Saturday, October 22, 2016

Solved Objectives: Vidhyarthi Publication

VIDHYARTHI
Networking and Telecommunication
1.      Fill in the gaps:
a.       Telecommunication is a system of transmission of sounds, images, texts or data in the form of                                                                                  electronic signals.
b.      Modes for transmitting data from one device to another are simple, Half-duplex, and
full duplex mode.
c.       Bandwidth is measured in BPS.                                                         .
d.      Cat 5 cable is used with RJ-45 connector.
e.       Microwave is a wireless topology that can be used to transmit data between two different computers.
f.       MODEM is a short form of  Modulation Demodulation.
g.       ­­­­­­­­­­Unix is an example of network operating system.
h.      Peer to peer  network is group of computers, which acts as server and workstation.
2.      State whether true of false.
a.       Protocols are no required to exchange data between two different computers. False
b.      Fill duplex mode allows simultaneous transmission of data in both directions. True
c.       Wire communication is suitable for Local Area Network. True
d.      The router filters and forwards information among different networks. True
e.       In a computer network, the data is passed from one computer to another by means of cables or satellites. True
f.       A metropolitan area network (MAN) is a network of computers between two different cities. False
g.       The computers in a network system share only software packages. False
h.      Connecting computers between two different countries is an example of WAN. False
3.      Match the following:
a.       Protocol                                  Network within a building. (b)
b.      LAN                                          BNC (d)
c.       MAN                                        RJ-45 (e)
d.      Coaxial                                    Central device for star topology. (f)
e.       Cat 5                                        Rules to exchange data. (a)
f.       Hub                                          Network within a city. (c)
4.      Select the best answer:
a.       Which is not a network protocol?
i. TCP/IP      ii. HTTP      iii. LAN      iv. FTP
b.      Which is not a network operating system?
i. MSDOS    ii. Windows NT   iii. Windows 2000   iv. None of them
c.       Which is the component of a network?
i. MSDOS      ii. Hub      iii. Volt guard      iv. None of them
d.      Which is the connector of coaxial cable.
i. RJ 45      ii. BNC      iii. ST      iv. None of them
e.       An example of guided media
i. Radio wave   ii. Infrared   iii. Fiber-optics   iv. Micro Wave
f.       Which is an appropriate network within a building?
i. WAN      ii. MAN      iii. LAN      iv. All of them
g.       The device used for connecting computer to a telephone line is called.
i.  Modem      ii. NIC      iii. Router      iv. Bridge
h.      Which one is used to connect the dissimilar networks?
i. Router      ii. Bridge      iii. Gateway      iv. All of them
i.        An example of unguided communication media
i. Radio Frequency   ii. Microwave   iii. Both of them   iv. None of them
j.        TV broadcasting is an example for data transmitting
i. Half-duplex Mode   ii. Simplex Mode   iii. Full duplex mode   iv. None of them
5.      Write the technical terms for the following:
a.       Sending or receiving information between two or more persons. communication
b.      A system of transmission of sounds, images, texts or data in the form of electronic signals. telecommunication
c.       The path through which the sender makes communication to the receiver. medium
d.      Data can be transmitted in both directions but only in one direction at a time. half duplex mode
e.       Mode of transmission that transmits the data simultaneously in both directions. Full duplex mode
f.       Terms used to describe the data handling capacity of a communication system. bandwidth
g.       Cable lines through which data flows in a specified path. guided media
h.      The data or signals transmitted through the air in the communication. unguided media
i.        Two or more computers connected with each other to share data and other respurces. computer network
j.        The arrangement or connection patterns of computers or nodes and other devices of the network. topology
k.      Interface between the NIC of the computer and the cable that passes data from one computer to another computer. connectors
l.        A device that amplifies the incoming signals, creates a new copy of it and transmits the signals on the network. repeater
m.    An intelligent device that connects two different networks. router
n.      A device used to transfer the data of one computer to another using a telephone line. modem
o.      Set of rules that the computers on network must follow to communicate and to exchange data with each other. protocol
Internet and Services Knowledge and understanding
1.      Fill in the blanks:
a.       The Internet is network of networks.
b.      The Internet is useful in different sectors such as­­­­­­­­­­­­­­­ education and banking offices.
c.       Two types of modem are internet and external.
d.      ­­­­­­­­­­­­­Web browser is software that allows the user to surf the information through the Internet.
e.       Chat programs allows user to communicate with each other in real time.
f.       Transmission control Protocol or Internet Protocol is used to make communication between user computer and  other computer in the Internet.
2.       State True or False:
a.       The Internet became popular during 1980s. False
b.      The Internet is a network between different computers within a group. False
c.       An Internet electronic mail address has two parts the user name and the domain name. True
d.      We will use IRC to make real time communication. True
e.       Th e Internet is owned and controlled by US government. False
f.       The World Wide Web uses a protocol called TCP/IP. False
3.      Give full forms:
a.       TCP/IP                         FTP                  E-mail              IRC                  ARPA              IETF
b.      NSF                             WWW              ISOC                W3C                IAB      IRTF    INIC
4.      Choose the best answer:
a.       Email is
                                            i.            Mail concerning electronic devices
                                          ii.            Transaction of letters,messages and memos over a communication network.
                                        iii.            Transaction of messages within a computer.                                  None of them.
b.      E-mail
                                            i.            cannot address many users                        Can address many users
                                          ii.            can address only 10user                            None of them.
c.       Connection between a computer and  the Internet done using a normal telephone is called
                                            i.            Satellite network                Dial-Up network          Cable network             None of them
d.      The ARPAnet that helped to develop protocol is
                                            i.            TCP/IP                   ARP                 POPA               None of above
e.       FTP is used to
                                            i.            Browse the Internet                        Send emails
                                          ii.            transfer files from one computer to another                      None of above
f.       WWW is a
                                            i.            Protocol of Internet                        Service of Internet       Language of Internet    None of them
5.      Write technical terms:
        i.            The use of Internet to buy and sell goods and services. E-commerce
      ii.            Voice communication through Internet. I-telephony
    iii.            A program that allows the user to log into a remote computer on the Internet as a user on that system. telnet
    iv.            High speed digital communication network evolving from existing telephony. ISDN
      v.            Software that is used for surfing information through the Internet. Web browser
6.      Match the following:
        i.            Internet                                                                        Service of internet (iii)
      ii.            HTTP                                                                           Service provider (iv)
    iii.            Email                                                                           Networks of networks (i)
    iv.            ISP                                                                               Protocol (ii)
online chat
Computer Security
1.      Fill in the blanks:-
a.       In the computer, we store important data and information which can be destroyed, damaged, hacked etc. by different factors.
b.      The recommended computer room temperature should be 22`C
c.       Due to the faulty wiring or overloaded sockets, short circuits can take place which can cause fire and damage the computer system.
d.      UPS is a battery supported power unit between and external power source and a computer system which supplies clean and continuous power even during power failure.
e.       Virus  is a computer program that has been created to damage your computer system.
2.      True or False
a.       The electronic device used in the setup of the computer are not delicate. False
b.      Valuable data and information may get lost due to the faulty wiring system. False
c.       Air conditioning is more important for the computer system where the temperature and the humidity must be controlled. True
d.      Scan disk will check the files and folders of the selected drive for any errors, lost clusters, lost chains, and bad sectors. True
e.       Some individuals and companies keep their backups in safe devices. True
3.      Select the best answer
a.       Common computer security is
                                            i.            Hardware Security           Software security           Hardware & software security
                                          ii.            None of them
b.      Hardware security includes
                                            i.            Regular maintenance         Use of power of regulator devices
                                          ii.            Both i &ii                                  None of them
c.       Data and software security includes
                                            i.            Protection from computer virus                 Cover the computer property
                                          ii.            Both                                                           None of them
d.      UPS is a
                                            i.            Voltage filtration device                            Voltage processing device
                                          ii.            Voltage regulator device                            None of them

e.       Scan disk is performed by using
                                            i.            Application software                     Operating system software
                                          ii.            Utility software                              None of them
f.       Backup is way of
                                            i.            Securing data and information                   Securing internal part of the computer
                                          ii.            Securing external parts of the computer     None of them
g.       Defragmentation is a process of
                                            i.            Formatting the disk                                    Relocation of the disk
                                          ii.            Relocation of the files of the disk              None of them
4.      Write technical terms.
a.       The software used to scan a computer’s memory and disks to detect viruses. antivirus
b.      A copy of the file which is used in the event of the original file being corrupted. backup
c.       A battery supported power unit between and external power source and a computer system which supplies clean and continuous power even during power failures. UPS
d.      A computer program that has been created to destroy your computer system. Computer virus
e.       A secret word or phrase that gives a user access to a particular program or system. password
f.       The scattering of the parts of the same file disks file over different locations. fragmentation
g.       The processing of rewriting parts of a file to contiguous sectors on a hard disks to increase the speed of access and retrieval. defragmentation
5.      Match the following.
        i.            Backup                                                Software that destroys data (iv)
      ii.            Password                                             Utility software (iii)
    iii.            Scan Disk                                            Copy of data (i)
    iv.            Computer virus                                    Allows the user to access system (ii)
System Software
Computer Virus
1.      Fill in the blanks with the appropriate words.
a.       A computer virus is a type of program that replicate itself by making copies of itself without your knowledge or consent.   
b.      Multipartite viruses can infect both the application programs and the boot sector of a disk.
c.       A macro virus is a type of computer virus that infects the word processing or spread sheet document or template.
d.      Bootsector Viruses replace the boot record program of system disk.   
e.       Antivirus Software is designed to detect and remove viruses from computer system.    
2.      True or False.
a.       Each computer virus contains instructions to initiate a unique, problematic event on the infected computer. True
b.      Bootsector viruses attach themselves to any executable file, usually .COM and .EXE files. False
c.       Computer viruses cannot delete files and format a user’s hard disk. False
d.      Pirated software copies viruses, to the computer. True
e.       Do not install pirated software, especially computer games. True
3.      Select the best answer for the following.
a.       Virus is a
i. Utility program   ii. Destructive program   iii. System program   iv. None
b.      Boot sector virus affects
i. System files   ii. Master Boot Record   iii. Application software   iv. None
c.       An example of antivirus software is
i. NAV   ii. McAfee   iii. CPAV           iv. All
d.      Multipartite viruses have combination features of
i. Boot sector & stealth virus           ii. Boot sector &macro  virus
iii. Boot sector & program virus      iv. None
4.      Write the technical term for the following.
a.       A computer program that entertains and damages the user’s file. Computer virus
b.      A virus that damages documents created in MSWord and MSExel. Macro virus
c.       Software that protects computer system from computer virus. Antivirus
d.      A virus that affects application programs. Program virus
Multimedia
1.      Fill in the blanks:
a.       Multimedia is the integration of multiple forms of media.
b.      CD-ROM  is used to store data and information in the multimedia technology.
c.       Multimedia enhances the information for better communication understanding.
d.      Virtual reality  is an artificial environment created with computer hardware and software and presented to the user in such a way that it appears.
e.       Virtual reality uses head set and data gloves.
2.      Say if the following statements are True or False :
a.       Multimedia manipulates the information for better communication. True
b.      To use multimedia, one may or may not have a multimedia kit installed in the computer. False
c.       Images do not play any role in multimedia. False
d.      Multimedia is not used in education. False
e.       Multimedia technology used in public places as an information provider. True
f.       Cartoons on television are an example of animation. True
3.      Choose the best answer :-
a)      A MUK consists of the
                                            i.            CD-ROM Drive    Sound Card                  Speaker                        All of them
b)      The types of media used in multimedia includes
                                            i.            Text                                   Graphics                      Sound                          All of them
c)      Multimedia technology is very effective in
                                            i.            Market                               Classroom                    War                              None
d)      Select the common components of the multimedia computer system.
                                            i.            Floppy                               Floppy drive                CD-ROM                     None
e)      Software associated with the multimedia technology is
i.                    Windows XP                      Macromedia Flash       QBASIC                      None

4.      Write the correct technical term for the following :
a.       The integration of text, audio, sound and animation. Multimedia
b.      The moving graphics images. Animation
c.       The display of still-frame pictures or photos on a computer screen. Graphics
d.      The artificial environment created by computer technology to entertain users. Virus reality
Cyber Law and Computer Ethics
1.      Fill in the blanks:
a.       Cyberspace has become synonyms with the internet.
b.      Cyber law includes a wide variety of legal issues to the use of communication technology.
c.       Digital Signature is a security Mechanism system in the cyberspace for Digital data processing and transaction.
d.      Cyber Crime refers to illegal,action involved in any computer.
e.       The law which is enacted to ensure the preservation, integrity and reliability of data is called data protection and privacy law.
2.      State Whether the following statement is True or False:
a.       The term “cyberspace” was used in 1984. True
b.      Copyright law is related to intellectual property law. True      
c.       The government of Nepal could not pass “The Electronic Transaction and Digital Signature Act-Ordinance”. False
d.      The Digital signature allow the user to attach an original signature on the document of electronic records. False
e.       “The Electronic Transaction and Digital Signature Act-Ordinance” is popularly known as “cyber law” of Nepal. True
f.       The cyberspace describes the real world of computer. False  
3.      Give the full form of the following abbreviation:
a.       UNCITRAL:                WWW:                         EDI:                 IT:
4.      Match the following:
a.       Fair Credit reporting Act                                                                      1988 (d)
b.      Copyright                                                                                             Encryption and decryption (h)
c.       Cyber law of Nepal                                                                             1992 (e)
d.      Video Privacy Protection Act                                                               1970 (a)
e.       Copyright Act                                                                                      2004 (c)
f.       Freedom of Information Act                                                                1974 (g)
g.       Federal Privacy Act                                                                             1970 (f)
h.      Digital Signature                                                                                  Intellectual property (b)
5.      Select the correct answer for the each of the following:
a.       The term ‘cyberspace’ was used in:
                                                              i.      1984                            1884                            1985                            1885
b.      The law which includes literature and art, films, computer programs, invention, designed used by traders for their goods or services is called:
                                                              i.      Data Privacy Law                                Intellectual Property Law
                                                            ii.      Telecommunication Law                     Cyber crime Law
c.       The Process of ensuring the preservation, integrity and reliability of data is Known as:
                                                              i.      Intellectual Property Law                     Data Protection and Privacy law
                                                            ii.      Cyber Law                                           Telecommunication Law
d.       “The Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
                                                              i.      Intellectual Property Law                                 Cyber Law
                                                            ii.      Telecommunication Law                                 Data Protection Law
e.       The government of Nepal has passed the cyber law on:
                                                              i.      31st Bhadra 2061 BS                            29th Bhadra 2061 BS
                                                            ii.      30thBhadra 2062 BS                            30thBhadra 2061 BS
MS-ACCESS
1.      Fill in the blanks:
a.       MS-Access is Database management software which is used to manage data  and manipulate them
b.      In MS-Access, maximum characters are typed in text fields 255
c.       A column in a table is called field and a row in a table is called record.
d.      A primary key uniquely identifies a record.
e.       Examples of Database Management Software are Ms access, oracle and fox pro.
f.       The field grid pane displays columns in which you enter the field       names, the data type for each field and description of each fields.
g.       In MS-Access, we design a table using table design view
h.      A query extracts and arranges information from a table in a manner that you specify.
i.        Examples of database are dictionary and telephone directory
j.        Delete query is an example of action query.                   
k.      Query that makes changes in table is called update query.

2.       State whether the following statement are true or false:
a)      DBMS is word processing software. False
b)      Data can be numbers, letters or symbols, which may or may not give any sense. True
c)      A row in a table is called field and it contains a specific piece of informarion within a record. False.
d)      Memo accepts maximum 32,767 characters. False
e)      Data field occupies 10 bytes of memory.  False
f)       Data validation enables you to limit the values that can be accepted into a field. True
g)      A default value is one that is not displayed automatically for the field into a field. True
h)      The data filter selects the required records and displays the result. False
i)        A form is useful for entering, viewing and displays the result. True
j)        Default field size of text fieid is 50 characters. True
k)      Default data type of MS-Access is a number. False
l)        Action query makes changes in a table. True


No comments:

Post a Comment