Saturday, October 22, 2016

Solved Objectives: Guinness Publication

GUINESSES
Networking Technology
1. State whether the given statement are true or false.
a)      Computer network or data network is a telecommunications network that allows computer to exchange data. True
b)      A node is a network computer that utilizes the resources of other network computer including other clients. False
c)      A network connector is defined as a device that facilitates the connection or the interconnection of computers and other device to a network. True
d)      HTTP is an internet based standard for retrieval of email by user from an email server. False
e)      Wide Area Network (WAN) is a geographically dispersed telecommunication network. True
2.      Match the following.
a)      Ring topology                    c) A group of computers that functions both as a client and server.
b)      Simplex connection                   e)  A group of computers and associated devices that share a common
Communications line or wireless link.    
c)      Peer-to peer  network         a) A network topology in which network nodes are connected in
continuous circle.      
d)      Fiber optic cable                b) A connection in which the data flows in only one direction from the
transmitter to the receiver.         
e)      Local area network            d) A network cable that contains stands of glass fibers inside an insulated
casing.
3. Choose the  best answer.
a)      Any network device that can connect to the network and can generate ,process or transfer network data.
i) Node                                    ii) Client                                   iii) Peer
Node
b) A network interface card is the card that physically makes the connection between the computer
        and the network cable.
i) Network cables                     ii) Network connector              iii) NIC
NIC
c) A centralized computing network is a type of network where  all the users connect to a host computer that is the acting agent for all communication.
                   i) Peer-to peer                   ii) Client/server                         iii) None of the above
None of the above
d) A network of computer spread over a city or town located in the same geographical area.
               i) LAN                                  ii)      MAN                              iii) WAN
MAN    
e) A device that converts the discrete stream of digital ON-OFF electric pulses used by computer into
the continuously variable analog wave patterns used to transmit the human voice over many existing telephone lines.
               i) Modem                              ii) Bridge                                  iii) Gateway
Modem 
4. Give the full forms of the following abbreviations.
a) LAN                  b)WAN                      c)PSTN          d)STP        e)NIC
5. Give the appropriate technical terms of the following.
a)      A computer circuit board or card designed to allow computer to communicate over a computer network. NIC
b)      A set of rules or procedures for transmitting data between electronic devices, such as computer. Protocol
c)      A group of computer that functions both as client and server. Peer-to-peer network
d)      A self-contained network that spans a small area such as single building, floor, or a room. LAN
e)      A device, software, or a system that converts data between dissimilar networks with different protocols. Gateway
7. Fill in the blanks.
a)      A Computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource- sharing among a wide range of users.
b)      A Peer is a self sufficient computer that acts both as a server and a client to other similar computers on the network.
c)      A Peer-to-peer _network is a group of computers that function both as client and server.
Internet and its Services
1.Fill in the blanks.
      a)   Internet  is an interconnection of several computers of different types belonging to various      
          network all over the world.
  The Internet began life in 1969 when the United States Department of Defence started a network called  ARPANet . Broadband  can be simply defined as a fast connection to the internet that is always on.
b)       Wifi  refers to wireless networking technology that allows computer and other devices to communicate over a wireless signal.
c)        Wimax   is a standard for high speed broadband internet access over a wireless connection.
d)      The World Wide Web was initially conceived at     CERN ,the famous particle physics laboratory in Geneva, Switzerland.
e)      The WWW  is the leading information-exchange service of the Internet.
f)          E-mail  is defined as the exchange of message and computer file between computers over a computer network.
g)      On the Internet, a  search engine is a coordinated set of programs that receives your search request, compares it to the entries in the index and returns result to you.
h)           Webchat on the Internet has become a popular way for people to connect online in a group(a chat room) to share similar interests.
i)           Usenet  is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.
j)         Video conference is a live video connection between people in separate locations for the purpose of communication or interaction.
k)          E-commerce  is the buying or selling of goods and services on the Internet , especially the World Wide Web.
l)           Social network  is a web site on the Internet that brings people together in a central location to talk, share ideas, share interests, make new friends, etc.
2. State whether the given statement is true or false.
a)      Internet is a collection of millions of computers of different types belonging to various network  over the globe .True
b)      TCP is responsible for ensuring that the packets are sent to the right destination. False
c)      Wi-Fi refers to wireless networking technology that allows computers and other devices to communicate over a wireless signal. True
d)      Web chat is a live video connection between people in separate locations for the purpose of communication or interaction. False
e)      Social network is a web site on the Internet that brings people together in a central location to talk, share ideas, share interests, make new friends etc. True
3.      Match the following.
Web chat                          a) It is a form of real time online communication between you and one of our     
                                          service advisors based on typed text.
E-Banking                       b) A system allowing individuals to perform banking activities at home, via the                                                                                     internet.
          Web servers                        c) The computers that deliver (serves up) Web pages. Every Web server has  
                                                An IP address and possibly a domain name.
          Web page                           d) Web document that is suitable for the World Wide Web and the web
                                              browser.
     URL                                   e) An address that identifies the location of a Web page on the Internet.
4.      Select the best answer.
a)      A collection of millions of different types belonging to various network all over the globe.
a)      Internet                  ii) Intranet                  iii) Extranet
Internet    
b)      Web sites that allow the users to search information based on keywords or a combination of keywords.
           i)World Wide Web          ii) Electronic mail                iii) Search engines
Search engines
        c)   A web site in the internet that brings people together in central location to talk, share ideas, share
              interests, make new friends.
         i)USENET                   ii) Social network                        iii) Web chat
Social network                       
    d)An online interactive communication mechanism that lets people to make a real time decision with one
       or more people through the Internet.
    i)Web chat                       ii)Newsgroup                     iii)Videoconferencing
Web chat                      
  e)The process of transferring a copy of file from a remote computer to the requesting computer.
   i)Downloading                 ii)Uploading                    iii)FTP
Downloading                
5. Give full forms for the following abbreviations.
a. ARPAnet          b.FTP        c.NSFNET             d.TCP/IP           e.TelNet           f.WWW
6. Give the appropriate technical terms for the following.
a.       A collection of millions of computers of different types belonging to various network all over the globe. Internet
b.      The wireless technology that allows computer and other devices communicate over a wireless signal. Wifi
c.       The exchange of messages and computer files between computers over a computer network. E-mail
d.      A coordinated set of programs that receives your search request, compares it to the entries in the index, and returns result to you. Search engine
e.       The use of technology to enable people to learn anytime and anywhere. E-learning
Computer Security System
1.      Fill in the blanks.
a.          Computer security Focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change or destruction.
            Computer system maintenance Is the practice of keeping computers in a good state of repair.
b.      The temperature in the computer system should be maintained between        21                 to         24           .
c.       A computer requires a constant source of    110 volt AC power.
2.      State whether the following statement are true or false.
a.       Computer and data have become the life line of any organization. True
b.      Hardware security protects the machine and peripheral hardware from theft and from electronic intrusion and damage. True
c.       Regular maintenance is important for ensuring that your computers operate at an optimal level. True
d.      A computer requires a constant source of 110-volt AC power. True
e.       Surge suppressor is any electrical or electronic device that maintains the voltage of a power source within the acceptable limits. False
3.      Match the following.
Computer security                         a) The protection of a computer system from accidental or intentional
                                                       harm.
UPS                                                b) A device that allows your computer to keep running for at least a
                                                        short time when the primary source is lost.
Voltage regulator                           c) A device or circuit that maintains a load voltage nearly constant
                                                        over a range of variations of input voltage and load current.
Surge protector                             d)  A device that shields computer and other electronic devices from 
                                                        surges in electric power or transient voltage that flow from power
                                                        supply.
           Defragmentation                            e) The process of locating the noncontiguous fragments of data,
                                                                    rearranging the fragments and restoring them into fewer or into
                                                                    the whole file.
4.      Select the best answer.
1.                                 Protects the machine and peripheral hardware from theft, electronic intrusion and damage.
i)Information security            ii)Hardware security                    iii)Software security
Hardware security                   
         b. The temperature in the computer system should be maintained between                   to           .
             i)21oC and 24oC                  ii)22oC and 25oC             iii)23oC and 26oC
21oC and 24oC                 
        c. A device that protects your PC against power surges and spikes.
           i)UPS                   ii) Voltage regulator                       iii)Surge suppressor
Surge suppressor
        d. The type of security barriers and other cyber-tools that protect programs files, and the information 
            flow to and from a computer.
         i)Computer security                  ii)Hardware security              iii)Software security
Software security
       e. The process of loading the noncontiguous fragments of data, rearranging   the fragments and restoring 
them into fewer fragments or into the whole life.
i)Fragmentation              ii)Defragmentation              iii)Scan disk
Defragmentation 
5. Give the appropriate technical terms of the following.
a.       The process of ensuring confidentiality, integrity, and availability of computers, their programs, hardware devices and data. Computer security
b.      A device which provides continuous power to the computer equipment and protects them from power surges and voltage fluctuations. Surge suppressor
c.       An electrical regulator designed to automatically maintained a constant voltage level. Voltage regulator device
d.      A program designed to   infect and potentiality damage files on a computer that receives it. Computer virus
e.       The tool that is used to maintained performance and error-free file management. Scan disk 
Computer Viruses
1.      Fill in the blanks.
a.          Computer virus  Is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself.
b.           Boot sector Viruses are designed to infect the boot sector of a disk.
c.       File infecting virus  Infects the executable files having an extension .exe.
2.      State whether the given statement are true or false.
a.       Computer virus is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself. True
b.      A files infecting virus activated only when you turn or a restart your computer. False
c.       A macro virus is a computer virus that replace a macro, which is what enables a programs to work and instigates a designated group of action and commands. True
d.      An examples of parasitic virus is Jerusalem. True
e.       Anti-virus software is a programs or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and more. True
3.      Match the  following
Boot virus                            e)    A computer virus that infect files and boot records.
Files virus                           a)    A computer virus designed to infect the boot sector of the disk.
Polymorphic virus                b) A computer virus that infect program written in scripting language.
Script virus                            d) A computer virus that infect executable program files having an      
                                                 extension .exe, .com or .dll.
Stealth virus                    c)   A computer virus that can change its appearance with every infection.
4.      Select the best answer.
a.                             Virus are designed to infect the boot sector of the disk.
i.Boot sector virus                    ii.file infecting virus                            iii. Polymorphic virus
Boot sector virus                   
        b. The type of virus that is designed to infect executable program files having extension .exe, .com, or .dill.
 i.boot sector virus                       ii.file virus                    iii.script virus
file virus                   
c. A type of virus that replaces a macro , which is what enables a program to work and instigates a designated group of actions and commands.
i)Macro virus                         ii)File infecting virus                       iii)Polymorphic virus
Macro virus                        
d. A virus that changes its appearance in every infection is called
i)Polymorphic virus            ii)Macro virus                      iii)Script virus
Polymorphic virus           
e. A program or set of programs designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware and more.
i)Shareware                     ii)Freeware                          ii)Antivirus
Antivirus
5. Give the appropriate technical term for each of the following statements.
a.       A program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copy of itself. Computer virus
b.      The first sector of a disk which directs the computer to the location of the operating system. It contains instruction to boot the computer. It either replaces or modifies the instruction. Boot sector virus
c.       A computer virus that replaces a macro, which is what enables a program to work and instigates a designated group of actions and commands. Macro virus
d.      A complicated virus that affects data types and functions. It is a self encrypted virus designed to avoid detection by a scanner. Polymorphic virus
e.       A program or set of program that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and many more. Antivirus
Cyber Law and Ethical Issues
1.      Fill in the blanks.
a.       Cyber crime Is a criminal activity done using computers and the Internet.
b.               The activity of breaking into a computer system to gain an unauthorized access is known as       Hacking                     .
c.                Cyber law of Nepal was enacted in Nepal in 2061 B.S.
d.               The use of communication technology, mainly the Internet to torture other individuals is known as  cyber-stalking.                            
e.       Computer ethics Is a set of moral principles that regulate the use of computers.
2.      State whether the following statement is true or false. Rewrite the false statement to make it true statement.
a.       Information Technology (IT) provides a new shape to build a dynamic world. True
b.      Cyberlaundering is the transferring illegal items through the internet(such as encryption technology) that is banned in some locations. False
c.       The digital signature is simply a small block of data that is attached to documents you sign. True
d.      Cybercrime is a criminal activity involving the information technology infrastructure.  True
e.       Cyber law of Nepal commonly known as the Electronic Transaction and Digital Signature Act-Ordinance was enacted in Nepal in 2061 B.S. True

3.      Give the appropriate technical terms for the following.
a.       A generic term which refers to all the illegal and regulatory aspects of internet and the World Wide Web. Cyber law
b.      Transferring illegal item through the internet (such as encryption technology)that is banned in some locations. Cyber contraband
c.       The activity of breaking into a computer system to gain an unauthorized access. Hacking
d.      The protection of creations of the mind, which have both a moral and a commercial value. Intellectual property
e.       The unauthorized duplication and use of computer software. Software piracy
4.Select the best answer.
a. IPR expands to
i)Individual Property Rights                            ii)Individual Performance Rights
iii)Intellectual Property Rights                         iv)Intellectual Performance Rights
Intellectual Property Rights                        
b.Cyber law of Nepal commonly known as Electronic Transaction and Digital Signature Act-Ordinance was enacted in Nepal in
i)2061 B.S                                                    ii)2062 B.S
iii)2063 B.S                                                  iv)2064 B.S
2061 B.S                                                   
c.Electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
i)Cyberstalking                                             ii)Cyberlaundering
iii)Cybertheft                                                iv)Cyberterroism
Cyberlaundering
d.The  act of attempting to acquire sensitive information like usernames, passwords, and credit card details by disguising as a trustworth source.
i)Hacking                                                        ii)Phishing
 iii)Computer viruses                                      iv)Cyberstalking
Phishing
5.Match the following.
Hacking                                  a) The activity of breaking into a computer system to gain an unauthorized access.
Phishing                                b)  The act of attempting to acquire sensitive information like usernames,
                                            passwords, and credit card details disguising as a trustworthy source.
Cyberstalking                      c)  The use of communication technology, mainly the Internet, to torture other
                                              Individual.
Computer viruses               d)    The computer program that can replicate themselves and harm the computer
                                               System on a network within the knowledge of the system users.
Identity Theft                        e) This is one of the most serious frauds as it involved stealing money and
                                              obtaining other benefits through the use of false identity.
Multimedia and its Applications
1)      Fill in the blanks.
        i.             Multimedia is a computer-delivered electronic system that allows the user to control, combine and manipulate different types of media such as sound, video, computer graphics and animation.
      ii.             Animation  is the process of displaying still images in a rapid sequence to create the illusion of movement.
    iii.            Virtual reality can be defined as an upcoming technology that make user feel in a virtual environment (VE) by using computer hardware and software.
2)      State whether the following statement is true or false.
     i.   Multimedia is a computer- delivered electronic system that allows the user to control, combine and manipulate different types of media, such as text, sound, video, computer graphics and animation. True
   ii.   Animation deals with synthesizing, recording and playback of audio or sound with the aid of computer. False
 iii.   Multimedia computer system require faster CPU, high capacity hard disk, larger main memory, super VGA monitors, speakers, keyboard and pointing device. True
 iv.   Multimedia based education greatly enhances traditional education  by providing the student with options of individual attention at his own place. True
   v.   Virtual reality is an artificial reality that projects the user into a 3D space generated by a computer. True
3)   Match the following.
Animation                                                         a) The process of giving the illusion of movement of drawings, 
                                                                           models, or inanimate objects.
Edutainment                                                        d)  The technology of electronically capturing, recording,      
                                                                              processing, storing, transmitting and reconstructing
                                                                              sequence of still images representing scenes in motion.
Virtual reality                                                       b)   A form of education which is designed to be entertaining
                                                                                In order to keep people interested and engaged.
Video                                    c)  An artificial reality that projects the user into a 3D space Generated by the computer.
4)      Select the best answer.
           i.      A computer-delivered electronic system that allows the user to control, combine, and manipulate different types of media such as text, sound, video, graphics, and animation.
i)Hypermedia                           ii)Multimedia                        iii)All of above           iv)None of above
Multimedia    
   ii. The process of displaying still images in a rapid sequence to create the illusion of movement.
     i)Text                                ii)Graphics                      iii)Video                    iv)Animation
Animation
 iii. In order to work with multimedia a personal computer typically requires the following hardware
     components.
    i)Faster CPU                   ii)Large main memory              iii)All of above          iv)None of above
All of above         
iv. An upcoming technology that makes users feel in Virtual Environment(VE) by using computer
    hardware and software.
  i)Virtual space                      ii)Virtual computer           iii)Virtual reality          iv)None of above
Virtual reality         
5. Give the appropriate technical terms for each of the following statements.
1)      A computer- delivered system that allows the user to control, combine, and manipulate different types of media such as text, sound, video, graphics and animation. Multimedia
2)      The generation, representation, manipulation and display of pictures with the aid of computer. Graphics
3)      The process of displaying still images in rapid sequence to create the illusion of movement. Animation
4)      An upcoming technology that makes user feel in a Virtual Environment(VE) by using computer hardware and software. Virtual reality
Database Management System
1)      State whether the following statement is true or false.
a)      Database Management System (DBMS) is a complex set of software programs that controls the organization storage, management, and retrieval of data in database. True
b)      A relational database is a collection of related data. RDBMS are among the most popular type of DBMS worldwide. True
c)      Queries are used to display records onscreen to make them easier to enter new records and to make change in an existing records. False
d)      An input mask is a field property that determines what data can be entered in the field, how the data looks, and the format in which it is stored. True
e)      Referential integrity is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.  True
2)      Match the following.
Queries                                     b) The primary building blocks of the Access database. Tables are
collections of record with similar data.
Tables                                           a) Object that allows you to select specific data from one or more tables.
Reports                                          e)  Object used to display records onscreen to make them easier to enter     
                                                            new records and to make changes to existing records.
     Pages                                              c) Object used to present processed data in an organized format
                                                            specifically designed for printing.
    Forms                                              d) Web pages that allow you to view and work with the data that ia stored
                                                              in an access database on the internet.
3)      Select the best answer.
a)      An                                              is an organized collection of related information.
       i)object                          ii)database           iii)property                  iv)document
database 
     b)  The maximum text field size in Access is 
       i)50                         ii)256                             iii)10                     iv)255
255
    c)                           Uniquely identifies any field.
       i)Index                   ii)Memo field                 iii)Primary key                 iv)Query
Primary key                
    d) The object of Access that stores the data the data is known as
     i) Query                  ii)Table                      iii)Form                              iv)Report
Table   
   4) Give the appropriate technical terms for the following.
            i.A complex set of software programs that controls the organization, storage, management and retrieval of data in a database. DBMS
         ii.The primary building blocks of the Access database. Table
       iii.A field property that determines which data can be entered in the field. Input mask
       iv.A set of rules used by Access to ensure that the relationship between tables are valid and that the related data is not accidentally changed or deleted. Referential integrity
         v.A database object that creates a datasheet of selected fields and records from one or more tables. Query


No comments:

Post a Comment