Networking and Telecommunication
1. [SLC 2064]
a)
Radio
Wave (d) Device to connect network having
different technology
b)
Cyber
ethics (c) power protection device
c)
Spike
guard (-) internet
d)
Gateway (b) professionally guided principles
(a) Wireless Media
2.
[SLC 2065]
a)
Server (c) HTTP
b)
Node (b) Work Station
c)
Protocol (a) Main Computer
d)
Coaxial
Cable (-) Repeater
(d) Communication
Media
3.
[SLC 2066]
a)
T-connector (b)Network device
b)
Bridge (d)Power
protection
c)
CD-ROM (a)Coaxial cable
d)
Spike
Guard (c)Multimedia
component
(-)Virus
scanning
4.
[SLC 2067]
Satellite (-)Multimedia
HTTP (b)Protocol
Online business (a)Unguided media
Fiber optics (c)E-commerce
Satellite (-)Multimedia
HTTP (b)Protocol
Online business (a)Unguided media
Fiber optics (c)E-commerce
(d)Guided media
5.
[SLC 2068]
Microwave
(c)Multimedia
Volt guard (d)Protocol
Sound card (a)Unguided media
TCP/IP (b)Power protection devices
(-)Guided media
Volt guard (d)Protocol
Sound card (a)Unguided media
TCP/IP (b)Power protection devices
(-)Guided media
6. [SLC 2069]
RJ-45 (c)Multimedia
WAN (d)Duplicate
copy
Back up (-)Fiber optic cable
Microphone (a)Twisted pair cable
(b)Internet
(b)Internet
7. [SLC 2070]
Combination of several media (c)Guided Media
POP (d)Power
Protection Device
UTP (a)Multimedia
UPS (-)Protocol
used in e-mail
(b)CD-ROM
8. [SLC
2071]
E-commerce (b)Power
protection device
Volt
guard (a)Online
shopping
Satellite
link (c)WAN
Sound
card (-)Optical
fiber
(d)Multimedia
9. [SLC 2065 S]
McAfee (b)Supplies
continuous power
UPS (d)Internet
protocol
Web Browser (-)Antivirus
software
TCP/IP (c)Internet
explorer
(a)Computer
virus
10. [SLC 2066 S]
Bandwidth (b)ISP
Internet ()FAT
Network (a)bps
Software
security (d)NAV
(c)NIC
11. [SLC 2067 S]
Pictures in motions (c)Guided media
TCP/IP (a)animation
UTP (d)Random Access Memory
Volatile memory (-)CD-ROM
(b)Protocol used in Internet
12. [SLC 2068 S]
Pictures in motions (c)Guided media
TCP/IP (a)animation
UTP (d)Random Access Memory
Volatile memory (-)CD-ROM
(b)Protocol used in Internet
12. [SLC 2068 S]
LAN (b)Within a city
MAN (d)Internet protocol
UPS (a)Within a room
IPX/SPX (c)Power supply device
(-)Between countries
13. [SLC 2069 S]
MAN (d)Internet protocol
UPS (a)Within a room
IPX/SPX (c)Power supply device
(-)Between countries
13. [SLC 2069 S]
Sound card (d)WAN
Virus (c)Internet explorer
Web browser (a)Multimedia
Satellite link (b)damage or corrupt data
()Bridge
Virus (c)Internet explorer
Web browser (a)Multimedia
Satellite link (b)damage or corrupt data
()Bridge
14. [SLC 2070 S]
TCP/IP (c)Multimedia
Back
up (d)Web address
Sound
card (b)Software
security
URL (a)Protocol
(-)RJ45
15. [SLC 2072]
(a) Microwave (c)
Power protection device()
(b) UTP (d)
Protocol()
(c) UPS (a)
Unguided media()
(d) SMTP (-)
Internet()
(b)
Guided mediav
16. [SEE 2073]
Group 'A' Group 'B'
(a) Malicious software (c) UPS ()
(b) Primary storage device (a) virus ()
(c) Power protection device (d) copyright ()
(d) Intellectual property law (b) RAM (
)
(-)
CD-ROM ( )
17. [SLC 2074]
Group 'A' Group 'B'
(a) RJ 45 connector (b)
Duplicate copy()
(b) Back up (c)
Multimedia()
(c) Microphone (a)
Twisted pair cable()
(d) Hub/switch (-)
Ring Topology()
(d)
Star Topology()
18.
Protocol (c)MODEM
WAN (d)Fiber Optic
Network
component (a)HTTP
Transmission
media (b)Internet
19.
Coaxial
Cable (c)RJ45
Optical
Fiber cable (a)BNC
Twisted
Pair (b)ST
Telephone
Wire (d)RJ11
20.
Star (c)Powerful computer
WAN (d)Computers on the network provided to
users
Server (b)Internet
Node (a)Topology
21.
Host computer (b)A computer circuit board
NIC (e)A self-sufficient computer
Windows NT (a)A powerful, centralized computer system
TCP/IP (c)Popular network operating
Peer (-)Node
(d)Network protocol
22.
Computer
network (b)Windows NT
Network
OS (d)HTTP
Transmission
channel (a)Resource Sharing
Protocol (c)UTP
(-)Bit
23.
Wi-Fi (-)Network within a building
Linear
Bus (d)Software component
BNC (b)Topology
Device
Driver (a)Transmission
Media
(c)Media connector
24.
Protocol (b)Network within a building.
LAN (d)BNC
MAN (e)RJ-45
Coaxial (f)Central device for star topology.
Cat
5 (a)Rules to exchange data.
Hub (c)Network within a city.
(-)Wireless media
25.
Node (b)a
network computer that utilizes the resources of other computer
Client (e)a
set of rules by which computers communicate with each other over a network
Host (d)a
self-sufficient computer that acts both as a server and a client(shares and uses
resources
Peer (a)any network device that can connect
to the network and can generate, process or transfer network data
Protocol (c)the most powerful type of computer on the network, that does all
the processing for the user
26.
Ring
topology (c)A group of computers that functions
both as a client and server.
Simplex
connection (e)A group of computers and associated
devices that share a common communications line or wireless link.
Peer-to
peer network (a)A network
topology in which network nodes are connected in continuous circle.
Fiber
optic cable (b)A connection in which the data flows
in only one direction from the transmitter to the receiver.
Local
area network (a)A network
cable that contains stands of glass fibers inside an insulated casing
Internet and Its services
27.
TCP/IP (a)Addressing data, converting them
into packets and Routing
FTP (d)Transfer mail and attachment on the
network
POP (b)Transfer files between two computers
SMTP (c)Fetching mails from the mail server
to a user’s computer
28.
NCSA
Mosaic (d)Internet Protocol
ARPA (e)Online shopping
WWW (b)Funded by US DOD
TCP/IP (c)Dr. Berners-Lee
E-commerce
(a)First
web browser
29.
E-mail (e)A private network within an organization.
World Wide Web (c)The opening or main page of a website.
Home Page (d)The buying and selling of goods and services
on internet.
Electronic commerce (b)The leading information – exchange service of
the internet.
Intranet (a)The exchange of computer-stored messages
telecommunication
30.
Usenet (b)Instant Chatting
MSN (c)Remote Login
Telnet (d)Internet component
Modem (a)Newsgroup
(-)Website
31.
Internet (c)Service of internet
HTTP (d)Internet Service provider
Email (a)Networks of networks
ISP (b)Protocol
(-)online chat
32.
E-mail (b)a global collection of millions of
computers of different types belonging
to various networks worldwide
Internet (d)an online communication
mechanism that lets people to make a real time discussion with one or
more people through the internet
Newsgroup (a)electronic
message sent from one computer to another
Web
Chat (c)world wide discussion group in which people share information
and ideas on a particular area of interest.
Computer Security
33.
A)
password (c)Duplicate
copy of data
B)
Encryption (a)Secret
word or phrase
C)
Backup (d)Authentication
D)
Access Control (-)Rearrangement
of fragmented file
(b)Scrambled and unreadable form of information
34.
A)
Antivirus (d)Software
that prevent gaining access
B)
Scandisk (c)Arranging
the scattered data
C)
Defragmentation (b)Checking for disk error
D)
Firewall (a)Software
to remove malicious Programs
(-)Duplicating
disk
35.
A)
Hardware security (-)Rewriting
the files to contiguous sector
B) Software (c) Scattering the disk
file over different locations
C) Fragmentation (d)Provide access to the computer system
D) Password (b)Antivirus
(a)Insurance policy
36.
A)
Hard Lock Key (c)Hardware Security
B)
Spike guard (a)Software security
C)
Insurance (b)Power protection device
D)Burlar
alarm (-)Computer Security
(d)Prevents
unauthorized entrance
37.
A)
Backup (d)Software that destroys data
B)
Password (c)Utility software
C)
Scan Disk (a)Copy of data
D)Computer
virus (b)Allows the user to access system
(-)System Software
Computer Virus
38.
a) Boot sector virus (-) McAFee
b) File infecting
virus (c) W97M.Melissa
c) Macro virus (a) stoned
d) Polymorphic
virus (e) Frodo
e) Stealth virus (b) Friday the 13th
(d) Involuntary
39.
a)Macro
virus (c)A virus that infects the part of the computer called a system
sector.
b)Antivirus (d)A virus that directly
attack and modify program files, which are usually .EXE or .COM files.
c)Boot
virus (a)The special macros that self- replicate in the data files of
personal productivity applications such as
Microsoft Word and Excel.
d)File
virus (b)A
class of program that searches your hard drive and floppy disks for any known
or potential viruses.
40.
a)Boot
virus (e)A computer virus that infect files
and boot records.
b)Files
virus (a)A computer virus designed to infect
the boot sector of the disk.
c)Polymorphic
virus (d)A computer virus that infect program written in scripting
language.
d)Script
virus (b)A computer virus that infect
executable program files having an
extension .exe, .com or .dll.
e)
Stealth virus (c)A computer virus that can change its
appearance with every infection.
41.
a)
CPAV (c)Propagating virus
b)
Software piracy (a)Antivirus software
c)
Worm (-)Virus transfer
d)
Password (b)Purpose of virus development
(d)Virus safety
measure
42.
a.
Boot virus (c)Cascade
b.
Parasitic virus (a)Disk
Killer
c.
polymorphic virus (e)Whale
d.
Script viruses (d)I LOVE YOU
e. stealth virus (b)Jerusalem
Multimedia and Its
Application
43.
Edutainment (c)
Components of multimedia
Virtual Reality (d) Multimedia software
Graphics (a) Multimedia in education
Adobe Photoshop (b) Simulated
software
44.
Virtual Reality (-)Combination
of various media
Graphics (a)Artificial
environment
Animation (b)Visual
impact
Multimedia (c)Moving
images
(d)Adobe
Photoshop
45.
Audio (b)Monitor
Video (a)Speaker
Sound
Card (d)Still frame pictures
Graphics (c)Recording and playing sound (-)Multimedia card
46.
Real
player (b)Upgrade the PC
MUK (d)Headsets and data gloves
Animation (a)Software
to view multimedia content
Virtual
reality (c)Cartoon on television
(-)Multimedia component
47.
Animation (e)A computer-delivered
electronic system that allows the user to control, combine, and manipulate
different types of media, such as text, sound video, computer graphics, and
animation.
Edutainment (c)The process of giving
the illusion of movement to drawings, models, or interested object
Multimedia (b)A form of education
which is designed to be entertaining, in order to keep people interested and
engaged.
Virtual Reality (e)An extension of
hypertext that supports linking sound, and video element in addition to text
elements.
Hypermedia (d)An artificial reality
that projects the user into a 3D Space generated by the computer.
Cyber Law and Computer Ethics
48.
|
|
a) Cyber stalking
|
(c)Electronic transfer of
illegally-obtained monies with the go with the goal of hiding its
source and
possibly its destination
|
b) Phishing
|
(e)The activity of
breaking into a computer system to gain to unauthorized
access
|
c) Cyber laundering
|
(a)The use of
communication technology, mainly the internet, to
torture other individuals
|
d) Cyber Contraband
|
(b)The act of attempting
to acquire sensitive information like usernames, passwords and credit card
details by distinguishing as a trustworthy source
|
e) Hacking
|
(d)Transferring illegal
items through the internet (such as encryption technology) that is
banned in some locations.
|
49.
|
|
a) Hacking
|
(c)The
use of communication technology, mainly the Internet, to torture other individual.
|
b) Phishing
|
(-)The
computer program that can replicate themselves and harm the computer system
on a network
(d)within
the knowledge of the system users.
|
c) Cyber stalking
|
(a)The
activity of breaking into a computer system to gain an unauthorized access.
|
d) Computer viruses
|
(e)This
is one of the most serious frauds as it involved stealing money and obtaining
other benefits
through the use of false identity.
|
e) Identity Theft
|
(b)The
act of attempting to acquire sensitive information like usernames, passwords,
and credit card
details disguising as a trustworthy source.
|
50.
|
|
a) Digital Signature
|
(b)Cyber
crime
|
b) Forgery
|
(a)Electronic
security system
|
c) Encryptions
|
(d)Cyber
law
|
d) Copy right
|
(c)Locking
message
|
51.
|
|
a) Fair Credit reporting Act
|
(d)1988
|
b) Copyright
|
(g)Encryption
and decryption
|
c) Cyber law of Nepal
|
(e)1992
|
d) Video Privacy Protection Act
|
(a)1970
|
e) Copyright Act
|
(c)2004
|
f) Federal Privacy Act
|
(f)1974
|
g) Digital Signature
|
(b)Intellectual
property
|
52.
|
|
a) Computer ethics
|
(c)The
block of data at the end of an electronic message that attests the authenticity
of the said message
|
b) Cyberspace
|
(d)A
method of making the data or message transmitted through the internet
unreadable by everyone
except the receiver.
|
c) Digital signature
|
(b)The
world-wide network of computers.
|
d) Encryption
|
(a)A
branch of applied ethics which studies and analyzes social and ethical
impacts of information
Technology.
|
Database Management System
53.
Data (d)-presentation
of result
Record (j)-organized
collection of data information
Field (i)-graphical
interface for data entry
Report (c)-column
on datasheet
Query (a)-value
Table (h)-software
Primary key (b)-row
on a datasheet
DBMS (e)-retrieving
editing information conditionally
Form (f)-sorting
data in rows and columns
Database (g)-a field with unique field
content
54.
Number (d)50
Yes/No (c)8
bytes
Currency (a)Long
integer
Text (b)1 bit
(-)short integer
55.
Data redundancy (b)Error
message
Validation Text (c)Pattern
of data in a field
Input Mask (-)Lookup
wizard
Validation Rule (a)Data
duplication
(d)Limits the value
56.
Indexing data (-)Retrieves
data
Long text (d)Caption
FoxPro (b)Memo
field
Label for a field (c)DBMS
(a)Searching fast
57.
Text (d)2048 characters
Currency (a)up
to 255 Characters
Memo (b)8 Bytes
Hyperlink (c)0-65535
Characters
(-)4 Bytes
58.
Data Integrity (c)No. of character can be entered
Automatic (d)Contains
distinct value
Field size (a)Validation
Rule
Primary key (-)Indexed
(b)Default value
59.
Query (b)A collection of programs
that enables you to store, modify, and extracts information from a database
DBMS (e)A field which uniquely
identifies every record in a table.
Table (d)A set of information
stored about a particular entry.
Record (c)An arrangement of data
in row and column format.
Primary Key (a)A database object that
creates a datasheet of selected fields and records from one or more tables.
60.
Data type (b)Field
property
Format (d)Relationship
Form (-)Referential
Integrity
One-to-one (c)Database
Object
(a)Memo
61.
Index (-)database
Data
redundancy (d)software
Record (a)easy
to search
DBMS (b)repetition
of data
(c)Tuple
62.
Form
(-)database
Primary
key (d)data
type
Advance
Filter (a)text
control
Hyperlink (b)unique
identification of record
(c)Query
63.
Sort (d)
mass change
Single
precision (c)DBMS
FoxPro (-)memo
field
Update
query (b)sub
type of number
(a)Arranging
data
64.
Mark
ledger (c) Predefined
formats
Wild
cards (a) database
Wizard (d) primary
key
Relationship (b) *
and?
(-)Report
65.
Default value (c)255 Characters
Fox Pro (d)Column Name
Text (b)DBMS
Field (a)Field Properties
(-)Search fast
Default value (c)255 Characters
Fox Pro (d)Column Name
Text (b)DBMS
Field (a)Field Properties
(-)Search fast
66. [SLC 2065 S S]
Group A Group B
i) MS-ACCESS (d)
analyze and present data in a printed format
ii) Data update (b) Query
iii) Field (c)
a piece of information related to someone or something
iv) Report (a)
Database management software
(-)
collection of related fields.
67. [SLC 2066]
Group A Group B
a) Default value (c) 255 Characters
b) Fox Pro (a) Column Name
c) Text (b) DBMS
d) Field (d)Field Properties
(-) Search fast
Group A Group B
a) Default value (c) 255 Characters
b) Fox Pro (a) Column Name
c) Text (b) DBMS
d) Field (d)Field Properties
(-) Search fast
68. [SLC
2066 S]
Group A Group B
a) OLE (d) Formatted output
b) Primary key (c) Interface
c) Form (-) 64,000 characters
d) Report (b) Unique Field
(a) Picture
Group A Group B
a) OLE (d) Formatted output
b) Primary key (c) Interface
c) Form (-) 64,000 characters
d) Report (b) Unique Field
(a) Picture
69. [SLC 2067]
a)OLE (d)Report
b) Data entry (a) Picture
c)Indexing (-) Table
d)Formatted printout (c)Fast searching
(b)Form
a)OLE (d)Report
b) Data entry (a) Picture
c)Indexing (-) Table
d)Formatted printout (c)Fast searching
(b)Form
70. [SLC
2067 S]
Group A Group B
a) MS-Access (d) DATA entry and editing interface
b) Query (-) Electronic Spreadsheet software
c) Record (b) Tool to retrieve data from one or more than one tables
d)Form (a) Data base management software
(c) Collection of related fields
Group A Group B
a) MS-Access (d) DATA entry and editing interface
b) Query (-) Electronic Spreadsheet software
c) Record (b) Tool to retrieve data from one or more than one tables
d)Form (a) Data base management software
(c) Collection of related fields
71. [SLC 2068]
Group A Group B
a) Indexing (c) Limits the value
b) Report (d) Data type
c) Validation Rule (-) Error messages
d) Hyper link (b) Final output
(a) Search fast
72. [SLC 2068 S]
Group A Group B
a) Indexing (c) Limits the value
b) Report (d) Data type
c) Validation Rule (-) Error messages
d) Hyper link (b) Final output
(a) Search fast
72. [SLC 2068 S]
Group A Group
B
a) Indexing data (d) Retrieves data conditionally
b) Long Text (c) DBMS
c) Fox Pro (b) Memo field
d) Query (a) Searching fast
(-) Report
a) Indexing data (d) Retrieves data conditionally
b) Long Text (c) DBMS
c) Fox Pro (b) Memo field
d) Query (a) Searching fast
(-) Report
73.[SLC 2069]
Group A Group B
i) OLE (d) Data Entry
ii) Hyperlink (c) Formatted Hardcopy
iii) Report (a) 1 GB
Group A Group B
i) OLE (d) Data Entry
ii) Hyperlink (c) Formatted Hardcopy
iii) Report (a) 1 GB
iv) Form (-)
Up to 255 characters
(b) Up to 2048 characters
74. [SLC 2069 S]
Group A Group B
a) Report (b) Data type
b) Currency (d) Column
c) Long Text (a) Database object
d) Field (-) Record
Group A Group B
a) Report (b) Data type
b) Currency (d) Column
c) Long Text (a) Database object
d) Field (-) Record
(c) Memo
75. [SLC 2070]
Group A Group B
i)
Indexing Data (d) Size upto 1 GB
ii)
Form (c) Column of datasheet
iii)
Field (-)
Row on a datasheet
iv)
OLE object (a) Searching Fast
(b) Graphical interface for data entry
76. [SLC 2070 S]
a) dBASE
(c)OLE
b) Primary
key (d)Memo
c) Photo (a)DBMS
d) Long
text (b)Uniquely defined
()Hyper
links
77. [SLC 2071]
a. Indexing
data (b)Final output
b. Report (d)View data
c. Yes/No (a)Searching fast
d. Select
query (-)Picture
(c)Data type
78. [SLC 2072]
Group 'A' Group 'B'
(a)
OLE (c) Data Entry
(b)
Validation Rule (-) Stores data
(c)
Form (b) Limits the value
(d)
Indexing (a) Data type
(d) Easy to search
79. [SLC 2065] [SEE
2073]
Group
'A' Group
'B'
(a)
Query (d) Printed format
(b)
Form (c) Stores data
(c)
Table (b) Allows view, edit, input data
(d)
Report (a) Extracts selected record for view
(-)
DBMS
80. [SLC 2074]
Group
'A' Group
'B'
(a)
Data (b) Input, view, edit data
(b)
Form (c) Formated output
(c)
Report (a) Collection of raw facts
(d)
Table (-) Question to the database
d) Stores data in
database