Saturday, October 22, 2016

Solved Objectives: Readmore Publication

READ MORE
  Chapter 1: Networking technology and Telecommunications Basics

1.    State whether the following statements are true or false.
a) A network computer allows sharing of networked connected peripherals and simultaneous access to programs and data irrespective of the physical location of the resources and the user.True
b) Network operating system is a formal description of messages formats and the rules that two or more machines must follow to exchange those messages. False
c) Wide Area Network is a large computer network that spans a metropolitan area or campus.False 
d) Wireless Access Point is a device that provides connection between wireless devices and can connect to wired networks. True
e) Modem is a network device that connects dissimilar networks with different protocols. False
2. Match the following.
            Group A                                                                     Group B
a)Host computer                                              A computer circuit board
b)NIC                                                              A self-sufficient computer
c)Windows NT                                                A powerful, centralized computer system
d) TCP/IP                                                         Popular network operating
e)Peer                                                           Node
                                                                                    Network protocol
Answer
        a)Host computer                                     A powerful, centralized computer system   
         b)NIC                                                                 A computer circuit board
        c)Windows NT                                         Popular network operating
        d) TCP/IP                                                   Network protocol
        e)Peer                                                          A self-sufficient computer
3. Select the best answer from the list of choices.  
a) A group of computers that functions both as a client and as a server.
               i) Centralized computing          ii) Client/server         iii) Peer-to-peer          iv)Local Area            Network
Ans: Peer-to-peer         
b) A telecommunication network, usually used for connecting computers, that spans a wide   geographical area.
                        i) LAN                                   ii) MAN                   iii) CAN                               iv) WAN
Ans: WAN
c) The communication protocol used to connect to web servers on the internet or on a local network (intranet).
                          i) TCP/IP                               ii) HTTP                                   iii) SMTP                             iv) POP
Ans: HTTP    
d) A form of wireless transmission in which signals are sent via pulses of infrared light.
            i) Radio networking         ii) Infrared transmission    iii) Microwave transmission       iv) None of the above   
Ans: Infrared transmission   
5. Give appropriate technical terms for the following.
a) A formal description of message formats and rules that two or more machines must follow to exchange those messages._ Protocol
b) A network model in which resources sharing, processing and communication control are completely decentralized. Peer-to-peer network
c) A large computer network that spans a metropolitan area or campus. LAN
d) A network topology in which network nodes are arranged in a linear format, with each nodes connected directly to the network cable with a T-connector or tap. Bus Topology
e) A mode of transmission in which data flows in both directions, but only from one direction at a time Half- Duplex mode
                               Chapter 2:  The Internet and Online Services
1) State whether the following statement is true or false                         
a)   The internet carries a vast range of information resources and services, such as the interlinked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. True
b) Communication between all the different devices on the internet is made possible by FTP. False
c) Dial-up connections involves large volumes of information being carried at high speeds to your PC. False
d) Telnet allows you to remote computers (called hosts) over a TCP/IP network (such as the internet). False
e) DNS represents a powerful internet technology for converting domain names to IP address. True

2) Match the following.
Group A
Group B
E-mail
A private network within an organization. e)
World Wide Web
The opening or main page of a website. c)
Home Page
The buying and selling of goods and services on   internet. d)
Electronic commerce
The leading information – exchange service of the internet. b)
Intranet
The exchange of computer-stored messages telecommunication a)
Answer:

3) Select the best answer
a) The internet was developed by US.
Department of Defence
Department of Electronics
Department of Commerce
None of the above
Ans: Department of Defence

         b) A user can get files from another computer by using
File Transfer Protocol
TCP/IP
Internet Protocol
None of above
Ans: File Transfer Protocol

c) Web-site is a collection of
HTML documents
Graphics File
audio and video files
All of above
Ans: All of above

d) Each web page has its own unique address known as
i) Uniform Resource Locator                                   ii) Universal Resource Locator
iii) Uniform Resources Locator                               iv) Universal Resources Locator
Ans: Uniform Resource Locator                                  
5. Give the appropriate technical terms for the following.
a)      A program that allows the user to scan the contents of the internet to find Web sites or specific
      information of the interest to them. Search engine
b)      The discussion groups in which people share information and ideas on a particular area of interest. Newsgroups
c)      The buying and selling of goods and services on the internet, especially the World Wide
Web. E-commerce
d)     A document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device. Web page
e)      A protocol used by the WWW to establish client server interaction. HTTP
                                          Chapter 3: Computer Security
1) State whether the following statement s are true or false.
a) Computer security is often viewed as a disaster for the user because it can cause serious problems before they develop into severe malfunction. False
b) Regular maintenance keeps equipment in good operating condition and to find and correct problems before they develop into the server malfunction. True
c) Security lighting and closed –circuit television cameras are the methods of software protection. False
d) UPS is a device that shields the computer and other electronic devices from surge in electrical power, to transient, that flow from then power supply. False
e) Fragmentation reduces data access time and allow storage to be used more efficiently. False
2) Match the following.
Group A                                                                                  Group B
Hardware security controls                                                      Fragmentation
Power protection device                                                          Electrical regulator d)
Software security protection                                                    Regular maintenance a)
Voltage Regulator                                                                    Maintenance tools e)
Scandisk                                                                              Surge suppressor b)
                                                                                                            Data backup c)
3) Select the best answer
a) _____________ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security                                           ii) Hardware security
iii) Software security                                              iv) None of the above
Ans: Hardware security
b) Some of the methods of hardware protection are:
i) Fire Alarms                                                        ii) Security Lighting
iii)Closed-circuit cameras                                     iv)All of above
Ans: All of above
c) The temperature in computer system should be maintained between ______to________
i)21`C to 24`C                                                       ii) 20`C to 25`C
iii) 23`C to 28`C                                                    iv) None of the above
ans: 21`C to 24`C                                                      
 d) A device that protects your PC against power surges and spikes.
i) UPS                                                                     ii) Voltage Regulator
iii) Surge suppressor                                               iv) All of the above
Ans:  Surge suppressor                                                
e) The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security                                                ii) Hardware security
iii) Software security                                               iv) None of the above
Ans: Software security                                              
4) Give the appropriate technical terms for the following.
a) A television transmitted to the particular audience at specific location via coaxial cables, telephone wires, fiber-optics strands, microwave radio systems, or communications satellites, as compared to open-circuit (broadcast) television intended for the general public. CCTV
b) A device that allows your computer to keep running for at least a shot time when the primary power sources is lost. UPS
c) A device or circuit that maintains a load voltage nearly constant over a range of variations of input voltage and load current. Voltage regulator device
d) A device that shields computer and other electronic devices from surges in electrical power, or transient voltage, that flow from the power supply. Surge processor
e) The process of locating the noncontiguous fragments of data, rearranging the fragments and restoring them fewer fragments or the whole file. Defragmmentation
                                              Chapter 4: Computer Virus
1) State whether the following statements are true or false.
a) Computer virus may damage or corrupt data, change data, degrade the performance of your system by utilizing resources such as a disk. True
b) The example of boot sector viruses are Friday the 13th, Enigma, Nemesis and Cascading. False
c) Antivirus software must perform algorithms scanning to detect script virus. False
d) Stealth virus is a file virus that uses special technique to hide its presence from user and virus scanners. True
e) Computer virus decreases the space in the main memory and increase the size of the executable files. True
2) Match the following
Group A                                                                                              Group B
Boot sector virus                                                                                  McAFee
File infecting virus                                                                               W97M.Melissa c)
Macro virus                                                                                         stoned a)
Polymorphic virus                                                                               Frodo e)
Stealth virus                                                                                         Friday the 13th  d)
                                                                                                            Involuntary b)
3) Select the best answer
a) A type of virus that infects the first sector, i.e. the boot sector, of a floppy disk or hard drive.
i) Boot sector virus                                            ii) File infecting virus
iii) Polymorphic virus                                        iv) None of the above
            Boot sector virus                                           
b) Disk Killer, stoned and Michelangelo are examples of ________________
i) Boot sector virus                                             ii) File infecting virus
iii) Polymorphic virus                                         iv) All of the above
Boot sector virus                                            
c) A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus                                              ii) File infecting
iii) Script virus                                                     iv) Macro virus
File infecting
d) A virus that can change its appearance with every infection is called_____________
i) Boot virus                                                          ii) Micro virus
iii) Script virus                                                      iv) None of them
None of them
e) A program designed to detect and remove virus from the computer system.
i) Shareware                                                          ii) Freeware
iii) Antivirus                                                          iv) Malware
Antivirus     
f) The Melissa worm is released, targeting Microsoft Word and Outlook- based systems, and
creating considerable network traffic.                                  
i) 1999                                                                    ii) 2000
iii) 2006                                                                  iv) 2010
1999    
4) Give the appropriate technical terms
a) A computer program that can copy itself and infect a computer without permission or knowledge of user. Computer virus
b) A type of virus that infects the first sector, i.e. the boot sector of a disk or hard drive. Boot sector virus
c) A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil. Program virus
d) A type of computer virus that is encoded as a macro embedded is a document. Macro virus
e) A file virus, that uses special technique to hide its presence from users and virus scanners. Stealth virus
f) A program designed to detect and remove virus from the computer system. Antivirus
                                   Chapter 5 – Cyber Law and Computer Ethics
1) State whether the following statements are true or false
a) Digital signature law provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium. True
b) Copyright includes inventions (patents), trademarks industrial designs and geographic indications of source. False
c) Cybercrime is defined as any type of illegal activity that makes use of the internet, a private or public network, or an in-house computer system.  True
d) Cyber law of Nepal commonly known as the Electronic Transaction and digital Signature Act Ordinance was enacted in Nepal in 2006 B.S. False
e) Freedom of the information Act is a federal law passed by Congress in 1966 and became effective on 4 July 1967. True
2) Match the following
  Group A                                                   Group B
Cyberstalking                         Electronic transfer of illegally-obtained monies with the go  with the goal of     
                                            hiding its source and possibly its destination  c)
Phishing                            The activity of breaking into a computer system to gain to   unauthorized
                                          Access  e)
Cyber laundering      The use of communication technology, mainly the    internet, to torture other
                                  Individuals.  a)
Cyber Contraband      The act of attempting to acquire sensitive information like usernames,     passwords
                                    and credit card details by       distinguishing as a trustworthy source    b)
Hacking                       Transferring illegal items through the internet (such as  encryption technology) that is banned in some locations.  d)
3) Select the best answer
a) IRP expands to
i) Individual Property Rights                      ii) Individual Performance Rights
iii) Intellectual Property  Rights                             iv) Intellectual Performance Rights
Intellectual Property  Rights                             
b) Cyber law of Nepal commonly known as the Electronic Transaction and Digital Signature Act
Ordinance was enacted in Nepal in___________________
i) 2061 BS                                                    ii) 2062BS
iii) 2063 BS                                                  iv) 2064 BS
2061 BS                                                    
c) Premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer technology
i) Cyber stalking                                            ii) Cyber laundering
iii) Cyber theft                                               iv) Cyber terrorism
Cyber terrorism

d) The act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trust worthy source.
i) Hacking                                                      ii) Phishing
iii) Computer Virus                                       iv) Cyber stalking
Phishing
e) Fair Credit Reporting Act is a federal law enacted in ________________ to ensure confidentiality
of consumer credit information helped by lenders and credit reporting agencies.
i) 1970                                                           ii) 1971
iii) 1972                                                         iv) 1973
1970  
4) Give the appropriate technical terms of the following
a) A generic term which refers to all the legal and regulatory aspects of the internet and the World Wide Web.   Cyber law
b) A mathematical scheme for demonstrating the authenticity of a digital message or document. Digital signature
c) The rights granted to creator and owners of the works that are the result of the human intellectual creativity. Intellectual property law
d) Any type of illegal activity that makes use of the internet, a private or public network, or an in-house computer system. Cyber crime
e) The unauthorized duplication and use of computer software. Software piracy
                                                       Chapter 6: The magic of multimedia
1) State whether the following statements are true or false
a) Video is the technology of electrically capturing, recording, processing, storing, transmitting and reconstruction a sequence of still images representing scenes in motion.  True
b) Multimedia computer systems require faster CPU, high capacity hard disk, larger main memory, super VGA monitors, speakers, keyboard and pointing device. True
c) In the industrial sector, multimedia is used as way to help present information to shareholders, supervisor and coworkers. True
d) Multimedia presentation software is a tool that computer users of varying industries and backgrounds use to dynamically present information to an audience. True
e) Virtual Reality is an artificial reality that projects the user into 3D space generated by the computer. True
2) Match the following.
Group A
Group B
Animation 
A computer-delivered electronic system that allows the user to control, combine, and manipulate different types of media, such as text, sound video, computer graphics, and animation. c)
Edutainment
The process of giving the illusion of movement to drawings, models, or interested object. a)
Multimedia
A form of education which is designed to be entertaining, in order to keep people interested and engaged.  b)
Virtual Reality
An extension of hypertext that supports linking sound, and video element in addition to text elements. e)
Hypermedia
An artificial reality that projects the user into a 3D Space generated by the computer.d)
3) Select the best answer.
a) A computer-derived electronic system that allows the user to control, combine, and manipulate different types different types of media, such as text, sound, video, computer graphics and animation.
Ans: Multimedia
Monomedia
Multimedia
Hypermedia
None of the above
b) ________________deals with the recording and display of a sequence of images at a reasonable speed to create an impression of the movement
Ans: Video
Text
Video
Graphics
Animation
c) I order to work with multimedia, a personal computer typically requires the following hardware components.
Ans:  All of the above
Faster CPU
Large main memory
All of the above
None of the above
d) An extension to hypertext supports linking graphics, sound and video elements in addition to text elements.
Ans: All of the above
Interactive media
Hypermedia
All of the above
None of the above
e) An artificial reality that projects the user into a 3D space generated by the computer.
Ans: Virtual Reality
Virtual Reality
Virtual Computer
All of the above
None of the above
4) Give the appropriate technical terms for the following.
a) A computer-delivered electronic system that allows the user to control, combine, and manipulate different types of media, such as text, sound, video, computer graphics, and animation. Multimedia
b) The creation and manipulation of picture images in the computer. Graphics
c) The process of giving the illusion of movement to drawings, models or inanimate objects. Animation
d) A form of education which is designed to be entertaining, in order to keep people interested and engaged. Edutainment
e) An extension to hypertext that supports linking graphics, sound and video elements in addition to text elements. Hypermedia
                                                 Chapter 8: Database Management System
1) State whether the following statements are true or false.
a) Form allows you to select specific data from one or more tables.  False
b) The default field size for a field with a data type of Text is 50 characters. True
c) An input mask is a field property that determines what data can be entered in the field, how the data looks, and the format in which it is stored. True
d) The allow Zero Length property, when set to No, permits zero-length strings. False
e) Referential integrity is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidently changed or delete.  True
2) Match the following.
Group A
Group B
Query
A collection of programs that enables you to store, modify, and extracts information from a database.  b)
DBMS
A field which uniquely identifies every record in a table. e)
Table
A set of information stored about a particular entry. d)
Record
An arrangement of data in row and column format. c)
Primary Key
A database object that creates a datasheet of selected fields and records from one or more tables. a)
3) Select the best answer.
a) A (n) ____________________ is an organized collection of the related information.
Ans: database
Object
database
Property
document
b) Field size, format, input mask, caption and default values are:
ans: field properties
Key elements 
field properties
Navigating modes
data types
c) The storage size of date/time type is
ans: 8 bytes
4 bytes
1 bytes
8 bytes
16 bytes
d) The _________________ key uniquely identifies each record
ans: Primary
Primary
database
Object
premier
e) ___________________ is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.
Ans: Referential integrity
Relationship
Referential integrity
Query
Forms
f) __________________ is an Access databases objects that information in a printed format.
ans: Report
Table
Form 
Query
Report
4) Give the appropriate technical terms for the following.
a) A special type of database where data is stored in a number of separated but linked tables. Relational database
b) A field property that determines what data can be entered in the field, how the data looks, and the format in which it is stored. Input mask
c) A set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.  Referential integrity
d) A restriction you place on records in the open datasheet or from quickly isolated and display a subset of records.  Filtering
e) A database object used primarily display records onscreen, to make it easier to enter new records and make changes to the existing records. Form



1 comment:

  1. Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Readmore Publication >>>>> Download Now

    >>>>> Download Full

    Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Readmore Publication >>>>> Download LINK

    >>>>> Download Now

    Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Readmore Publication >>>>> Download Full

    >>>>> Download LINK Dq

    ReplyDelete