TIMES
NETWORKING AND TELECOMMUNICATIONS
1. State True or False and correct false statements.
a) Networked computers allow easy transfer of data from one computer to another. True
b) A node is the primary data path that can carry large amount of data traffic. False
c) A peer-to-peer network is a simple, inexpensive network designed to connect computers together using twisted pair cable or coaxial cable. True
d) A hub is a device that amplifies a signal being transmitted on the network. False
e) Fiber optic transmitters and receivers are still relatively expensive compared to electrical interface. True
2. Fill in the blanks.
a) A network server is a computer designed to process requests and deliver data to other (client) computers over a Local Network or the Internet.
b) Network protocol is a set of rules that governs the communications between computers on a network.
c) A MAN is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a LAN but smaller than the area covered by a WAN.
d) Hub is a hardware device used to connect several computers together.
e) Router is a device connecting two or more networks that facilitates the transfer of data in the form of packets.
3. Write the technical terms for each of the following.
a) A computer that acts both as a server and a client-it shares resources (like a server) and uses them (like a client).
Peer-to-peer network
b) The protocol used for transferring hypertext documents that make the World Wide Web possible.
HTTP
c) A computer networking device that connects network segments.
Network switch
d) A network device that connects dissimilar networks.
Gateway
e) A mode of transmission in which data flows in the both directions, but only in one direction at a time.
Half duplex mode
3. Choose the best answer.
a) A specialized network device on a host-based network that transmits the data entered by the user to the host for processing and displays the results.
i. Client ii. Network Server iii. Terminal iv. None of the above
Terminal
b) A data communications system allowing a number of independent devices to communicate directly with each other, within a moderately sized geographic area.
i.LAN ii.WAN iii. MAN iv.CAN
LAN
c) A topology with a single cable that connects all the workstations, servers, printers and other devices on the network.
i. Ring Topology ii. Bus Topology iii. Star Topology iv. Mesh Topology
Bus topology
d) A device that lets you link two networks together.
i. Switch ii. Hub iii. Router iv. None of above
None of above
THE INTERNET AND ITS SERVICES
1. State True or False and correct false statements.
a) The Internet has greatly changed the way people use computers and communicate today. True
b) The seeds of today’s Internet were planted in 1959, when U.S. Department of Defense sponsored a project named ARPANET. False
c) The minimum hardware requirement for connecting the Internet is a computer system with at least 80486 processor, 40 GB hard disk and minimum 64 GB RAM with 128 MB RAM. True
d) Wiki is a technology that allows the creation of collaborative web sites. True
e) Web server is a set of interconnected web pages. False
2. Fill in the blanks.
a) Search engine are online services that allow users to scan the contents of the Internet to find Web sites or specific information of interest to them.
b) E-commerce refers to the buying and selling of things over the Internet.
c) The process of transferring a copy of a file from a remote computer to the requesting computer is called downloading .
d) Web servers are computers that deliver (serves up) Web pages.
e) HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.
3. Write the technical terms for each of the following.
a) The large group of millions of computers around the world that are all connected to one another.
Internet
b) A protocol used for sending emails from one server to another.
SMTP
c) The online services that allow users to scan the contents of the Internet to find web sites or specific information of interest to them.
Search engine
d) The buying and selling of things over the Internet.
E-commerce
e) A protocol used for transferring files from one computer to another typically from your computer to a web server.
FTP
4. Choose the best answer.
a) The large group of millions of computers around the world that are all connected to one another.
i. LAN ii.Intranet
iii.Internet iv. All of above
Internet
b) A technology that allows the creation of collaborative web sites.
i.Wiki ii.E-Mail
iii.Search Engine iv.All of above
Wiki
c) The buying and selling of things over the Internet.
i.Chat ii. E-Commerce
iii.Search Engine iv. All of above
E-commerce
d) A protocol used for transferring files from one computer to another typically from your computer to a web server.
i.Apple Talk ii.TCP/IP
iii.FTP iv. All of above
FTP
e) The process of transferring a copy of a file from a remote computer to the requesting computer.
i.Downloading ii.Uploading
iii.FTP iv.Gopher
Downloading
f) A set of interconnected webpages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
i.Web site ii.Web Browser
Iii.Web server iv. None of above
Web site
5. Give the full forms.
a) ARPAnet TCP/IP FTP POP3 SMTP
6. Match the following.
a) E-Mail The large group of millions of computers around the world that are all
connected to one another. c)
b) Wiki A company which gives us the facility to gain access to the Internet against a fee. d)
c) Internet A technology that allows the creation of collaborative web sites. b)
d) ISP A system used for creating, sending and storing textual data in the digital
form over a network. a)
COMPUTER VIRUSES
1. State True or False and correct false statements.
a) A computer virus needs another program in order to be able to be activated and infect other computer files. True
b) Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments. True
c) The most prevalent types of file viruses are the Michelangelo, stoned and disk killer. False
d) Stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. True
e) 306 Safeguard, Ad-Aware Pro and AVG Anti-virus are some popular antivirus software. True
2. Fill in the blanks.
a) Computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.
b) A system sector is an area of the computer hard drive or a floppy disk that is executed when the computer is started.
c) A polymorphic virus is a complicated computer virus that affects data types and functions.
d) Antivirus software is a class of program that searches your hard drive and floppy disks for any known or potential viruses.
3. Write the technical terms.
a) A program that can copy itself and infect a computer without the permission or knowledge of the user.
Computer virus
b) A virus that infects the part of the computer called a system sector.
Boot sector
c) A virus that directly attack and modify program files, which are usually .EXE or .COM files.
Program virus
d) The special macros that self replicate in the data files of personal productivity applications such as Word and Excel.
e) Macro virus
f) A class of program that searches your hard drive and floppy disks for any known or potential viruses.
Antivirus
4. Match the following.
a) Macro virus A virus that infects the part of the computer called a system sector. c)
b) Antivirus A virus that directly attack and modify program files, which are usually .EXE or .COM files. d)
c) Boot virus The special macros that self- replicate in the data files of personal
productivity applications such as Microsoft Word and Excel. a)
d) File virus A class of program that searches your hard drive and floppy disks
for any known or potential viruses. b)
5. Choose the best answer.
a) A computer program that can copy itself and infect a computer without the permission or knowledge of the user.
i.Computer worm ii.Trojan Horse
iii.Computer Virus iv.None of the above
Computer virus
b) A virus that infects the part of the computer called a system sector.
i.Boot sector virus ii.File infecting Virus
iii.Polymorphic virus iv. None of the above
Boot sector virus
c) Disk Killer, Stoned and Michelangelo are the examples of _
i. Boot sector virus ii. File infecting Virus
iii. Polymorphic virus iv. Script virus
Boot sector virus
d) The type of virus that is designed to infect executables files having extensions .exe, .com, or .dll.
i. Boot sector virus ii.File Virus
iii.Script virus iv.Macro virus
File virus
e) Polymorphic virus is a self-encrypted virus designed to avoid detection by a scanner.
i. Polymorphic virus ii. Macro virus
iii. Script virus iv. None of the above
Polymorphic virus
f) Antivirus is a class of program that searches your hard drive and floppy disks for any known or potential viruses.
i.Shareware ii.Freeware
iii.Antivirus iv.Malware
Antivirus
g) Dialers are programs that set up your modem connection to connect a 1-900 number.
i.Adware ii.Dialers
iii.Hijackers iv.Malware
Dialers
MULTIMEDIA AND ITS APPLICATION
1. State True or False and correct false statements.
a) Multimedia makes use of a wide range of resources, which can cost you a large amount of money. True
b) The important elements of multimedia are text, graphics, video, animation and audio. True
c) Animation is a digital representation of non-text information, such as a drawing, charts or photographs. False
d) Multimedia is being used more in the field of education to view patients’ internal organs and to learn about their functions. False
e) Virtual Reality is the use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment. True
2. Fill in the blanks.
a) Multimedia is defined as the combination of multiple media such as text, images, video, animation and audio.
b) Graphics is a digital representation of non-text information such as a drawing, chart or photographs.
c) Multimedia is used in the entertainment industry, especially to develop special effects in movies and animation.
d) Virtual reality is the use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment.
3. Choose the best answer.
a) A computer-delivered electronic system that allows the user to control, combine and manipulate different types of media, such as text, sound, video, computer graphics and animation.
i.Computer media ii.Multimedia
iii.Electronic media iv.None of the above
Multimedia
b) Graphics that contain movement often referred to as .
i.Graphics ii.Video
iii.Animation iv.Text
Animation
c) The multimedia computer requires the following components:
i.Powerful microprocessor ii.Large main memory
iii.Compact disk iv. All of the above
All of above
d) The use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment.
i.Internet ii.Virtual Reality
iii.Simulator iv.None of the above
Virtual Realiy
e) The software associated with the multimedia technology is .
i.Macromedia Flash ii.Mirosoft Word.
iii.Adobe Indesign iv. None of the above
Macromedia Flash
4. Match the following.
a) Animation The creation and manipulation of pictures images in the computer. b)
b) Graphics A system that enables one or more users to move and react with
computer graphics world. d)
c) Multimedia The moving graphics image. a)
d) VR The combination of multiple media such as text, image, video,
animation and audio. c)
5. Write the technical terms.
a) The combination of multiple media such as text, image, video, animation and audio.
Multimedia
b) A digital representation of non-text information such as a drawing, chart or photographs.
Graphics
c) The graphics that contains movement.
Animation
d) The use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment.
Virtual Reality
Computer Security System
1. State True or False and correct false statements.
a) The objective of computer security includes protection of information and property from theft, corruption, or natural disaster. True
b) The goal of securing the assets or information broadly involves insuring confidentiality, integrity, and availability of assets or information. True
c) Integrity means that assets are accessible to authorized parties at appropriate times. False
d) Alarms, security lightning and closed-circuit television cameras are some of the methods of software protection. False
e) Defragmentation refers to the condition of a disk in which files are divided into pieces scattered around the disk. False
2. Fill in the blanks.
a) Computer security is the process of preventing and detecting unauthorized use of any computer.
b) A power conditioner is an electrical device that provides “clean” AC power to sensitive electrical equipment.
c) A surge protector is an appliance designed to protect electrical devices from voltage spikes.
d) A password is a secret series of characters that enables a user to access a file, computer, or program.
e) Computer virus is a program or set of programs that disrupts the normal functioning of a computer.
3. Choose the best answer.
a) Hardware security protects the machine and peripheral hardware from theft electronic intrusion and damage.
i.Information security ii.Hardware security
iii.Software security iv.None of the above
Hardware Security
b) Some of the methods of hardware protection are:
i.Password security ii.Security lighting
iii.Scandisk iv.All of the above
Security lighting
c) The temperature in the computer system should be maintained between and .
i.68 to 72 degree Fahrenheit ii.88 to 78 degree Fahrenheit
iii.68 to 27 degree Fahrenheit iv.All of the above
68 to 72 degree Fahrenheit
d) is a device that allows your computer to keep running for at least a short time when the primary power source is lost.
i.UPS ii.Voltage regulator
iii.Surge processor iv.All of the above
UPS
e) An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS ii. Voltage regulator
iii. Surge processor iv.All of the above
Voltage regulator
f) Fragmentation refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation ii.Defragmentation
iii.Scan disk iv.All of the above
Fragmentation
g) An important countermeasure against data corruption or loss.
i.Password policy ii. Defragmentation
iii.Scan disk iv.Backup system
Backup system
4. Match the following.
UPS
|
The use of video cameras to transmit a signal to a specific place, on a limited set of monitors. e)
|
Password
|
A device that allows your computer to keep running for at least a short time when the primary power source is lost. a)
|
Spike Guard
|
An electrical regulator that maintain a consistent voltage output. d)
|
Volt guard
|
An appliance designed to protect electrical devices from voltage spikes. c)
|
CCTV
|
A secret series of characters that enables a user to access a file, computer, or program. b)
|
5. Write the technical terms.
a) The process of preventing and detecting unauthorized use of your computer.
b) The protection of the components of a computer system.
c) The use of video cameras to transmit a signal to a specific place, on a limited set of monitors.
d) An electrical device that provides “clean” AC power to sensitive electrical equipment.
e) A device that allows your computer to keep running for at least a short time when the primary power source is lost.
CYBERLAW AND ETHICS
1. State True or False and correct false statements.
a) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, software piracy and so on, which invade our privacy and offend our senses.
Computer Security
b) Intellectual Property can be defined as the relationship between collection and dissemination of data, technology privacy, and the legal and political issues surrounding them.
Hardware Security
c) Cyber law of Nepal commonly known as the Electronic and Digital Transaction Act-Ordinance was enacted in Nepal in 2061 B.S.
CCTV
d) Copyright Act of 1992 provides access right to government to see any record of individual.
Power conditioner
e) Computers ethics refer the behavior and ways of thinking of computer users in situations where a choice can affect the dignity and well being of others.
UPS
2. Fill in the blanks.
a) Cyber law is the law governing computers and the Internet.
b) A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of the document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
c) Computer crime may include thefts or actions in electric form that causes damages or difficulty to other computer users.
d) Intellectual property rights law is a term referring legal property rights of someone over his creations of the mind , both artistic and commercial.
e) Telecommunication is the exchange of information over significant distances by electronic means.
f) Cyber law of Nepal commonly known as the Electronic Transaction And Digital Signature Act-Ordinance was enacted in Nepal in 2061 B.S.
DATABASE MANAGEMENT SYSTEM
1. State True or False and correct false statements.
a) A database usually contains data pertaining to one particular entity (person, institution or organization). True
b) Microsoft Access, MySQL, Microsoft SQL Server, Oracle and FileMaker Pro are all examples of operating systems. False
c) Microsoft Access is a Relational Database Management System. True
d) A query is a collection of related data stored in an organized manner. False
e) A form is a user-friendly way of entering, displaying an editing data stored in a table. True
2. Fill in the blanks.
a) The default field size for text type is 50 characters.
b) An input mask is the format we will assign for the introduction of values into a field.
c) The default value property is used to define a default value that is automatically entered in field when you add a new record, at o time of data entry.
d) Filtering allows you to retrieve specific information from a table in Microsoft Access 2003.
e) Queries help us to retrieve and view only those records from the database tables that meet a specific condition or criteria set by us.
f) Report enable you to format your data in an attracting and informative layout for printing.
3. Select the best answer.
a) A Database Management System can be used to
i.retrieve information ii.search information
iii.sort information iv.all of the above
All of the above
b) The storage size of date and time is
i.4 bytes ii.6 bytes
iii.8 bytes iv.12 bytes
8 bytes
c) The data type appropriate to store address is
i.Memo ii.Currency
iii.Text iv.Autonumber
Text
d) The object of MS-ACCESS that issued to present the data stored in tables or queries in a printed form.
i.Query ii.Table
iii.Form iv.Report
Report
e) A collection of records for a single subject, such as all of the customer records.
i.Field ii.Record
iii.Table iv.Data
Table
f) Which of the following is not a data type in Microsoft Access?
i.Text ii.Currency
iii.Hypertext iv.Date/Time
Hypertext
g) A primary key is a field that uniquely identifies a record.
i.Candidate ii.Alternate
iii.Primary iv.Foreign
Primary
h) What is the extension of Access database file?
i..MBD ii..MDB
iii..DBF iv..DFB
MDB
i) The logical data type of access is
i.Yes/No ii.True/False
iii.On/Off iv.All of the above
Yes/No
j) Primary key does not accept
i.Text ii.Number
iii.Null value iv.None of the above
Null value
k) Field name can be up to 64 characters long.
i.64 ii.16
iii.128 iv.40
64
l) The default field size of “AutoNumber” data type is
i.Byte ii.Integer
iii.Long Integer iv.Long Integer
Byte
4. Match the following.
a) OLE Formatted printout d)
Form Picture a)
Indexing Data Entry b)
Report Fast Searching c)
Text
b) Query Printed format d)
Form Stores data c)
Table Allows view, edit, input data b)
Report Extracts selected record a)
DBMS
c) Data type Field property b)
Format Relationship d)
Form Referential Integrity
One-to-one Database Object c)
Memo a)
No comments:
Post a Comment