GUINESSES
Networking Technology
1. State whether the given statement are true or false.
a) Computer network or data network is a telecommunications network that allows computer to exchange data. True
b) A node is a network computer that utilizes the resources of other network computer including other clients. False
c) A network connector is defined as a device that facilitates the connection or the interconnection of computers and other device to a network. True
d) HTTP is an internet based standard for retrieval of email by user from an email server. False
e) Wide Area Network (WAN) is a geographically dispersed telecommunication network. True
2. Match the following.
a) Ring topology c) A group of computers that functions both as a client and server.
b) Simplex connection e) A group of computers and associated devices that share a common
Communications line or wireless link.
c) Peer-to peer network a) A network topology in which network nodes are connected in
continuous circle.
d) Fiber optic cable b) A connection in which the data flows in only one direction from the
transmitter to the receiver.
e) Local area network d) A network cable that contains stands of glass fibers inside an insulated
casing.
3. Choose the best answer.
a) Any network device that can connect to the network and can generate ,process or transfer network data.
i) Node ii) Client iii) Peer
Node
b) A network interface card is the card that physically makes the connection between the computer
and the network cable.
i) Network cables ii) Network connector iii) NIC
NIC
c) A centralized computing network is a type of network where all the users connect to a host computer that is the acting agent for all communication.
i) Peer-to peer ii) Client/server iii) None of the above
None of the above
d) A network of computer spread over a city or town located in the same geographical area.
i) LAN ii) MAN iii) WAN
MAN
e) A device that converts the discrete stream of digital ON-OFF electric pulses used by computer into
the continuously variable analog wave patterns used to transmit the human voice over many existing telephone lines.
i) Modem ii) Bridge iii) Gateway
Modem
4. Give the full forms of the following abbreviations.
a) LAN b)WAN c)PSTN d)STP e)NIC
5. Give the appropriate technical terms of the following.
a) A computer circuit board or card designed to allow computer to communicate over a computer network. NIC
b) A set of rules or procedures for transmitting data between electronic devices, such as computer. Protocol
c) A group of computer that functions both as client and server. Peer-to-peer network
d) A self-contained network that spans a small area such as single building, floor, or a room. LAN
e) A device, software, or a system that converts data between dissimilar networks with different protocols. Gateway
7. Fill in the blanks.
a) A Computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource- sharing among a wide range of users.
b) A Peer is a self sufficient computer that acts both as a server and a client to other similar computers on the network.
c) A Peer-to-peer _network is a group of computers that function both as client and server.
Internet and its Services
1.Fill in the blanks.
a) Internet is an interconnection of several computers of different types belonging to various
network all over the world.
The Internet began life in 1969 when the United States Department of Defence started a network called ARPANet . Broadband can be simply defined as a fast connection to the internet that is always on.
b) Wifi refers to wireless networking technology that allows computer and other devices to communicate over a wireless signal.
c) Wimax is a standard for high speed broadband internet access over a wireless connection.
d) The World Wide Web was initially conceived at CERN ,the famous particle physics laboratory in Geneva, Switzerland.
e) The WWW is the leading information-exchange service of the Internet.
f) E-mail is defined as the exchange of message and computer file between computers over a computer network.
g) On the Internet, a search engine is a coordinated set of programs that receives your search request, compares it to the entries in the index and returns result to you.
h) Webchat on the Internet has become a popular way for people to connect online in a group(a chat room) to share similar interests.
i) Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.
j) Video conference is a live video connection between people in separate locations for the purpose of communication or interaction.
k) E-commerce is the buying or selling of goods and services on the Internet , especially the World Wide Web.
l) Social network is a web site on the Internet that brings people together in a central location to talk, share ideas, share interests, make new friends, etc.
2. State whether the given statement is true or false.
a) Internet is a collection of millions of computers of different types belonging to various network over the globe .True
b) TCP is responsible for ensuring that the packets are sent to the right destination. False
c) Wi-Fi refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal. True
d) Web chat is a live video connection between people in separate locations for the purpose of communication or interaction. False
e) Social network is a web site on the Internet that brings people together in a central location to talk, share ideas, share interests, make new friends etc. True
3. Match the following.
Web chat a) It is a form of real time online communication between you and one of our
service advisors based on typed text.
E-Banking b) A system allowing individuals to perform banking activities at home, via the internet.
Web servers c) The computers that deliver (serves up) Web pages. Every Web server has
An IP address and possibly a domain name.
Web page d) Web document that is suitable for the World Wide Web and the web
browser.
URL e) An address that identifies the location of a Web page on the Internet.
4. Select the best answer.
a) A collection of millions of different types belonging to various network all over the globe.
a) Internet ii) Intranet iii) Extranet
Internet
b) Web sites that allow the users to search information based on keywords or a combination of keywords.
i)World Wide Web ii) Electronic mail iii) Search engines
Search engines
c) A web site in the internet that brings people together in central location to talk, share ideas, share
interests, make new friends.
i)USENET ii) Social network iii) Web chat
Social network
d)An online interactive communication mechanism that lets people to make a real time decision with one
or more people through the Internet.
i)Web chat ii)Newsgroup iii)Videoconferencing
Web chat
e)The process of transferring a copy of file from a remote computer to the requesting computer.
i)Downloading ii)Uploading iii)FTP
Downloading
5. Give full forms for the following abbreviations.
a. ARPAnet b.FTP c.NSFNET d.TCP/IP e.TelNet f.WWW
6. Give the appropriate technical terms for the following.
a. A collection of millions of computers of different types belonging to various network all over the globe. Internet
b. The wireless technology that allows computer and other devices communicate over a wireless signal. Wifi
c. The exchange of messages and computer files between computers over a computer network. E-mail
d. A coordinated set of programs that receives your search request, compares it to the entries in the index, and returns result to you. Search engine
e. The use of technology to enable people to learn anytime and anywhere. E-learning
Computer Security System
1. Fill in the blanks.
a. Computer security Focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change or destruction.
Computer system maintenance Is the practice of keeping computers in a good state of repair.
b. The temperature in the computer system should be maintained between 21 to 24 .
c. A computer requires a constant source of 110 volt AC power.
2. State whether the following statement are true or false.
a. Computer and data have become the life line of any organization. True
b. Hardware security protects the machine and peripheral hardware from theft and from electronic intrusion and damage. True
c. Regular maintenance is important for ensuring that your computers operate at an optimal level. True
d. A computer requires a constant source of 110-volt AC power. True
e. Surge suppressor is any electrical or electronic device that maintains the voltage of a power source within the acceptable limits. False
3. Match the following.
Computer security a) The protection of a computer system from accidental or intentional
harm.
UPS b) A device that allows your computer to keep running for at least a
short time when the primary source is lost.
Voltage regulator c) A device or circuit that maintains a load voltage nearly constant
over a range of variations of input voltage and load current.
Surge protector d) A device that shields computer and other electronic devices from
surges in electric power or transient voltage that flow from power
supply.
Defragmentation e) The process of locating the noncontiguous fragments of data,
rearranging the fragments and restoring them into fewer or into
the whole file.
4. Select the best answer.
1. Protects the machine and peripheral hardware from theft, electronic intrusion and damage.
i)Information security ii)Hardware security iii)Software security
Hardware security
b. The temperature in the computer system should be maintained between to .
i)21oC and 24oC ii)22oC and 25oC iii)23oC and 26oC
21oC and 24oC
c. A device that protects your PC against power surges and spikes.
i)UPS ii) Voltage regulator iii)Surge suppressor
Surge suppressor
d. The type of security barriers and other cyber-tools that protect programs files, and the information
flow to and from a computer.
i)Computer security ii)Hardware security iii)Software security
Software security
e. The process of loading the noncontiguous fragments of data, rearranging the fragments and restoring
them into fewer fragments or into the whole life.
i)Fragmentation ii)Defragmentation iii)Scan disk
Defragmentation
5. Give the appropriate technical terms of the following.
a. The process of ensuring confidentiality, integrity, and availability of computers, their programs, hardware devices and data. Computer security
b. A device which provides continuous power to the computer equipment and protects them from power surges and voltage fluctuations. Surge suppressor
c. An electrical regulator designed to automatically maintained a constant voltage level. Voltage regulator device
d. A program designed to infect and potentiality damage files on a computer that receives it. Computer virus
e. The tool that is used to maintained performance and error-free file management. Scan disk
Computer Viruses
1. Fill in the blanks.
a. Computer virus Is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself.
b. Boot sector Viruses are designed to infect the boot sector of a disk.
c. File infecting virus Infects the executable files having an extension .exe.
2. State whether the given statement are true or false.
a. Computer virus is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself. True
b. A files infecting virus activated only when you turn or a restart your computer. False
c. A macro virus is a computer virus that replace a macro, which is what enables a programs to work and instigates a designated group of action and commands. True
d. An examples of parasitic virus is Jerusalem. True
e. Anti-virus software is a programs or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and more. True
3. Match the following
Boot virus e) A computer virus that infect files and boot records.
Files virus a) A computer virus designed to infect the boot sector of the disk.
Polymorphic virus b) A computer virus that infect program written in scripting language.
Script virus d) A computer virus that infect executable program files having an
extension .exe, .com or .dll.
Stealth virus c) A computer virus that can change its appearance with every infection.
4. Select the best answer.
a. Virus are designed to infect the boot sector of the disk.
i.Boot sector virus ii.file infecting virus iii. Polymorphic virus
Boot sector virus
b. The type of virus that is designed to infect executable program files having extension .exe, .com, or .dill.
i.boot sector virus ii.file virus iii.script virus
file virus
c. A type of virus that replaces a macro , which is what enables a program to work and instigates a designated group of actions and commands.
i)Macro virus ii)File infecting virus iii)Polymorphic virus
Macro virus
d. A virus that changes its appearance in every infection is called
i)Polymorphic virus ii)Macro virus iii)Script virus
Polymorphic virus
e. A program or set of programs designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware and more.
i)Shareware ii)Freeware ii)Antivirus
Antivirus
5. Give the appropriate technical term for each of the following statements.
a. A program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copy of itself. Computer virus
b. The first sector of a disk which directs the computer to the location of the operating system. It contains instruction to boot the computer. It either replaces or modifies the instruction. Boot sector virus
c. A computer virus that replaces a macro, which is what enables a program to work and instigates a designated group of actions and commands. Macro virus
d. A complicated virus that affects data types and functions. It is a self encrypted virus designed to avoid detection by a scanner. Polymorphic virus
e. A program or set of program that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and many more. Antivirus
Cyber Law and Ethical Issues
1. Fill in the blanks.
a. Cyber crime Is a criminal activity done using computers and the Internet.
b. The activity of breaking into a computer system to gain an unauthorized access is known as Hacking .
c. Cyber law of Nepal was enacted in Nepal in 2061 B.S.
d. The use of communication technology, mainly the Internet to torture other individuals is known as cyber-stalking.
e. Computer ethics Is a set of moral principles that regulate the use of computers.
2. State whether the following statement is true or false. Rewrite the false statement to make it true statement.
a. Information Technology (IT) provides a new shape to build a dynamic world. True
b. Cyberlaundering is the transferring illegal items through the internet(such as encryption technology) that is banned in some locations. False
c. The digital signature is simply a small block of data that is attached to documents you sign. True
d. Cybercrime is a criminal activity involving the information technology infrastructure. True
e. Cyber law of Nepal commonly known as the Electronic Transaction and Digital Signature Act-Ordinance was enacted in Nepal in 2061 B.S. True
3. Give the appropriate technical terms for the following.
a. A generic term which refers to all the illegal and regulatory aspects of internet and the World Wide Web. Cyber law
b. Transferring illegal item through the internet (such as encryption technology)that is banned in some locations. Cyber contraband
c. The activity of breaking into a computer system to gain an unauthorized access. Hacking
d. The protection of creations of the mind, which have both a moral and a commercial value. Intellectual property
e. The unauthorized duplication and use of computer software. Software piracy
4.Select the best answer.
a. IPR expands to
i)Individual Property Rights ii)Individual Performance Rights
iii)Intellectual Property Rights iv)Intellectual Performance Rights
Intellectual Property Rights
b.Cyber law of Nepal commonly known as Electronic Transaction and Digital Signature Act-Ordinance was enacted in Nepal in
i)2061 B.S ii)2062 B.S
iii)2063 B.S iv)2064 B.S
2061 B.S
c.Electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
i)Cyberstalking ii)Cyberlaundering
iii)Cybertheft iv)Cyberterroism
Cyberlaundering
d.The act of attempting to acquire sensitive information like usernames, passwords, and credit card details by disguising as a trustworth source.
i)Hacking ii)Phishing
iii)Computer viruses iv)Cyberstalking
Phishing
5.Match the following.
Hacking a) The activity of breaking into a computer system to gain an unauthorized access.
Phishing b) The act of attempting to acquire sensitive information like usernames,
passwords, and credit card details disguising as a trustworthy source.
Cyberstalking c) The use of communication technology, mainly the Internet, to torture other
Individual.
Computer viruses d) The computer program that can replicate themselves and harm the computer
System on a network within the knowledge of the system users.
Identity Theft e) This is one of the most serious frauds as it involved stealing money and
obtaining other benefits through the use of false identity.
Multimedia and its Applications
1) Fill in the blanks.
i. Multimedia is a computer-delivered electronic system that allows the user to control, combine and manipulate different types of media such as sound, video, computer graphics and animation.
ii. Animation is the process of displaying still images in a rapid sequence to create the illusion of movement.
iii. Virtual reality can be defined as an upcoming technology that make user feel in a virtual environment (VE) by using computer hardware and software.
2) State whether the following statement is true or false.
i. Multimedia is a computer- delivered electronic system that allows the user to control, combine and manipulate different types of media, such as text, sound, video, computer graphics and animation. True
ii. Animation deals with synthesizing, recording and playback of audio or sound with the aid of computer. False
iii. Multimedia computer system require faster CPU, high capacity hard disk, larger main memory, super VGA monitors, speakers, keyboard and pointing device. True
iv. Multimedia based education greatly enhances traditional education by providing the student with options of individual attention at his own place. True
v. Virtual reality is an artificial reality that projects the user into a 3D space generated by a computer. True
3) Match the following.
Animation a) The process of giving the illusion of movement of drawings,
models, or inanimate objects.
Edutainment d) The technology of electronically capturing, recording,
processing, storing, transmitting and reconstructing
sequence of still images representing scenes in motion.
Virtual reality b) A form of education which is designed to be entertaining
In order to keep people interested and engaged.
Video c) An artificial reality that projects the user into a 3D space Generated by the computer.
4) Select the best answer.
i. A computer-delivered electronic system that allows the user to control, combine, and manipulate different types of media such as text, sound, video, graphics, and animation.
i)Hypermedia ii)Multimedia iii)All of above iv)None of above
Multimedia
ii. The process of displaying still images in a rapid sequence to create the illusion of movement.
i)Text ii)Graphics iii)Video iv)Animation
Animation
iii. In order to work with multimedia a personal computer typically requires the following hardware
components.
i)Faster CPU ii)Large main memory iii)All of above iv)None of above
All of above
iv. An upcoming technology that makes users feel in Virtual Environment(VE) by using computer
hardware and software.
i)Virtual space ii)Virtual computer iii)Virtual reality iv)None of above
Virtual reality
5. Give the appropriate technical terms for each of the following statements.
1) A computer- delivered system that allows the user to control, combine, and manipulate different types of media such as text, sound, video, graphics and animation. Multimedia
2) The generation, representation, manipulation and display of pictures with the aid of computer. Graphics
3) The process of displaying still images in rapid sequence to create the illusion of movement. Animation
4) An upcoming technology that makes user feel in a Virtual Environment(VE) by using computer hardware and software. Virtual reality
Database Management System
1) State whether the following statement is true or false.
a) Database Management System (DBMS) is a complex set of software programs that controls the organization storage, management, and retrieval of data in database. True
b) A relational database is a collection of related data. RDBMS are among the most popular type of DBMS worldwide. True
c) Queries are used to display records onscreen to make them easier to enter new records and to make change in an existing records. False
d) An input mask is a field property that determines what data can be entered in the field, how the data looks, and the format in which it is stored. True
e) Referential integrity is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted. True
2) Match the following.
Queries b) The primary building blocks of the Access database. Tables are
collections of record with similar data.
Tables a) Object that allows you to select specific data from one or more tables.
Reports e) Object used to display records onscreen to make them easier to enter
new records and to make changes to existing records.
Pages c) Object used to present processed data in an organized format
specifically designed for printing.
Forms d) Web pages that allow you to view and work with the data that ia stored
in an access database on the internet.
3) Select the best answer.
a) An is an organized collection of related information.
i)object ii)database iii)property iv)document
database
b) The maximum text field size in Access is
i)50 ii)256 iii)10 iv)255
255
c) Uniquely identifies any field.
i)Index ii)Memo field iii)Primary key iv)Query
Primary key
d) The object of Access that stores the data the data is known as
i) Query ii)Table iii)Form iv)Report
Table
4) Give the appropriate technical terms for the following.
i.A complex set of software programs that controls the organization, storage, management and retrieval of data in a database. DBMS
ii.The primary building blocks of the Access database. Table
iii.A field property that determines which data can be entered in the field. Input mask
iv.A set of rules used by Access to ensure that the relationship between tables are valid and that the related data is not accidentally changed or deleted. Referential integrity
v.A database object that creates a datasheet of selected fields and records from one or more tables. Query
No comments:
Post a Comment