Posts

Legislations and IT in Nepal MCQ IT Officer(PSC)

  1. A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology. a. Copyright law b. Cyber law c. Computer Crime d. None of them Correct Answer: b Explanation: Cyber law encompasses the legal and regulatory aspects of internet and computer technology. The correct answer is "b". 2. "The Electronic Transaction and Digital Signature Act Ordinance" is Known as: a. Intellectual Property Law b. Cyber Law c. Telecommunication Law d. Data Protection Law Correct Answer: b Explanation: This act is commonly referred to as Cyber Law in Nepal, governing electronic transactions and digital signatures. The correct answer is "b". 3. A criminal activity within the information technology infrastructure. a. Digital crime b. Intellectual property c. Cybercrime d. All of them Correct Answer: c Explanation: Cybercrime specifically refers to criminal activities conducted within IT infrastructure. The correct...

E-Commerce Technology MCQ IT Officer(PSC)

  MCQs from "E-commerce Technology" (Document 1, PAGE1) 1. E-Commerce stands for a. Electrical Commerce b. Electronic Commerce c. Entertainment Commerce d. ElectroChemical Commerce Correct Answer: b Explanation: E-Commerce stands for Electronic Commerce, which involves buying and selling goods and services over electronic systems like the internet. The correct answer is "b". 2. The World Wide Web (WWW) was introduced in the year ...... a. 1994 b. 1996 c. 1992 d. 1990 Correct Answer: d Explanation: The World Wide Web was introduced by Tim Berners-Lee in 1990 at CERN, marking a significant milestone for e-commerce and internet usage. The correct answer is "d" (note: the answer sheet lists "a" (1994), which is incorrect; 1990 is the correct year). 3. ______ is an early form of E-commerce a. SCM b. EDI c. Both of these d. Neither of these Correct Answer: b Explanation: Electronic Data Interchange (EDI) was an early form of ...

MIS and Web Engineering MCQ IT Officer(PSC)

  MCQs from PAGE1 1. Which of these is correct about data mining? a. It is a procedure in which knowledge is mined from data. b. It involves processes like Data Transformation, Data Integration, Data Cleaning. c. It is a procedure using which one can extract information out of huge sets of data. d. All of the above Correct Answer: d Explanation: Data mining encompasses all these aspects: it extracts knowledge from data, involves processes like transformation and cleaning, and extracts information from large datasets. The correct answer is "d". 2. The total categories of functions that are involved in Data Mining are: a. 5 b. 4 c. 3 d. 2 Correct Answer: d Explanation: Data mining functions are generally categorized into two main types: descriptive (e.g., clustering, association) and predictive (e.g., classification, regression). The answer sheet lists "d," aligning with this categorization. The correct answer is "d". 3. The classification...

Computer Network MCQ IT Officer(PSC)

  MCQs from PAGE1 1. The protocol data unit (PDU) for the application layer in the Internet stack is a. Segment b. Datagram c. Message d. Frame Correct Answer: c Explanation: In the TCP/IP model, the protocol data unit (PDU) for the application layer is a "Message," which represents the data exchanged between applications. Segments are used at the transport layer, datagrams at the network layer, and frames at the data link layer. The correct answer is "c". 2. Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP Correct Answer: c Explanation: Electronic mail relies on the Transport Control Protocol (TCP) for reliable data delivery, which is used by protocols like SMTP (Simple Mail Transfer Protocol) at the application layer. IP is a network layer protocol, and UDP is less reliable. The answer sheet lists "c," but SMTP is an application layer protocol; the question likely intends t...

Database Management System and Design MCQ IT Officer(PSC)

  MCQs from PAGE1 1. ______ offers the ability to query the data and insert, after, and delete tuples. a. Transaction Control Language (TCL) b. Data Control Language (DCL) c. Data Definition Language (DDL) d. Data Manipulation Language (DML) Correct Answer: d Explanation: Data Manipulation Language (DML) includes commands like SELECT , INSERT , UPDATE , and DELETE , which are used to query and manipulate data (tuples) in a database. TCL manages transactions, DCL controls access, and DDL defines structures. The correct answer is "d". 2. We can add or remove the user IDs using which of these fixed roles? a. db_setupadmin b. db_securityadmin c. db_accessadmin d. db_sysadmin Correct Answer: c Explanation: The db_accessadmin role in SQL Server is specifically designed to manage user permissions, including adding or removing user IDs. Other roles have different responsibilities (e.g., db_securityadmin manages security, db_sysadmin is for system administration)....