Saturday, October 22, 2016

Solved Objectives: Times Publication


TIMES
                       NETWORKING AND TELECOMMUNICATIONS
1.      State True or False and correct false statements.
a)      Networked computers allow easy transfer of data from one computer to another. True
b)      A node is the primary data path that can carry large amount of data traffic. False
c)      A peer-to-peer network is a simple, inexpensive network designed to connect computers together using twisted pair cable or coaxial cable. True
d)      A hub is a device that amplifies a signal being transmitted on the network. False  
e)      Fiber optic transmitters and receivers are still relatively expensive compared to electrical interface. True
2.      Fill in the blanks.
a)      A  network server   is a computer designed to process requests and deliver data to other (client) computers over a Local Network or the Internet.
b)      Network protocol   is a set of rules that governs the communications between computers on a network.
c)       MAN    is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a LAN but smaller than the area covered by a WAN.
d)      Hub     is a hardware device used to connect several computers  together.
e)      Router   is a device connecting two or more networks that facilitates the transfer of data in the form of packets.
3.      Write the technical terms for each of the following.
a)      A computer that acts both as a server and a client-it shares resources (like a server) and uses them (like a client).
Peer-to-peer network
b)      The protocol used for transferring hypertext documents that make the World Wide Web possible.
HTTP
c)      A computer networking device that connects network segments.
Network switch
d)      A network device that connects dissimilar networks.
Gateway
e)      A mode of transmission in which data flows in the both directions, but only in one direction at a time.
Half duplex mode
3.      Choose the best answer.
a)      A specialized network device on a host-based network that transmits the data entered by the user to the host for processing and displays the results.
i. Client                   ii. Network Server                   iii. Terminal                 iv. None of the above
Terminal
b)      A data communications system allowing a number of independent devices to communicate directly with each other, within a moderately sized geographic area.
i.LAN                    ii.WAN                        iii. MAN                                    iv.CAN
LAN
c)      A topology with a single cable that connects all the workstations, servers, printers and other devices on the network.
i. Ring Topology           ii. Bus Topology               iii. Star Topology     iv. Mesh Topology
Bus topology
d)      A device that lets you link two networks together.
i. Switch                      ii. Hub                    iii. Router           iv. None of above
None of above
                             THE INTERNET AND ITS SERVICES
1.    State True or False and correct false statements.
a)      The Internet has greatly changed the way   people use computers and communicate today. True
b)      The seeds of today’s   Internet were planted in 1959, when U.S. Department of Defense sponsored a project named ARPANET. False
c)      The minimum hardware requirement for connecting the Internet is a computer system with at least 80486 processor, 40 GB hard disk and minimum 64 GB RAM with 128 MB RAM. True
d)      Wiki is a technology that allows the creation of collaborative web sites. True
e)      Web server is a set of interconnected web pages. False 
2.      Fill in the blanks.
a)       Search engine   are online services that allow users to scan the contents of the Internet to find Web sites or specific information of interest to them.
b)      E-commerce    refers to the buying and selling of things over the Internet.
c)      The process of transferring a copy of a file from a remote computer to the requesting computer is called  downloading    .                 
d)      Web servers    are computers that deliver (serves up) Web pages.
e)      HTTP    is a set of standards that allow users of the World Wide Web to exchange information found on web pages.  
3.      Write the technical terms for each of the following.
a)      The large group of millions of computers around the world that are all connected to one another.
Internet
b)      A protocol used for sending emails from one server to another.
SMTP
c)      The online services that allow users to scan the contents of the Internet to find web sites or specific information of interest to them.
Search engine
d)      The buying and selling of things over the Internet.
E-commerce
e)      A protocol used for transferring files from one computer to another typically from your computer to a web server.
FTP
4.      Choose the best answer.
a)      The large group of millions of computers around the world that are all connected to one another.
i. LAN                                                                                                     ii.Intranet
iii.Internet                                                                                                iv. All of above
Internet
b)      A technology that allows the creation of collaborative web sites.
i.Wiki                                                                                                   ii.E-Mail
iii.Search Engine                                                                                   iv.All of above
Wiki
c)      The buying and selling of things over the Internet.
i.Chat                                                                                                    ii. E-Commerce
iii.Search Engine                                                                                   iv. All of above
E-commerce
d)      A protocol used for transferring files from one computer to another typically from your computer to a web server.
i.Apple Talk                                                                                           ii.TCP/IP
iii.FTP                                                                                                      iv. All of above
FTP                                                                         
e)      The process of transferring a copy of a file from a remote computer to the requesting computer.
i.Downloading                                                                                       ii.Uploading
iii.FTP                                                                                                    iv.Gopher
Downloading
f)       A set of interconnected webpages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
i.Web site                                                                                              ii.Web Browser
Iii.Web server                                                                                          iv. None of above
Web site
5.      Give the full forms.
a)      ARPAnet               TCP/IP             FTP                  POP3               SMTP
6.      Match the following.
a)      E-Mail                    The large group of millions of computers around the world that are all        
                                connected to one another. c)                                                                             
b)      Wiki                        A company which gives us the facility to gain access to the Internet                               against a fee. d)
c)      Internet                    A technology that allows the creation of collaborative web sites. b)
d)      ISP                          A system used for creating, sending and storing textual data in the digital
                                form over a network. a)
                                                    COMPUTER VIRUSES
1.      State True or False and correct false statements.
a)      A computer virus needs another program in order to be able to be activated and infect other computer files. True
b)      Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. True
c)      The most prevalent types of file viruses are the Michelangelo, stoned and disk killer. False
d)      Stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. True
e)      306 Safeguard, Ad-Aware Pro and AVG Anti-virus are some popular antivirus software. True
2.      Fill in the blanks.
a)      Computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
b)      A   system sector     is an area of the computer hard drive or a floppy disk that is executed when the computer is started.
c)      A   polymorphic virus is a complicated computer virus that affects data types and functions.
d)      Antivirus   software is a class of program that searches your hard drive and floppy disks for any known or potential viruses.
3.      Write the technical terms.
a)      A program that can copy itself and infect a computer without the permission or knowledge of the user.
Computer virus
b)      A virus that infects the part of the computer called a system sector.
Boot sector
c)      A virus that directly attack and modify program files, which are usually .EXE or .COM files.
Program virus
d)      The special macros that self replicate in the data files of personal productivity applications such as Word and Excel.
e)      Macro virus
f)       A class of program that searches your hard drive and floppy disks for any known or potential viruses.
Antivirus
4.      Match the following.
a)      Macro virus                    A virus that infects the part of the computer called a system sector. c)
b)      Antivirus                        A virus that directly attack and modify program files, which are                                                 usually .EXE or .COM files. d)
c)      Boot virus                       The special macros that self- replicate in the data files of personal 
                                        productivity applications such as Microsoft Word and Excel. a)
d)      File virus                         A class of program that searches your hard drive and floppy disks
                                      for any known or potential viruses. b)
5.      Choose the best answer.
a)      A computer program that can copy itself and infect a computer without the permission or knowledge of the user.
i.Computer worm                                                                           ii.Trojan Horse
iii.Computer Virus                                                                           iv.None of the above
Computer virus
b)      A virus that infects the part of the computer called a system sector.
i.Boot sector virus                                                                           ii.File infecting Virus
iii.Polymorphic virus                                                                       iv. None of the above
Boot sector virus
c)      Disk Killer, Stoned and Michelangelo are the examples of  _                  
i. Boot sector virus                                                                            ii. File infecting Virus
iii. Polymorphic virus                                                                        iv. Script virus
Boot sector virus
d)      The type of virus that is designed to infect executables files having extensions .exe, .com, or .dll.
i. Boot sector virus                                                                            ii.File Virus
iii.Script virus                                                                                    iv.Macro virus
File virus
e)      Polymorphic virus  is a self-encrypted virus designed to avoid detection by a scanner.
i. Polymorphic virus                                                                            ii. Macro virus
iii. Script virus                                                                                     iv. None of the above
Polymorphic virus
f)        Antivirus is a class of program that searches your hard drive and floppy disks for                                 any known or potential viruses.
i.Shareware                                                                                           ii.Freeware
iii.Antivirus                                                                                          iv.Malware 
Antivirus
g)         Dialers   are programs that set up your modem connection to connect a 1-900 number.
i.Adware                                                                                               ii.Dialers
iii.Hijackers                                                                                          iv.Malware
Dialers
                       
 MULTIMEDIA AND ITS APPLICATION
1.      State True or False and correct false statements.
a)      Multimedia makes use of a wide range of resources, which can cost you a large amount of money. True
b)      The important elements of multimedia are text, graphics, video, animation and audio. True
c)      Animation is a digital representation of non-text information, such as a drawing, charts or photographs. False
d)      Multimedia is being used more in the field of education to view patients’ internal organs and to learn about their functions. False
e)      Virtual Reality is the use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment. True
2.      Fill in the blanks.
a)      Multimedia   is defined as the combination of multiple media such as text, images, video, animation and audio.
b)      Graphics  is a digital representation of non-text information such as a drawing, chart or  photographs.
c)      Multimedia is used in the entertainment industry, especially to develop special effects in movies   and animation.
d)      Virtual reality   is the use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment.
3.      Choose the best answer.
a)      A computer-delivered electronic system that allows the user to control, combine and manipulate different types of media, such as text, sound, video, computer graphics and animation.
i.Computer media                                                                                         ii.Multimedia
iii.Electronic media                                                                               iv.None of the above
Multimedia
b)      Graphics that contain movement often referred to as                        .
i.Graphics                                                                                                      ii.Video
iii.Animation                                                                                                 iv.Text
Animation
c)      The multimedia computer requires the following components:
i.Powerful microprocessor                                                                            ii.Large main memory
iii.Compact disk                                                                                            iv. All of the above
All of above
d)      The use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment.
i.Internet                                                                                                        ii.Virtual Reality
iii.Simulator                                                                                                   iv.None of the above
Virtual Realiy
e)      The software associated with the multimedia technology is                           .
i.Macromedia Flash                                                                                       ii.Mirosoft Word.
iii.Adobe Indesign                                                                                          iv. None of the above
Macromedia Flash
4.      Match the following.
a)      Animation                         The creation and manipulation of pictures images in the computer.                                             b)
b)      Graphics                            A system that enables one or more users to move and react with
                                           computer graphics world. d)
c)      Multimedia                        The moving graphics image. a)
d)      VR                                     The combination of multiple media such as text, image, video,
                                           animation and audio. c)
5.      Write the technical terms.
a)      The combination of multiple media such as text, image, video, animation and audio.
Multimedia
b)      A digital representation of non-text information such as a drawing, chart or photographs.
Graphics
c)      The graphics that contains movement.
Animation
d)      The use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment.
Virtual Reality
                                       

 Computer Security System
1.      State True or False and correct false statements.
a)      The objective of computer security includes protection of information and property from theft, corruption, or natural disaster. True
b)      The goal of securing the assets or information broadly involves insuring confidentiality, integrity, and availability of assets or information. True
c)      Integrity means that assets are accessible to authorized parties at appropriate times. False
d)      Alarms, security lightning and closed-circuit television cameras are some of the methods of software protection. False
e)      Defragmentation refers to the condition of a disk in which files are divided into pieces scattered around the disk. False
2.      Fill in the blanks.
a)      Computer security is the process of preventing and detecting unauthorized use of any computer.
b)      A power conditioner is an electrical device that provides “clean” AC power to sensitive electrical equipment.
c)      A surge protector is an appliance designed to protect electrical devices from voltage spikes.
d)      A password   is a secret series of characters that enables a user to access a file, computer, or program.
e)      Computer virus   is a program or set of programs that disrupts the normal functioning of a computer.
3.      Choose the best answer.
a)      Hardware security  protects the machine and peripheral hardware from theft electronic intrusion and damage.
i.Information security                                                                                 ii.Hardware security
iii.Software security                                                                           iv.None of the above
Hardware Security
b)      Some of the methods of hardware protection are:
i.Password security                                                                                       ii.Security lighting
iii.Scandisk                                                                                                   iv.All of the above
Security lighting
c)      The temperature in the computer system should be maintained between             and          .
i.68 to 72 degree Fahrenheit                                                            ii.88 to 78 degree       Fahrenheit
iii.68 to 27 degree Fahrenheit                                                  iv.All of the above
68 to 72 degree Fahrenheit
d)                                  is a device that allows your computer to keep running for at least a short time when the primary power source is lost.
i.UPS                                                                                                             ii.Voltage regulator
iii.Surge processor                                                                                         iv.All of the above
UPS
e)      An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS                                                                                                             ii. Voltage regulator
iii. Surge processor                                                                                        iv.All of the above
Voltage regulator
f)       Fragmentation   refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation                                                                                         ii.Defragmentation
iii.Scan disk                                                                                               iv.All of the above
Fragmentation
g)      An important countermeasure against data corruption or loss.
i.Password policy                                                                                      ii. Defragmentation
iii.Scan disk                                                                                               iv.Backup system
Backup system
4.      Match the following.
UPS
The use of video cameras to transmit a signal to a specific place, on a limited set of monitors. e)
Password
A device that allows your computer to keep running for at least a short time when the primary power source is lost. a)
Spike Guard
An electrical regulator that maintain a consistent voltage output. d)
Volt guard
An appliance designed to protect electrical devices from voltage spikes. c)
CCTV
A secret series of characters that enables a user to access a file, computer,   or program. b)
5.      Write the technical terms.
a)      The process of preventing and detecting unauthorized use of your computer.
b)      The protection of the components of a computer system.
c)      The use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
d)      An electrical device that provides “clean” AC power to sensitive electrical equipment.
e)      A device that allows your computer to keep running for at least a short time when the primary power source is lost.
                                                              CYBERLAW AND ETHICS
1.      State True or False and correct false statements.
a)      Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, software piracy and so on, which invade our privacy and offend our senses.
Computer Security
b)      Intellectual Property can be defined as the relationship between collection and dissemination of data, technology privacy, and the legal and political issues surrounding them.
Hardware Security
c)      Cyber law of Nepal commonly known as the Electronic and Digital Transaction Act-Ordinance was enacted in Nepal in 2061 B.S.
CCTV
d)      Copyright Act of 1992 provides access right to government to see any record of individual.
Power conditioner
e)      Computers ethics refer the behavior and ways of thinking of computer users in situations where a choice can affect the dignity and well being of others.  
UPS
2.      Fill in the blanks.
a)      Cyber law   is the law governing computers and the Internet.
b)      A   digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of the document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
c)      Computer crime   may include thefts or actions in electric form that causes damages or difficulty to other computer users.
d)      Intellectual property rights law   is a term referring legal property rights of someone over his creations of the mind , both artistic and commercial.
e)      Telecommunication is the exchange of information over significant distances by electronic means.
f)       Cyber law of Nepal commonly known as the Electronic Transaction And Digital Signature Act-Ordinance was enacted in Nepal in    2061 B.S.
                                     DATABASE MANAGEMENT SYSTEM
1.      State True or False and correct false statements.
a)      A database usually contains data pertaining to one particular entity (person, institution or organization). True
b)      Microsoft Access, MySQL, Microsoft SQL Server, Oracle and FileMaker Pro are all examples of operating systems. False
c)      Microsoft Access is a Relational Database Management System. True
d)      A query is a collection of related data stored in an organized manner. False
e)      A form is a user-friendly way of entering, displaying an editing data stored in a table. True
2.      Fill in the blanks.
a)      The default field size for text type is    50   characters.
b)      An   input mask    is the format we will assign for the introduction of values into a field.
c)      The default value    property is used to define a default value that is automatically entered in field when you add a new record, at o time of data entry.
d)      Filtering   allows you to retrieve specific information from a table in Microsoft Access 2003.
e)      Queries   help us to retrieve and view only those records from the database tables that meet a specific condition or criteria set by us.
f)       Report   enable you to format your data in an attracting and informative layout for printing.
3.      Select the best answer.
a)      A Database Management System can be used to
i.retrieve information                                                                         ii.search information
iii.sort information                                                                             iv.all of the above
All of the above
b)      The storage size of date and time is
i.4 bytes                                                                                             ii.6 bytes
iii.8 bytes                                                                                           iv.12 bytes
8 bytes
c)      The data type appropriate to store address is
i.Memo                                                                                               ii.Currency
iii.Text                                                                                                iv.Autonumber
Text
d)      The object of MS-ACCESS that issued to present the data stored in tables or queries in a printed form.
i.Query                                                                                                ii.Table
iii.Form                                                                                               iv.Report
Report
e)      A collection of records for a single subject, such as all of the customer records.
i.Field                                                                                                 ii.Record
iii.Table                                                                                               iv.Data
Table
f)       Which of the following is not a data type in Microsoft Access?
i.Text                                                                                                   ii.Currency
iii.Hypertext                                                                                       iv.Date/Time
Hypertext
g)      A    primary   key is a field that uniquely identifies a record.
i.Candidate                                                                                          ii.Alternate
iii.Primary                                                                                           iv.Foreign
Primary
h)      What is the extension of Access database file?
i..MBD                                                                                                 ii..MDB
iii..DBF                                                                                                iv..DFB
MDB
i)        The logical data type of access is
i.Yes/No                                                                                               ii.True/False
iii.On/Off                                                                                             iv.All of the above
Yes/No
j)        Primary key does not accept
i.Text                   ii.Number
iii.Null value                                                                                        iv.None of the above
Null value
k)      Field name can be up to    64  characters long.
i.64                                                                                                        ii.16
iii.128                                                                                                    iv.40
64
l)        The default field size of “AutoNumber” data type is
i.Byte                                                                                                     ii.Integer
iii.Long Integer                                                                                      iv.Long Integer
Byte
4.      Match the following.
a)      OLE                                       Formatted printout d)
Form                                       Picture a)
Indexing                                 Data Entry b)
Report                                     Fast Searching c)
                                               Text
b)      Query                                     Printed format d)
Form                                       Stores data c)
Table                                      Allows view, edit, input data b)
Report                                    Extracts selected record a)
                                               DBMS
c)      Data type                                Field property b)
Format                                    Relationship d)
Form                                       Referential Integrity
One-to-one                             Database Object c)
                                                Memo a)


No comments:

Post a Comment