology refers to services and applications that typically run on a distributed network through virtualized resources?
A) Distributed computing
B) Parallel computing
C) Soft computing
D) Cloud computing
13. What is the main advantage of using a hybrid cloud model?
A) Lower cost
B) Enhanced security
C) Flexibility and scalability
D) Improved performance
14. In cloud computing, what does the term ‘SaaS’ represent?
A) Software as a Service
B) Storage as a Service
C) System as Service
D) Security as a Service
15. In programming, which term is used for a user-defined data type that encapsulates data and the procedures that operate on that data?
A) Algorithm
B) Flowchart
C) Abstract Data Type
D) Variable
16. Which of the following in an unconditional control structure?
A) Goto
B) For
C) Do-while
D) If-else
17. What is polymorphism in object-oriented programming?
A) The ability to have multiple functions with the same name but different implementations
B) The process of combining data and functions into a single unit
C) The inheritance of characteristics from one class to another
D) The practice of defining arrays with different data types
18. In structured programming, what does a flowchart represent?
A) Data types
B) Control structures
C) Abstract Data Types
D) Class definitions
19. What is <noframe> element used for?
A) To remove the frame
B) For making the frame elements non-effective
C) To display frame’s content in a browser which does not support frame
D) To restrict the access of frame element
20. What is the role of web server in the context of web technology?
A) Manage website contents
B) Store and organize HTML documents
C) Host and deliver web pages to clients
D) Create dynamic web pages
21. What is the second name of the proxy server?
A) Proxy tools
B) Application proxy
C) Gateway
D) Application-level gateway
22. What is the primary purpose of normalization in database design?
A) Increase data redundancy
B) Improve data consistency
C) Decrease data security
D) Speed up data retrieval
23. A database is ….. to reduce the number of disk accesses needed to process queries in order to improve performance.
A) Non-indexed
B) Indexed
C) Inserted
D) Updated
24. The ……operation, denoted by, allows us to find tuples that in one relation but are not in another.
A) Union
B) Intersection
C) Difference
D) Set-difference
25. In structured Query Language, which statement is used to insert data into a database table?
A) SELECT
B) DELETE
C) INSERT
D) UPDATE
26. Which model can be selected if user is involved in all the phases of SDLC?
A) RAD Model
B) Prototyping Model
C) Waterfall Model
D) Both B and C
27. Which phase of the Software Development Life Cycle (SDLC) is responsible for gathering and analyzing user requirements?
A) Design
B) Implementation
C) Testing
D) Requirement Analysis
28. What does software reliability refer to in the context of software engineering?
A) The accuracy of software documentation
B) The ability of software to perform without failure
C) The speed of software execution
D) The aesthetics of software design
29. Which technology is primarily associated with decentralized and secure data storage?
A) Artificial Intelligence
B) Virtualization
C) Blockchain
D) GIS
30. Which of the following in not an application of artificial intelligence?
A) Face recognition system
B) Chatbots
C) LiDAR
D) DBMS
31. GIS deals with which kind of data?
A) Numeric data
B) Binary data
C) Spatial data
D) Complex data
32. Electronic Transactions Act, 2063 has made provision of Information Technology Tribunal. How many members does it have?
A) 2
B) 3
C) 4
D) 5
33. Which policy of the Government of Nepal deals with the development of Information and Communication Technologies in Nepal?
A) Information Technology Policy, 2057
B) Telecommunication Policy, 2060
C) Broadband Policy, 2071
D) ICT Policy, 2072
34. तल दिइएका मध्ये सबैभन्दा अग्लो हिमशिखर कुन हो?
A) अन्नपूर्ण
B) नुप्से
C) मनासलु
D) गौरीशंकर
35. ‘कर्णाली ब्लुज’ पुस्तकका लेखक को हुन्?
A) बुद्दिसागर
B) नवराज ढकाल
C) नरमाया
D) पारिजात
36. राष्ट्रिय जनगणना, २०७८ अनुसार सबैभनदा बढी जनसंख्या बृद्दिदर भएको जिल्ला कुन हो?
A) भक्तपुर
B) काठमाडौं
C) ललितपुर
D) मोरङ
37. प्रहरी सेवाको राजपत्र अनंकित पदबाट राजपत्रांकित अधिकृत पदमा बदुवाको उम्मेदवार हुन न्यूनतम कति वर्ष सेवा अवधि पूरा भएको हुनुपर्छ ?
A) ३
B) ४
C) ५
D) ६
38. नेपालले इन्टरपोलको सदस्यता कहिले प्राप्त गरेको हो?
A) सन् १९६३ सेप्टेम्बर १३
B) सन् १९६३ सेप्टेम्बर १५
C) सन् १९६३ सेप्टेम्बर २७
D) सन् १९६३ सेप्टेम्बर २९
39. Which device is used to send and receive data over telephone lines?
A) Router
B) Hub
C) Switch
D) Modem
40. Which component is considered as a part of the output unit in a computer system?
A) Keyboard
B) Mouse
C) Printer
D) Hard disk
41. Which of the following usually observes each activity on the internet of the victim, gather all information in the background and send it to someone else?
A) Malware
B) Spyware
C) Adware
D) Ransomware
42. Which of the following is the characteristic of a multimedia system?
A) High storage and low data rates
B) Low storage and high data rates
C) Both high storage and high data rates
D) Both low storage and low data rates
43. Which of the following would be a logical first step in troubleshooting in a PC?
A) Check the computer CMOS
B) Define the circumstances of the problem
C) Call the vendor
D) Define what applications are being used
44. Which component is responsible for temporarily storing data that the CPU is currently, using?
A) RAM
B) Hard Disk
C) CPU
D) ROM
45. What does defragmentation do for a hard drive?
A) Removes viruses
B) Increases storage capacity
C) Reorganizes data for faster access
D) Recovers deleted files
46. What is the primary function of the operating system’s Process Management System?
A) File organization and management
B) Memory allocation and optimization
C) Managing system security
D) Handling user interaction
47. What is the full form of FAT?
A) File Attribute Table
B) Format Allocation Table
C) Font Attribute Table
D) File Allocation Table
48. Scheduling is done so as to …………..
A) Increase the throughput
B) Decrease the throughput
C) Increase the duration of specific amount of work
D) Decrease CPU utilization
49. What is the primary purpose of virtual memory management techniques?
A) Increase the size of physical RAM
B) Allow multiple processes to share the same memory space
C) Provide a mechanism for swapping processes
D) Ensure fast access to secondary storage devices
50. Where are the processes that are prepared to be executed and waiting placed in?
A) Job queue
B) Ready queue
C) Execution queue
D) Process queue
-The End-
%20%E0%A4%AA%E0%A4%A6%E0%A4%95%E0%A5%8B%20%E0%A4%96%E0%A5%81%E0%A4%B2%E0%A4%BE%20%E0%A4%AA%E0%A5%8D%E0%A4%B0%E0%A4%A4%E0%A4%BF%E0%A4%AF%E0%A5%8B%E0%A4%97%E0%A4%BF%E0%A4%A4%E0%A4%BE%E0%A4%A4%E0%A5%8D%E0%A4%AE%E0%A4%95%20%E0%A4%B2%E0%A4%BF%E0%A4%96%E0%A4%BF%E0%A4%A4%20%E0%A4%AA%E0%A4%B0%E0%A5%80%E0%A4%95%E0%A5%8D%E0%A4%B7%E0%A4%BE%20%E0%A5%A8%E0%A5%A6%E0%A5%AE%E0%A5%A6%E0%A5%A4%E0%A5%A7%E0%A5%A8%E0%A5%A4%E0%A5%A7%E0%A5%AA%20KEY%20%5BC%5D%20%E0%A4%AA%E0%A4%A4%E0%A5%8D.jpg)