ASIA PUBLICATION
Chapter 1
Computer Networking & Telecommunication
3. Fill in the blanks with appropriate words:
a) The interconnection of computers with or without wires in order to share information is called computer network.
b) The server computer is used to serve data and information.
c) The smallest area covers by network is called LAN
d) The client computer uses information from the server.
e) The wireless technology used for long distance is called microwave transmission.
f) Client / server and peer to peer are the example of network architecture.
g) A topology which does not consist any wire is called cellular topology.
h) UTP and STP are the examples of twisted pair cable.
i) MODEM means Modulation and Demodulation.
j) A set of rules used to define communication is called protocol.
k) The remote login protocol is telnet.
l) Both directional communication at the same time is called full duplex mode of communication.
4. Select appropriate words:
a) Which is not a network device?
Hub Repeater switch TCP/IP
Ans: TCP/IP
b) Fastest and high bandwidth data communication medium is:
i. Optical fiber Twisted Pair Coaxial Cable Telephone Line
Ans: Optical Fiber
c) Which is not the network operating system:
i. Linux UNIX MS-DOS Windows Server 2012
Ans: MS-DOS
d) Which transmission media is not used for guided transmission media?
Fiber Optic Coaxial Cable RJ45 Satellite
Ans: Satellite
e) Which type of network is used in the internet?
i. LAN MAN GAN WAN
Ans: WAN
f) Which refers to the communication media:
i. UTP Cable Fiber optics cable Satellite All of above
Ans: All of above
g) Which is not a network topology?
i. STAR Ring Client Server BUS
Ans: Client/ Server
h) Which is not a guided media?
i. UTP Cable STP Cable Satellite Fiber Optics
Ans: Satellite
i) Modem converts ______________
i. Sound into digital ii. Digital signal into sound Both (i) and (ii) None of above
Ans: Both (i) and (ii)
j) Which is not a communication media?
i. Wire Microwave Satellite NIC
Ans: NIC
k) In which topology network is connected to hub?
i. Ring Topology Bus Topology Star Topology None
Ans: Star topology
l) Data communication means:
i. We can easily send and receive the message Data computing system is fastest in network
ii. The process of transferring data and information None of above
Ans: The process of transferring data and information
5. State whether the following statements are true or false.
a) A computer network is just used for resource sharing. False
b) The computer networking cannot be implemented within room. False
c) The network that covers small area is called PAN. False
d) Fiber optics uses light to carry a data signal through cable. True
e) Communication and network are different. False
f) UTP and STP are types of unguided media. False
6. Match the following:
GROUP A GROUP B
a) Server HTTP
b) Node Work Station
c) Protocol Main Computer
d) Coaxial Cable Set of rules
Communication Media
Answers
a) Server
|
Main Computer
|
b) Node
|
Work Station
|
c) Protocol
|
Set of rules
|
d) Coaxial Cable
|
Communication Media
|
7. Give an appropriate word:
a) Cabling structure of LAN: Topology
b) Group of computers that can share resources in between computer: Computer network
c) Analog to digital and digital to analog converter during data transmission: MODEM
d) A computer network limited within a room: LAN
e) Network of networks: Internet
f) A card used to connect network cable to computer: NIC
Chapter 2 The Internet and E-mail
3. State whether the following statements are true or false:
a) The Internet carries large amount of data stored in specific server. True
b) ARPANET was the beginning to invent the Internet. True
c) FTP is used to transfer file from one computer to another. True
d) Telnet is used to browse the Web pages. False
e) DNS is used to convert domain name into IP address. True
f) The network of network is called the Internet. True
g) Search engines are used for sending and receiving emails. False
4. Fill in the blanks:
a) The genesis of the internet was decentralized network called ARPANET created by Department Of Defense.
b) The remote login protocol is telnet and file transfer protocol is FTP.
c) The main page of the website is called homepage.
d) The internet connection requires Computer with modem/router, Internet account and Web browser.
e) A dedicated server used to serve web pages is called web server.
f) Some of the common web browsers are Mozilla Firefox, Safari, Google Chrome, Opera and Internet Explorer.
g) Cost effective, Information exchange and Highly Personal are the advantage of email.
h) Pornography, Spamming and theft of personal information are misuses of internet.
i) IRC, E-commerce, E-mail and Video Conference are the common service provided by the internet.
5. Give appropriate technical terms of the following:
a) Sending mail by using computer. E-mail
b) The application software which is used to visit web pages. Web browser
c) The private owned Internet. Intranet
d) Commercial activities on the Internet. E-commerce
e) The local company sells the Internet service. ISP
f) The service which is used to transfer files from one computer to others. FTP
g) A web page, which is designed to search other web pages. Search engine
h) Protocol used to browse the internet. TCP/IP
i) The technology with deliver voice over the Internet. Skype
j) The learning process by using the Internet. E-learning
k) The total set of interlinked by hypertext documents residing on HTTP servers. WWW
l) A mechanism which is used to convert domain names into IP addresses. DNS
Chapter 3: Computer Malicious Software
2. State whether the following statements are true or false:
a) A computer virus is usable program. False
b) Computer virus cannot hide itself, it can be found easily. False
c) Antivirus program is used to detect and remove computer malware. True
d) Scripting virus attaches with the documents. False
e) Computer virus consumes CPU, memory and storage spaces. True
3. Match the following:
Group A Group B
a) McAfee Computer Virus
b) Trojan horse Boot Sector Virus
c) Polyboot.B Malware
d) Spam Antivirus Program
Unauthorized email
Answers
a) McAfee
|
Antivirus Program
|
b) Trojan horse
|
Malware
|
c) Polyboot.B
|
Boot Sector Virus
|
d) Spam
| Unauthorized email |
4. Fill in the blanks with appropriate words:
a) Antivirus is used to remove computer malicious programs.
b) Macro virus infects the document files.
c) The boot sector virus resides in the boot sector of drive.
d) The examples of script virus are JS.Fortnight and Redlof.A
e) Kaspersky, NOD, Avast and McAfee are examples of antivirus program.
Chapter 4: Computer Security
2. State whether the following statements are true or false:
a) Physical security is the only security measures. False
b) Physical access to the system can also loose data. False
c) IP cameras are used for the surveillance and maintenance. True
d) Lighting cannot cause physical damage to physical system. False
e) Software protection can be made by using physical security. False
f) The UPS can be used to protect system. True
g) Antivirus program are used to protect from unauthorized people. False
h) Password protection can be implemented to the computer system only. False
i) System cannot be restored. False
j) System maintenance is used to clear viruses from the system. False
k) Fire protection is not necessary for the important servers. False
3. Write down the appropriate technical terms:
a) A device which provide electricity after power off. UPS
b) A secret word used to log in. Password
c) A program which protects from malware. Antivirus
d) Security mechanism implemented on the basis of hardware. Hardware security
e) Security implemented on software. Software security
Chapter 6: Introduction to multimedia
2. Fill in the blanks with suitable words:
a) Multiple media in one content is called multimedia.
b) Animation represents multiple picture in a sequence.
c) Games, Virtual Reality and DTH service is an example of interactive multimedia.
d) Text, Audio, Video, Graphics and Animation are the common components of multimedia.
e) An charts, pictures in presentation, bitmap image or animated GIF can be considered as graphics.
f) Hoarding board is an example to use multimedia in commercial field.
g) A simulated 3-D environment is called virtual reality.
h) Adobe, MovieWorks and MediaBlender are the some of the common examples of multimedia software.
3. State whether the following statements are true or false:
a) Multimedia is just one media. False
b) Multimedia presentation is less effective than lecturing. False
c) All the computers are capable of handling multimedia. False
d) Computers with multimedia can only play movies. False
e) Animation and simulation are part of multimedia. True
f) A picture is a worth of thousand words. True
g) Multimedia is also used in animated movie. True
h) Virtual reality is a simulated process to represent real world scenario. True
i) Sound card is one of the components of multimedia computer. True
4. Name the appropriate technical term of the following:
a) The combination of more than one media. Multimedia
b) A computer equipped with multimedia features. Multimedia Computer
c) A 3-D simulated environment. Virtual Reality
d) An emerging term, multimedia used in education. Edutainment
5. Match the following
Group A Group B
a) Edutainment Components of multimedia
b) Virtual Reality Multimedia software
c) Graphics Multimedia in education
d) Adobe Photoshop Simulated software
Answers
a) Edutainment
|
Multimedia in education
|
b) Virtual Reality
|
Simulated software
|
c) Graphics
|
Components of multimedia
|
d) Adobe Photoshop
|
Multimedia software
|
Chapter 8: Database Management using MS-Access
1. Fill in the blanks with correct word(s).
a. Database is an organized collection of related data in tabular form.
b. Flat file or file based system is an early attempt to computerize the manual system for data storage.
c. DBMS is a general program designed to manage a database.
d. Data is the raw facts to generate information.
e. Information is the processed value which we get after we get after processing by the computer.
f. SQL stands for Structured Query Language.
g. A primary key cannot contain the duplicate or null values.
h. Foreign key is the linking field between two values.
i. A text data type allows the field to contain up to 255 characters.
j. A domain is a set of permissible values that can be given to an attribute or field of an entity.
2.State whether the following statements are true or false:
a. Database has been being used knowingly or unknowingly in our daily life. True
b. Flat file system is more advanced than database system to manage data in computer. False
c. The maximum field size of text field is 255 characters. True
d. MS Access 2007 is database management software. True
e. Once the data is entered in a table, it cannot be modified. False
f. Pictures and graphics cannot be stored in the table in MS Access 2007. False
g. Form is the source of table. False
h. The primary key field of a table allows the duplication of data. False
i. Data integrity is used to enter the data into the table in MS Access 2007. False
j. Report is used to enter the data into the table in MS-Access 2007. False
No comments:
Post a Comment