Saturday, October 22, 2016

Solved Objectives: Sunrise Publication

SUNRISE
1.      State true or false:
a)      Communication is the process of sharing message from one point to another. True
b)       In half duplex mode of communication, data can be transmitted in both directions simultaneously. False
c)       Metropolitan Area Network connects two or more LAN together with in a large city or state. False
d)       Computer network allows sharing of software only. False
e)       Coaxial cable has much greater bandwidth than fiber optic cable. False
f)        A gateway is a network device which connects two dissimilar networks together. True
g)       Each computer or device in a network is called node. True
h)       Peer-to-peer is a network model which has more security than client server. False
2.      Choose the correct answer:
            a.  Which of the following acts as the central authority in the network?
                         i. protocol    ii.client                iii.server     iv.none of the above
                                                            Server
b. which of the following is not Media connector?
i.BNC             ii. terminator    iii.RJ-45            iv.NIC
                                    NIC
c. In which of the following network model all the computers have equal access?
i. Peer-to-peer network              ii. apple talk network
iii. Client/server network            iv. None of the above
                                    Peer-to-peer network
d. Which is an internetworking device that connects two dissimilar networks?
i. Bridge          ii. Gateway       iii. Switch          iv. Router
                                    Gateway
e. Which of the following device is multi ports repeater?
i. Hub              ii. router            iii. bridge          iv. Gateway
                                    Hub
f. Which of the following is not a protocol?
                          i.TCP/IP        ii.IPX/SPX        iii.NETBIOS/NETBUI        iv. Client
                                                            Client
g. Which of the following is not the network operating system?
i. windows        ii.MS-DOS    iii. Linux            iv. None of the above
                                    MS-DOS
h. The speed of Modems is measured in terms of
i. mbps                 ii.bps           iii. kbps                 iv. Bits
                                    bps
i. Which of the following is guided communication media?
i. radio wave        ii. fiber optic cable    iii.satellite          iv.Infrared
                                    fiber optic cable
j. Which of the             following topology uses hub as compulsory device
i. star topology   ii. Bus topology         iii. Ring topology            iv. None of the above
                                    star topology
k. Which is not network hardware component?
i.HUB           ii. Repeater  iii. Router            iv. Windows NT
                                    Windows NT
l. In which communication media does light travel in the form of light signal?
i. Telephone wire     ii. Fiber optic    iii. Coaxial cable             iv. Twisted pair cable
                                    Fiber optic
3. Match the following points:
a.       Column A                                             Column B
 i. Computer network                                       Windows NT ii)
 ii. Network OS                                                HTTP iv)
iii. Transmission channel                                 Resource Sharing i)
iv. Protocol                                                      UTP iii)
 Bit
b.         Column A                                             Column B
i. Wi-Fi                                                            Network within a building
ii. Linear Bus                                                  Software component iv)
iii. BNC                                                          Topology ii)
iv. Device Driver                                             Transmission Media i)
                                                                        Media connector iii)
5. Write technical terms for the following statements:
a)      The modes of transmission in which communication takes place from both the sides simultaneously.
Full duplex mode
b)      A computer network limited within a room.
LAN
c)      The interconnection between two or more computers through physical and logical components to share resources.
Computer network
d)      The set of rules and procedures that makes the communication possible among  different computers in a network.
Protocol
e)      The computer that acts as the central authority on a network.
Server
f)       The computer on which users run applications.
Workstation
g)      The amount of data that can be transmitted through communication channels in a fixed time period.
Bandwidth
h)      A network which is extended beyond the boundary of countries.
WAN
i)        A device with multiple ports that joins multiple computer together.
Hub
j)        The software which controls and manages all the operation in computer network.
NOS
k)      The computer that controls and coordinates all the activities of the entire computer in a network.
Server
l)        The physical interface between cabling and network places.
Topology
m)    The topology in which all the computers are connected by a common distribution channel.
Bus Topology
n)      The device which accepts weak signals regenerates them and sends them back on their way.
Repeater
o)      The topology on which all the computers are connected to each other in a closed circular loop.
Ring Topology
p)      A communication media which use light to carry a data signal through the cable.
Fiber optics
q)      The physical layout or cabling structure of computers on Local area network.
Topology
r)       The device that connects communication media with network devices.
Connectors
s)       An intelligent device that connects two different networks by setting best network traffics.
Router
t)        The device which connects similar networks having same protocols.
Bridge
6. Write the full forms of the following:
LAN, MAN, WAN, Wi-Fi, NIC, VOIP, UTP, Modem, NOS, PPP, SMTP, POP, IMAP, NNTP,
NetBEUI, NCP, BNC, GPS, MAC
1.      Fill in the blanks:
a.      Internet is also known as network of  networks  .
b.     Mozilla Firefox is  web browser  program.
c.      IRC  is an online textual communication with each other in real time.
d.     FTP  is a protocol used to upload and download information.
e.      The process of copying and storing data, files, programs, etc. from internet server to user’s computer is known as downloading.
2.      Choose the correct answer:
a)      The unique address of a web page on the internet is called
i.URL                 ii. Browseriii. Protocol                 iv.HTTP
URL
b)      Which is the protocol used in internet?
i. TCP/IP            ii.FTPiii.ICP         iv.ISP
TCP/IP
c)      Which one of the following is internet service?
i. Chat              ii. e-commerce         iii. e-mail                       iv. all of the above
all of above
d)      Which of the following allows the user to surf and interact with the web-page?
i.website            ii.browseriii.web page                  iv.web server
browser
e)      The ARPAnet was developed by
 i.ANSI       ii.DARPA  iii.POPA iv.None of them
None of them
f)       Which is the correct email ID?
i.Yahoo@ramesh                       ii.ramesh@yahoo.com              iii.@ramesh.yahoo.com            iv.None
of the above
ramesh@yahoo.com
g)      Which device is necessary to operate the internet?
i.CD-ROM         ii. ISPiii. Modem                 iv.All of above
ISP
Which is web browser software?
 i.Windows 2007                       ii.Internet explorer     iii.Windows NT                       iv.All of the above
Internet explorer
h)      Which is not related to Internet?
i.ISP                 ii.TCP/IP               iii.WWW                       iv.UPS
UPS
3. Match the following:
Column A                           Column B
a)      Usenet                        Instant Chatting  b)
b)      MSN                           Remote Login c)                               
c)      Telnet                         Internet component  d)  
d)      Modem                       Newsgroup a)
e)      Website
6. Write technical term for the following:
a)      The process of sending and receiving messages electronically through the internet.
E-mail
b)      The very first page of every web site.
Homepage
c)      c.A company that provides internet services to the users.
ISP
d)      Software or programs that search the website for us.
Search engine
e)      Software that is used for surfing information through the internet.
Web browser
f)       The process of copying files,documents, programs,etc from users computer to the web server.
Uploading
g)      An internet tool that helps to download /upload the file.
FTP
h)      Buying and selling products and services online.
E-commerce
i)        The private network within an organization that utilizes the internet services.
Intranet
7. write full forms of the following:
TCP/IP, HTTP, NTC, FTP, WWW, IRC, NSFNet, URL, ISP, DARPA, ISDN, HTML, MIIS.DNS
1. State true or false:
a)      Computer security is concerned with hardware security only. False
b)       Backup is used for scanning and protecting computer from viruses. False
c)      The use of ID card prevents unauthorized person from being entered in computer room. True
d)      The lost data and information can be easily recovered in computer. False
e)      The required voltage for computer system is 220 to 240. True
f)       Scandisk is a disk tool that allows checking files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk. True
2. Select the best answer:
a)      Which of the following is not hardware security method?
i.Insurance     ii.Maintenance       iii.Closed-circuit cameras        iv.Hard lock key
Hard lock key
b)      Which of the following measure allows to protect compouters being opened from unauthorized user?
i.Antivirus program      ii.Password                 iii.Debug               iv.program
Password
c)      The computer security is purely concerned with the following
i.Hardware security            ii.software security     iii.Hardware and software security                  iv.Data security
Hardware and software security  
d)      Which of the following is not power supply decide?
i.Volt guard               ii.UPS     iii.Constant Voltage Transformer                    iv.Power Plug
Power plug
e)      Which of the following is not software security measure?
i.Virus Scanning          ii. Scandisk                  iii. Password             iv. Security Guard
Security Guard
3.Match the following:
  Column A                                                       Column B                     
a)      Hard Lock Key                                   Hardware Security c)
b)      Spike guard                                         Software security a)   
c)      Insurance                                             Power protection device  d)
d)      Burlar alram                                        Computer Security b)
Prevents unauthorized entrance


5. Write technical term for the following:
a)      The method applied to increase the life of computers and  its assets.
Regular maintenance
b)      The secret word or phrase of authorized users to open computer and access programs.
Password
c)      The scattering of the parts of the same disk file over different locations.
Fragmentation
d)      The process of re-writing parts of a file to contiguous sector on a hard disk to increase the speed of access and retrieval.
Defragmentation
e)      The process of making a reserve copy of file,which can be restored in case of original file is corrupted.
Backup
f)       The power regulating device this supplies constant power to the computer from its backup system.
UPS
g)      The software used to scan,locate and detect the disk for viruses.
Antivirus
h)      An utility program used to detect and repair lost clusters and bad sectors of hard disk.
Scan disk
6.Write the full forms of the following:
CPU, UPS, CCTV, CVT, AC, DC, DVD, RAM
1. Fill in the blanks:
a)      Computer virus replicates itself.
b)     Antivirus is used to remove virus from computer.
c)      File infector viruses corrupt only executable files form the computer.
d)      The first person who introduced the concept of replicating program was John Von Neumann.
e)      Polymorphic viruses are very difficult to identify and detect by anti-virus.
f)       We should install Latest and updated antivirus in our computer.
2. Match the following:
Column A                                   Column B
a)      CPAV                                Propagating virus c)
b)      Software piracy                 Antivirus software a)   
c)      Worm                                Virus transfer                         
d)      Password                           Purpose of virus development b)
Virus safety measure d)
3. Select the correct answer:
a)      Computer virus are known as
i.computer programs             ii.biological problems     iii.hardware components       iv. None of the above
Computer programs
b)      Which of the following is not anti-virus
i.AVG                                  ii.NAV                      iii,Kaspersky                      iv.I Love you
I Love You
c)      Which of the following virus infects the various parts of operating system?
i.boot sector                        ii. Worm                    iii.Macro                             iv.system infector
System infector
d)      Which is the source for virus transfer?
i.Mouse                            ii.Pen drive                 iii.Printer                            iv.None of the above
Pendrive
e)      Which software protects from computer virus?
i.Antivirus software            ii.Word processing software
iii.Spreadsheet software     iv.Backup software
Antivirus Software
f)       Computer virus can destroy
i.Hardware                         ii.Software                  iii.Data                                iv.All
Data
g)      Boot sector virus infects
i.System files                     ii.Master boot record          iii.Application software     iv.Document file
Master boot record
5. Write technical terms:
a)      A program that destroys other program.
Computer virus
b)      The software used to scan computer memory and disk to detect viruses.
Antivirus
c)      The viruses which have combination features of boot sector viruses and program viruses.
Multipartite Virus
d)      A type of computer virus that infects the document or template of word processing or spreadsheet.
Macro virus
e)      The Program which is used to detect and eliminate computer virus.
Antivirus program
6. Write full forms of the following:
MCP, MBR, NAV, CPAV, PAV, KAV, USB
1. State true or false:
a)      Cyber law of Nepal was introduced in 2060 B.S. False
b)      Cyber law covers those areas including ICTS. True
c)      Internet pornography is a type of cyber crime. True
d)      The term ‘cyberspace’ was used by William Gibson for the first time. True
e)      Cyber ethics are moral principles that make aware to the computer users. True
2. Match the following:
       Column A                                   Column B
a)      Digital Signature                 Cyber crime b)
b)      Forgery                                Electronic security system a)
c)      Encryptions                          Cyber law d)
d)      Copy right                            Locking message c)
                                                            Computer crime
3. Choose the correct answer:
a)      Which of the following is computer crime?
i.piracy            ii.pornography                  iii.harassment                iv.All of above
All of above
b)      When did cyber law introduced in Nepal.
i.2002 A.D.        ii.2003 A.D.                      iii.2004 A.D.                  iv.2005 A.D.
2004 A.D
c)      Which of the following is not computer crime?
i.Plagiarism        ii.Password guessing         iii.Internet                      iv.virus transferring
Internet
d)      Which of the following is included in cyber law?
i.Trademark right    ii.Copyright                       iii.Data privacy               iv.All of the above
All of the above
e)      Which of the following is not computer ethics?
i.Not to steal data                   ii.Not to bear false message
iii.Not to use Internet             iv.Not to harm the society
Not to use internet
5.Write technical terms for the following:
a)      The process of unauthorized access to an information system intentionally.
Hacking
b)      The rules and procedures relates to the internet and cyberspace.
Cyber law
c)      Moral rules to be followed by computer and other professionals.
Computer ethics
d)      A security mechanism used on the internet that relies on two keys, one public and one private.
Digital signature
e)      Virtual space created by computer networks, internet to make communication.
Cyber space
f)       A person who uses a computer to gain an unauthorized access.
Hacker
g)      A computer user who attempts to break into copyright protected software or an information system.
Cracker
h)      The rules and regulation to systematize the computer related technology.
Cyber law
6. Write full forms of the following:
   ICT, IT, ATM, NITC, CCA, ETDSA, NITDC, MOST, HLCIT
1. Match the following:
Column A                                 Column B
a)      TOEFL                                    Multimedia software b)
b)      PowerPoint                              Multimedia component c)     
c)      Speaker                                    Interactive multimedia a)
d)      Advertisement                          Virtual reality
                                                             Multimedia application d)
2. Select the best answer:
a)      Which of the following media are used in Multimedia system?
i.Text-audio                                    ii.Text-visual
iii.Text, graphic, audio and visual  iv.Text, graphic and sound
Text, graphic, audio and visual 
b)      Which of the following is multimedia application?
i. Education     ii.Entertainment                   iii.virtual reality          iv.All  of above
All  of above
c)      Which of the following is software used in multimedia technology.
i.Office XP                     ii.Adope Photoshop             iii.Basic                       iv.None of the above
Adope Photoshop            
d)      Which of the following is note multimedia software?
i. Windows media player         ii.Windows XP                   iii.Adobe illustrator           iv.Macromedia flash
Windows XP  
e)      Which of the following are components of multimedia?
i.Computer                     ii.Software                             iii.Projector                   iv.All of above
All of above
f)       Which is a technology that allows people to enter and interact with three dimensional computer graphics world?
i.Virtual system             ii.Virtual reality                     iii.Graphics system       iv.All of the above
Virtual reality                    
g)      Which of the following is main component of multimedia?
i.Floppy disk                 ii.Hard disk                            iii.Sound card               iv.Magnetic tap
Sound card              
4. Write technical term for the following:
a)      The process of displaying alphanumeric characters on the screen to present information.
Text
b)      An integration of audio,video,graphics and text.
Multimedia
c)      It is simulation movement created by displaying a series of particular frames or pictures.
Animation
d)      The artificial environment created by computer technology to entertain user.
Virtual reality
e)      A high capacity storage device that can read and write data into storage media.
DVD
f)       The computer having capability to integrate two or more types of media for information presentation.
Multimedia computer
g)      The program used to create and present multimedia system.
Multimedia Authority software
5. Write full forms of the following:
CBE, CAL, CAI, CBT, BMP, GIF, JPEG, LCD, CD-ROM, DVD
1. State true or false:
a)      MS-Access is spreadsheet software. False
b)      The default extension of MS-Access file is .DBF. False
c)      Primary key field cannot be left blank. True
d)      We cannot change data type of a field. False
e)      Memo field is used to store long information beyond of the text. True
f)       Yes/No Logical field stores one bit of data. True
g)      More than one table can be created in MS-Access. True
h)      Query can be used to apply mathematical calculations in the table. True
i)        We can make the form as the source of table. False
j)        * is a wild card that represents any one character in an expression. False
k)      A form allows displaying one complete information at once. True
l)        A query is used to select records from many tables. True
m)    Index decreases the speed of the query and short operations. False
n)      Report is used to prepare database for final printing. True
o)      Field name can be up to the 98 characters long. False
2. Select the best answer:
a)      Which of the following is not MS-Access database object?
i. Table                      ii. Form                     iii. Query                         iv.
Print
b)      Which of the following data type is appropriate to store gender of person in terms M or F?
i. Memo                    ii. Currency              iii. Yes no                         iv. Auto number
Yes no
c)      Form is designed for
i. filters data              ii. Sort data               iii. Sort data                      iv. Modify data
Modify data
d)      Query is used to
i. retrieves data from database                ii. Create table in database
iii. Print database      iv. All of above
retrieves data from database               
e)      Report is used for
i. Printing database                                  ii. Process database     iii. Filter database           iv. None of the above
Printing database                                 
f)       Which of the following is not a data type?
i. Picture                  ii.date/time                       iii.text                              iv.number
Picture
g)      What is the maximum length of text field?
i.512 characters            ii.50 characters            iii. 255 characters        iv.No limit
255 characters
h)      Which of the following is not field property?
i. indexed               ii. Field size                 iii.color                            iv.format
color
i)        What field type is used to store picture in a table?
i.memo                  ii.OLE                          iii.hyperlink                     iv.None
OLE
j)        Which of the following uniquely identifies any field.
i.Index                  ii.Memo                      iii.Primary key                 iv.Query
Primary key
k)      The object of MS-Access that stores the data is known as
i.Query                 ii.Table                        iii.Form                            iv.report
Table
l)        Which is the example of Relational Database Management System?
i.Oracle                ii.FoxBASE                  iii.Sybase                          iv.FoxPro
Oracle
m)    The datatype which is used for only integer value.
i.text                     ii.currency                    iii.number                         iv.OLE
number
n)      What kind of data are kept in memo field?
i.Name of Student                                    ii.Students phone number
iii.Students Bio data                                 iv.Students picture
Students’ Bio data
o)      Which of the following is not the datatype of MS-Access?
i.yes/no                ii.true/false                   iii.on/off                               iv.All
Yes/no
p)      A field is also known as
i.records               ii.column                     iii.Database                          iv.entity
column
q)      Which of the following field property limits from wrong data entry.
i.Input mask         ii.caption                     iii.required                            iv.validation rule
validation rule
3.Match the following:
a)                Column A                                           Column B
    Index                                                   database
    Data redundancy                                 software d)
    Record                                                 easy to search a)
    DBMS                                                  repetition of data b)
                                                                 Tuple c)
b)          Column A                                           Column B
          Form                                                   database
          Primary key                                        data type d)
          Advance Filter                                    text control a)
          Hyperlink                                            unique identification of record b)
                                                                Query c)
c)                Column A                                           Column B
          Sort                                                      mass change d)
          Single precision                                   DBMS c)
          FoxPro                                                 memo field
          Update query                                       sub type of number b)
                                                                       Arranging data a)
d)                Column A                                           Column B
          Mark ledger                                        Predefined formats c)
          Wild cards                                          database a)
          Wizard                                                primary key d)
          Relationship                                        * and? b)
                                                                      Report


5 comments:

  1. Replies
    1. Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Sunrise Publication >>>>> Download Now

      >>>>> Download Full

      Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Sunrise Publication >>>>> Download LINK

      >>>>> Download Now

      Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Sunrise Publication >>>>> Download Full

      >>>>> Download LINK 7Y

      Delete