MEGHA PUBLICATION
Computer Network and Telecommunication
1. Select the best answer.
a) Which of the following networking solution is suitable for networking within a building?
i) WAN ii) LAN iii) MAN iv) None of above
Ans: LAN
b) Which of the following topologies share a single channel on which all stations can receive and transmit the data?
i) LAN ii) BUS iii) TREE iv) None of the above
Ans: BUS
c) Protocols in network means
i) Language for communication between computer
ii) Rules for exchange of message between two or more hosts
iii) Both a and b iv) None of the above
Ans: Both a and b
d) Faster data communication is possible when using
i) Co-axial cable ii) Microwave transmission iii) Fiber optic iv) None of above
Ans: Fiber optic
e) A server in LAN is a
i) Device offering service to user ii) NIC
iii) Workstation with huge secondary storage iv) None of the above
Ans: Device offering service to user
f) Which is not a physical component of computer network ?
i) Cable ii) NIC iii) Network OS iv) Hub
Ans: Network OS
g) Which of the following topologies is least affected by addition/removal of a node?
i) Star ii) Ring iii) Bus iv) None of the above
Ans: Star
h) The device used for connecting PC to telephone line is
i) CD-ROM ii) MODEM iii) Printer iv) Port
Ans: MODEM
i) Which of the following is used to connect totally dissimilar networks?
i) Router ii) Bridge iii) Gateway iv) None of the above
Ans: Gateway
2. State true or false
a) It is possible to share hardware resources on a computer network. True
b) In client/server network architecture the resources are distributed to different terminals. False
c) Nodes are also called workstations. True
d) Network interface card connects printers on the network. False
e) Star topology uses a single cable as a backbone from where all other nodes are connected. False
f) It is difficult to identify and isolate the failure node in ring topology compared to star topology. True
g) There is possibility producing more crosstalk in twisted pair cable than coaxial cable. True
h) WAN uses guided transmission media like microwave or radio wave. False
i) Bridge connects two dissimilar networks and carried out protocol conversion if needed. False
j) Normally there is more transmission error rate in unguided transmission media than guided transmission media. True
Internet and its services
1) Match the following.
a) NCSA Mosaic Internet Protocol
b) ARPA Online shopping
c) WWW Funded by US DOD
d) TCP/IP Dr. Berners-Lee
e) E-commerce First web browser
Answers
a) NCSA Mosaic
|
First web browser
|
b) ARPA
|
Funded by US DOD
|
c) WWW
|
Dr. Berners-Lee
|
d) TCP/IP
|
Internet Protocol
|
e) E-commerce
|
Online shopping
|
2) State true or false.
a) US government controls the Internet. False
b) The web uses HTTP protocol to transmit data. True
c) Web documents contain graphics, sounds, text and video. True
d) FTP is document that allows you to log into another computers on the Internet. False
e) Usenet messages are stored on central computers. True
f) Downloading is process of sending files from your computer to another computer on the Internet. False
g) E-commerce is buying and selling products services online. True
h) In the Internet information can be sent from any computer to any other 24 hours a day. True
i) The web remained primarily text based until 1998. False
j) Probably the most common web-based resources available through Telnet is library catalogs. True
3) Write single term for the followings.
a) The term used to describe the tool which allows one computer user to send a message to one or more other computer users over a computer network. Email
b) Both a program and method used to transfer files between computers. FTP
c) A global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. Usenet News
d) The visual communication of parties around the world. Video Conference
e) A searchable database of Internet files collected by a computer program. Search engine
f) Internet programs to communicate with each other by typing in real time. Internet Relay Chat
g) A server which sorts and directs your mail for you. Mail Server
h) A network of networks. Internet
i) A component of the Internet that presents information in a graphical interface. World Wide Web
j) The document formatting language used to link document in on the web. Hyper Text Markup Language
Computer Security
1) State True or False
a) Security layers minimizes the threats to the security. True
b) Read only access right enables the user to change the information in the computer. False
c) Callback, handshaking and encryption are the method in the computer. True
d) Anti-virus programs inject viruses to the computer system. False
e) The best security policy in the world if no use if people do not abide by it. True
f) Modern computer system work more efficiently in the environmental temperature below 0oC. False
2) Match the following.
a) Security threat Callback
b) Operational Security Management
c) Communication Security 220V to 240V
d) Security policy Floppy disk
e) Access control Power failure
f) Computer system Audit control
g) UPS Read-write
h) Backup Power supply
Answers
a) Security threat
|
Power failure
|
b) Operational Security
|
Audit control
|
c) Communication Security
|
Callback
|
d) Security policy
|
Management
|
e) Access control
|
Read-write
|
f) Computer system
|
220V to 240V
|
g) UPS
|
Power supply
|
h) Backup
|
Floppy disk
|
Computer Virus
1) Fill in the blanks.
a) The capability of generating the copies of itself is called replicating.
b) Boot sector virus infect boot record, master boot, FAT and partition table of a disk.
c) Program virus normally infects computer programs searching the extensions like .com, .exe, .ovl etc
d) Viruses can be removed from the system using antivirus programs.
e) Message Carrying viruses usually do not destruct the computer files/programs but display interesting information to entertain the users.
f) Multipartite viruses can infect both programs and boot sector.
2) State whether true or false.
a) A computer virus can cause actual damage or destruction to the hardware components of a computer system. False
b) Virus spreads across disks and networks by making copies of itself. True
c) Computer viruses used to be a developed unknowingly while developing computer program. False
d) Usually system infectors enter to the system as a device driver and get loaded into memory. True
Cyber law and Ethics
1. Fill in the blanks.
a. US introduced fair credit reporting act in 1970 AD
b. Government of Nepal introduced cyber law in the year 2061 B.S.
c. Computer ethics is the set of moral principals that regulate the use of computers.
d. Posting on the website of indecent and illegal materials will attract the fine of Rs. 1,oo,ooo or one year jail or both.
e. Cyber space does not only include the internet and computers, but it present where two or more cables or wires etc meet.
2. Match the following.
a. Federal privacy Act copyright law
b. Cyber law of Nepal 1974
c. Intellectual property law 2000
d. Cyber crime hacking
Answers
a. Federal privacy Act
|
1974
|
b. Cyber law of Nepal
|
2000
|
c. Intellectual property law
|
copyright law
|
d. Cyber crime
|
hacking
|
3. True or false
a. Two possible reasons for cyber crime are problems with moral vision and rationalization of the problem. True
b. Cyber law does not deal with issues relating to telecommunications. False
c. Some common issues of cyber ethics are intellectual property right, privacy concerns and how computer affect society. True
d. The cyber law of Nepal has the provision of appellate judicial body to issue licenses of certification to the IT industry monitor implementation of the act and regulate ICT activities. True
e. Cyber law is the set of moral principles that governor the behavior of a group or individual. False
Multimedia and Its Applications
1. Fill in the blanks.
a. Multimedia uses more than one medium such as text, audio, video, graphics and animation.
b. The CPU of a multimedia computer should be at least 486 with math co-processor.
c. Graphics provides a visual impact.
d. A computer capable of handling texts, graphics, audios, animations and videos is called multimedia computer.
e. Edutainment is nothing but educational entertainment.
2. State true or false.
a. Multimedia is used only in the field of information technology. False
b. Multimedia systems support the interactive uses of text, graphics, animation, audio, or motion video. True
c. Sound cards capture movies, or pictures from external device. False
d. Keyboard and mouse are two important components for any multimedia computers. True
e. CPU of multimedia computer should be at least 486 with math co-processor. True
Database management using MS Access
1. State true or false.
a. A field name refers to the category of information about a subject. True
b. You can not delete a field in a database once they have been defined. False
c. The primary key is an optional field in MS-Access table. True
d. The primary key in a table is a field that contains information unique to the records. True
e. Many related fields makeup a record and many records makeup table. True
f. Freezing the column enables scrolling the selected columns. False
g. A query is used to select fields and records from one or more tables. True
h. Once a column is hidden the data stored in the field are deleted. False
i. A select query retrieve data from one or more tables using criteria you specify. True
j. Form is a graphical interface through which data can be printed or displayed in a specified format. False
2. Match the following.
a. Data -presentation of result
b. Record -organized collection of data / information
c. Field -graphical interface for data entry
d. Report -column on datasheet
e. Query -value
f. Table -software
g. Primary key -row on a datasheet
h. DBMS -retrieving editing information conditionally
i. Form -sorting data in rows and columns
j. Database -a field with unique field content
Answers
a. Data
|
value
|
b. Record
|
row on a datasheet
|
c. Field
|
column on datasheet
|
d. Report
|
presentation of result
|
e. Query
|
retrieving editing information conditionally
|
f. Table
|
sorting data in rows and columns
|
g. Primary key
|
a field with unique field content
|
h. DBMS
|
software
|
i. Form
|
graphical interface for data entry
|
j. Database
|
organized collection of data / information
|
No comments:
Post a Comment