AA Syllabus
AA Syllabus
kbk"lt{ ;ldlt
;fgf]l7dL, eQmk'/ .
k|fljlws tyf k|lzIf0f ;]jf, OlGhlgol/Ë k|fljlws k|lzIf0f ;d"x, ;"rgf k|ljlw pk;d"x,
clws[t:t/ t[tLo >]0fL, k|fljlws clws[t -;"rgf k|ljlw_ kbsf]
v'nf / cfGtl/s k|ltof]lutfTds lnlvt k/LIffsf] kf7\oj|md
;]jf M k|fljlws tyf k|lzIf0f ;d"x M OlGhlgol/Ë k|fljlws k|lzIf0f
pk;d"x M ;"rgf k|ljlw kb M k|fljlws clws[t -;"rgf k|ljlw_
:t/ M clws[t :t/ t[tLo
kf7\os|dsf] ?k/]vf M o; kf7\os|dsf] cfwf/df lgDgfg';f/ b'O{ r/0fdf k/LIff lnOg]5 .
k|yd r/0f M lnlvt k/LIff k"0ff{ª\s M @))
låtLo r/0f M -s_ sDKo'6/ bIftf k/LIf0f k"0ff{ª\s M !)
-v_ cGt/jftf{ k"0ff{ª\s M #)
tfnLsf !
k|yd r/0f M lnlvt k/LIff
kq laifo k"0ff{Í pQL0ff{Í k/LIff k|0ffnL k|Zg ;+Vof x c+s ;do
ef/
v08 -s_ @) a:t'ut ax'j}slNks k|Zg @) k|Zgx! cÍ
;fdfGo 1fg (MCQS) ! 306f
v08 -v_ @) a:t'ut ax'j}slNks k|Zg @) k|Zgx! cÍ !% ldg]6
k|yd kl/ifb\ ;]jf ;DaGwL $) (MCQS)
sfg"gL Joj:yf
v08 -u_ ^) a:t'ut ax'j}slNks k|Zg ^) k|Zgx! cÍ
;]jf ;DaGwL (MCQS)
låtLo ;]jf ;DaGwL !)) $) ljifout (Subjective) * k|Zg x % cÍ # 306f
5f]6f] pQ/ / nfdf] pQ/ ^ k|Zg x !) cÍ
tfnLsf @
låtLo r/0f M
ljifo k"0ff{Í k/LIff k|0ffnL ;do
sDKo'6/ bIftf k/LIf0f !) k|of]ufTds -Practical_ !% ldg]6
cGt/jftf{ #) df}lvs -Interview_
dfly pNn]lvt k|yd kqsf k/LIff Ps} l;km\6df x'g]5 . v08 æuÆ ;]jf ;DaGwL laifosf] k/LIff kZrft v08 æs / vÆ
sf] j:t'ut ax'a}slNks k/LIff x'g]5 . k|ydkq / låtLokqsf] lnlvt k/LIff 5'6\6f5'6\6}| x'g]5 .
b|i6Ao M
!= of] kf7\oqmdsf] of]hgfnfO{ k|yd r/0f / l4tLo r/0f u/L b'O{ efudf ljefhg ul/Psf] 5 .
@= dfly pNn]lvt ;]jf cGtu{tsf ;d"x pk–;d"xx?sf] v'nf÷cfGtl/s k|ltof]lutfTds lnlvt k/LIffsf] kf7\os|d pko'{Qm adf]lhd x'g]5 .
#= lnlvt k/LIffsf] dfWod efiff g]kfnL jf c+u|]hL cyjf g]kfnL / c+u|]hL b'j} x'g]5 .
$= a:t'ut ax'a}slNks -Multiple choice_ k|Zgx?sf] unt pQ/ lbPsf k|To]s unt pQ/ jfkt @) k|ltzt cÍ s§f ul/g]5 . t/ pQ/
glbPdf To; jfkt cÍ lbOg] 5}g / cÍ klg s§f ul/g] 5}g .
%= j:t'ut ax'pQ/ x'g] k/LIffdf k/LIffyL{n] pQ/ n]Vbf c+u|]hL 7"nf] cIf/ -Capital letter_ A,B,C,D df n]Vg'kg]{5 . ;fgf] cIf/ -Small
letter) a,b,c,d n]v]sf] jf cGo s'g} ;+s]t u/]sf] eP ;a} pQ/k'l:tsf /2 x'g]5 .
^= ax'a}slNks k|Zgx? x'g] k/LIffdf s'g} k|sf/sf] SofNs'n]6/ k|of]u ug{ kfOg] 5}g .
&= ljifout k|Zgsf nflu tf]lsPsf c+ssf xsdf Pp6f nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu jf Pp6} k|Zg cGtu{t b'O{
jf a9L l6Kk0fLx? ;f]Wg ;lsg]5 .
*= k/LIffdf ;f]lwg] k|Zg;+Vof, c+s / cÍef/ oyf;Dej ;DalGwt kq ÷ljifodf lbO{P cg';f/ x'g]5 .
(= k/LIffdf k/LIffyL{n] df]jfOn jf o:t} k|sf/sf ljB'tLo pks/0f k/LIff xndf n}hfg kfOg] 5}g .
!)= ljifout k|Zg x'g] kqsf xsdf k|To]s v08sf nflu 5'§f5'§} pQ/k'l:tsfx? x'g]5g\ . k/LIffyL{n] k|To]s v08sf k|Zgx?sf] pQ/ ;f]xL
v08sf] pQ/k'l:tsfdf n]Vg' kg]{5 .
!!= o; kf7\os|d of]hgf cGtu{tsf kq÷ljifosf ljifoa:t'df h];'s} n]lvPsf] eP tfklg kf7\os|ddf k/]sf sfg"g, P]g, lgod tyf gLltx?
k/LIffsf] ldlteGbf # -tLg_ dlxgf cufl8 -;+zf]wg ePsf jf ;+zf]wg eO{ x6OPsf jf yk u/L ;+zf]wg eO{_ sfod /x]sfnfO{ o;
kf7\os|ddf k/]sf] ;Demg' kb{5 .
!@= k|yd r/0fsf] lnlvt k/LIffaf6 5gf}6 ePsf pDd]bjf/x?nfO{ dfq låtLo r/0fdf ;lDdlnt u/fOg]5 .
!#= k|yd r/0fsf] lnlvt k/LIffdf 5gf}6 ePsf pDd]bjf/x?sf] k|fKtfÍ / låtLo r/0fsf] sDKo'6/ k/LIf0f / cGt/jftf{sf]] s"n cÍ of]usf
cfwf/df clGtd k/LIffkmn k|sflzt ul/g]5 .
!$= k/LIff of]hgf / kf7\oqmd ;+zf]wg ldlt M @)&^.!).)% ut] .
!%= o;eGbf cufl8 nfu" ePsf] dfly pNn]lvt kb, ;]jf, ;d"x, pk;d"xsf] kf7\oqmd vf/]h ul/Psf] 5 .
1
k|fljlws lzIff tyf Jofj;flos tfnLd kl/ifb\
kbk"lt{ ;ldlt
;fgf]l7dL, eQmk'/ .
k|fljlws tyf k|lzIf0f ;]jf, OlGhlgol/Ë k|fljlws k|lzIf0f ;d"x, ;"rgf k|ljlw OlGhlgol/Ë
pk;d"x, clws[t:t/ t[tLo >]0fL, k|fljlws clws[t -;"rgf k|ljlw_ kbsf]
v'nf / cfGtl/s k|ltof]lutfTds lnlvt k/LIffsf] kf7\oj|md
k|yd kq M ;fdfGo 1fg, kl/ifb\sf] ;]jf ;Dalwt ljifo / s]xL P]g lgodx? k"0ff{+s M !))
v08 sM ;fdfGo 1fg @)x! =@)
! ljZjsf] k|d'v P]ltxfl;s 36gfx? .
@= g]kfnsf] Oltxf; .
#= g]kfnsf] e"uf]n .
$= g]kfnsf] cfly{s, /fhgLlts, ;fdflhs / ;f+:s[lts Joj:yf .
%= g]kfnsf k|rlnt wd{, ;+:s[lt, hft hflt, efiff, ;flxTo / snf
^= v]ns"b tyf dgf]/Ghg ;DaGwL ljljw hfgsf/L .
&= la1fg / k|ljlw, k|l;4 a}1flgs / ltgsf] of]ubfg .
*= jftfj/0f k|b'if0f tyf hnjfo' kl/jt{g .
(= cGt/f{li6«o ;+3 ;+:yf -;+o'Qm /fi6\;+3, Oo", cfl;ofg, ladi6]s / ;fs{_
!)= g]kfnsf] a}b]lzs ;DaGw / k//fi6« gLlt .
!!= /fli6«o / cGt/f{li6«o dxTjsf ;d;fdlos 36\gf tyf gljgtd ultljlwx? .
!@= lbuf] ljsf;sf nIox? .
2
k|fljlws lzIff tyf Jofj;flos tfnLd kl/ifb\
kbk"lt{ ;ldlt
;fgf]l7dL, eQmk'/ .
k|fljlws tyf k|lzIf0f ;]jf, OlGhlgol/Ë k|fljlws k|lzIf0f ;d"x, ;"rgf k|ljlw OlGhlgol/Ë
pk;d"x, clws[t:t/ t[tLo >]0fL, k|fljlws clws[t -;"rgf k|ljlw_ kbsf]
v'nf / cfGtl/s k|ltof]lutfTds lnlvt k/LIffsf] kf7\oj|md
v08 uM ;]jf ;DaGwL ljifo ^)x! =^)
-!_ låtLo kqsf] ;]jf ;DaGwL ljifosf] kf7\oqmd g} k|yd kqsf] v08 æuÆ sf] ;]jf ;DaGwL kqsf]
kf7\oqmd x'g]5 .
-@_ k|yd kqsf] v08 -u_ sf] ;]jf ;DaGwL kqsf] PsfO{x?sf] k|Zg;+Vof lgDgfg';f/ x'g]5 M
प्रथम पत्रको 1 2 3 4 5 6 7 8 9 10 11 12
खण्ड “ग” को
सेवा सम्बन्धी
पत्रको एकाइ
k|Zg ;+Vof 3 5 7 7 8 5 3 8 5 5 2 2
द्वितीय पत्र 1 2 3 4 5 6 7 8 9 10 11 12
सेवा सम्बन्धी
प्ववषयको
पत्रको एकाइ
k|Zg ;+Vof 5 10 10 10 10 5+5 5 10+5 10 5 5 5
२)] द्वितीय पत्र सेिा सम्बन्धी विषयको पत्रको ljifout k|Zgsf nflu tf]lsPsf १० अंकका
k|Zgx?sf] xsdf १० अंकको Pp6f nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu -Two or more
parts of a single question_ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx? -Short notes_ ;f]Wg ;lsg]5 .
3
k|fljlws lzIff tyf Jofj;flos tfnLd kl/ifb\
kbk"lt{ ;ldlt
;fgf]l7dL, eQmk'/ .
k|fljlws tyf k|lzIf0f ;]jf, OlGhlgol/Ë k|fljlws k|lzIf0f ;d"x, ;"rgf k|ljlw OlGhlgol/Ë
pk;d"x, clws[t:t/ t[tLo >]0fL, k|fljlws clws[t -;"rgf k|ljlw_ kbsf]
v'nf / cfGtl/s k|ltof]lutfTds lnlvt k/LIffsf] kf7\oj|md
4
3.2.3. Binary search trees
3.2.4. Balancing trees
3.2.5. AVL trees
3.3. Indexing Methods
3.3.1. Hashing Trees
3.3.2. Suffix Trees
3.4. Analysis of Algorithms
3.4.1. Asymptotic Notation
3.4.2. Notions of Space and Time Complexity
3.4.3. Worst and Average Case Analysis
3.5. Algorithm Design
3.5.1. Greedy Approach
3.5.2. Dynamic Programming
3.5.3. Divide-and-Conquer
3.5.4. Backtracking
3.6. Graph Traversals
3.6.1. Connected Components
3.6.2. Spanning Trees
3.6.3. Shortest Paths
3.6.4. Hashing
3.6.5. Sorting
3.6.6. Searching
3.6.7. Merging
3.6.8. Depth-first Search and Breadth-first Search
3.6.9. Minimum Spanning Trees
3.6.10. Directed Acyclic Graphs
4. Operating Systems
4.1. History & concepts of operating system
4.2. Resources and Sharing
4.3. Resource Management and Spooling
4.4. Single Task
4.5. Multi Tasking and Multi User
4.6. Multiprocessing
4.7. Batch Processing,
4.8. Processes and Threads
4.9. Parallel and Distributed Processing
4.10. Process Scheduling
4.11. Inter-process Communication
4.12. Concurrency
4.13. Synchronization
4.14. Deadlock
4.15. CPU Scheduling
4.16. Memory Management and Virtual Memory
4.17. Disk and File systems
4.18. I/O systems
4.19. Protection and Security
4.20. Embedded systems
4.21. Open Source
4.22. Microsoft Windows
4.23. Kernel
4.24. Real time OS
4.25. Troubleshooting Windows, & Linux
4.26. Managing Network Printing
4.27. Managing Hard Disks and Partitions
4.28. Monitoring and Troubleshooting Windows
5
4.29. Users, Groups and Permission Linux and Windows
5. Database Management System and Design
5.1. Introduction
5.1.1. A Database Model
5.1.2. Relational Database Model
5.1.3. Integrity
5.1.4. RDBMS
5.2. SQL and Embedded SQL
5.2.1. Writing Basic SQL SELECT Statements
5.2.2. Restricting and Sorting data
5.2.3. Single Row Functions
5.2.4. Displaying Data from Multiple Tables
5.2.5. Aggregation Data Using Group Functions
5.2.6. Sub Queries, Manipulating Data and Creating &Managing Tables
5.2.7. Creating Views and Controlling User Access
5.2.8. Using Set Operators
5.2.9. Date time Function
5.3. Database Design
5.3.1. Logical Design
5.3.2. Conceptual Design
5.3.3. Mapping Conceptual to Logical
5.3.4. Pragmatic issues
5.3.5. Physical Design
5.3.6. Integrity and Correctness
5.3.7. Relational Algebra
5.3.8. Relational Calculus
5.4. Normalization
5.4.1. 1NF
5.4.2. 2NF
5.4.3. 3NF
5.4.4. BCNF
5.4.5. 4NF
5.4.6. 5NF
5.4.7. DKNF
5.5. Architecture of DBMS
5.5.1. Client-server, Open Architectures
5.5.2. Transaction Processing
5.5.3. Multi-User & Concurrency and
5.5.4. Backup & Recovery Database.
5.6. Basic Concept of major RDBMS products
5.6.1. Oracle
5.6.2. Sybase
5.6.3. DB2
5.6.4. SQL Server and
5.6.5. Other Databases
5.6.6. Database Design issues, Data Mining, Data Warehousing
6. Computer Organization and Architecture
6.1. Basic Computer Organization and Design
6.2. Machine Instructions and Addressing Modes
6.3. ALU and Data Path
6.4. CPU Control Design
6.5. Memory interface
6.6. I/O interface
6.7. Instruction Pipelining
6.8. Cache Memory and Mapping Techniques
6
6.9. Main Memory
6.10. Secondary Storage and
6.11. Microprocessor
7. Theory of Computation
7.1. Regular Languages and Finite Automata
7.2. Context Free Languages and Push-down Automata
7.3. Recursively Enumerable Sets and Turing Machines
7.4. Undecidability
7.5. Completeness
8. Computer Networks and Network Security
8.1. Network Definition, Network Models, Connectivity, Network Addressing
8.2. The Data Package, Establishing a Connection, Reliable Delivery, Network Connectivity,
Noise Control, Building Codes, Connection Devices
8.3. ISO/OSI Model
8.4. LAN technologies (Ethernet, Token Ring)
8.5. Flow and Error Control Techniques
8.6. Routing Algorithms, Congestion Control
8.7. TCP/IP, UDP, Sockets
8.8. IP (v4), IP (v6),
8.9. Dynamic Host Configuration Protocol
8.10. Application Layer Protocols (ICMP, DNS, SMTP, POP, FTP, http)
8.11. Basic concepts of Hubs, Switches, Gateways, and Routers LAN
8.12. Protocols on a Network, IP Routing, IP Routing Tables, Router Discovery Protocols,
Data Movement in a Routed Network, Virtual LANs (VLANS)
8.13. The WAN Environment, Wan Transmission Technologies, Wan Connectivity Devices,
Voice Over Data Services
8.14. Internetworking, E-mail, Internet and Intranet, Extranet
8.15. Remote Networking: Remote Networking, Remote Access protocols, VPN
Technologies.
8.16. Computer Security: Computer Virus, Worm, Trojan Horse.
8.17. Network Security: Introduction, Virus Protection, Local Security, Network Access,
Internet Security.
8.17.1. Encryption, Decryption, Asymmetric / Symmetric Algorithms
8.17.2. RSA Algorithm,
8.17.3. Firewalls, Proxies, Intrusion Detection and Protection System
8.17.4. Security- Confidentiality, Integrity and Authentication
8.18. Disaster Recovery: The need for Disaster Recovery, Disaster Recovery plan, Data
backup, Fault Tolerance.
8.19. Advanced Data Storage Techniques: Enterprise Data Storage, Clustering, Network
Attached Storage, Storage Area Networks.
8.20. Network Troubleshooting: Using Systematic Approach to Troubleshooting.
8.21. Network Support Tools: Utilities, The Network Baseline.
8.22. Network Access Points (NAP), Common Network Component, Common Peripheral
Ports.
9. System Analysis and Design
9.1. Defining the System, System Owner, System User, System Designers and system Builders,
System Analysts, Variations on the System Analyst title, System life Cycle,
9.2. Requirement Analysis, System Design
9.3. JAD definition, JAD purpose, JAD Philosophy, JAD Scope
9.4. Entity Relationship Diagram, Data Flow Diagram, Software Development Life Cycles,
MIS
9.5. Decision Support System, Software Engineering and User-Interface Design
Considerations.
9.6. Context diagram, Top level DFD, Expansion Level DFD, Conversions of Data
9.7. Object -Oriented Concept, Object Structure, Object Feature, Class and Object
7
9.8. Association and Composition, Inheritance, Multiple Inheritances
9.9. Use Case Diagram, State Diagram, Event Flow Diagram
10. Software Engineering
10.1. Project Management & software project planning.
10.2. Software quality assurance & risk analysis.
10.3. Software Testing Techniques
10.4. Object Oriented software engineering
10.5. Client/Server software engineering
10.6. Web engineering
10.7. Re-engineering
11. E-Commerce Technology
11.1. Introduction to E-Commerce.
11.2. Electronic Commerce Strategies.
11.3. Electronic Commerce Security Issues.
11.4. Success Models of E-Governance.
11.5. E-Business: b2b, b2c, b2e, c2c, g2g, g2c.
11.6. Principles of Electronic Payment, Strategies & Systems.
11.7. E-Banking, EDI Methods, SWIFT.
12. IT in Nepal
12.1. History of IT in Nepal,
12.2. IT Policy of Nepal, 2057 B.S.
12.3. Cyber law of Nepal (Electronic Transaction Ordinance, 2061 B.S.)
12.4. Copyright Act, 2022 B.S.
12.5. Software Piracy, cyber crime
12.6. Nepali Unicode, Nepali Fonts
12.7. Licensing Issues
8
k|fljlws lzIff tyf Jofj;flos tfnLd kl/ifb\
kbk"lt{ ;ldlt
;fgf]l7dL, eQmk'/ .
k|fljlws tyf k|lzIf0f ;]jf, OlGhlgol/Ë k|fljlws k|lzIf0f ;d"x, ;"rgf k|ljlw OlGhlgol/Ë
pk;d"x, clws[t:t/ t[tLo >]0fL, k|fljlws clws[t -;"rgf k|ljlw_ kbsf]
v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] l4tLo r/0fsf]
sDKo'6/ bIftf k/LIf0f k|of]ufTds k/LIffsf] kf7\oj|md
kf7\oqmdsf] p2]Zo M
cfhsf] a}1flgs o'udf b}lgs hLjgdf cfOkg]{ Jofjxfl/s ;d:of ;dfwfgsf nflu ;"rgf / ;+rf/
k|ljlw;Fu kl/lrt / Go"gtd 1fg ;Lk / wf/0ff ePsf] JolQm x'g ckl/xfo{tf /x]sf] 5 . t;y{ k|fljlws
lzIffdf sd{rf/L 5gf}6 ubf{ cfwf/e"t sDKo'6/ 1fg / ;Lk ePsf] JolQm 5gf}6 ug{ pko'Qm x'g] x'Fbf clws[t
:t/sf sd{rf/Lx?nfO{ klg sDKo'6/ ;DaGwL ug'{kg]{ ;fdfGo ;d:ofx? xn ug]{ Ifdtf x'g clgjfo{ b]lvG5 .
t;y{ clws[t:t/sf kbx?sf] v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] l4tLo r/0fdf sDKo'6/ bIftf
k/LIf0f k|of]ufTds k/LIff ;dfj]z ul/Psf] xf] .
l4tLo r/0f
ljifo M sDKo'6/ bIftf k/LIf0f
1. Windows Basic, Email and Internet
a. Introduction to Graphical User Interface
b. Use & Update of Antivirus
c. Concept of virus, worm, spam etc.
d. Starting and shutting down Windows
e. Basic Windows elements - Desktop, Taskbar, My Computer, Recycle Bin, etc.
f. Concept of file, folder, menu, toolbar
g. Searching files and folders
h. Internet browsing & searching the content in the web
i. Creating Email ID, Using email and mail client tools
j. Basic Network troubleshooting (checking network & internet connectivity)
2. Word processing
a. Creating, saving and opening documents
b. Typing in Devanagari and English
c. Copying, Moving, Deleting and Formatting Text
d. Paragraph formatting (alignment, indentation, spacing etc.)
e. Creating lists with Bullets and Numbering
f. Creating and Manipulating Tables
g. Borders and Shading
9
h. Creating Newspaper Style Documents Using Column
i. Security Techniques of Document
j. Inserting header, footer, page number, Graphics, Pictures, Symbols
k. Page setting, previewing and printing of documents
l. Mail merge
3. Presentation System
a. Introduction to presentation application
b. Creating, Opening & Saving Slides
c. Formatting Slides, Slide design, Inserting header & footer
d. Slide Show
e. Animation
f. Inserting Built-in picture, Picture, Table, Chart, Graphs, and Organization Chart
etc.
4. Electronic Spreadsheet
a. Organization of Electronic Spreadsheet applications (Cells, Rows, Columns,
Worksheet, Workbook and Workspace)
b. Creating, Opening and Saving Work Book
c. Editing, Copying, Moving, Deleting Cell Contents
d. Formatting Cells (Font, Border, Pattern, Alignment, Number , Protection,
Margins and text wrap)
e. Formatting Rows, Column and Sheets
f. Using Formula with Relative and Absolute Cell Reference
g. Using Basic Functions (IF, SUM, MAX, MIN, AVERAGE etc)
h. Sorting and Filtering Data
i. Inserting Header and Footer
j. Page Setting, Previewing and Printing
.. ;dfKt ..
10