READ MORE
Chapter 1: Networking technology and Telecommunications Basics
1. State whether the following statements are true or false.
a) A network computer allows sharing of networked connected peripherals and simultaneous access to programs and data irrespective of the physical location of the resources and the user.True
b) Network operating system is a formal description of messages formats and the rules that two or more machines must follow to exchange those messages. False
c) Wide Area Network is a large computer network that spans a metropolitan area or campus.False
d) Wireless Access Point is a device that provides connection between wireless devices and can connect to wired networks. True
e) Modem is a network device that connects dissimilar networks with different protocols. False
2. Match the following.
Group A Group B
a)Host computer A computer circuit board
b)NIC A self-sufficient computer
c)Windows NT A powerful, centralized computer system
d) TCP/IP Popular network operating
e)Peer Node
Network protocol
Answer
a)Host computer A powerful, centralized computer system
b)NIC A computer circuit board
c)Windows NT Popular network operating
d) TCP/IP Network protocol
e)Peer A self-sufficient computer
3. Select the best answer from the list of choices.
a) A group of computers that functions both as a client and as a server.
i) Centralized computing ii) Client/server iii) Peer-to-peer iv)Local Area Network
Ans: Peer-to-peer
b) A telecommunication network, usually used for connecting computers, that spans a wide geographical area.
i) LAN ii) MAN iii) CAN iv) WAN
Ans: WAN
c) The communication protocol used to connect to web servers on the internet or on a local network (intranet).
i) TCP/IP ii) HTTP iii) SMTP iv) POP
Ans: HTTP
d) A form of wireless transmission in which signals are sent via pulses of infrared light.
i) Radio networking ii) Infrared transmission iii) Microwave transmission iv) None of the above
Ans: Infrared transmission
5. Give appropriate technical terms for the following.
a) A formal description of message formats and rules that two or more machines must follow to exchange those messages._ Protocol
b) A network model in which resources sharing, processing and communication control are completely decentralized. Peer-to-peer network
c) A large computer network that spans a metropolitan area or campus. LAN
d) A network topology in which network nodes are arranged in a linear format, with each nodes connected directly to the network cable with a T-connector or tap. Bus Topology
e) A mode of transmission in which data flows in both directions, but only from one direction at a time Half- Duplex mode
Chapter 2: The Internet and Online Services
1) State whether the following statement is true or false
a) The internet carries a vast range of information resources and services, such as the interlinked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. True
b) Communication between all the different devices on the internet is made possible by FTP. False
c) Dial-up connections involves large volumes of information being carried at high speeds to your PC. False
d) Telnet allows you to remote computers (called hosts) over a TCP/IP network (such as the internet). False
e) DNS represents a powerful internet technology for converting domain names to IP address. True
2) Match the following.
Group A
|
Group B
|
E-mail
|
A private network within an organization. e)
|
World Wide Web
|
The opening or main page of a website. c)
|
Home Page
|
The buying and selling of goods and services on internet. d)
|
Electronic commerce
|
The leading information – exchange service of the internet. b)
|
Intranet
|
The exchange of computer-stored messages telecommunication a)
|
Answer:
3) Select the best answer
a) The internet was developed by US.
Department of Defence
|
Department of Electronics
|
Department of Commerce
|
None of the above
|
Ans: Department of Defence
|
b) A user can get files from another computer by using
File Transfer Protocol
|
TCP/IP
|
Internet Protocol
|
None of above
|
Ans: File Transfer Protocol
|
c) Web-site is a collection of
HTML documents
|
Graphics File
|
audio and video files
|
All of above
|
Ans: All of above
|
d) Each web page has its own unique address known as
i) Uniform Resource Locator ii) Universal Resource Locator
iii) Uniform Resources Locator iv) Universal Resources Locator
Ans: Uniform Resource Locator
5. Give the appropriate technical terms for the following.
a) A program that allows the user to scan the contents of the internet to find Web sites or specific
information of the interest to them. Search engine
b) The discussion groups in which people share information and ideas on a particular area of interest. Newsgroups
c) The buying and selling of goods and services on the internet, especially the World Wide
Web. E-commerce
d) A document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device. Web page
e) A protocol used by the WWW to establish client server interaction. HTTP
Chapter 3: Computer Security
1) State whether the following statement s are true or false.
a) Computer security is often viewed as a disaster for the user because it can cause serious problems before they develop into severe malfunction. False
b) Regular maintenance keeps equipment in good operating condition and to find and correct problems before they develop into the server malfunction. True
c) Security lighting and closed –circuit television cameras are the methods of software protection. False
d) UPS is a device that shields the computer and other electronic devices from surge in electrical power, to transient, that flow from then power supply. False
e) Fragmentation reduces data access time and allow storage to be used more efficiently. False
2) Match the following.
Group A Group B
Hardware security controls Fragmentation
Power protection device Electrical regulator d)
Software security protection Regular maintenance a)
Voltage Regulator Maintenance tools e)
Scandisk Surge suppressor b)
Data backup c)
3) Select the best answer
a) _____________ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security ii) Hardware security
iii) Software security iv) None of the above
Ans: Hardware security
b) Some of the methods of hardware protection are:
i) Fire Alarms ii) Security Lighting
iii)Closed-circuit cameras iv)All of above
Ans: All of above
c) The temperature in computer system should be maintained between ______to________
i)21`C to 24`C ii) 20`C to 25`C
iii) 23`C to 28`C iv) None of the above
ans: 21`C to 24`C
d) A device that protects your PC against power surges and spikes.
i) UPS ii) Voltage Regulator
iii) Surge suppressor iv) All of the above
Ans: Surge suppressor
e) The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security ii) Hardware security
iii) Software security iv) None of the above
Ans: Software security
4) Give the appropriate technical terms for the following.
a) A television transmitted to the particular audience at specific location via coaxial cables, telephone wires, fiber-optics strands, microwave radio systems, or communications satellites, as compared to open-circuit (broadcast) television intended for the general public. CCTV
b) A device that allows your computer to keep running for at least a shot time when the primary power sources is lost. UPS
c) A device or circuit that maintains a load voltage nearly constant over a range of variations of input voltage and load current. Voltage regulator device
d) A device that shields computer and other electronic devices from surges in electrical power, or transient voltage, that flow from the power supply. Surge processor
e) The process of locating the noncontiguous fragments of data, rearranging the fragments and restoring them fewer fragments or the whole file. Defragmmentation
Chapter 4: Computer Virus
1) State whether the following statements are true or false.
a) Computer virus may damage or corrupt data, change data, degrade the performance of your system by utilizing resources such as a disk. True
b) The example of boot sector viruses are Friday the 13th, Enigma, Nemesis and Cascading. False
c) Antivirus software must perform algorithms scanning to detect script virus. False
d) Stealth virus is a file virus that uses special technique to hide its presence from user and virus scanners. True
e) Computer virus decreases the space in the main memory and increase the size of the executable files. True
2) Match the following
Group A Group B
Boot sector virus McAFee
File infecting virus W97M.Melissa c)
Macro virus stoned a)
Polymorphic virus Frodo e)
Stealth virus Friday the 13th d)
Involuntary b)
3) Select the best answer
a) A type of virus that infects the first sector, i.e. the boot sector, of a floppy disk or hard drive.
i) Boot sector virus ii) File infecting virus
iii) Polymorphic virus iv) None of the above
Boot sector virus
b) Disk Killer, stoned and Michelangelo are examples of ________________
i) Boot sector virus ii) File infecting virus
iii) Polymorphic virus iv) All of the above
Boot sector virus
c) A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus ii) File infecting
iii) Script virus iv) Macro virus
File infecting
d) A virus that can change its appearance with every infection is called_____________
i) Boot virus ii) Micro virus
iii) Script virus iv) None of them
None of them
e) A program designed to detect and remove virus from the computer system.
i) Shareware ii) Freeware
iii) Antivirus iv) Malware
Antivirus
f) The Melissa worm is released, targeting Microsoft Word and Outlook- based systems, and
creating considerable network traffic.
i) 1999 ii) 2000
iii) 2006 iv) 2010
1999
4) Give the appropriate technical terms
a) A computer program that can copy itself and infect a computer without permission or knowledge of user. Computer virus
b) A type of virus that infects the first sector, i.e. the boot sector of a disk or hard drive. Boot sector virus
c) A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil. Program virus
d) A type of computer virus that is encoded as a macro embedded is a document. Macro virus
e) A file virus, that uses special technique to hide its presence from users and virus scanners. Stealth virus
f) A program designed to detect and remove virus from the computer system. Antivirus
Chapter 5 – Cyber Law and Computer Ethics
1) State whether the following statements are true or false
a) Digital signature law provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium. True
b) Copyright includes inventions (patents), trademarks industrial designs and geographic indications of source. False
c) Cybercrime is defined as any type of illegal activity that makes use of the internet, a private or public network, or an in-house computer system. True
d) Cyber law of Nepal commonly known as the Electronic Transaction and digital Signature Act Ordinance was enacted in Nepal in 2006 B.S. False
d) Cyber law of Nepal commonly known as the Electronic Transaction and digital Signature Act Ordinance was enacted in Nepal in 2006 B.S. False
e) Freedom of the information Act is a federal law passed by Congress in 1966 and became effective on 4 July 1967. True
2) Match the following
Group A Group B
Cyberstalking Electronic transfer of illegally-obtained monies with the go with the goal of
hiding its source and possibly its destination c)
Phishing The activity of breaking into a computer system to gain to unauthorized
Access e)
Cyber laundering The use of communication technology, mainly the internet, to torture other
Individuals. a)
Cyber Contraband The act of attempting to acquire sensitive information like usernames, passwords
and credit card details by distinguishing as a trustworthy source b)
Hacking Transferring illegal items through the internet (such as encryption technology) that is banned in some locations. d)
3) Select the best answer
a) IRP expands to
i) Individual Property Rights ii) Individual Performance Rights
iii) Intellectual Property Rights iv) Intellectual Performance Rights
Intellectual Property Rights
b) Cyber law of Nepal commonly known as the Electronic Transaction and Digital Signature Act
Ordinance was enacted in Nepal in___________________
i) 2061 BS ii) 2062BS
iii) 2063 BS iv) 2064 BS
2061 BS
c) Premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer technology
i) Cyber stalking ii) Cyber laundering
iii) Cyber theft iv) Cyber terrorism
Cyber terrorism
d) The act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trust worthy source.
i) Hacking ii) Phishing
iii) Computer Virus iv) Cyber stalking
Phishing
e) Fair Credit Reporting Act is a federal law enacted in ________________ to ensure confidentiality
of consumer credit information helped by lenders and credit reporting agencies.
i) 1970 ii) 1971
iii) 1972 iv) 1973
1970
4) Give the appropriate technical terms of the following
a) A generic term which refers to all the legal and regulatory aspects of the internet and the World Wide Web. Cyber law
b) A mathematical scheme for demonstrating the authenticity of a digital message or document. Digital signature
c) The rights granted to creator and owners of the works that are the result of the human intellectual creativity. Intellectual property law
d) Any type of illegal activity that makes use of the internet, a private or public network, or an in-house computer system. Cyber crime
e) The unauthorized duplication and use of computer software. Software piracy
Chapter 6: The magic of multimedia
1) State whether the following statements are true or false
a) Video is the technology of electrically capturing, recording, processing, storing, transmitting and reconstruction a sequence of still images representing scenes in motion. True
b) Multimedia computer systems require faster CPU, high capacity hard disk, larger main memory, super VGA monitors, speakers, keyboard and pointing device. True
c) In the industrial sector, multimedia is used as way to help present information to shareholders, supervisor and coworkers. True
d) Multimedia presentation software is a tool that computer users of varying industries and backgrounds use to dynamically present information to an audience. True
e) Virtual Reality is an artificial reality that projects the user into 3D space generated by the computer. True
2) Match the following.
Group A
|
Group B
|
Animation
|
A computer-delivered electronic system that allows the user to control, combine, and manipulate different types of media, such as text, sound video, computer graphics, and animation. c)
|
Edutainment
|
The process of giving the illusion of movement to drawings, models, or interested object. a)
|
Multimedia
|
A form of education which is designed to be entertaining, in order to keep people interested and engaged. b)
|
Virtual Reality
|
An extension of hypertext that supports linking sound, and video element in addition to text elements. e)
|
Hypermedia
|
An artificial reality that projects the user into a 3D Space generated by the computer.d)
|
3) Select the best answer.
a) A computer-derived electronic system that allows the user to control, combine, and manipulate different types different types of media, such as text, sound, video, computer graphics and animation.
Ans: Multimedia
Monomedia
|
Multimedia
|
Hypermedia
|
None of the above
|
b) ________________deals with the recording and display of a sequence of images at a reasonable speed to create an impression of the movement
Ans: Video
Text
|
Video
|
Graphics
|
Animation
|
c) I order to work with multimedia, a personal computer typically requires the following hardware components.
Ans: All of the above
Faster CPU
|
Large main memory
|
All of the above
|
None of the above
|
d) An extension to hypertext supports linking graphics, sound and video elements in addition to text elements.
Ans: All of the above
Interactive media
|
Hypermedia
|
All of the above
|
None of the above
|
e) An artificial reality that projects the user into a 3D space generated by the computer.
Ans: Virtual Reality
Virtual Reality
|
Virtual Computer
|
All of the above
|
None of the above
|
4) Give the appropriate technical terms for the following.
a) A computer-delivered electronic system that allows the user to control, combine, and manipulate different types of media, such as text, sound, video, computer graphics, and animation. Multimedia
b) The creation and manipulation of picture images in the computer. Graphics
c) The process of giving the illusion of movement to drawings, models or inanimate objects. Animation
d) A form of education which is designed to be entertaining, in order to keep people interested and engaged. Edutainment
e) An extension to hypertext that supports linking graphics, sound and video elements in addition to text elements. Hypermedia
Chapter 8: Database Management System
1) State whether the following statements are true or false.
a) Form allows you to select specific data from one or more tables. False
b) The default field size for a field with a data type of Text is 50 characters. True
c) An input mask is a field property that determines what data can be entered in the field, how the data looks, and the format in which it is stored. True
d) The allow Zero Length property, when set to No, permits zero-length strings. False
e) Referential integrity is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidently changed or delete. True
2) Match the following.
Group A
|
Group B
|
Query
|
A collection of programs that enables you to store, modify, and extracts information from a database. b)
|
DBMS
|
A field which uniquely identifies every record in a table. e)
|
Table
|
A set of information stored about a particular entry. d)
|
Record
|
An arrangement of data in row and column format. c)
|
Primary Key
|
A database object that creates a datasheet of selected fields and records from one or more tables. a)
|
3) Select the best answer.
a) A (n) ____________________ is an organized collection of the related information.
Ans: database
Object
|
database
|
Property
|
document
|
b) Field size, format, input mask, caption and default values are:
ans: field properties
Key elements
|
field properties
|
Navigating modes
|
data types
|
c) The storage size of date/time type is
ans: 8 bytes
4 bytes
|
1 bytes
|
8 bytes
|
16 bytes
|
d) The _________________ key uniquely identifies each record
ans: Primary
Primary
|
database
|
Object
|
premier
|
e) ___________________ is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.
Ans: Referential integrity
Relationship
|
Referential integrity
|
Query
|
Forms
|
f) __________________ is an Access databases objects that information in a printed format.
ans: Report
Table
|
Form
|
Query
|
Report
|
4) Give the appropriate technical terms for the following.
a) A special type of database where data is stored in a number of separated but linked tables. Relational database
b) A field property that determines what data can be entered in the field, how the data looks, and the format in which it is stored. Input mask
c) A set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted. Referential integrity
d) A restriction you place on records in the open datasheet or from quickly isolated and display a subset of records. Filtering
e) A database object used primarily display records onscreen, to make it easier to enter new records and make changes to the existing records. Form
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Readmore Publication >>>>> Download Now
ReplyDelete>>>>> Download Full
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Readmore Publication >>>>> Download LINK
>>>>> Download Now
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Readmore Publication >>>>> Download Full
>>>>> Download LINK Dq