VIDHYARTHI
Networking and Telecommunication
1. Fill in the gaps:
a. Telecommunication is a system of transmission of sounds, images, texts or data in the form of electronic signals.
b. Modes for transmitting data from one device to another are simple, Half-duplex, and
full duplex mode.
c. Bandwidth is measured in BPS. .
d. Cat 5 cable is used with RJ-45 connector.
e. Microwave is a wireless topology that can be used to transmit data between two different computers.
f. MODEM is a short form of Modulation Demodulation.
g. Unix is an example of network operating system.
h. Peer to peer network is group of computers, which acts as server and workstation.
2. State whether true of false.
a. Protocols are no required to exchange data between two different computers. False
b. Fill duplex mode allows simultaneous transmission of data in both directions. True
c. Wire communication is suitable for Local Area Network. True
d. The router filters and forwards information among different networks. True
e. In a computer network, the data is passed from one computer to another by means of cables or satellites. True
f. A metropolitan area network (MAN) is a network of computers between two different cities. False
g. The computers in a network system share only software packages. False
h. Connecting computers between two different countries is an example of WAN. False
3. Match the following:
a. Protocol Network within a building. (b)
b. LAN BNC (d)
c. MAN RJ-45 (e)
d. Coaxial Central device for star topology. (f)
e. Cat 5 Rules to exchange data. (a)
f. Hub Network within a city. (c)
4. Select the best answer:
a. Which is not a network protocol?
i. TCP/IP ii. HTTP iii. LAN iv. FTP
b. Which is not a network operating system?
i. MSDOS ii. Windows NT iii. Windows 2000 iv. None of them
c. Which is the component of a network?
i. MSDOS ii. Hub iii. Volt guard iv. None of them
d. Which is the connector of coaxial cable.
i. RJ 45 ii. BNC iii. ST iv. None of them
e. An example of guided media
i. Radio wave ii. Infrared iii. Fiber-optics iv. Micro Wave
f. Which is an appropriate network within a building?
i. WAN ii. MAN iii. LAN iv. All of them
g. The device used for connecting computer to a telephone line is called.
i. Modem ii. NIC iii. Router iv. Bridge
h. Which one is used to connect the dissimilar networks?
i. Router ii. Bridge iii. Gateway iv. All of them
i. An example of unguided communication media
i. Radio Frequency ii. Microwave iii. Both of them iv. None of them
j. TV broadcasting is an example for data transmitting
i. Half-duplex Mode ii. Simplex Mode iii. Full duplex mode iv. None of them
5. Write the technical terms for the following:
a. Sending or receiving information between two or more persons. communication
b. A system of transmission of sounds, images, texts or data in the form of electronic signals. telecommunication
c. The path through which the sender makes communication to the receiver. medium
d. Data can be transmitted in both directions but only in one direction at a time. half duplex mode
e. Mode of transmission that transmits the data simultaneously in both directions. Full duplex mode
f. Terms used to describe the data handling capacity of a communication system. bandwidth
g. Cable lines through which data flows in a specified path. guided media
h. The data or signals transmitted through the air in the communication. unguided media
i. Two or more computers connected with each other to share data and other respurces. computer network
j. The arrangement or connection patterns of computers or nodes and other devices of the network. topology
k. Interface between the NIC of the computer and the cable that passes data from one computer to another computer. connectors
l. A device that amplifies the incoming signals, creates a new copy of it and transmits the signals on the network. repeater
m. An intelligent device that connects two different networks. router
n. A device used to transfer the data of one computer to another using a telephone line. modem
o. Set of rules that the computers on network must follow to communicate and to exchange data with each other. protocol
Internet and Services Knowledge and understanding
1. Fill in the blanks:
a. The Internet is network of networks.
b. The Internet is useful in different sectors such as education and banking offices.
c. Two types of modem are internet and external.
d. Web browser is software that allows the user to surf the information through the Internet.
e. Chat programs allows user to communicate with each other in real time.
f. Transmission control Protocol or Internet Protocol is used to make communication between user computer and other computer in the Internet.
2. State True or False:
a. The Internet became popular during 1980s. False
b. The Internet is a network between different computers within a group. False
c. An Internet electronic mail address has two parts the user name and the domain name. True
d. We will use IRC to make real time communication. True
e. Th e Internet is owned and controlled by US government. False
f. The World Wide Web uses a protocol called TCP/IP. False
3. Give full forms:
a. TCP/IP FTP E-mail IRC ARPA IETF
b. NSF WWW ISOC W3C IAB IRTF INIC
4. Choose the best answer:
a. Email is
i. Mail concerning electronic devices
ii. Transaction of letters,messages and memos over a communication network.
iii. Transaction of messages within a computer. None of them.
b. E-mail
i. cannot address many users Can address many users
ii. can address only 10user None of them.
c. Connection between a computer and the Internet done using a normal telephone is called
i. Satellite network Dial-Up network Cable network None of them
d. The ARPAnet that helped to develop protocol is
i. TCP/IP ARP POPA None of above
e. FTP is used to
i. Browse the Internet Send emails
ii. transfer files from one computer to another None of above
f. WWW is a
i. Protocol of Internet Service of Internet Language of Internet None of them
5. Write technical terms:
i. The use of Internet to buy and sell goods and services. E-commerce
ii. Voice communication through Internet. I-telephony
iii. A program that allows the user to log into a remote computer on the Internet as a user on that system. telnet
iv. High speed digital communication network evolving from existing telephony. ISDN
v. Software that is used for surfing information through the Internet. Web browser
6. Match the following:
i. Internet Service of internet (iii)
ii. HTTP Service provider (iv)
iii. Email Networks of networks (i)
iv. ISP Protocol (ii)
online chat
Computer Security
1. Fill in the blanks:-
a. In the computer, we store important data and information which can be destroyed, damaged, hacked etc. by different factors.
b. The recommended computer room temperature should be 22`C
c. Due to the faulty wiring or overloaded sockets, short circuits can take place which can cause fire and damage the computer system.
d. UPS is a battery supported power unit between and external power source and a computer system which supplies clean and continuous power even during power failure.
e. Virus is a computer program that has been created to damage your computer system.
2. True or False
a. The electronic device used in the setup of the computer are not delicate. False
b. Valuable data and information may get lost due to the faulty wiring system. False
c. Air conditioning is more important for the computer system where the temperature and the humidity must be controlled. True
d. Scan disk will check the files and folders of the selected drive for any errors, lost clusters, lost chains, and bad sectors. True
e. Some individuals and companies keep their backups in safe devices. True
3. Select the best answer
a. Common computer security is
i. Hardware Security Software security Hardware & software security
ii. None of them
b. Hardware security includes
i. Regular maintenance Use of power of regulator devices
ii. Both i &ii None of them
c. Data and software security includes
i. Protection from computer virus Cover the computer property
ii. Both None of them
d. UPS is a
i. Voltage filtration device Voltage processing device
ii. Voltage regulator device None of them
e. Scan disk is performed by using
i. Application software Operating system software
ii. Utility software None of them
f. Backup is way of
i. Securing data and information Securing internal part of the computer
ii. Securing external parts of the computer None of them
g. Defragmentation is a process of
i. Formatting the disk Relocation of the disk
ii. Relocation of the files of the disk None of them
4. Write technical terms.
a. The software used to scan a computer’s memory and disks to detect viruses. antivirus
b. A copy of the file which is used in the event of the original file being corrupted. backup
c. A battery supported power unit between and external power source and a computer system which supplies clean and continuous power even during power failures. UPS
d. A computer program that has been created to destroy your computer system. Computer virus
e. A secret word or phrase that gives a user access to a particular program or system. password
f. The scattering of the parts of the same file disks file over different locations. fragmentation
g. The processing of rewriting parts of a file to contiguous sectors on a hard disks to increase the speed of access and retrieval. defragmentation
5. Match the following.
i. Backup Software that destroys data (iv)
ii. Password Utility software (iii)
iii. Scan Disk Copy of data (i)
iv. Computer virus Allows the user to access system (ii)
System Software
Computer Virus
1. Fill in the blanks with the appropriate words.
a. A computer virus is a type of program that replicate itself by making copies of itself without your knowledge or consent.
b. Multipartite viruses can infect both the application programs and the boot sector of a disk.
c. A macro virus is a type of computer virus that infects the word processing or spread sheet document or template.
d. Bootsector Viruses replace the boot record program of system disk.
e. Antivirus Software is designed to detect and remove viruses from computer system.
2. True or False.
a. Each computer virus contains instructions to initiate a unique, problematic event on the infected computer. True
b. Bootsector viruses attach themselves to any executable file, usually .COM and .EXE files. False
c. Computer viruses cannot delete files and format a user’s hard disk. False
d. Pirated software copies viruses, to the computer. True
e. Do not install pirated software, especially computer games. True
3. Select the best answer for the following.
a. Virus is a
i. Utility program ii. Destructive program iii. System program iv. None
b. Boot sector virus affects
i. System files ii. Master Boot Record iii. Application software iv. None
c. An example of antivirus software is
i. NAV ii. McAfee iii. CPAV iv. All
d. Multipartite viruses have combination features of
i. Boot sector & stealth virus ii. Boot sector ¯o virus
iii. Boot sector & program virus iv. None
4. Write the technical term for the following.
a. A computer program that entertains and damages the user’s file. Computer virus
b. A virus that damages documents created in MSWord and MSExel. Macro virus
c. Software that protects computer system from computer virus. Antivirus
d. A virus that affects application programs. Program virus
Multimedia
1. Fill in the blanks:
a. Multimedia is the integration of multiple forms of media.
b. CD-ROM is used to store data and information in the multimedia technology.
c. Multimedia enhances the information for better communication understanding.
d. Virtual reality is an artificial environment created with computer hardware and software and presented to the user in such a way that it appears.
e. Virtual reality uses head set and data gloves.
2. Say if the following statements are True or False :
a. Multimedia manipulates the information for better communication. True
b. To use multimedia, one may or may not have a multimedia kit installed in the computer. False
c. Images do not play any role in multimedia. False
d. Multimedia is not used in education. False
e. Multimedia technology used in public places as an information provider. True
f. Cartoons on television are an example of animation. True
3. Choose the best answer :-
a) A MUK consists of the
i. CD-ROM Drive Sound Card Speaker All of them
b) The types of media used in multimedia includes
i. Text Graphics Sound All of them
c) Multimedia technology is very effective in
i. Market Classroom War None
d) Select the common components of the multimedia computer system.
i. Floppy Floppy drive CD-ROM None
e) Software associated with the multimedia technology is
i. Windows XP Macromedia Flash QBASIC None
4. Write the correct technical term for the following :
a. The integration of text, audio, sound and animation. Multimedia
b. The moving graphics images. Animation
c. The display of still-frame pictures or photos on a computer screen. Graphics
d. The artificial environment created by computer technology to entertain users. Virus reality
Cyber Law and Computer Ethics
1. Fill in the blanks:
a. Cyberspace has become synonyms with the internet.
b. Cyber law includes a wide variety of legal issues to the use of communication technology.
c. Digital Signature is a security Mechanism system in the cyberspace for Digital data processing and transaction.
d. Cyber Crime refers to illegal,action involved in any computer.
e. The law which is enacted to ensure the preservation, integrity and reliability of data is called data protection and privacy law.
2. State Whether the following statement is True or False:
a. The term “cyberspace” was used in 1984. True
b. Copyright law is related to intellectual property law. True
c. The government of Nepal could not pass “The Electronic Transaction and Digital Signature Act-Ordinance”. False
d. The Digital signature allow the user to attach an original signature on the document of electronic records. False
e. “The Electronic Transaction and Digital Signature Act-Ordinance” is popularly known as “cyber law” of Nepal. True
f. The cyberspace describes the real world of computer. False
3. Give the full form of the following abbreviation:
a. UNCITRAL: WWW: EDI: IT:
4. Match the following:
a. Fair Credit reporting Act 1988 (d)
b. Copyright Encryption and decryption (h)
c. Cyber law of Nepal 1992 (e)
d. Video Privacy Protection Act 1970 (a)
e. Copyright Act 2004 (c)
f. Freedom of Information Act 1974 (g)
g. Federal Privacy Act 1970 (f)
h. Digital Signature Intellectual property (b)
5. Select the correct answer for the each of the following:
a. The term ‘cyberspace’ was used in:
i. 1984 1884 1985 1885
b. The law which includes literature and art, films, computer programs, invention, designed used by traders for their goods or services is called:
i. Data Privacy Law Intellectual Property Law
ii. Telecommunication Law Cyber crime Law
c. The Process of ensuring the preservation, integrity and reliability of data is Known as:
i. Intellectual Property Law Data Protection and Privacy law
ii. Cyber Law Telecommunication Law
d. “The Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
i. Intellectual Property Law Cyber Law
ii. Telecommunication Law Data Protection Law
e. The government of Nepal has passed the cyber law on:
i. 31st Bhadra 2061 BS 29th Bhadra 2061 BS
ii. 30thBhadra 2062 BS 30thBhadra 2061 BS
MS-ACCESS
1. Fill in the blanks:
a. MS-Access is Database management software which is used to manage data and manipulate them
b. In MS-Access, maximum characters are typed in text fields 255
c. A column in a table is called field and a row in a table is called record.
d. A primary key uniquely identifies a record.
e. Examples of Database Management Software are Ms access, oracle and fox pro.
f. The field grid pane displays columns in which you enter the field names, the data type for each field and description of each fields.
g. In MS-Access, we design a table using table design view
h. A query extracts and arranges information from a table in a manner that you specify.
i. Examples of database are dictionary and telephone directory
j. Delete query is an example of action query.
k. Query that makes changes in table is called update query.
2. State whether the following statement are true or false:
a) DBMS is word processing software. False
b) Data can be numbers, letters or symbols, which may or may not give any sense. True
c) A row in a table is called field and it contains a specific piece of informarion within a record. False.
d) Memo accepts maximum 32,767 characters. False
e) Data field occupies 10 bytes of memory. False
f) Data validation enables you to limit the values that can be accepted into a field. True
g) A default value is one that is not displayed automatically for the field into a field. True
h) The data filter selects the required records and displays the result. False
i) A form is useful for entering, viewing and displays the result. True
j) Default field size of text fieid is 50 characters. True
k) Default data type of MS-Access is a number. False
l) Action query makes changes in a table. True
No comments:
Post a Comment