SUNRISE
1. State true or false:
a) Communication is the process of sharing message from one point to another. True
b) In half duplex mode of communication, data can be transmitted in both directions simultaneously. False
c) Metropolitan Area Network connects two or more LAN together with in a large city or state. False
d) Computer network allows sharing of software only. False
e) Coaxial cable has much greater bandwidth than fiber optic cable. False
f) A gateway is a network device which connects two dissimilar networks together. True
g) Each computer or device in a network is called node. True
h) Peer-to-peer is a network model which has more security than client server. False
2. Choose the correct answer:
a. Which of the following acts as the central authority in the network?
i. protocol ii.client iii.server iv.none of the above
Server
b. which of the following is not Media connector?
i.BNC ii. terminator iii.RJ-45 iv.NIC
NIC
c. In which of the following network model all the computers have equal access?
i. Peer-to-peer network ii. apple talk network
iii. Client/server network iv. None of the above
Peer-to-peer network
d. Which is an internetworking device that connects two dissimilar networks?
i. Bridge ii. Gateway iii. Switch iv. Router
Gateway
e. Which of the following device is multi ports repeater?
i. Hub ii. router iii. bridge iv. Gateway
Hub
f. Which of the following is not a protocol?
i.TCP/IP ii.IPX/SPX iii.NETBIOS/NETBUI iv. Client
Client
g. Which of the following is not the network operating system?
i. windows ii.MS-DOS iii. Linux iv. None of the above
MS-DOS
h. The speed of Modems is measured in terms of
i. mbps ii.bps iii. kbps iv. Bits
bps
i. Which of the following is guided communication media?
i. radio wave ii. fiber optic cable iii.satellite iv.Infrared
fiber optic cable
j. Which of the following topology uses hub as compulsory device
i. star topology ii. Bus topology iii. Ring topology iv. None of the above
star topology
k. Which is not network hardware component?
i.HUB ii. Repeater iii. Router iv. Windows NT
Windows NT
l. In which communication media does light travel in the form of light signal?
Fiber optic
3. Match the following points:
a. Column A Column B
i. Computer network Windows NT ii)
ii. Network OS HTTP iv)
iii. Transmission channel Resource Sharing i)
iv. Protocol UTP iii)
Bit
b. Column A Column B
i. Wi-Fi Network within a building
ii. Linear Bus Software component iv)
iii. BNC Topology ii)
iv. Device Driver Transmission Media i)
Media connector iii)
5. Write technical terms for the following statements:
a) The modes of transmission in which communication takes place from both the sides simultaneously.
Full duplex mode
b) A computer network limited within a room.
LAN
c) The interconnection between two or more computers through physical and logical components to share resources.
Computer network
d) The set of rules and procedures that makes the communication possible among different computers in a network.
Protocol
e) The computer that acts as the central authority on a network.
Server
f) The computer on which users run applications.
Workstation
g) The amount of data that can be transmitted through communication channels in a fixed time period.
Bandwidth
h) A network which is extended beyond the boundary of countries.
WAN
i) A device with multiple ports that joins multiple computer together.
Hub
j) The software which controls and manages all the operation in computer network.
NOS
k) The computer that controls and coordinates all the activities of the entire computer in a network.
Server
l) The physical interface between cabling and network places.
Topology
m) The topology in which all the computers are connected by a common distribution channel.
Bus Topology
n) The device which accepts weak signals regenerates them and sends them back on their way.
Repeater
o) The topology on which all the computers are connected to each other in a closed circular loop.
Ring Topology
p) A communication media which use light to carry a data signal through the cable.
Fiber optics
q) The physical layout or cabling structure of computers on Local area network.
Topology
r) The device that connects communication media with network devices.
Connectors
s) An intelligent device that connects two different networks by setting best network traffics.
Router
t) The device which connects similar networks having same protocols.
Bridge
6. Write the full forms of the following:
LAN, MAN, WAN, Wi-Fi, NIC, VOIP, UTP, Modem, NOS, PPP, SMTP, POP, IMAP, NNTP,
NetBEUI, NCP, BNC, GPS, MAC
1. Fill in the blanks:
a. Internet is also known as network of networks .
b. Mozilla Firefox is web browser program.
c. IRC is an online textual communication with each other in real time.
d. FTP is a protocol used to upload and download information.
e. The process of copying and storing data, files, programs, etc. from internet server to user’s computer is known as downloading.
2. Choose the correct answer:
a) The unique address of a web page on the internet is called
i.URL ii. Browseriii. Protocol iv.HTTP
URL
b) Which is the protocol used in internet?
i. TCP/IP ii.FTPiii.ICP iv.ISP
TCP/IP
c) Which one of the following is internet service?
i. Chat ii. e-commerce iii. e-mail iv. all of the above
all of above
d) Which of the following allows the user to surf and interact with the web-page?
i.website ii.browseriii.web page iv.web server
browser
e) The ARPAnet was developed by
i.ANSI ii.DARPA iii.POPA iv.None of them
None of them
f) Which is the correct email ID?
of the above
ramesh@yahoo.com
g) Which device is necessary to operate the internet?
i.CD-ROM ii. ISPiii. Modem iv.All of above
ISP
Which is web browser software?
i.Windows 2007 ii.Internet explorer iii.Windows NT iv.All of the above
Internet explorer
h) Which is not related to Internet?
i.ISP ii.TCP/IP iii.WWW iv.UPS
UPS
3. Match the following:
Column A Column B
a) Usenet Instant Chatting b)
b) MSN Remote Login c)
c) Telnet Internet component d)
d) Modem Newsgroup a)
e) Website
6. Write technical term for the following:
a) The process of sending and receiving messages electronically through the internet.
E-mail
b) The very first page of every web site.
Homepage
c) c.A company that provides internet services to the users.
ISP
d) Software or programs that search the website for us.
Search engine
e) Software that is used for surfing information through the internet.
Web browser
f) The process of copying files,documents, programs,etc from users computer to the web server.
Uploading
g) An internet tool that helps to download /upload the file.
FTP
h) Buying and selling products and services online.
E-commerce
i) The private network within an organization that utilizes the internet services.
Intranet
7. write full forms of the following:
TCP/IP, HTTP, NTC, FTP, WWW, IRC, NSFNet, URL, ISP, DARPA, ISDN, HTML, MIIS.DNS
1. State true or false:
a) Computer security is concerned with hardware security only. False
b) Backup is used for scanning and protecting computer from viruses. False
c) The use of ID card prevents unauthorized person from being entered in computer room. True
d) The lost data and information can be easily recovered in computer. False
e) The required voltage for computer system is 220 to 240. True
f) Scandisk is a disk tool that allows checking files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk. True
2. Select the best answer:
a) Which of the following is not hardware security method?
i.Insurance ii.Maintenance iii.Closed-circuit cameras iv.Hard lock key
Hard lock key
b) Which of the following measure allows to protect compouters being opened from unauthorized user?
i.Antivirus program ii.Password iii.Debug iv.program
Password
c) The computer security is purely concerned with the following
i.Hardware security ii.software security iii.Hardware and software security iv.Data security
Hardware and software security
d) Which of the following is not power supply decide?
i.Volt guard ii.UPS iii.Constant Voltage Transformer iv.Power Plug
Power plug
e) Which of the following is not software security measure?
i.Virus Scanning ii. Scandisk iii. Password iv. Security Guard
Security Guard
3.Match the following:
Column A Column B
a) Hard Lock Key Hardware Security c)
b) Spike guard Software security a)
c) Insurance Power protection device d)
d) Burlar alram Computer Security b)
Prevents unauthorized entrance
5. Write technical term for the following:
a) The method applied to increase the life of computers and its assets.
Regular maintenance
b) The secret word or phrase of authorized users to open computer and access programs.
Password
c) The scattering of the parts of the same disk file over different locations.
Fragmentation
d) The process of re-writing parts of a file to contiguous sector on a hard disk to increase the speed of access and retrieval.
Defragmentation
e) The process of making a reserve copy of file,which can be restored in case of original file is corrupted.
Backup
f) The power regulating device this supplies constant power to the computer from its backup system.
UPS
g) The software used to scan,locate and detect the disk for viruses.
Antivirus
h) An utility program used to detect and repair lost clusters and bad sectors of hard disk.
Scan disk
6.Write the full forms of the following:
CPU, UPS, CCTV, CVT, AC, DC, DVD, RAM
1. Fill in the blanks:
a) Computer virus replicates itself.
b) Antivirus is used to remove virus from computer.
c) File infector viruses corrupt only executable files form the computer.
d) The first person who introduced the concept of replicating program was John Von Neumann.
e) Polymorphic viruses are very difficult to identify and detect by anti-virus.
f) We should install Latest and updated antivirus in our computer.
2. Match the following:
Column A Column B
a) CPAV Propagating virus c)
b) Software piracy Antivirus software a)
c) Worm Virus transfer
d) Password Purpose of virus development b)
Virus safety measure d)
3. Select the correct answer:
a) Computer virus are known as
i.computer programs ii.biological problems iii.hardware components iv. None of the above
Computer programs
b) Which of the following is not anti-virus
i.AVG ii.NAV iii,Kaspersky iv.I Love you
I Love You
c) Which of the following virus infects the various parts of operating system?
i.boot sector ii. Worm iii.Macro iv.system infector
System infector
d) Which is the source for virus transfer?
i.Mouse ii.Pen drive iii.Printer iv.None of the above
Pendrive
e) Which software protects from computer virus?
i.Antivirus software ii.Word processing software
iii.Spreadsheet software iv.Backup software
Antivirus Software
f) Computer virus can destroy
i.Hardware ii.Software iii.Data iv.All
Data
g) Boot sector virus infects
i.System files ii.Master boot record iii.Application software iv.Document file
Master boot record
5. Write technical terms:
a) A program that destroys other program.
Computer virus
b) The software used to scan computer memory and disk to detect viruses.
Antivirus
c) The viruses which have combination features of boot sector viruses and program viruses.
Multipartite Virus
d) A type of computer virus that infects the document or template of word processing or spreadsheet.
Macro virus
e) The Program which is used to detect and eliminate computer virus.
Antivirus program
6. Write full forms of the following:
MCP, MBR, NAV, CPAV, PAV, KAV, USB
1. State true or false:
a) Cyber law of Nepal was introduced in 2060 B.S. False
b) Cyber law covers those areas including ICTS. True
c) Internet pornography is a type of cyber crime. True
d) The term ‘cyberspace’ was used by William Gibson for the first time. True
e) Cyber ethics are moral principles that make aware to the computer users. True
2. Match the following:
Column A Column B
a) Digital Signature Cyber crime b)
b) Forgery Electronic security system a)
c) Encryptions Cyber law d)
d) Copy right Locking message c)
Computer crime
3. Choose the correct answer:
a) Which of the following is computer crime?
i.piracy ii.pornography iii.harassment iv.All of above
All of above
b) When did cyber law introduced in Nepal.
i.2002 A.D. ii.2003 A.D. iii.2004 A.D. iv.2005 A.D.
2004 A.D
c) Which of the following is not computer crime?
i.Plagiarism ii.Password guessing iii.Internet iv.virus transferring
Internet
d) Which of the following is included in cyber law?
i.Trademark right ii.Copyright iii.Data privacy iv.All of the above
All of the above
e) Which of the following is not computer ethics?
i.Not to steal data ii.Not to bear false message
iii.Not to use Internet iv.Not to harm the society
Not to use internet
5.Write technical terms for the following:
a) The process of unauthorized access to an information system intentionally.
Hacking
b) The rules and procedures relates to the internet and cyberspace.
Cyber law
c) Moral rules to be followed by computer and other professionals.
Computer ethics
d) A security mechanism used on the internet that relies on two keys, one public and one private.
Digital signature
e) Virtual space created by computer networks, internet to make communication.
Cyber space
f) A person who uses a computer to gain an unauthorized access.
Hacker
g) A computer user who attempts to break into copyright protected software or an information system.
Cracker
h) The rules and regulation to systematize the computer related technology.
Cyber law
6. Write full forms of the following:
ICT, IT, ATM, NITC, CCA, ETDSA, NITDC, MOST, HLCIT
1. Match the following:
Column A Column B
a) TOEFL Multimedia software b)
b) PowerPoint Multimedia component c)
c) Speaker Interactive multimedia a)
d) Advertisement Virtual reality
Multimedia application d)
2. Select the best answer:
a) Which of the following media are used in Multimedia system?
i.Text-audio ii.Text-visual
iii.Text, graphic, audio and visual iv.Text, graphic and sound
Text, graphic, audio and visual
b) Which of the following is multimedia application?
i. Education ii.Entertainment iii.virtual reality iv.All of above
All of above
c) Which of the following is software used in multimedia technology.
i.Office XP ii.Adope Photoshop iii.Basic iv.None of the above
Adope Photoshop
d) Which of the following is note multimedia software?
i. Windows media player ii.Windows XP iii.Adobe illustrator iv.Macromedia flash
Windows XP
e) Which of the following are components of multimedia?
i.Computer ii.Software iii.Projector iv.All of above
All of above
f) Which is a technology that allows people to enter and interact with three dimensional computer graphics world?
i.Virtual system ii.Virtual reality iii.Graphics system iv.All of the above
Virtual reality
g) Which of the following is main component of multimedia?
i.Floppy disk ii.Hard disk iii.Sound card iv.Magnetic tap
Sound card
4. Write technical term for the following:
a) The process of displaying alphanumeric characters on the screen to present information.
Text
b) An integration of audio,video,graphics and text.
Multimedia
c) It is simulation movement created by displaying a series of particular frames or pictures.
Animation
d) The artificial environment created by computer technology to entertain user.
Virtual reality
e) A high capacity storage device that can read and write data into storage media.
DVD
f) The computer having capability to integrate two or more types of media for information presentation.
Multimedia computer
g) The program used to create and present multimedia system.
Multimedia Authority software
5. Write full forms of the following:
CBE, CAL, CAI, CBT, BMP, GIF, JPEG, LCD, CD-ROM, DVD
1. State true or false:
a) MS-Access is spreadsheet software. False
b) The default extension of MS-Access file is .DBF. False
c) Primary key field cannot be left blank. True
d) We cannot change data type of a field. False
e) Memo field is used to store long information beyond of the text. True
f) Yes/No Logical field stores one bit of data. True
g) More than one table can be created in MS-Access. True
h) Query can be used to apply mathematical calculations in the table. True
i) We can make the form as the source of table. False
j) * is a wild card that represents any one character in an expression. False
k) A form allows displaying one complete information at once. True
l) A query is used to select records from many tables. True
m) Index decreases the speed of the query and short operations. False
n) Report is used to prepare database for final printing. True
o) Field name can be up to the 98 characters long. False
2. Select the best answer:
a) Which of the following is not MS-Access database object?
i. Table ii. Form iii. Query iv.
Print
b) Which of the following data type is appropriate to store gender of person in terms M or F?
i. Memo ii. Currency iii. Yes no iv. Auto number
Yes no
c) Form is designed for
i. filters data ii. Sort data iii. Sort data iv. Modify data
Modify data
d) Query is used to
i. retrieves data from database ii. Create table in database
iii. Print database iv. All of above
retrieves data from database
e) Report is used for
i. Printing database ii. Process database iii. Filter database iv. None of the above
Printing database
f) Which of the following is not a data type?
i. Picture ii.date/time iii.text iv.number
Picture
g) What is the maximum length of text field?
i.512 characters ii.50 characters iii. 255 characters iv.No limit
255 characters
h) Which of the following is not field property?
i. indexed ii. Field size iii.color iv.format
color
i) What field type is used to store picture in a table?
i.memo ii.OLE iii.hyperlink iv.None
OLE
j) Which of the following uniquely identifies any field.
i.Index ii.Memo iii.Primary key iv.Query
Primary key
k) The object of MS-Access that stores the data is known as
i.Query ii.Table iii.Form iv.report
Table
l) Which is the example of Relational Database Management System?
i.Oracle ii.FoxBASE iii.Sybase iv.FoxPro
Oracle
m) The datatype which is used for only integer value.
i.text ii.currency iii.number iv.OLE
number
n) What kind of data are kept in memo field?
i.Name of Student ii.Students phone number
iii.Students Bio data iv.Students picture
Students’ Bio data
o) Which of the following is not the datatype of MS-Access?
i.yes/no ii.true/false iii.on/off iv.All
Yes/no
p) A field is also known as
i.records ii.column iii.Database iv.entity
column
q) Which of the following field property limits from wrong data entry.
i.Input mask ii.caption iii.required iv.validation rule
validation rule
3.Match the following:
a) Column A Column B
Index database
Data redundancy software d)
Record easy to search a)
DBMS repetition of data b)
Tuple c)
b) Column A Column B
Form database
Primary key data type d)
Advance Filter text control a)
Hyperlink unique identification of record b)
Query c)
c) Column A Column B
Sort mass change d)
Single precision DBMS c)
FoxPro memo field
Update query sub type of number b)
Arranging data a)
d) Column A Column B
Mark ledger Predefined formats c)
Wild cards database a)
Wizard primary key d)
Relationship * and? b)
Report
where is the rest
ReplyDeleteAru chapter ko khoi ???
Deleteanswer question khoi
DeleteQbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Sunrise Publication >>>>> Download Now
Delete>>>>> Download Full
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Sunrise Publication >>>>> Download LINK
>>>>> Download Now
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Solved Objectives: Sunrise Publication >>>>> Download Full
>>>>> Download LINK 7Y
other chapter
ReplyDeleteFuck
ReplyDelete