Saturday, October 22, 2016

Solved Objectives: Megha Publication

MEGHA PUBLICATION
Computer Network and Telecommunication
1.       Select the best answer.
a)       Which of the following networking solution is suitable for networking within a building?
i) WAN                   ii) LAN             iii) MAN           iv) None of above
Ans: LAN
b)      Which of the following topologies share a single channel on which all stations can receive and transmit the data?
i) LAN                    ii) BUS             iii) TREE          iv) None of the above
Ans: BUS
c)       Protocols in network means
i) Language for communication between computer
ii) Rules for exchange of message between two or more hosts
iii) Both a and b                   iv) None of the above
Ans: Both a and b
d)      Faster data communication is possible when using
i) Co-axial  cable      ii)  Microwave transmission                     iii) Fiber optic   iv) None of above
Ans: Fiber optic
e)       A server in LAN is a
i) Device offering service to user                   ii) NIC             
iii) Workstation with huge secondary storage   iv) None of the above
Ans: Device offering service to user
f)       Which is not a physical component of computer network ?
i) Cable                   ii) NIC              iii) Network OS             iv) Hub
Ans: Network OS
g)      Which of the following topologies is least affected by addition/removal of a node?
i) Star                     ii) Ring             iii) Bus              iv) None of the above
Ans: Star
h)      The device used for connecting PC to telephone line is
i) CD-ROM             ii) MODEM                   iii) Printer                     iv) Port
Ans: MODEM
i)        Which of the following is used to connect  totally dissimilar networks?
i) Router                 ii) Bridge                      iii) Gateway                   iv) None of the above
Ans: Gateway
2.       State true or false
a)       It is possible to share hardware resources on a computer network. True
b)      In client/server network architecture the resources are distributed to different terminals. False
c)       Nodes are also called workstations. True
d)      Network interface card connects printers on the network. False
e)       Star topology uses a single cable as a backbone from where all other nodes are connected. False
f)       It is difficult to identify and isolate the failure node in ring topology compared to star topology. True
g)      There is possibility producing more crosstalk in twisted pair cable than coaxial cable. True
h)      WAN uses guided transmission media like microwave or radio wave. False
i)        Bridge connects two dissimilar networks and carried out protocol conversion if needed. False
j)        Normally there is more transmission error rate in unguided transmission media than guided transmission media. True
Internet and its services
1)      Match the following.
a)       NCSA Mosaic                          Internet Protocol
b)      ARPA                                       Online shopping
c)       WWW                                       Funded by US DOD
d)      TCP/IP                                      Dr. Berners-Lee
e)       E-commerce                             First web browser
Answers
a)      NCSA Mosaic
First web browser
b)      ARPA
Funded by US DOD
c)       WWW
Dr. Berners-Lee
d)      TCP/IP
Internet Protocol
e)      E-commerce
Online shopping

2)      State true or false.
a)       US government controls the Internet. False
b)      The web uses HTTP protocol to transmit data. True
c)       Web documents contain graphics, sounds, text and video. True
d)      FTP is document that allows you to log into another computers on the Internet. False
e)       Usenet messages are stored on central computers. True
f)       Downloading is process of sending files from your computer to another computer on the Internet. False
g)      E-commerce is buying and selling products services online. True
h)      In the Internet information can be sent from any computer to any other 24 hours a day. True
i)        The web remained primarily text based until 1998. False
j)        Probably the most common web-based resources available through Telnet is library catalogs. True
3)      Write single term for the followings.
a)       The term used to describe the tool which allows one computer user to send a message to one or more other computer users over a computer network. Email
b)      Both a program and method used to transfer files between computers. FTP
c)       A global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. Usenet News
d)      The visual communication of parties around the world. Video Conference
e)       A searchable database of Internet files collected by a computer program. Search engine
f)       Internet programs to communicate with each other by typing in real time. Internet Relay Chat
g)      A server which sorts and directs your mail for you. Mail Server
h)      A network of networks. Internet
i)        A component of the Internet that presents information in a graphical interface. World Wide Web
j)        The document formatting language used to link document in on the web. Hyper Text Markup Language
Computer Security
1)      State True or False
a)       Security layers minimizes the threats to the security. True
b)      Read only access right enables the user to change the information in the computer. False
c)       Callback, handshaking and encryption are the method in the computer. True
d)      Anti-virus programs inject viruses to the computer system. False
e)       The best security policy in the world if no use if people do not abide by it. True
f)       Modern computer system work more efficiently in the environmental temperature below 0oC. False
2)      Match the following.
a)       Security threat                            Callback
b)      Operational Security                  Management
c)       Communication Security           220V to 240V
d)      Security policy                           Floppy disk
e)       Access control                            Power failure
f)       Computer system                        Audit control
g)      UPS                                            Read-write
h)      Backup                                       Power supply
Answers
a)      Security threat
Power failure
b)      Operational Security
Audit control
c)       Communication Security
Callback
d)      Security policy
Management
e)      Access control
Read-write
f)       Computer system
220V to 240V
g)      UPS
Power supply
h)      Backup
Floppy disk

Computer Virus
1)      Fill in the blanks.
a)       The capability of generating the copies of itself is called replicating.
b)      Boot sector virus infect boot record, master boot, FAT and partition table of a disk.
c)       Program virus  normally infects computer programs searching the extensions like .com, .exe, .ovl etc
d)      Viruses can be removed from the system using antivirus programs.
e)       Message Carrying viruses usually do not destruct the computer files/programs but display interesting information to entertain the users.
f)       Multipartite viruses can infect both programs and boot sector.
2)      State whether true or false.
a)       A computer virus can cause actual damage or destruction to the hardware components of a computer system. False
b)      Virus spreads across disks and networks by making copies of itself. True
c)       Computer viruses used to be a developed unknowingly while developing computer program. False
d)      Usually system infectors enter to the system as a device driver and get loaded into memory. True
Cyber law and Ethics
1.       Fill in the blanks.
a.       US introduced fair credit reporting act in 1970 AD
b.       Government of Nepal introduced cyber law in the year 2061 B.S.
c.       Computer ethics is the set of moral principals that regulate the use of computers.
d.       Posting on the website of indecent and illegal materials  will attract the fine of Rs. 1,oo,ooo or one year jail or both.
e.       Cyber space does not only include the internet and computers, but it present where two or more cables or wires etc meet.
2.       Match the following.
a.       Federal privacy Act                                       copyright law
b.       Cyber law of Nepal                                       1974
c.       Intellectual property law                               2000
d.       Cyber crime                                                   hacking
Answers
a.       Federal privacy Act
1974
b.      Cyber law of Nepal
2000
c.       Intellectual property law
copyright law
d.      Cyber crime
hacking

3.       True or false
a.       Two possible reasons for cyber crime are problems with moral vision and rationalization of the problem. True
b.       Cyber law does not deal with issues relating to telecommunications.  False
c.       Some common issues of cyber ethics are intellectual property right, privacy concerns and how computer affect society. True
d.       The cyber law of Nepal has the provision of appellate judicial body to issue licenses of certification to the IT industry monitor implementation of the act and regulate ICT activities. True
e.       Cyber law is the set of moral principles that governor the behavior  of a group or individual. False
Multimedia and Its Applications
1.       Fill in the blanks.
a.       Multimedia uses more than one medium such as  text, audio, video, graphics and animation.
b.       The CPU of a multimedia computer should be at least 486 with math co-processor.
c.       Graphics provides a visual impact.
d.       A computer capable of handling texts, graphics, audios, animations and videos is called multimedia computer.
e.       Edutainment is nothing but educational entertainment.
2.       State true or false.
a.       Multimedia is used only in the field of information technology. False
b.       Multimedia systems support the interactive uses of text, graphics, animation, audio, or motion video. True
c.       Sound cards capture movies, or pictures from external device. False
d.       Keyboard and mouse are two important components for any multimedia computers. True
e.       CPU of multimedia computer should be at least 486 with math co-processor. True
Database management using MS Access
1.       State true or false.
a.       A field name refers to the category of information  about a subject. True
b.       You can not delete a field in a database once they have been defined. False
c.       The primary key is an optional field in MS-Access table. True
d.       The primary key in a table is a field that contains information unique to the records. True
e.       Many related fields makeup a record and many records makeup table. True
f.        Freezing the column enables scrolling the selected columns. False
g.       A query is used to select fields and records from one or more tables. True
h.       Once a column is hidden the data stored in the field are deleted. False
i.        A select query retrieve data from one or more tables using criteria you specify. True
j.        Form is a graphical interface through which data can be printed or displayed in a specified format. False
2.       Match the following.
a.       Data                                     -presentation of result
b.       Record                                 -organized collection of data / information
c.       Field                                    -graphical interface for data entry
d.       Report                                 -column on datasheet
e.       Query                                  -value
f.        Table                                   -software
g.       Primary key                        -row on a datasheet  
h.       DBMS                                -retrieving editing information conditionally
i.        Form                                  -sorting data in rows and columns
j.        Database                            -a field with unique field content
Answers
a.       Data
value
b.      Record                                
row on a datasheet
c.       Field                                   
column on datasheet
d.      Report                                 
presentation of result
e.      Query                                  
retrieving editing information conditionally
f.        Table                                   
sorting data in rows and columns
g.       Primary  key
a field with unique field content
h.      DBMS                               
software
i.        Form                                 
graphical interface for data entry
j.        Database
organized collection of data / information

No comments:

Post a Comment