Saturday, October 22, 2016

Solved Objectives: Unique Publication

UNIQUE
Chapter 1:Networking and Telecommunication
1.      Write full form of the followings.
a)      FTP                  SMTP               TCP/IP             ISP                   POP                 MODEM
b)      UTP                 STP                  NetBEUI          DARPA           HTTP               WLAN
2.      Fill in the blanks.
a)      The interconnection of computer with or without wire is known ascomputer network.
b)      The servercomputer acts as the storehouse and distributor for the data, information and programs.
c)      A computer on a network that uses resources of the network is workstation.
d)      The network if computer within the room, building or campus isLAN
e)      The computer network of any two countries isWAN.
f)       The example of WAN is Internet.
3.      State True or False.
a)      Computer network only allows us to share computer hardware. False
b)      A workstation is a computer that uses the service of the network.True
c)      A computer network that covers small local area is MAN. False
d)      Internet is an example of WAN.True
e)      A server computer acts as the storehouse and distributer for the program data and information.True
f)       You can send message from one computer to another computer on the network.True
g)      Modem can convert digital signal into analog signal and vice versa.True
h)      A hub is also known as multi-port repeater.True
4.      Write technical term for the following statement.
a)      A group of interconnected computer.computer network
b)      A computer on a network.node
c)      The physical path through which data and information flow on the network.Transmissionmedia
d)      The data handling capacity of communication system. bandwidth
e)      The amount of data transmitted per second through the communication channel.bandwidth
f)       A computer which provides resources to other computer on the network.server
g)      A computer which uses services of a network.workstation
h)      An operating system of a server computer.network operating system
i)        A computer on the network that provides resource and allows a client to use it as a workstation.Nondedicated software
j)        A computer on the network that provides resources but does not allows a client to use it as a workstation.Dedicated software
k)      A network which uses bounded media. Wired network
l)        A transmission media through which data are transmitted in the form of light.Fiber optics cable
m)    A network that uses unbounded transmission media. Wireless network
n)      A network model having at least one server and more than one client computer.Client server network
o)      A network model where all nodes have equal right.Peer-to-peer network
p)      A network of computer within a room.LAN
q)      A computer network that is spread within a city of neighboring city.MAN
r)       A device that convert digital signal into analog signal and vice versa.MODEM
s)       A card that connect a computer within a networking cable.NIC
t)        A network of computer that cover whole world.WAN
u)      The physical layout of cabling for connecting computer on the network.Topology
v)      A network structure where all computer on the network are connected through a centrally located device.Star topology
w)    A set of rules that each computer on the network has to follow.Protocol
x)      A multiple port repeater.hub
y)      A network device that join segments of a computer.bridge
z)      A network device that regenerates or amplifies signals.repeater
aa)   A network device that makes communication between two different network having different protocols.gateway

Chapter 2:Internet and Its Services
1.      Write the full form of the following
a)      WWW              URL                 ISP                   FTP                  Email
b)      ISDN               VOIP               Telnet              IRC
c)      PSTN
2.      Fill in the blanks.
a)      Internet is the largest network of computer in the world.
b)      Dial-up internet access requiresmodem and telephone
c)      In the internet you can send and receive message using email facility.
d)      World Wide Web is also known as internet
e)      A ­­­­­­­­­­­­­­­­­­­website is the collection of web pages.
f)       Each page of information is known as webpage
g)      Each web sites is identified by the URL.
h)      Windows Internet Explorer and Netscape Navigator are two popular web browsers
3.      State whether the following statement are True or False.
a)      A person can reverse the room in a hotel and even purchase goods by using his computer.True
b)      Internet is the Network.True
c)      You can send mail through internet but cannot receive the mail. False
d)      A web page can have only textual information. False
e)      A search engine allows you to search web sites on the net as specified.True
f)       Downloader makes downloading files from web sites easy.True
4.      Write the technical term for the following:
a)      Selling and buying goods on the Internet.E-commerce
b)      A private internet.intranet
c)      A service of the internet that allows a user to post question for discussion.Newsgroup
d)      A service of the internet that allows a user to connect a remote computer.Telnet
e)      Internet services that helps us to send and receive instant messages.Email
f)       A company that provides internet facility.ISP

Chapter 3 :Computer Virus
1.      State whether Trueor  False.
a)      A virus is a useful program that help a user to perform some specific task. False
b)      Computer virus can hide themselves in other files.True
c)      Multi-partite virus can infect both the boot sector of the disk and executable file.True
d)      An anti-virus program having old virus definition file can effectively detect the latest virus. False
e)      All anti-virus program can detect and eliminate all types of viruses.True

2.      Fill in the blanks.
a)      An antivirus software uses to detect and remove viruses from the computer system.
b)      Boot sector Virus resides in the boot sector of a storage disk.
c)      File infector virus affect executable file.
d)      A malicious program that pretends to be something useful program is known as Trojan horse
e)      A program that is not a virus but behave like virus and can replicate is known as worm
f)       Macro virus infect files of MS-Word,MS-Excel and MS-Excess

Chapter 4: Cyber Law and Ethics
1.      Write the technical term for the following:
a)      The crime committed with the help of computer and internet.Cyber crime
b)      A law that deals with the criminal activities like on line fraud, hacking, etc.Cyber law
c)      A law that deals with cyber-crime.Cyber law
d)      The moral principles or the code of conduct that regulate the proper use of computer.Cyber ethics
Chapter 5: Computer Security
1.      State whether the following statement are True or False.
a)      When a hard disk of a computer system get damaged or lost, we don’t lose any data and information. False
b)      Some time by mistake a user can delete important files.True
c)      Hardware securing means securing hard disk from being damaged only. False
d)      Dust, fluctuation of electricity and over heat can damage hardware of computer system.True
e)      The regular check of computer system helps us to keep computer system in good working condition. False
f)       Volt guard and stabilizer can supply back up electric power tom a computer system when there is power cut off. False
g)      A UPS supplies steady voltage and provides electric power for short period of time.True
h)      When we set a password to file, and unauthorized person can delete the file.True
i)        Scan disk is a application program like MS-Word. False
j)        Defragmentation rearrange the fragmented files in the contiguous spaces on the disk.True
2.      Write the technical term for the following statement:
a.       An electric device that supply steady voltage to the appliance.Volt guard
b.      An electric device that supply electric power when the electric is cut off.UPS
c.       A secret word that gives a user access to a particular file, program or system.password
d.      A program that disinfects a file from a virus.antivirus
e.       A copy of file or program that is used when a original file is corrupted.backup
f.       A program that checks and keeps hard disk in good condition.scandisk
g.       A program that rearranges the fragmented files.defragmentation

Chapter 6: Multimedia
1.      Fill in the blanks.
a.       “Multimedia” word is made of multi and media words.
b.      Media means the way through which one can convey information.
c.       Text is the primary component of multimedia.
d.      Video refers to pictures in motion.
e.       Virtualreality is an artificial environment created with the computer hardware and software.
f.       MS-Power Point Software is used in creating presentation.
2.      State weather the following statement are True or False.
a.       Multimedia is the combination of more than one media.True
b.      Information can be presented more effective and understandable way by using more than one medium.True
c.       All the computer are capable of handling multimedia. False
d.      A computer that can handle only text and audio is multimedia computer. False
e.       Multimedia products are stored in pen drive. False
f.       Sound card is one of the hardware required in multimedia computer.True
g.       Most of the information is conveyed through the text medium.True
h.      Animation refers to simulation of movement created by displaying a series of picture one after another.True
i.        Video increase the retention of information for long time in the memory of people.True
j.        Multimedia is used in movies to add special effects.True
3.      Write a technical terms for the following statements.
a.       The combination of more than media such as text, picture, sound, movies clips, etc.multimedia
b.      The computer system that is capable to handle more than one media simultaneously.Multimedia computer
c.       A simulation of movement created by displaying a series of pictures one after the other.Animation
d.      The artificial environment created by computer technology that seems to be real.Virtual reality
e.       A technology that mixes text, pictures, sound, movies clips in a digital format.Multimedia technology

Chapter 8:Microsoft Access
1.      Fill in the blanks.
a.       A collection of related data of a person or anything is known as database.
b.      A field which uniquely identifies a record of a table is primary key.
c.       A column in a table is called field and row in a table is calledrecord.
d.      Primary key value must not benull.
e.       The default value size of text field is50.
f.       dBase is the example of DBMS.
g.       Memo is the field types used to store text that is more than 255 character.
h.      Auto number field type automatically enters number in a field which increase by one for every new record.
i.        We can change data type of field in table design view.
j.        Validation rule is used to make sure that the data entered in a field is within the criteria set by the user.
k.      Action query is used to change record in a table at a single operation.
l.        Delete query is used to delete records from the table.
2.      State whether the following statement are True or False.
a.       A database file of MS-Access can have only one table. False
b.      The extension of MS-Access database file is MDB.True
c.       A field name can have maximum of 64 character.True
d.      New field cannot be added in access after designation of table.False
e.       Picture can be stored I the Access Database.True
f.       A field can’t be declared with data type.True
g.       Query is used for printing record. False
h.      The table of MS-Access has .tbl extension. False
i.        A text data type can store maximum of 155 characters per field record. False
j.        Record is the collection of information.True
k.      Logical value can also be stored in database.True
l.        Hyperlink field type in used to store photographs. False
m.    A query cannot be the source for a form. False
n.      Primary key field may contain the same value in two records. False
o.      A report can be used to delete record from a table. False
p.      Index accelerates the query and sort operation.True
3.      Choose the correct answer.
a.       The default field size value of text field is 50
                                                              i.      40                    50                    256                  64
b.      Which component of MS-Access is used to enter data?Form
                                                              i.      Query              Forms              Report              Both (i) and (ii)
c.       All of above is a Database Management System.
                                                              i.      DBase              MSAV             EXCEL                        All of above
d.      A column in MS-Access Table is field
                                                              i.      Field                Query              Database          Record
e.       MS-Access is a RDBMS
                                                              i.      DBMS              RDBMS           Database          Metabase
f.       A row in a table is known as Record
                                                              i.      Field                Content                        Record             Text table
g.       Which is the database? Data of SLC Exam
                                                              i.      Data of SLC Exam       Oracle              MS-Access                   Excel
h.      A key which uniquely identifies each record of a table is primary key.
                                                              i.      Primary key                 Foreign key      Both (i) and (ii)                        None of above
i.        Field size of logical field is 1 bit in Access.
                                                              i.      1 bit                 1 byte              8 byte              0 bit
j.        Which component of MS-Access is used to print data?report
                                                              i.      Query              Form                Report              None
k.      MS-Access is used to create database.
                                                              i.      Database          DBMS              Record             Table
l.        A caption can have maximum of 2048 character.
                                                              i.      2062                2048                64000              2006
m.    The logical data type of Access is Yes/No
                                                              i.      Yes/No                        True/False        On/Off             All
n.      What is the extension of Access database?MDB
                                                              i.      MBD                MDB                DBF                 ADB
o.      Number field is used for storing only Number
                                                              i.      Number           Text and Number         Number and Time        Number and Year
p.      Paint is not DBMS.
                                                              i.      Oracle              dBase               FoxPro             Paint
q.      MS-Access is a kind of Application software.
                                                              i.      System Software          Operating System         Application Software   Utility Software
r.        Which is an example of database?telephone directory
                                                              i.      DBase              MS-Access       Telephone Directory    All
s.       Report is the printed output we generate from Both (i) and (ii)
                                                              i.      Table               Query              Forms              Both (i) and (ii)
t.        Which of them is not a data type?caption
                                                              i.      Memo              Yes/No                        Time/Date        Caption
u.      Which is the subtypes for the number data type?Integer
                                                              i.      Hyperlink        Bit                    Index               Integer
v.      The maximum size of the text field is 255
                                                              i.      253                  255                  256                  254


No comments:

Post a Comment