Saturday, October 22, 2016

Solved Objectives: Innovative Publication


Innovative Computer

Chapter 1 (Networking and Telecommunication)
1. Write the technical terms for the following.
a.       A group of the interconnected computers. Computer Network
b.      A path through data is transmitted from one computer to another. Transmission medium
c.       The amount of data transmitted per second through a communication channel. Bandwidth
d.      A network of computers formed by using cables. Wired network
e.       A network of computers formed by using unguided media. Wireless network
f.       A transmission medium through which data are transmitted in the form of light. Fiber optic cable
g.       A computer on the network that provided resources to other computers on the network. Server
h.      A computer on the network that uses resources of the network. Workstation
i.        An operating system used in a server computer. Network Operating System
j.        A card through which a computer is connected on a network. Network Interface Card
k.      A network device that retransmits signals to all nodes on the network. Hub
l.        A network device that retransmits signals to a destination node on the network. Switch
m.    A network device that connects the segments of the same or different network having same protocol. Bridge
n.      A network device that can determine the best path for forwarding the data packets. Router
o.      A network device that joins networks having different protocols. Gateway
p.      A device that converts digital signals into analog signals and vice versa. MODEM
q.      The conversion of digital signals into analog signals. Modulation
r.        The conversion of analog signals into digital signals. Demodulation
s.       A network of computers in a room, building or campus. LAN
t.        The network model where there is at least one server. Client- server network
u.      The network model where each node has equal right. Peer-to-peer network
v.      The cabling pattern of computers where each computer is connected to a common cable in the linear format. BUS Topology
w.     The cabling pattern of computers where all nodes are connected in a closed loop.  Ring topology
x.      The cabling pattern of computers where each node is individually connected to centrally located device. Star  topology
y.      A set of rules by which computers on the network communicate with each other.Protocols
2. State whether the following statements are true or false.
a.       In the simplex, the transmission of data can take place in both directions. False
b.      A full duplex device can transmit data in both directions at a time. True
c.       In the wired network, computers are connected with each other through wires. True
d.      Data are transmitted in the form of light in the fiber optic cable. True
e.       Microwave signals travel in straight line and cannot pass through obstacles like buildings, hills, etc. True
f.       A hub is also called multiport repeater. True
g.       Multiple bridges can be used to form a large network by connecting several small networks. True
h.      A repeater is a network device that regenerates electric signals. False
i.        In the  star topology computers must be arranged in the form of star. False
j.        A NIC converts analog signal  to digital and vice versa. False
3. Choose the correct answer.
a.       Which one of the device is simplex?
i. Television                 ii. Telephone                iii. Computer                iv. Walkie-Talkie
Television

b.      The bandwidth of digital signal is measured in­_
i. Hertz                         ii. Cycle per second     iii. Bits per second       iv. None of the above
Bits Per Second

c.       Which is not the guided  medium?
i. UTP                          ii. STP                          iii. Microwave              iv. Fiber optic cable
Microwave
d.      Which is the connector of UTP cable?
i. BNC                         ii. T-Connector            iii. ST connector          iv. RJ-45 connector
RJ-45 connector

e.       Which is the network operating system used in a server computer?
i. Windows XP ii. Windows Vista        iii. Windows NT server    iv. None of them
Windows NT server   
f.       A dedicated server that manages printers and printing jobs is_
i. Network Server         ii. Printer Server           iii. Modem Server        iv. File Server
Printer Server
g.       A networking device that joins multiple networks having different protocols is_
i. Switch                       ii. Router                      iii. Gateway                 iv. Bridge
Gateway
h.      Which is not the network protocol?
i. TCP/IP                      ii. STP                          iii. FTP             iv. SMTP
STP
4. Write the full forms of the following.
a)      UTP                 STP                  NIC                  LAN                MODEM
b)      MAN               WAN               WLAN             TCP/IP SMTP               POP
Chapter 2 (Internet and its Services)
1. Write the technical terms for the following.
a)      A network of networks. Internet
b)      A company that provides the Internet facility. ISP
c)      A service of the Internet that allows a user to access the remote computer. Telnet
d)      A service of the Internet that allows a user to send or receive instant message. IRC
e)      Buying or selling goods on the internet. E-commerce
2. State whether the following statements are true or false.
a)      Web servers are stored in websites. False
b)      People can send or receive email through the IRC. True
c)      You can send only text message through the Internet. False
d)      The Internet provides facility for posting messages on various subjects on the newsgroup. True
e)      The Internet user can only buy goods through the Internet. False
3. Choose the correct answer.
a)      Which one is not the service of the Internet?
i. Electronic Fax           ii. Chatting       iii. Sharing hardware                iv. Electronic mail
Sharing hardware     
b)      Which is not the search engine?
i. Yahoo.com               ii. Google.com             iii. Bing.com                iv. Ebay.com
Ebay.com
c)      Which protocol gets the email from the mail box to the user’s computer?
i. SMTP                        ii. POP                         iii. FTP             iv. HTTP
POP    
d)      In an email address : abc@yahoo.com, what does ‘yahoo’ refer?
i. User account name   ii. Domain name          iii. Top level domain name      iv. None of them.
Domain name
e)      The service of the Internet that provides audio and video conversation is_
i. Chat              ii. E-mail          iii. Video conference               iv. Video chat
Video conference       
4. Write the full forms of the following.
a.       ADSL              ISDN               ARPA              DARPA                       WWW
b.      URL                 ISP                   IRC                  E-Fax
Chapter 3 (Computer Security)
1. Write the appropriate technical terms for the following.
a.       Making an extra copy of data and software. Backup
b.      A device that protects computer system from the fluctuation of electric voltage. Volt guard
c.       A device that provides back up electric power to the computer.  UPS
d.      A secret word that provides accessibility to a user to use a file, application or computer system. Password
e.       A program that checks a condition of hard disk. Scandisk
f.       The process of rearranging the fragmented files in the contiguous spaces on the disk. Defragmentation
2. State whether the following statements are true or false.
a.       The regular maintenance helps to detect problems in computer hardware. True
b.      The dust particles can damage hard disk of a computer. True
c.       A volt guard supplies back up electric power to the electronic goods when there is load shedding. False
d.      The data and programs stored in a disk can not be damaged. False
e.       The password prevents unauthorized users to access a file, application or computer system. True
3. Write the full forms of the following.
a.       CCTV                    SMPS               CVT                 UPS
Chapter 4 (Computer Virus)
1. Write the technical terms for the following.
a.       A destructive computer program that hides and replicates itself. Computer virus
b.      A virus that infects the boot sector of a disk. Boot sector virus
c.       A virus that infects executable files. File infecting virus
d.      A virus that infects both boot sector of a disk and program files. Multipartite Virus
e.       A program that detects and prevents computer from the computer viruses. Antivirus
2. State whether the following statements are true or false.
a.       Computer virus deletes unnecessary data, information and programs of a computer. False
b.      Computer virus is visible lie other files and programs. False
c.       Computer viruses are created to stop the software piracy. True
d.      Computer viruses hide themselves in host files. True
e.       Macro viruses infect files created in Microsoft application software like MS-Word, MS-Excel, etc. True
f.       The antivirus software can detect viruses of a disk. True
3. Choose the correct options.
a.       Computer virus is_ software.
i. Malware                    ii. Utility                      iii. Application iv. Operating System
Malware
Boot sector virus infects_
i. System files              ii. Master boot record  iii. Application software    iv. Document file
Master boot record 
b.      Computer virus can spread from one computer to another through_
i. Infected portable disk           ii. The Internet             iii. Pirated software      iv. All of the above.
All of the above.
c.       Computer virus can_
i. Hide in a host file                 ii. Replicate                  iii. Spread                   iv. All of the above.
All of the above.
d.      Which is antivirus software?
i. Scan              ii. Defrag         iii. Kaspersky               iv. Power point
Kaspersky      
Chapter 5 (Cyber law and Ethics)
1. Write the technical terms for the following.
a.       The crime committed with the help of computer. Cybercrime
b.      Stealing or destroying data, information and files. Hacking
c.       The repeated acts of harassment or threatening the victim by using internet services like e-mail. Cyber stalking
d.      A law that legalize the transaction through electronic media Cyber law
e.       A set of moral principles. Computer ethics
Chapter 6 (Multimedia and its Application)
1. Write the technical terms of the following.
a.       The integration of text, graphics, audio, video and animation. Multimedia
b.      The moving images of real events. Video
c.       The real images of artwork. Animation
d.      A stimulation of movement created by displaying a series of images of artwork one after the other. Animation
e.       A computer system that is capable of handling more than one medium simultaneously. Multimedia computer
f.       The artificial environment created by computer system that appears real. Virtual reality
2. State whether the following statements are true of false.
a.       All the multimedia products are available in optical disks. True
b.      Tutorial CD and TOEFL CD are interactive multimedia CDs. True
c.       Multimedia computer can play more than one medium simultaneously. True
d.      All computers can handle multimedia. False
e.       Multimedia is used in business to promote business. True
f.       Cartoon movies are examples of animation. True
Chapter 8 (Microsoft Access)
1. State whether the following statements are true or false.
a.       The information can be used as data for the further processing. True
b.      A database can be managed manually. True
c.       DBMS is application software. True
d.      Data redundancy is controlled by primary key in MS-Access. True
e.       A database file created in MS-Access has .DMB extension. False
f.       A row of a table is known as field in MS-Access. False
g.       A field name can b up to 40 characters long. False
h.      The Auto Number data type generates random number automatically whenever a new record is added to a table. False
i.        A query can be created without tables. False
j.        A report can be used to modify data of a table. False
2. Choose the correct options.
a.       Which is not the database?
i. Phone diary              ii. Mark ledger             iii. Attendance Register    iv. Report Card
               Report Card
b.      MS-Access is a software.
i. Utility                       ii. Application              iii. System        iv. None of the above.
Application    
c.       Which is DBMS?
i. Database                   ii. Metabase                 iii. dBase          iv. MS-Excel.
dBase
d.      _uniquely identifies records of a table.
i. Foreign key               ii. Primary key              iii. Field name iv. Composite key
Primary key  
e.       The object of MS-Access that stores data is known as_
i. Query                       ii. Table                       iii. Form                       iv. Report
Table  
f.       Which of the following is not the data type used in MS-Access?
i. Date/Time                 ii. Counter                    iii. Hyperlink               iv. Caption
Counter
g.       The object of MS-Access that is used to prepare read-to-print document is_
i. Query           ii. Table           iii. Form           iv. Report
Report
h.      The Date/Time fields data type occupies_ Bytes of memory.
i. 4                   ii. 2                  iii. 8                 iv. 16
8
i.        The extension of database file in MS-Access  is_
i. .DBF             ii. .DMB           iii. .MDB          iv. DMB
.MDB
j.        A field property that limits the data to be entered in a field is_
i. Validation Rule         ii. Format                     iii. Input Mask             iv. Indexed
Validation Rule
k.      Which is the subtype of number data type?
i. Integer                      ii. Byte                         iii. Single                      iv. All of the above.
All of the above.
l.        _ allows MS-Access to query and sort record faster.
i. Sorting                      ii. Editing                     iii. Filtering                  iv. Indexing
Indexing
m.    The maximum number of characters that can be stored in a field is determined by_
i. Field Type                ii. Field Size                 iii. Field Length            iv. Field width
Field Size        
n.      The logical field data type of MS-Access is_
i. Yes/No                     ii. True/False                iii. On/Off                    iv. All of the above.
. Yes/No
o.      The field size of logical field data type is _ in MS-Access.
i. 1 bit                          ii. 1 byte                      iii. 2 bytes                    iv. 2 bits
1 bit



1 comment:

  1. What's about chapter 9,10,11 and 12's objective questions sir?

    ReplyDelete