Saturday, October 22, 2016

Solved Objectives: Asia Publication

ASIA PUBLICATION

Chapter 1

Computer Networking & Telecommunication

3. Fill in the blanks with appropriate words:

  a)      The interconnection of computers with or without wires in order to share information is called computer network.
  b)      The server computer is used to serve data and information.
  c)      The smallest area covers by network is called LAN
  d)      The client computer uses information from the server.
  e)      The wireless technology used for long distance is called microwave transmission.
  f)       Client / server and peer to peer are the example of network architecture.
  g)      A topology which does not consist any wire is called cellular topology.
  h)      UTP and STP are the examples of twisted pair cable.
  i)        MODEM means Modulation and Demodulation.
  j)        A set of rules used to define communication is called protocol.
  k)      The remote login protocol is  telnet.
  l)        Both directional communication at the same time is called full duplex mode of communication.

4. Select appropriate words:

  a)      Which is not a network device?
Hub                             Repeater                      switch                          TCP/IP
Ans: TCP/IP
  b)      Fastest and high bandwidth data communication medium is:
                                i.            Optical fiber                Twisted Pair                 Coaxial Cable              Telephone Line
Ans: Optical Fiber
  c)      Which is not the network operating system:
                                i.            Linux                           UNIX                           MS-DOS                      Windows Server 2012
Ans: MS-DOS
  d)      Which transmission media is not used for guided transmission media?
Fiber Optic                               Coaxial Cable              RJ45                            Satellite
                        Ans: Satellite
  e)      Which type of network is used in the internet?
                                  i.            LAN                            MAN                           GAN                            WAN
Ans: WAN
  f)       Which refers to the communication media:
                                i.            UTP Cable                   Fiber optics cable         Satellite                        All of above
Ans: All of above
  g)      Which is not a network topology?
                                i.            STAR                           Ring                             Client Server                BUS
Ans: Client/ Server
  h)      Which is not a guided media?
                                i.            UTP Cable                   STP Cable                    Satellite                        Fiber Optics
Ans: Satellite
  i)        Modem converts ______________
                                i.            Sound into digital         ii. Digital signal into sound      Both (i) and (ii)                        None of above
Ans: Both (i) and (ii)
  j)        Which is not a communication media?
                                i.            Wire                             Microwave                   Satellite                        NIC
Ans: NIC
  k)      In which topology network is connected to hub?
                                i.            Ring Topology             Bus Topology              Star Topology              None
Ans: Star topology
  l)        Data communication means:
                                i.            We can easily send and receive the message               Data computing system is fastest in network
                              ii.            The process of transferring data and information                    None of above
Ans: The process of transferring data and information

5. State whether the following statements are true or false.

  a)      A computer network is just used for resource sharing. False
  b)      The computer networking cannot be implemented within room. False
  c)      The network that covers small area is called PAN. False
  d)      Fiber optics uses light to carry a data signal through cable. True
  e)      Communication and network are different. False
  f)       UTP and STP are types of unguided media. False

6. Match the following:

GROUP A                               GROUP B                      
a)      Server                                HTTP                                                                        
b)      Node                                  Work Station                                                                              
c)      Protocol                             Main Computer                                                                          
d)      Coaxial Cable                    Set of rules
Communication Media
            Answers
a)      Server   
Main Computer
b)      Node  
Work Station
c)      Protocol  
Set of rules
d)      Coaxial Cable
Communication Media

7. Give an appropriate word:

  a)      Cabling structure of LAN: Topology
  b)      Group of computers that can share resources in between computer: Computer network
  c)      Analog to digital and digital to analog converter during data transmission: MODEM
  d)      A computer network limited within a room: LAN
  e)      Network of networks: Internet
  f)       A card used to connect network cable to computer: NIC

Chapter 2 The Internet and E-mail

3. State whether the following statements are true or false:

  a)      The Internet carries large amount of data stored in specific server. True
  b)      ARPANET was the beginning to invent the Internet. True
  c)      FTP is used to transfer file from one computer to another. True
  d)      Telnet is used to browse the Web pages. False
  e)      DNS is used to convert domain name into IP address. True
  f)       The network of network is called the Internet. True
  g)      Search engines are used for sending and receiving emails. False

4. Fill in the blanks:

  a)      The genesis of the internet was decentralized network called ARPANET created by Department Of Defense.
  b)      The remote login protocol is telnet and file transfer protocol is FTP.
  c)      The main page of the website is called homepage.
  d)      The internet connection requires Computer with modem/router, Internet account and Web browser.
  e)      A dedicated server used to serve web pages is called  web server.
  f)       Some of the common web browsers are  Mozilla Firefox, Safari, Google Chrome, Opera and Internet Explorer.
  g)    Cost effective, Information exchange and Highly Personal are the advantage of email.
  h)      Pornography, Spamming and theft of personal information are misuses of internet.
  i)        IRC, E-commerce, E-mail and Video Conference are the common service provided by the internet.

5. Give appropriate technical terms of the following:

  a)      Sending mail by using computer. E-mail
  b)      The application software which is used to visit web pages. Web browser
  c)      The private owned Internet. Intranet
  d)      Commercial activities on the Internet. E-commerce
  e)      The local company sells the Internet service. ISP
  f)       The service which is used to transfer files from one computer to others. FTP
  g)      A web page, which is designed to search other web pages. Search engine
  h)      Protocol used to browse the internet. TCP/IP
  i)        The technology with deliver voice over the Internet. Skype
  j)        The learning process by using the Internet. E-learning
  k)      The total set of interlinked by hypertext documents residing on HTTP servers. WWW
  l)        A mechanism which is used to convert domain names into IP addresses. DNS

Chapter 3: Computer Malicious Software

 2. State whether the following statements are true or false:

  a)      A computer virus is usable program. False
  b)      Computer virus cannot hide itself, it can be found easily. False
  c)      Antivirus program is used to detect and remove computer malware. True
  d)      Scripting virus attaches with the documents. False
  e)      Computer virus consumes CPU, memory and storage spaces. True

3. Match the following:

Group A                                  Group B

a)      McAfee                             Computer Virus
b)      Trojan horse                      Boot Sector Virus
c)      Polyboot.B                         Malware
d)      Spam                                 Antivirus Program

Unauthorized email

                Answers
a)      McAfee
Antivirus Program
b)      Trojan horse
Malware
c)       Polyboot.B
Boot Sector Virus
d)      Spam

Unauthorized email

4. Fill in the blanks with appropriate words:

a)      Antivirus is used to remove computer malicious programs.

  b)      Macro virus infects the document files.
  c)      The boot sector virus resides in the boot sector of drive.
  d)      The examples of script virus are JS.Fortnight and Redlof.A
  e)      Kaspersky, NOD, Avast and McAfee are examples of antivirus program.

Chapter 4: Computer Security

2. State whether the following statements are true or false:

  a)      Physical security is the only security measures. False
  b)      Physical access to the system can also loose data. False
  c)      IP cameras are used for the surveillance and maintenance. True
  d)      Lighting cannot cause physical damage to physical system. False
  e)      Software protection can be made by using physical security. False
  f)       The UPS can be used to protect system. True
  g)      Antivirus program are used to protect from unauthorized people. False
  h)      Password protection can be implemented to the computer system only. False
  i)        System cannot be restored. False
  j)        System maintenance is used to clear viruses from the system. False
  k)      Fire protection is not necessary for the important servers. False

3. Write down the appropriate technical terms:

  a)      A device which provide electricity after power off. UPS
  b)      A secret word used to log in. Password
  c)      A program which protects from malware. Antivirus
  d)      Security mechanism implemented on the basis of hardware. Hardware security
  e)      Security implemented on software. Software security

Chapter 6: Introduction to multimedia

2. Fill in the blanks with suitable words:

  a)      Multiple media in one content is called multimedia.
  b)      Animation represents multiple picture in a sequence.
  c)      Games, Virtual Reality and DTH service  is an example of interactive multimedia.
  d)      Text, Audio, Video, Graphics and Animation  are the common components of multimedia.
  e)      An charts, pictures in presentation, bitmap image or animated GIF can be considered as graphics.
  f)       Hoarding board is an example to use multimedia in commercial field.
  g)      A simulated 3-D environment is called  virtual reality.
  h)      Adobe, MovieWorks and MediaBlender are the some of the common examples of multimedia software.

3. State whether the following statements are true or false:

  a)      Multimedia is just one media. False
  b)      Multimedia presentation is less effective than lecturing. False
  c)      All the computers are capable of handling multimedia. False
  d)      Computers with multimedia can only play movies. False
  e)      Animation and simulation are part of multimedia. True
  f)       A picture is a worth of thousand words. True
  g)      Multimedia is also used in animated movie. True
  h)      Virtual reality is a simulated process to represent real world scenario. True
  i)        Sound card is one of the components of multimedia computer. True

4. Name the appropriate technical term of the following:

  a)      The combination of more than one media. Multimedia
  b)      A computer equipped with multimedia features. Multimedia Computer
  c)      A 3-D simulated environment. Virtual Reality
  d)      An emerging term, multimedia used in education. Edutainment

5. Match the following

Group A                                        Group B
a)      Edutainment                            Components of multimedia
b)      Virtual Reality                         Multimedia software
c)      Graphics                                  Multimedia in education
d)      Adobe Photoshop                    Simulated software
Answers
a)      Edutainment
Multimedia in education
b)      Virtual Reality
Simulated software
c)       Graphics
Components of multimedia
d)      Adobe Photoshop
Multimedia software


Chapter 8: Database Management using MS-Access

1. Fill in the blanks with correct word(s).

  a.       Database  is an organized collection of related data in tabular form.
  b.      Flat file or file based system is an early attempt to computerize the manual system for data storage.
  c.       DBMS is a general program designed to manage a database.
  d.      Data is the raw facts to generate information.
  e.       Information is the processed value which we get after we get after processing by the computer.
  f.       SQL stands for Structured Query Language.
  g.       A primary key cannot contain the duplicate or null values.
  h.      Foreign key is the linking field between two values.
  i.        A text data type allows the field to contain up to 255 characters.
  j.        A domain is a set of permissible values that can be given to an attribute or field of an entity.
  
   2.State whether the following statements are true or false:
  a.       Database has been being used knowingly or unknowingly in our daily life. True
  b.         Flat file system is more advanced than database system to manage data in computer. False
  c.       The maximum field size of text field is 255 characters. True
  d.      MS Access 2007 is database management software. True
  e.       Once the data is entered in a table, it cannot be modified. False
  f.       Pictures and graphics cannot be stored in the table in MS Access 2007. False
  g.       Form is the source of table. False
  h.      The primary key field of a table allows the duplication of data. False
  i.        Data integrity is used to enter the data into the table in MS Access 2007. False
  j.        Report is used to enter the data into the table in MS-Access 2007. False


No comments:

Post a Comment