Loksewa Computer Operator Syllabus
kf7\oqmdsf] p2]Zo M–
!_
|
MS-Dos, Windows 2000, Windows XP / Windows
NT sf] 1fg ePsf] tYo k|of]u ug{ ;Sg] . Linux
sf] ;d]t cfwf/e"t 1fg x'g ;Sg] .
|
@_
|
File/disk management
;DaGwL sfo{ ug{ ;Sg] .
|
#_
|
Computer printer, CD-Rom, Pen drives, Multimedia / Scanner
;d]t cGo Accessories sf] k|of]u ug{ ;Sg] .
|
$_ MS-Office package k|of]u ug{
;Sg] .
%_ Computer fundamental af/] /fd|f]
1fg x'g ;Sg]
^_ Data structure / Algorithms af/] /fd|f]
1fg x'g ;Sg] .
&_ System Analysis u/L Design ;d]t ug{
;sg] .
*_ Database design ug{ ;Sg], DBMS sf] Architecture af/] 1fg
x'g] tyf Oracle,
Sybase,
DB2, SQL Server, cGo database x?sf] General concept ePsf] x'g
;Sg] .
(_ C,C++ / Java
programming language k|of]u u/L program n]Vg / pQm
k|f]u|fd k|of]u ub}{ Output lgsfNg ;Sg] .
!)_ Network ;DaGwL basic concept ePsf], Network af/] security lbg], Trouble
shooting ug]{ tyf Network support tool k|of]u u/L sfd ug{ ;Sg] .
!!_ e-Commerce Technology / Management
Information System (MIS) af/] /fd|f] 1fg ePsf] x'g] .
!@_ g]kfn
;/sf/n] tof/ u/]sf IT Policy 2000, Cyber Law of Nepal, Copy Write Law, g]kfndf
ljsf; eO{ k|of]u e}/x]sf] Computer Technology af/ ] /fd|f] 1fg x'g ;Sg] .
kf7\oqmdsf] ?k/]vf M— o;
kf7\oqmdsf] cfwf/df lgDgfg';f/ tLg r/0fdf k/LIff lnOg] 5 M
k|yd
r/0f M— lnlvt k/LIff k"0ff{Í
M— !%)
låtLo
r/0f M— -s_ k|of]ufTds k"0ff{Í M— %)
-v_ cGtjf{tf{ k"0ff{Í
M— #) k|yd r/0f — lnlvt k/LIff of]hgf (Examination Scheme)
kq ljifo
k"0ff{Í pQL0ff{Í k/LIff k|0ffnL k|Zg ;+Vof xcÍef/ ;do k|yd
!)) $) (j:t'ut ax'pQ/Multiple Choice) !))x! Ö !)) ! 306f !%
ldg]6 sDKo'6/
låtLo ;DaGwL laifo %) @) ljifout %x!) Ö %) ! 30ld6g]6 f #)
-Subjective_
låtLo r/0f
k|of]ufTds ! 306f #)
-s_ k/LIff
%) @% k|of]ufTds %x!) Ö %) ldg]6
-v_ cGtjf{tf{ #)
– df}lvs – –
!= lnlvt k/LIffsf] dfWod efiff g]kfnL jf c+u|]hL
cyjf gk] fnL / c+u|]hL b'j} x'g ;Sg]5 .
@= kf7\oqmdsf]
k|yd / låtLo kq tyf k|of]ufTds k/LIffsf] ljifoj:t' Pp6} x'g]5 .
#= k|yd /
låtLo kqsf] lnlvt k/LIff 5'§f5'§} x'g]5 .
$= lnlvt
k/LIff tyf k|of]ufTds k/LIffsf k|Zg;+Vof lgDgfg';f/ x'g]5g\ M–
%= k|yd kqdf j:t'ut ax'pQ/ (Multiple
Choice) k|Zgx?sf] pQ/ ;xL lbPdf k|To]s ;xL pQ/ afkt ! -Ps_ cÍ k|bfg ul/g]5 eg]
unt pQ/ lbPdf k|To]s unt pQ/ afkt @) k|ltzt cyf{t\ )=@ cÍ s§f ul/g]5 . t/ pQ/
glbPdf To; afkt cÍ lbOg] 5}g / cÍ s§f klg ul/g] 5}g .
^= låtLo kqsf] ljifout k|Zgsf nflu tf]lsPsf !)
cÍsf k|Zgx?sf] xsdf !) cÍsf] Pp6f nfdf]
k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu -Two or more
parts of a single question_ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx? -Short notes_ ;f]Wg ;lsg]
5 .
&= låtLo kqsf] kf7\oqmdnfO{ $ j6f v08÷PsfO{df
ljefhg ul/Psf] 5 . $ j6f v08÷PsfO{sf] nflu $ j6} pQ/k'l:tsf lbO{g]5 /
kl/IffyL{n] k|To]s v08÷PsfO{sf k|Zgx?sf] pQ/ ;f]xL v08÷PsfO{sf] pQ/ k'l:tsfdf
nV] g' kg]{5 .
*=
|
o;
kf7|oqmddf h];'s} n]lvPsf] ePtf klg kf7\oqmddf k/]sf P]g, lgodx? k/LIffsf]
ldlt eGbf # -tLg_ dlxgf cufl8 -;+zf]wg ePsf jf ;+zf]wg eO{ x6fOPsf jf yk u/L
;+zf]wg eO{_ sfod /x]sfnfO{ o; kf7\oqmddf /x]sf] ;Demg' kb{5 .
|
(=
|
k|yd
r/0fsf] lnlvt k/LIffaf6 5gf}6 ePsf pDd]bjf/x?nfO{ dfq låtLo r/0fsf]
cGtjf{tf{df ;lDdlnt u/fOg]5 .
|
!)=
|
o; eGbf cufl8 nfu" ePsf] dfly plNnlvt
;d"xsf] kf7\oqmd vf/]h ul/Psf] 5 .
|
!!
|
kf7\oqmd
nfu" ldlt M— @)^@÷@÷@$ b]lv
|
k|yd / låtLo kq M— sDKo'6/ ;DjGwL ljifo
1.
Computer
Fundamentals
1.1
Computers, Kinds of Computers in respect of size
and function,
1.2
Generation of Computers,
1.3
Components and Architecture of Computers,
Connecting the Components,
1.4
Getting
started: Orientation to personal computers, The system unit, Starting the
computers
1.5
Input
Devices: The keyboard, The mouse, Other input devices
1.6
Processing:
CPU, Memory
1.7
Storages
devices: Overview of Storage Devices, The Floppy Disk Drive, The Hard
Drive, The Universal Serial Bus(USB) Devices and Other Storage Devices
1.8
Output
devices: Monitors, Printers, Modems, Soundboards
1.9
Dos
survival guide: Using Command Prompt, Creating and using AUTOEXEC.BAT and
CONFIG.SYS
1.10
Windows
survival guide: The Windows Desktop, The Program Manager, Organizing the
Desktop, The File Manager
1.11
Application
software: Using Application Software
1.12
Windows Explorer, E-mails, Internet, Intranet,
Extranets, Ethernet, HTTP
1.13
Computer Viruses, Antivirus
2.
Data
Structure and Algorithms
2.1
Fundamental of Data Structures, Abstract Data
types,
2.2
Lists, Linked Lists, Stacks,
2.3
Queues, Priority Queue,
2.4
Trees:
Traversal, Implementations, Binary Trees, Binary Search Trees, Balanced Search
Trees, AVL Trees.
2.5
Indexing Methods. Hashing Trees, Suffix Trees
2.6
Worst-Case and Expected time Complexity.
2.7
Analysis of Simple Recursive and Nonrecursive
Algorithms.
2.8
Searching, Merging and Sorting.
2.9
Introductory
Notions of algorithm design: Divide-and-Conquer, Dynamic
Programming, Greedy Methods, Backtracking
2.10
Graph
algorithms: Depth-first Search and Breadth-first Search, Shortest Path
Problems, Minimum Spanning Trees, Directed Acyclic Graphs.
3.
System
Analysis and Design
3.1
Defining the System, System Owner, System User,
System Designers and system Builders, System Analysts, Variations on the System
Analyst title, System life Cycle,
3.2
Joint
Application Development (JAD): JAD definition, JAD purpose, JAD Philosophy,
JAD Scope,
3.3
Involved
in a JAD: Sponsor, Business Users, System Analyst
3.4
Roles of
JAD Group Member: Project Leader, Record Keeper, Time Keeper.
3.5
Concept formations: Introduction, Finding the Problem, Evaluating
the Proposal, Technical
Feasibility, Operational Feasibility, Economic Feasibility.
3.6
Requirements
analysis: Representing System Analysis Model, Requirement Model, Design
Model,
3.7
Development
Process: Design Method.
3.8
Entity
Relationship Diagram (E-R Diagram): Notations, Entities: Strong Entities, Weak Entities, Attributes:
Simple and Composite, Single Valued and Multiple Valued, Null and Derived
Attribute.
3.9
Relationship
Sets: Degree of Relationship and Cardinality Relationship,
Specialization, Generalization, Aggregation.
3.10
Data Flow
Diagrams (DFDs): Introductions, Data flow Diagram, Symbol, Files or data
store, External entities, Data flows,
3.11
Describing
System by Data Flow Diagram: Context diagram, Top level DFD, Expansion
Level DFD, Conversions of Data.
3.12
Object
Modeling: Object -Oriented Concept,
Object Structure, Object Feature, Class and Object.
3.13
Representation:
Association and Composition, Inheritance, Multiple Inheritances.
3.14
Modeling:
Use Case Diagram, State Diagram, Event Flow Diagram.
3.15
Documentation:
Automatic and Manual System.
4.
Operating
Systems
4.1
Define an Operating System, Trace the
Developments in Operating Systems, Identify the functions of Operating Systems,
4.2
Describe the basic components of the Operating
Systems, Understand Information Storage and Management Systems,
4.3
List Disk Allocation and Scheduling Methods,
Identify the Basic Memory Management strategies, List the Virtual Memory
Management Techniques, Define a Process and list the features of the Process
Management System
4.4
Identify the Features of Process Scheduling;
List the features of Inter-Process Communication and Deadlocks,
4.5
Identify the Concepts of Parallel and
Distributed Processing, Identify Security Threats to Operating Systems
4.6
Overview of the MS-DOS Operating System
4.7
Introduction to the Windows Family of Products,
Unix Family of Products, Linux Family of Products.
4.8
Introduction to Windows Networking
4.9
Windows Architecture, Linux Architecture
4.10
Troubleshooting Windows, & Linux
4.11
Managing Network Printing
4.12
Managing Hard Disks and Partitions
4.13
Monitoring and Troubleshooting Windows
4.14
Users, Groups and Permission Linux and Windows.
5.
Database
Management System and Design
5.1
Introduction, A Database Model, Relational
Database Model, Integrity, RDBMS.
5.2
SQL and Embedded SQL
5.3
Writing Basic SQL SELECT Statements
5.4
Restricting and Sorting data
5.5
Single Row Functions
5.6
Displaying Data from Multiple Tables
5.7
Aggregation Data Using Group Functions
5.8
Sub Queries, Manipulating Data and Creating
&Managing Tables
5.9
Creating Views and Controlling User Access
5.10
Using Set Operators, Datetime Function
5.11
Database
Design: Logical Design, Conceptual Design, Mapping Conceptual to Logical,
Pragmatic issues, Physical Design, Integrity and Correctness, Relational
Algebra, Relational Calculus.
5.12
Normalization: 1NF, 2NF, 3NF, BCNF, 4NF,5NF,
DKNF
5.13
Architecture
of DBMS: Client-server, Open Architectures, Transaction Processing,
Multi-User & Concurrency, and Backup & Recovery Database.
5.14
Basic
Concept of major RDBMS products: Oracle, Sybase, DB2, SQL Server and other
Databases.
6.
Programming
Language
6.1
Overview of Programming Language: History,
Programming Paradigms, The role of Language translates in the Programming
Process.
6.2
Fundamental Issues in Language Design.
6.3
Virtual Machines, Code Generation, Loop
Optimization.
6.4
Concept of Procedural Programming, Structural
Programming, Object-Oriented Programming.
6.5
Concept of C programming, C++ Programming,
6.6
Java Programming for Declaration, Modularity and
Storage Management Software Development.
7.
Networking
7.1
Basic
Network Theory: Network Definition, Network Models, Connectivity, Network
Addressing.
7.2
Network
Connectivity: The Data Package, Establishing a Connection, Reliable
Delivery, Network Connectivity, Noise Control, Building Codes, Connection
Devices.
7.3
Advanced
Network Theory: The OSI model, Ethernet, Network Resources, Token ring,
FDDI, Wireless Networking.
7.4
Common
Network Protocols: Families of Protocols, NetBEUI, Bridge and Switches, The
TCP/IP Protocol, Building TCP/IP Network, The TCP/IP Suite
7.5
TCP/IP
Services: Dynamic Host Configuration Protocol, DNS Name Resolution, NetBIOS
support, SNMP, TCP/IP Utilities, FTP
7.6
Network
LAN Infrastructure: LAN Protocols on a Network, IP Routing, IP Routing
Tables, Router Discovery Protocols, Data Movement in a Routed Network, Virtual
LANs(VLANS)
7.7
Network
WAN Infrastructure: The WAN Environment, Wan Transmission
Technologies, Wan Connectivity Devices, Voice Over Data
Services
7.8
Remote
Networking: Remote Networking, Remote Access protocols, VPN
Technologies.
7.9
Computer
Security: Computer Virus, Worm, Trojan Horse.
7.10
Network
Security: Introduction, Virus Protection, Local Security, Network Access,
Internet Security.
7.11
Disaster
Recovery: The need for Disaster Recovery, Disaster Recovery plan, Data
backup, Fault Tolerance.
7.12
Advanced
Data Storage Techniques: Enterprise Data Storage, Clustering, Network
Attached Storage, Storage Area Networks.
7.13
Network
Troubleshooting: Using Systematic Approach to Troubleshooting.
7.14
Network
Support Tools: Utilities, The Network Baseline.
7.15
Network Access Points (NAP), Common Network
Component, Common Peripheral
Ports.
8.
Computer
Architecture & Organization
8.1
Evaluation of Computers, Design Methodology, Set
Architecture, MIPS ISA, ALU Design.
8.2
Datapath
Design: Single and Multiple Cycle Implementations, Pipelining, Memory
Hierarchy, Input/Output System: Bus & Role of Operating System.
9.
Complier
Design
9.1
Introduction to Compiling,
9.2
Logical Analysis, Syntax Analysis, Semantic
Analysis,
9.3
Run Time environment,
9.4
Intermediate Code Generation, Code
Optimization,
9.5
Compiler Generation Tools.
10.
E-Commerce
Technology
10.1
Introduction to E-Commerce.
10.2
Electronic Commerce Strategies.
10.3
Electronic Commerce Security Issues.
10.4
Success Models of E-Governance.
10.5
E-Business:
b2b, b2c, b2e, c2c, g2g, g2c.
10.6
Principles of Electronic Payment, Strategies
& Systems.
10.7
E-marketing, Reverse Engineering.
10.8
E-Banking, EDI Methods, SWIFT.
10.9
Encryption and Decryption Methods, XML, Layout
Managers, Event Model.
11.
MIS
and Web Engineering
11.1
Information Systems, Client-Server Computing.
11.2
Information Systems and Decision Making.
11.3
Database Design issues, Data Mining, Data
Warehousing
11.4
Knowledge Management, The strategic use of
Information Technology.
11.5
Work Process Redesign (Reengineering) with
Information Technology, Enterprise Resources Planning Systems, Information
Systems Security, Information Privacy, and Global Information Technology
issues.
11.6
Software Supported Demonstrations including
advanced Spreadsheet topics, Software Component Based Systems (CBSE),
11.7 Multimedia
11.8 object oriented programming with COMS & DECOMS
11.9 Group Decision Support Systems
11.10 Basics of Website Design
12.
IT in
Nepal
12.1 History of IT in Nepal
12.2 IT Policy of Nepal 2057B.S
12.3 Cyber law of Nepal(Electronics Transaction Ordinance 2061 B.S
12.4 Copyright Act,2022 B.S
12.5 Uses of Computers and Software Development
12.6 Nepali Unicodes,Nepali fonts
12.7 licensing Issue
j:t'ut ax'pQ/ gd"gf k|Zgx? (Sample questions)
1) SCANDISK
analyze and repairs damage to which of the following
A. Physical
clusters B. FAT C.
Lost Clusters D. All of the above
Correct Ans. (D)
2) DOS
makes which of the special batch file named
A. AUTOEXCE.BAT B.
AUTOEXE.BAT
C. AUTOEXEC.BAT D.
AUTOEXC.BAT
Correct Ans. (C)
3) The
two parts of the CPU are
A. Control
unit and memory B. Addresses and ALU
C. Addresses and Registers D.
Control Unit and ALU
Correct Ans. (D)
4) Operating
is a ............
A. System
Software B.
Application Software
C. Presentation Software D.
Database Software
Correct Ans. (A)
5) Which
key is used to work with non-adjacent cells in excel?
A. Shift
key B.
Ctrl key C. Alt key D.Tab
Key
Correct Ans. (B)
6) The
database element that represents a correspondence between the various data
element is
A. Data B.
Information C. Constraints D. Schema
Correct Ans. (D)
7) Currently
the most popular database model is
A. Hierarchical B.
Object-Oriented C. Relational D. Deductive
Correct Ans. (B)
8) When
we download anything from the internet which protocol works:
A. TCP/IP B.
FTP C.
HTTP D.
ARP
Correct Ans. (C)
9) What
e-commerce category is the largest in terms of revenue? A. Business to Business (B2B) B.
Intra-Business (B2E)
C. Business to
Consumer (B2C) D. Consumer to Consumer (C2C)
Correct Ans. (A)
10) How
is data transferred in serial communications?
A. 10
bits at a time. B.
1 bit at a time.
C. 1 byte at a time. D.
6 bits at a time
Correct Ans. (B)
11) With
respect to the interface network card, what does the term 10/100 refer to?
A. Protocol
speed. B.
A fiber network
C. Megabits per second. D.
Minimum and maximum server speed
Correct Ans. (A)
12) A
workstation has just been installed on the Ethernet LAN but cannot communicate
with the network. What should you do first?
A. Reinstall
the network protocols.
B. Reinstall
the network interface card driver.
C. Verify
the IP configuration on the workstation.
D. Verify
the link status on the computer's network card.
Correct Ans. (C)
13) To
represent an entity in a model which of the following conventions are used A.
Soft box with any dimension
B. Singular, unique entity name C. Entity Name in
uppercase
D. All of the Above.
Correct Ans. (D)
nfs ;]jf cfof]u
g]kfn ljljw
;]jf, sDKo'6/ clws[t /fhkqflÍt t[tLo >]0fLsf kbx?sf] v'nf / cfGtl/s
k|ltof]lutfTds lnlvt k/LIffsf] kf7\oqmd
14) SQL
statement used to A. Data Retrieve
B. Data
manipulate
C. Data
control D. All of the above.
Correct Ans. (D)
ljifout gd"gf k|Zgx? (Sample questions)
5) Consider the following schema:
Parts(pid: integer, pname: string, color: string)
Catalog (sid: integer, pid:integer, cost: real)
The key fields are underline, and the domain
of each field is listed after the field name.
Thus sid is the key for suppliers, pid is the key for parts, and sid and
pid together form the key Catalog. The
catalog relation list the prices charged for parts by suppliers. Write the following queries in relational
algebra, SQL
• Find the Name of the suppliers who
supply red part.
nfs ;]jf cfof]ug]kfn ljljw ;]jf, sDKo'6/ clws[t /fhkqflÍt t[tLo >]0fLsf kbx?sf] v'nf / cfGtl/s k|ltof]lutfTds lnlvt k/LIffsf] kf7\oqmd Solution:
a. Relational
algebra
Πsname(Πsid((Πpid σcolor=’red’ Parts ) ∞ Catalog) ∞ Suppliers)
b. SQL
SELECT
S.sname
FROM
Suppliers S, Parts P, Catalog C
WHERE P.color=’red’ AND C.pid=P.pid AND
C.sid=S.sid
k|of]ufTds k/LIffsf gd"gf k|Zgx?
nf]s ;]jf cfof]u g]kfn ljljw ;]jf, sDKo'6/ clws[t /fhkqflÍt t[tLo >]0fLsf kbx?sf] v'nf / cfGtl/s k|ltof]lutfTds lnlvt k/LIffsf] kf7\oqmd
1.
Get IP address from given computers which are Network.
a.
Give privileged share only database administration.
b.
Determine if the following address are on local or
remote network.
Node 1:
192.255.16.8
Node2:
192.225.14.8
Mask:
255.255.255.0
2.
Create tables Student, Teacher, Course is SQL . Student
(Sid, Sname, subject, level) Teacher (Tid, Tname, subject,)
Course
(Cid, Cnumber, Tname, level)
a.
Insert 10
values
b.
Delete first two values. 3. Given a string