Innovative Computer
Chapter 1 (Networking and Telecommunication)
1. Write the technical terms for the following.
a. A group of the interconnected computers. Computer Network
b. A path through data is transmitted from one computer to another. Transmission medium
c. The amount of data transmitted per second through a communication channel. Bandwidth
d. A network of computers formed by using cables. Wired network
e. A network of computers formed by using unguided media. Wireless network
f. A transmission medium through which data are transmitted in the form of light. Fiber optic cable
g. A computer on the network that provided resources to other computers on the network. Server
h. A computer on the network that uses resources of the network. Workstation
i. An operating system used in a server computer. Network Operating System
j. A card through which a computer is connected on a network. Network Interface Card
k. A network device that retransmits signals to all nodes on the network. Hub
l. A network device that retransmits signals to a destination node on the network. Switch
m. A network device that connects the segments of the same or different network having same protocol. Bridge
n. A network device that can determine the best path for forwarding the data packets. Router
o. A network device that joins networks having different protocols. Gateway
p. A device that converts digital signals into analog signals and vice versa. MODEM
q. The conversion of digital signals into analog signals. Modulation
r. The conversion of analog signals into digital signals. Demodulation
s. A network of computers in a room, building or campus. LAN
t. The network model where there is at least one server. Client- server network
u. The network model where each node has equal right. Peer-to-peer network
v. The cabling pattern of computers where each computer is connected to a common cable in the linear format. BUS Topology
w. The cabling pattern of computers where all nodes are connected in a closed loop. Ring topology
x. The cabling pattern of computers where each node is individually connected to centrally located device. Star topology
y. A set of rules by which computers on the network communicate with each other.Protocols
2. State whether the following statements are true or false.
a. In the simplex, the transmission of data can take place in both directions. False
b. A full duplex device can transmit data in both directions at a time. True
c. In the wired network, computers are connected with each other through wires. True
d. Data are transmitted in the form of light in the fiber optic cable. True
e. Microwave signals travel in straight line and cannot pass through obstacles like buildings, hills, etc. True
f. A hub is also called multiport repeater. True
g. Multiple bridges can be used to form a large network by connecting several small networks. True
h. A repeater is a network device that regenerates electric signals. False
i. In the star topology computers must be arranged in the form of star. False
j. A NIC converts analog signal to digital and vice versa. False
3. Choose the correct answer.
a. Which one of the device is simplex?
i. Television ii. Telephone iii. Computer iv. Walkie-Talkie
Television
b. The bandwidth of digital signal is measured in_
i. Hertz ii. Cycle per second iii. Bits per second iv. None of the above
Bits Per Second
c. Which is not the guided medium?
i. UTP ii. STP iii. Microwave iv. Fiber optic cable
Microwave
d. Which is the connector of UTP cable?
i. BNC ii. T-Connector iii. ST connector iv. RJ-45 connector
RJ-45 connector
e. Which is the network operating system used in a server computer?
i. Windows XP ii. Windows Vista iii. Windows NT server iv. None of them
Windows NT server
f. A dedicated server that manages printers and printing jobs is_
i. Network Server ii. Printer Server iii. Modem Server iv. File Server
Printer Server
g. A networking device that joins multiple networks having different protocols is_
i. Switch ii. Router iii. Gateway iv. Bridge
Gateway
h. Which is not the network protocol?
i. TCP/IP ii. STP iii. FTP iv. SMTP
STP
4. Write the full forms of the following.
a) UTP STP NIC LAN MODEM
b) MAN WAN WLAN TCP/IP SMTP POP
Chapter 2 (Internet and its Services)
1. Write the technical terms for the following.
a) A network of networks. Internet
b) A company that provides the Internet facility. ISP
c) A service of the Internet that allows a user to access the remote computer. Telnet
d) A service of the Internet that allows a user to send or receive instant message. IRC
e) Buying or selling goods on the internet. E-commerce
2. State whether the following statements are true or false.
a) Web servers are stored in websites. False
b) People can send or receive email through the IRC. True
c) You can send only text message through the Internet. False
d) The Internet provides facility for posting messages on various subjects on the newsgroup. True
e) The Internet user can only buy goods through the Internet. False
3. Choose the correct answer.
a) Which one is not the service of the Internet?
i. Electronic Fax ii. Chatting iii. Sharing hardware iv. Electronic mail
Sharing hardware
b) Which is not the search engine?
i. Yahoo.com ii. Google.com iii. Bing.com iv. Ebay.com
Ebay.com
c) Which protocol gets the email from the mail box to the user’s computer?
i. SMTP ii. POP iii. FTP iv. HTTP
POP
d) In an email address : abc@yahoo.com, what does ‘yahoo’ refer?
i. User account name ii. Domain name iii. Top level domain name iv. None of them.
Domain name
e) The service of the Internet that provides audio and video conversation is_
i. Chat ii. E-mail iii. Video conference iv. Video chat
Video conference
4. Write the full forms of the following.
a. ADSL ISDN ARPA DARPA WWW
b. URL ISP IRC E-Fax
Chapter 3 (Computer Security)
1. Write the appropriate technical terms for the following.
a. Making an extra copy of data and software. Backup
b. A device that protects computer system from the fluctuation of electric voltage. Volt guard
c. A device that provides back up electric power to the computer. UPS
d. A secret word that provides accessibility to a user to use a file, application or computer system. Password
e. A program that checks a condition of hard disk. Scandisk
f. The process of rearranging the fragmented files in the contiguous spaces on the disk. Defragmentation
2. State whether the following statements are true or false.
a. The regular maintenance helps to detect problems in computer hardware. True
b. The dust particles can damage hard disk of a computer. True
c. A volt guard supplies back up electric power to the electronic goods when there is load shedding. False
d. The data and programs stored in a disk can not be damaged. False
e. The password prevents unauthorized users to access a file, application or computer system. True
3. Write the full forms of the following.
a. CCTV SMPS CVT UPS
Chapter 4 (Computer Virus)
1. Write the technical terms for the following.
a. A destructive computer program that hides and replicates itself. Computer virus
b. A virus that infects the boot sector of a disk. Boot sector virus
c. A virus that infects executable files. File infecting virus
d. A virus that infects both boot sector of a disk and program files. Multipartite Virus
e. A program that detects and prevents computer from the computer viruses. Antivirus
2. State whether the following statements are true or false.
a. Computer virus deletes unnecessary data, information and programs of a computer. False
b. Computer virus is visible lie other files and programs. False
c. Computer viruses are created to stop the software piracy. True
d. Computer viruses hide themselves in host files. True
e. Macro viruses infect files created in Microsoft application software like MS-Word, MS-Excel, etc. True
f. The antivirus software can detect viruses of a disk. True
3. Choose the correct options.
a. Computer virus is_ software.
i. Malware ii. Utility iii. Application iv. Operating System
Malware
Boot sector virus infects_
Boot sector virus infects_
i. System files ii. Master boot record iii. Application software iv. Document file
Master boot record
b. Computer virus can spread from one computer to another through_
i. Infected portable disk ii. The Internet iii. Pirated software iv. All of the above.
All of the above.
c. Computer virus can_
i. Hide in a host file ii. Replicate iii. Spread iv. All of the above.
All of the above.
d. Which is antivirus software?
i. Scan ii. Defrag iii. Kaspersky iv. Power point
Kaspersky
Chapter 5 (Cyber law and Ethics)
1. Write the technical terms for the following.
a. The crime committed with the help of computer. Cybercrime
b. Stealing or destroying data, information and files. Hacking
c. The repeated acts of harassment or threatening the victim by using internet services like e-mail. Cyber stalking
d. A law that legalize the transaction through electronic media Cyber law
e. A set of moral principles. Computer ethics
Chapter 6 (Multimedia and its Application)
1. Write the technical terms of the following.
a. The integration of text, graphics, audio, video and animation. Multimedia
b. The moving images of real events. Video
c. The real images of artwork. Animation
d. A stimulation of movement created by displaying a series of images of artwork one after the other. Animation
e. A computer system that is capable of handling more than one medium simultaneously. Multimedia computer
f. The artificial environment created by computer system that appears real. Virtual reality
2. State whether the following statements are true of false.
a. All the multimedia products are available in optical disks. True
b. Tutorial CD and TOEFL CD are interactive multimedia CDs. True
c. Multimedia computer can play more than one medium simultaneously. True
d. All computers can handle multimedia. False
e. Multimedia is used in business to promote business. True
f. Cartoon movies are examples of animation. True
Chapter 8 (Microsoft Access)
1. State whether the following statements are true or false.
a. The information can be used as data for the further processing. True
b. A database can be managed manually. True
c. DBMS is application software. True
d. Data redundancy is controlled by primary key in MS-Access. True
e. A database file created in MS-Access has .DMB extension. False
f. A row of a table is known as field in MS-Access. False
g. A field name can b up to 40 characters long. False
h. The Auto Number data type generates random number automatically whenever a new record is added to a table. False
i. A query can be created without tables. False
j. A report can be used to modify data of a table. False
2. Choose the correct options.
a. Which is not the database?
i. Phone diary ii. Mark ledger iii. Attendance Register iv. Report Card
Report Card
b. MS-Access is a software.
i. Utility ii. Application iii. System iv. None of the above.
Application
c. Which is DBMS?
i. Database ii. Metabase iii. dBase iv. MS-Excel.
dBase
d. _uniquely identifies records of a table.
i. Foreign key ii. Primary key iii. Field name iv. Composite key
Primary key
e. The object of MS-Access that stores data is known as_
i. Query ii. Table iii. Form iv. Report
Table
f. Which of the following is not the data type used in MS-Access?
i. Date/Time ii. Counter iii. Hyperlink iv. Caption
Counter
g. The object of MS-Access that is used to prepare read-to-print document is_
i. Query ii. Table iii. Form iv. Report
Report
h. The Date/Time fields data type occupies_ Bytes of memory.
i. 4 ii. 2 iii. 8 iv. 16
8
i. The extension of database file in MS-Access is_
i. .DBF ii. .DMB iii. .MDB iv. DMB
.MDB
j. A field property that limits the data to be entered in a field is_
i. Validation Rule ii. Format iii. Input Mask iv. Indexed
Validation Rule
k. Which is the subtype of number data type?
i. Integer ii. Byte iii. Single iv. All of the above.
All of the above.
l. _ allows MS-Access to query and sort record faster.
i. Sorting ii. Editing iii. Filtering iv. Indexing
Indexing
m. The maximum number of characters that can be stored in a field is determined by_
i. Field Type ii. Field Size iii. Field Length iv. Field width
Field Size
n. The logical field data type of MS-Access is_
i. Yes/No ii. True/False iii. On/Off iv. All of the above.
. Yes/No
o. The field size of logical field data type is _ in MS-Access.
i. 1 bit ii. 1 byte iii. 2 bytes iv. 2 bits
1 bit
What's about chapter 9,10,11 and 12's objective questions sir?
ReplyDelete