Friday, August 31, 2018

80 Match the Following Computer Science [SLC / SEE] with answers




Networking and Telecommunication
1. [SLC 2064]
a)      Radio Wave                       (d) Device to connect network having different technology
b)     Cyber ethics                       (c) power protection device
c)      Spike guard                        (-)  internet
d)     Gateway                                             (b) professionally guided principles
(a) Wireless Media

2. [SLC 2065]
a)      Server                                  (c) HTTP                                                                        
b)     Node                                    (b) Work Station                                                                              
c)      Protocol                              (a) Main Computer                                                                         
d)     Coaxial Cable                    (-) Repeater
(d) Communication Media


3. [SLC 2066]
a)      T-connector                       (b)Network device
b)      Bridge                                 (d)Power protection
c)      CD-ROM                            (a)Coaxial  cable
d)      Spike Guard                       (c)Multimedia component
(-)Virus scanning


4. [SLC 2067]
Satellite                               (-)Multimedia
HTTP                                   (b)Protocol
Online business                 (a)Unguided media
Fiber optics                        (c)E-commerce
                                             (d)Guided media

5. [SLC 2068]
Microwave                         (c)Multimedia
Volt guard                          (d)Protocol
Sound card                         (a)Unguided media
TCP/IP                                 (b)Power protection devices
                                             (-)Guided media

6. [SLC 2069]
 RJ-45                                  (c)Multimedia
WAN                                   (d)Duplicate copy
Back up                               (-)Fiber optic cable
Microphone                       (a)Twisted pair cable
                              (b)Internet

7. [SLC 2070]
Combination of several media       (c)Guided Media
POP                                                     (d)Power Protection Device
UTP                                                    (a)Multimedia
UPS                                                     (-)Protocol used in e-mail
                                                     (b)CD-ROM

8. [SLC 2071]
E-commerce                       (b)Power protection device
Volt guard                          (a)Online shopping
Satellite link                       (c)WAN
Sound card                         (-)Optical fiber
(d)Multimedia




9. [SLC 2065 S]
McAfee                               (b)Supplies continuous power
UPS                                      (d)Internet protocol
Web Browser                     (-)Antivirus software
TCP/IP                                 (c)Internet explorer
                                             (a)Computer virus

10. [SLC 2066 S]
Bandwidth                          (b)ISP
Internet                               ()FAT
 Network                             (a)bps
 Software security             (d)NAV
                                             (c)NIC

11. [SLC 2067 S]
Pictures in motions          
(c)Guided media
TCP/IP                                
(a)animation
UTP                                    
(d)Random Access Memory
Volatile memory                             
(-)CD-ROM
                                            
(b)Protocol used in Internet
12.  [SLC 2068 S]
LAN                                     (b)Within a city
MAN                                   (d)Internet protocol
UPS                                      (a)Within a room
IPX/SPX                              (c)Power supply device
                                             (-)Between countries
13. [SLC 2069 S]
Sound card                         (d)WAN
Virus                                  
(c)Internet explorer
Web browser                     
(a)Multimedia
Satellite link                      
(b)damage or corrupt data
                                            
()Bridge
14. [SLC 2070 S]                                                                          
TCP/IP                                 (c)Multimedia
Back up                               (d)Web address
Sound card                         (b)Software security
URL                                     (a)Protocol
 (-)RJ45

15. [SLC 2072]
(a) Microwave               (c) Power protection device()
(b) UTP                        (d) Protocol()
(c) UPS                        (a) Unguided media()
(d) SMTP                     (-) Internet()
(b) Guided mediav

16. [SEE 2073]
Group 'A'                                Group 'B'
(a) Malicious software               (c) UPS ()
(b) Primary storage device         (a) virus ()
(c) Power protection device        (d) copyright ()
(d) Intellectual property law       (b) RAM ( )
(-) CD-ROM ( )


17. [SLC 2074]
Group 'A'                                Group 'B'
(a) RJ 45 connector                   (b) Duplicate copy()
(b) Back up                               (c) Multimedia()
(c) Microphone                         (a) Twisted pair cable()
(d) Hub/switch                          (-) Ring Topology()
(d) Star Topology()

18.
Protocol                                             (c)MODEM
WAN                                   (d)Fiber Optic
Network component         (a)HTTP
Transmission media          (b)Internet

19.
Coaxial Cable                    (c)RJ45
Optical Fiber cable           (a)BNC
Twisted Pair                       (b)ST
Telephone Wire                 (d)RJ11

20.
Star                                      (c)Powerful computer
WAN                                   (d)Computers on the network provided to users
Server                                  (b)Internet
Node                                    (a)Topology

21.
Host computer                   (b)A computer circuit board
NIC                                      (e)A self-sufficient computer
Windows NT                      (a)A powerful, centralized computer system
TCP/IP                                 (c)Popular network operating
Peer                                     (-)Node
(d)Network protocol

22.
Computer network            (b)Windows NT
Network OS                        (d)HTTP
Transmission channel      (a)Resource Sharing
Protocol                                             (c)UTP
(-)Bit
23.
Wi-Fi                                   (-)Network within a building
Linear Bus                          (d)Software component
BNC                                (b)Topology
Device Driver                     (a)Transmission Media
                             (c)Media connector         
24.
Protocol                                             (b)Network within a building.
LAN                                     (d)BNC
MAN                                   (e)RJ-45
Coaxial                               (f)Central device for star topology.
Cat 5                                    (a)Rules to exchange data.
Hub                                      (c)Network within a city.
                                                (-)Wireless media

25.
Node                                (b)a network computer that utilizes the resources of other computer
Client                               (e)a set of rules by which computers communicate with each other over a network
Host                                 (d)a self-sufficient computer that acts both as a server and a client(shares and uses resources
Peer                                  (a)any network device that can connect to the network and can generate, process or transfer network data
Protocol                          (c)the most powerful type of computer on the network, that does all the processing for the user

26.
Ring topology                    (c)A group of computers that functions both as a client and server.
Simplex connection          (e)A group of computers and associated devices that share a common communications line or wireless link.    
Peer-to peer  network       (a)A network topology in which network nodes are connected in continuous circle.      
Fiber optic cable               (b)A connection in which the data flows in only one direction from the transmitter to the receiver.         
Local area network           (a)A network cable that contains stands of glass fibers inside an insulated casing




Internet and Its services
27.
TCP/IP                                 (a)Addressing data, converting them into packets and Routing
FTP                                      (d)Transfer mail and attachment on the network
POP                                      (b)Transfer files between two computers
SMTP                                  (c)Fetching mails from the mail server to a user’s computer

28.
NCSA Mosaic                     (d)Internet Protocol
ARPA                                  (e)Online shopping
WWW                                 (b)Funded by US DOD
TCP/IP                                (c)Dr. Berners-Lee
E-commerce                        (a)First web browser


29.
E-mail                                 (e)A private network within an organization.
World Wide Web              (c)The opening or main page of a website.
Home Page                         (d)The buying and selling of goods and services on   internet.
Electronic commerce        (b)The leading information – exchange service of the internet.
Intranet                                              (a)The exchange of computer-stored messages telecommunication

30.
Usenet                  (b)Instant Chatting  
MSN                    (c)Remote Login                               
Telnet                   (d)Internet component   
Modem                 (a)Newsgroup
(-)Website

31.
Internet                (c)Service of internet
HTTP                    (d)Internet Service provider
Email                    (a)Networks of networks
ISP                        (b)Protocol
(-)online chat
                         
32.
E-mail                  (b)a global collection of millions of computers of  different types belonging to various networks worldwide                                                        
Internet                (d)an online communication   mechanism that lets people to make a real time discussion with one or more people           through the internet
Newsgroup          (a)electronic message sent from one computer to another
Web Chat             (c)world wide discussion group in which people share information and ideas on a particular area of interest.

Computer Security
33.
A) password                                      (c)Duplicate copy of data
B) Encryption                                   (a)Secret word or phrase
C) Backup                                         (d)Authentication
D) Access Control                            (-)Rearrangement of fragmented file
                                                           (b)Scrambled and unreadable form of information

34.
A) Antivirus                                      (d)Software that prevent gaining access
B) Scandisk                                       (c)Arranging the scattered data
C) Defragmentation                         (b)Checking for disk error
D) Firewall                                        (a)Software to remove malicious Programs
                              (-)Duplicating disk

35.
A) Hardware security                      (-)Rewriting the files to contiguous sector
B) Software                                      (c)  Scattering the disk file over different locations
C) Fragmentation                             (d)Provide access to the computer system
D) Password                                     (b)Antivirus
                                                         (a)Insurance policy

36.
A) Hard Lock Key                 (c)Hardware Security
B) Spike guard                        (a)Software security    
C) Insurance                            (b)Power protection device
D)Burlar alarm                       (-)Computer Security
   (d)Prevents unauthorized entrance

37.
A) Backup                                         (d)Software that destroys data
B) Password                                     (c)Utility software
C) Scan Disk                                    (a)Copy of data
D)Computer virus                            (b)Allows the user to access system
              (-)System Software

Computer Virus

38.
a) Boot sector virus                         (-) McAFee
b) File infecting virus                      (c) W97M.Melissa
c) Macro virus                               (a) stoned
d) Polymorphic virus                      (e) Frodo
e) Stealth virus                               (b) Friday the 13th
                                                    (d) Involuntary

39.
a)Macro virus          (c)A virus that infects the part of the computer called a system sector.
b)Antivirus              (d)A virus that directly  attack and modify program files, which are usually .EXE or .COM files.
c)Boot virus            (a)The special macros that self- replicate in the data files of personal productivity applications such as
       Microsoft Word and Excel.
d)File virus            (b)A class of program that searches your hard drive and floppy disks for any known or potential viruses.

40.
a)Boot virus                       (e)A computer virus that infect files and boot records.
b)Files virus                       (a)A computer virus designed to infect the boot sector of the disk.
c)Polymorphic virus         (d)A computer virus that infect program written in scripting language.
d)Script virus                     (b)A computer virus that infect executable program files having an  extension .exe, .com or .dll.
e) Stealth virus                  (c)A computer virus that can change its appearance with every infection.

41.
a) CPAV                                (c)Propagating virus
b) Software piracy                 (a)Antivirus software    
c) Worm                                (-)Virus transfer                         
d) Password                           (b)Purpose of virus development
   (d)Virus safety measure

42.
a. Boot virus                       (c)Cascade
b. Parasitic virus                 (a)Disk Killer
c. polymorphic virus          (e)Whale
d. Script viruses                 (d)I LOVE YOU
e. stealth virus                    (b)Jerusalem



Multimedia and Its Application

43.
Edutainment                   (c) Components of multimedia
Virtual Reality              (d) Multimedia software
Graphics                       (a) Multimedia in education
Adobe Photoshop          (b) Simulated software
                                                                                                                 
44.
Virtual Reality              (-)Combination of various media
Graphics                       (a)Artificial environment
Animation                     (b)Visual impact
Multimedia                   (c)Moving images
            (d)Adobe Photoshop     


45.
Audio                           (b)Monitor
Video                           (a)Speaker
Sound Card                   (d)Still frame pictures
Graphics                       (c)Recording and playing sound                                                                                                                         (-)Multimedia card
46.
Real player                   (b)Upgrade the PC
MUK                            (d)Headsets and data gloves
Animation                     (a)Software to view multimedia content
Virtual reality                (c)Cartoon on television
                                    (-)Multimedia component
47.
Animation                     (e)A computer-delivered electronic system that allows the user to control, combine, and manipulate different types of media, such as text, sound video, computer graphics, and animation.
Edutainment                  (c)The process of giving the illusion of movement to drawings, models, or interested object
Multimedia                   (b)A form of education which is designed to be entertaining, in order to keep people interested and engaged.
Virtual Reality              (e)An extension of hypertext that supports linking sound, and video element in addition to text elements.
Hypermedia                  (d)An artificial reality that projects the user into a 3D Space generated by the computer.
Cyber Law and Computer Ethics
48.

a) Cyber stalking
(c)Electronic transfer of illegally-obtained monies with the go  with the goal of hiding its source and
possibly its destination
b) Phishing
(e)The activity of breaking into a computer system to gain to   unauthorized access
c) Cyber laundering
(a)The use of communication technology, mainly the    internet, to torture other individuals
d) Cyber Contraband 
(b)The act of attempting to acquire sensitive information like usernames, passwords and credit card details by distinguishing as a trustworthy source
e) Hacking
(d)Transferring illegal items through the internet (such as  encryption technology) that is banned in some locations.

49.

a) Hacking
(c)The use of communication technology, mainly the Internet, to torture other individual.
b) Phishing
(-)The computer program that can replicate themselves and harm the computer system on a network
(d)within the knowledge of the system users.
c) Cyber stalking
(a)The activity of breaking into a computer system to gain an unauthorized access.
d) Computer viruses
(e)This is one of the most serious frauds as it involved stealing money and obtaining other benefits
through the use of false identity.
e) Identity Theft
(b)The act of attempting to acquire sensitive information like usernames, passwords, and credit card
details disguising as a trustworthy source.

50.

a) Digital Signature
(b)Cyber crime
b) Forgery
(a)Electronic security system
c) Encryptions
(d)Cyber law
d) Copy right
(c)Locking message

51.

a) Fair Credit reporting Act
(d)1988
b) Copyright
(g)Encryption and decryption
c) Cyber law of Nepal
(e)1992
d) Video Privacy Protection Act
(a)1970
e) Copyright Act
(c)2004
f) Federal Privacy Act
(f)1974
g) Digital Signature
(b)Intellectual property

52.

a) Computer ethics
(c)The block of data at the end of an electronic message that attests the authenticity of the said message
b) Cyberspace
(d)A method of making the data or message transmitted through the internet unreadable by everyone
except the receiver.
c) Digital signature
(b)The world-wide network of computers.
d) Encryption
(a)A branch of applied ethics which studies and analyzes social and ethical impacts of information
Technology.

Database Management System

53.
Data                                     (d)-presentation of result
Record                                 (j)-organized collection of data information
Field                                    (i)-graphical interface for data entry
Report                                 (c)-column on datasheet
Query                                  (a)-value
Table                                   (h)-software
Primary key                        (b)-row on a datasheet  
DBMS                                (e)-retrieving editing information conditionally
Form                                  (f)-sorting data in rows and columns
Database                            (g)-a field with unique field content

54.
Number                        (d)50
Yes/No                         (c)8 bytes
Currency                       (a)Long integer
Text                             (b)1 bit
                        (-)short integer

55.
Data redundancy           (b)Error message
Validation Text             (c)Pattern of data in a field
Input Mask                   (-)Lookup wizard
Validation Rule             (a)Data duplication
                        (d)Limits the value

56.
Indexing data                (-)Retrieves data
Long text                      (d)Caption
FoxPro                         (b)Memo field
Label for a field            (c)DBMS
                              (a)Searching fast

57.
Text                             (d)2048 characters
Currency                       (a)up to 255 Characters
Memo                           (b)8 Bytes
Hyperlink                     (c)0-65535 Characters
                              (-)4 Bytes
58.
 Data Integrity               (c)No. of character can be entered
Automatic                     (d)Contains distinct value
Field size                      (a)Validation Rule
Primary key                  (-)Indexed
                                    (b)Default value

59.
Query                           (b)A collection of programs that enables you to store, modify, and extracts information from a database
DBMS                          (e)A field which uniquely identifies every record in a table.        
Table                            (d)A set of information stored about a particular entry.
Record                          (c)An arrangement of data in row and column format.     
Primary Key                 (a)A database object that creates a datasheet of selected fields and records from one or more tables.

60.
Data type                      (b)Field property
Format                         (d)Relationship
Form                           (-)Referential Integrity
One-to-one                   (c)Database Object
 (a)Memo
61.
Index                                  (-)database
Data redundancy                (d)software
Record                                (a)easy to search
DBMS                                (b)repetition of data
                             (c)Tuple


62.
Form                                (-)database
Primary key                        (d)data type
Advance Filter                    (a)text control
Hyperlink                            (b)unique identification of record
                               (c)Query

63.
Sort                                     (d) mass change
Single precision                   (c)DBMS
FoxPro                                 (-)memo field
Update query                       (b)sub type of number
                                      (a)Arranging data

64.
Mark ledger                          (c) Predefined formats
Wild cards                            (a) database
Wizard                                  (d) primary key
Relationship                          (b) * and?
                                        (-)Report

65.
Default value   
(c)255 Characters
Fox Pro           
(d)Column Name
Text                
(b)DBMS
Field                
(a)Field Properties
                       
(-)Search fast


66. [SLC 2065 S S]
   Group A                       Group B
i) MS-ACCESS          (d) analyze and present data in a printed format
ii) Data update                        (b) Query
iii) Field                      (c) a piece of information related to someone or something
iv) Report                   (a) Database management software
                                    (-) collection of related fields.
67. [SLC 2066]
Group A                      Group B
a) Default value          (c) 255 Characters
b) Fox Pro                   (a) Column Name
c) Text                        (b) DBMS
d) Field                       (d)Field Properties
                                    (-) Search fast
68. [SLC 2066 S]
 Group A                     Group B
a) OLE                                    (d) Formatted output
b) Primary key                        (c) Interface
c) Form                       (-) 64,000 characters
d) Report                     (b) Unique Field
                                    (a) Picture

69. [SLC 2067]
a)OLE                                     (d)Report
b) Data entry                           (a) Picture
c)Indexing                               (-) Table
d)Formatted printout              (c)Fast searching
                                                (b)Form

70. [SLC 2067 S]
 Group A                     Group B
a) MS-Access             (d) DATA entry and editing interface
b) Query                      (-) Electronic Spreadsheet software
c) Record                    (b) Tool to retrieve data from one or more than one   tables
d)Form                        (a) Data base management software
                                    (c) Collection of related fields

71. [SLC 2068]
      Group A                            Group B
   a) Indexing                           (c) Limits the value
   b) Report                              (d) Data type
   c) Validation Rule               (-) Error messages
   d) Hyper link                       (b) Final output
                                                (a) Search fast
72. [SLC 2068 S]
     Group A                             Group B
     a) Indexing data                 (d) Retrieves data conditionally
     b) Long Text                      (c) DBMS
     c) Fox Pro                          (b) Memo field
     d) Query                             (a) Searching fast
                                                (-) Report
73.[SLC 2069]
 Group A                                 Group B
   i) OLE                                  (d) Data Entry
   ii) Hyperlink                                    (c) Formatted  Hardcopy
   iii) Report                            (a) 1 GB
   iv) Form                               (-) Up to 255 characters
                                                (b) Up to 2048 characters

74. [SLC 2069 S]
    Group A                             Group B
    a) Report                             (b) Data type
    b) Currency                         (d) Column
    c) Long Text                       (a) Database object
    d) Field
                               (-) Record
                                                (c) Memo

75. [SLC 2070]
          Group A                                          Group B
i) Indexing Data                             (d) Size upto 1 GB
ii) Form                                          (c) Column of datasheet
iii) Field                                         (-) Row on a datasheet
iv) OLE object                               (a) Searching Fast
                                                       (b) Graphical interface for data entry

76. [SLC 2070 S]
a)      dBASE                                   (c)OLE
b)     Primary key                            (d)Memo
c)     Photo                                       (a)DBMS
d)     Long text                                (b)Uniquely defined
 ()Hyper links

77. [SLC 2071]
a.       Indexing data                    (b)Final output
b.      Report                                (d)View data
c.       Yes/No                              (a)Searching fast
d.      Select query                       (-)Picture
                                                          (c)Data type
78. [SLC 2072]
Group 'A'                               Group 'B'
(a) OLE                                   (c) Data Entry
(b) Validation Rule                (-) Stores data
(c) Form                                  (b) Limits the value
(d) Indexing                            (a) Data type
(d) Easy to search
79. [SLC 2065] [SEE 2073]
Group 'A'                               Group 'B'
(a) Query                                (d) Printed format
(b) Form                                  (c) Stores data
(c) Table                                 (b) Allows view, edit, input data
(d) Report                               (a) Extracts selected record for view
(-) DBMS
80. [SLC 2074]
Group 'A'                                           Group 'B'
(a) Data                                   (b) Input, view, edit data
(b) Form                                  (c) Formated output
(c) Report                               (a) Collection of raw facts
(d) Table                                 (-) Question to the database
d) Stores data in database