Thursday, August 30, 2018

170 Fill in the Blanks Computer Science [SLC / SEE] with answers



Networking and Telecommunication
1.      Telecommunication is a system of transmission of sounds, images, texts or data in the form of                                                                                  electronic signals.
2.      Telecommunication is a transmission of data and information between computers using a communication link such as a standard telephone line.
3.      The interconnection of computers with or without wires in order to share information is called computer network.
4.      Computer network  is a communication system connecting two or more computer that work together to exchange information and share resources.
5.      The server computer is used to serve data and information.
6.      A server is a computer designed to process requests and deliver data to other (client) computers over a Local Network or the Internet.
7.      The server computer acts as the storehouse and distributor for the data, information and programs.
8.      A peer is a self sufficient computer that acts both as a server and a client to other similar computers on the network.
9.      A computer on a network that uses resources of the network is workstation.
10.   A peer to peer network is a group of computers that function both as client and server.
11.   A centralized network is a network in which a central host computer performs data processing and storage on behalf of clients.
12.   The wireless technology used for long distance is called microwave transmission.
13.   Cat 5 cable is used with RJ-45 connector.
14.   Microwave is a wireless technology  that can be used to transmit data between two different computers.
15.   A set of rules used to define communication is called protocol.
16.   Protocol is a set of rules that governs the communications between computers on a network.
17.   The smallest area covers by network is called LAN
18.   The network of computer within the room, building or campus is LAN.
19.   A MAN is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a LAN but smaller than the area covered by a WAN.
20.   The computer network of any two countries is WAN.
21.   The example of WAN is internet .
22.   HUB is a hardware device used to connect several computers  together.
23.   Router is a device connecting two or more networks that facilitates the transfer of data in the form of packets.
24.   Gatewayis a device software or a system that converts data between dissimilar network with different protocols.
25.   Simplex mode communication is a mode of transmission in which data flows in one direction only.
26.   Modes for transmitting data from one device to another are simplex, Half-duplex, and full-duplex mode.
27.   Full-duplex mode means two-way communication system. [SLC 2064]
28.   Bandwidth is measured in bits per second.
29.   A topology refers to the shape of the network in which all the computers are connected together.
30.   A physical ring topology is a network topology in which network nodes are connected in a continuous circle.

Internet and Its services

31.   Internet is an interconnection of several computers of different types belonging to various  network all over the world.
32.   The Internet is network of  networks.
33.   The Internet began life in 1969 when the United States Department of Defense started a network called
ARPA net
34.   The internet originated from an experimental network called ARPAnetcreated in 1969.
35.   World Wide Web is also known as internet.
36.   Dial-up internet access requires MODEM and telephone.
37.   A ­­­­­­­­­­­­­­­­­­­web site is the collection of web pages.
38.   Each page of information is known as web page
39.   Each web sites is identified by the URL.
40.   The main page of the website is called homepage.
41.   Web server are computers that deliver (serves up) Web pages.
42.   Windows Internet Explorer and Netscape Navigator are two popular web browser.
43.   ­­­­­­­­­­­­­Web browser  is software that allows the user to surf the information through the Internet.
44.   HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.  
45.   The WWW is the leading information-exchange service of the Internet.
46.   Search engine are online services that allow users to scan the contents of the Internet to find Web sites or specific information of interest to them.
47.   On the Internet, a search engine is a coordinated set of programs that receives your search request, compares it to the entries in the index and returns result to you.
48.   E-mail is defined as the exchange of message and computer file between computers over a computer network.
49.   Web chat on the Internet has become a popular way for people to connect online in a group(a chat room) to share similar interests.
50.   IRC is an online textual communication with each other in real time.
51.   The remote login protocol is telnet and file transfer protocol is FTP.
52.   FTP is a protocol used to upload and download information.
53.   E-commerce refers to the buying and selling of things over the Internet.
54.   Broadband can be simply defined as a fast connection to the internet that is always on.
55.   Wi­-Fi refers to wireless networking technology that allows computer and other devices to communicate over a wireless signal.
56.   Wi-max is a standard for high speed broadband internet access over a wireless connection.
57.   Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.
58.    Video conference is a live video connection between people in separate locations for the purpose of communication or interaction.
59.   Social network is a web site on the Internet that brings people together in a central location to talk, share ideas, share interests, make new friends, etc.
60.   The process of transferring a copy of a file from a remote computer to the requesting computer is called downloading.[SLC 2064]

Computer Security
  1. The protection given to the computer hardware and software from being lost or damaged is known as computer security.
62.   Computer security focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change or destruction.
63.   Computer security is the process of preventing and detecting unauthorized use of any computer.
  1. Hardware security protects the machine and peripheral devices from theft, damage and electronic instruction.
  2. The regular maintenance of hardware keeps the computer devices in good operating condition and helps to find out the problems in hardware.
  3. Voltage regulator an electrical regulator designed to automatically maintain a constant voltage level.
  4. The suitable temperature in the computer room should be maintained between 21  to 24 degree Celsius.
68.   A computer requires a constant source of 110 volt AC power.
69.   The recommended computer room temperature should be 220celcius.
70.   UPS is a battery supported power unit between and external power source and a computer system which supplies clean and continuous power even during power failure.
  1. UPS is a device which provides continuous power and protects the computer equipments from power surges and voltage fluctuations
72.   A  power conditioner is an electrical device that provides “clean” AC power to sensitive electrical equipment.
73.   A   surge suppressor is an appliance designed to protect electrical devices from voltage spikes.
74.   The tool that is used to maintain performance and error free file management is called scan disk.
75.   A password is a secret series of characters that enables a user to access a file, computer, or program.

Computer Virus
76.   The first person who introduced the concept of replicating program was John von nevmann.
77.     Computer virus Is a program that spreads by first infecting files or the system areas of a computer or network router’s hard drive and then making copies of itself.
78.   Computer virus  is a program that can copy itself and infect a computer without the permission or knowledge of the user.
79.   Computer virus is a program containing code that can generate multiple copies of itself .
80.   The capability of generating the copies of itself is called replication.
81.   Antivirus software is a class of program that searches your hard drive and floppy disks for any known or potential viruses.
82.   Antivirus are used to detect and remove computer virus from infected file or memory. [SLC 2064]
83.   Message carrying viruses usually do not destruct the computer files/programs but display interesting information to entertain the users.
84.   Firewall are software programs or hardware devices designed to keep computers safe from hackers.
85.   A MBR is an area of the computer hard drive or a floppy disk that is executed when the computer is started.
86.   Boot sector virus infects or substitutes its own code for either the DOS boot sector or the master boot record(MBR)
87.    File infector viruses infect executable program files having an extension .exe,.com,or.dll.
88.   File infector virus affect executable file.
89.   A macro virus is a type of computer virus that infects the word processing or spread sheet document or template.
90.   A malicious program that pretends to be something useful program is known as trojan horse.
91.   A program that is not a virus but behave like virus and can replicate is known as worm.
92.   Multipartite viruses can infect both the application programs and the boot sector of a disk.
93.   Polymorphic code is a code that mutates while keeping the original algorithm intact.
94.   A  polymorphic virus is a complicated computer virus that affects data types and functions.
95.   Polymorphic viruses are very difficult to identify and detect by anti-virus.

Multimedia and Its Application
96.   A computer capable of handling texts, graphics, audios, animations and videos is called multimedia computer.
97.   Multimedia is a computer-delivered electronic system that allows the user to control, combine and manipulate different types of media such as sound, video, computer graphics and animation.
98.   Multimedia is the integration of multiple forms of media.
99.   Multiple media in one content is called multimedia .
100.                    Multimedia enhances the information for better communication and understanding.
101.                    Graphics provides a visual impact.
102.                    Graphics is a digital representation of non-text information such as a drawing, chart or  photographs.
103.                    Graphics deal with the generations, representations, manipulation and display of pictures with the aid of computer.
104.                    Animation represents multiple picture in a sequence.
105.                    Video is the process of displaying still images in a rapid sequence to create the illusion of movement.
106.                    Video deal with recording and displaying of a sequence of mages at a reasonable speed to create an impression of movement.
107.                    Video refers to pictures in motion.
108.                    Text is the primary component of multimedia.
109.                    Optical disk is used to store data and information in the multimedia technology.
110.                    Hoarding board is an example to use multimedia in commercial field.
111.                    Multimedia is used in the entertainment industry, especially to develop special effects in   movies and animation.
112.                    VR is an artificial environment created with computer hardware and software and presented to the user in such a way that it appears.
113.                    A simulated 3-D environment is called VR.
114.            VR is the use of computer modeling and simulation to enable a person to interact with an artificial three-dimensional visual or other sensory environment.
115.                    Virtual reality uses    head sets    and data gloves.

Cyber Law and Computer Ethics
116.                    Telecommunication is the exchange of information over significant distances by electronic means.
117.                    Cyber law includes a wide variety of legal issues to the use of communication technology.
118.                    Cyber law is a generic term, which refers to all the legal and regulatory aspects of internet and the world wide web
119.                    Cyber law is the law governing computers and the Internet.
120.                    Cyber law of Nepal commonly known as the Electronic Transaction And Digital Signature Act-Ordinance was enacted in Nepal in   2061  B.S.
121.                    Cyber crime may include thefts or actions in electric form that causes damages or difficulty to other computer users.
122.                    Cyber crime is a criminal activity done using computers and the Internet.
123.                    Cyber Crime refers to illegal activities involved in any computer.
124.                    The activity of breaking into a computer system to gain an unauthorized access is known as                           .            hacking.
125.                    The use of communication technology, mainly the Internet to torture other individuals is known as cyber stalking.
126.                    Computer ethics is the set of moral principles that regulate the use of computers.
127.                    Cyber space does not only include the internet and computers, but it present where two or more cables or wires etc meet.
128.                    Cyberspace has become synonyms with the internet.
129.                    A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of the document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.
130.                    Digital Signature is a security Mechanism system in the cyberspace for digital data processing and transaction.
131.                    Intellectual property law is a term referring legal property rights of someone over his creations of the mind , both artistic and commercial.
132.                    The law which is enacted to ensure the preservation, integrity and reliability of data is called data protection and privacy law.
133.                    Fair credit reporting act is a federal law enacted in 1970 to insure confidentiality of consumer credit information held by lenders and credit reporting agencies.
134.                    Video privacy protection act limits the disclosure of personally identifiable information regarding video rentals.
135.                    US introduced fair credit reporting act in 1970 A.D.
Database Management System

136.                    Database is an organized collection of related data in tabular form.
137.                    A collection of related data of a person or anything is known as database.
138.                    DBMS is a general program designed to manage a database.
  1. DBMS is a complex set of software program that controls the organization, storage, management, retrieval of data in database.
  2. Ms-Access is a relational database management system where data is arranged in the form of tables .
141.                    Data  is the raw facts to generate information.
142.                    Information is the processed value which we get after we get after processing by the computer.
143.                    SQL stands for structure query language.
144.                    A primary key cannot contain the null values.
145.                    A primary key is a fixed field which uniquely identifies every record in a table.
146.                    You cannot enter duplicate values in a primary field.
147.                    Foreign key is the linking field between two values.
148.                    A combination of two or more keys which can be used as a primary key is called a composite key.
149.                    A text data type allows the field to contain up to 255characters.
150.                    The default field size for text type is 50 characters.
151.                    Memo field can hold 65535 characters.
152.                    Maximum width of field is 64 characters.
153.                    An input mask  is the format we will assign for the introduction of values into a field.
154.                    The   default value property is used to define a default value that is automatically entered in field when you add a new record, at o time of data entry.
155.                    Filtering allows you to retrieve specific information from a table in Microsoft Access 2003.
156.                    A column in a table is called field and row in a table is called record.
  1. The smallest unit of data organization is called a field.
158.                    Auto number field type automatically enters number in a field which increase by one for every new record.
159.                    We can change data type of field in table design view.
160.                    Validation rule is used to make sure that the data entered in a field is within the criteria set by the user.
161.                    A table contains records and field.
162.                    Query help us to retrieve and view only those records from the database tables that meet a specific condition or criteria set by us.
  1. A query is a database object that creates a datasheet of selected fields and records from one or more tables.
164.                    A    query extracts and arranges information from a table in a manner that you specify.
165.                    Action query is used to change record in a table at a single operation.
166.                    Delete query is used to delete records from the table.
167.                    Query that makes changes in table is called update query
  1. A form is a database object used primarily to display records on screen, to make it easier to enter new records and to make changes to the existing records.
  2. The report design View window is the place where you design reports from a scratch or add your own touches to reports you create with the report wizard.
170.                   Report enables you to format your data in an attracting and informative layout for printing.

No comments:

Post a Comment