Networking and Telecommunication
1.
Data
communication means:
i.
We
can easily send and receive the message Data
computing system is fastest in network
ii.
The process of transferring data
and information None
of above
2.
The
term network basically refers to:
Communication Interconnection Sharing All of them
3.
Which
of the following are is not a goal of computer networks?
Resource sharing High reliability Scalability None
of the above
4.
Which
one of the device is simplex?
i. Television ii.
Telephone iii. Computer iv. Walkie-Talkie
5.
TV
broadcasting is an example for data transmitting
i.
Half-duplex Mode ii. Simplex Mode iii. Full duplex mode iv. None of them
6.
Which
refers to the communication media: [SLC 2065]
UTP
Cable Fiber optics cable Satellite All of
above
7.
Which
is not a communication media? [SLC 2067]
Wire Microwave Satellite NIC
8.
Which
is not unguided media? [SLC 2069]
i) Fiber optics ii) Microwave iii) Infrared iv) Radio wave
i) Fiber optics ii) Microwave iii) Infrared iv) Radio wave
9.
Which is NOT a guided media? [SLC 2066 S]
i)
UTP Cable ii) STP Cable iii) Satellite iv)
Fiber Optics
10.
Which
of the following is not a guided data communication media? [SLC 2068 S]
i)
Coaxial cable ii) Fiber optic iii) twisted pair iv) Satellite
11.
Which
transmission media is not used for guided transmission media?
Fiber Optic Coaxial Cable RJ45 Satellite
12.
Which one is an example of bounded media? [SLC
2067 S] [SLC 2070]
i) Fiber optics ii) Microwave transmission iii)Laser transmission iv) infrared transmission
i) Fiber optics ii) Microwave transmission iii)Laser transmission iv) infrared transmission
13.
An
example of guided media_______
Radio wave Infrared Fiber Optics Micro wave
14.
In
which communication media data transfer high? [SLC 2068]
i) Twisted pair ii) Co-axial cable iii) Fiber optics iv) Microwave
i) Twisted pair ii) Co-axial cable iii) Fiber optics iv) Microwave
15.
Fastest
and high bandwidth data communication medium is:
Optical
fiber Twisted Pair Coaxial Cable Telephone
Line
16.
Media
used to transfer data in forms of light? [SLC 2070 S]
i. Microwave ii. Fiber optical iii. Radio wave iv. Satellite
i. Microwave ii. Fiber optical iii. Radio wave iv. Satellite
17.
Microwave
and Infrared technology are related with:
Unbounded media Bounded
Media Confounded Hot Bounded
18.
A form of wireless
transmission in which signals are sent via pulses of infrared light.
i) Radio networking ii) Infrared transmission iii) Microwave
transmission iv) None of the above
19.
Which
is the connector of UTP cable?
i.
BNC ii. T-Connector iii. ST connector iv. RJ-45 connector
20.
Which
is the connector of coaxial cable.
i. RJ 45 ii. BNC
iii. ST iv. None of them
21.
Which
of the following is not Media connector?
BNC ii. terminator iii.RJ-45 iv.NIC
22.
The
device used for connecting PC to telephone line is
i) CD-ROM ii) MODEM iii) Printer iv) Port
23.
A
device that converts the discrete stream of digital ON-OFF electric pulses used
by computer into the continuously variable analog wave patterns used to
transmit the human voice over many existing telephone lines.
i) Modem ii)
Bridge iii) Gateway
24.
Modem
converts ______________ [SLC 2066
S]
Sound into digital Digital signal into sound Both (i) and (ii) None
of above
25.
The
speed of Modems is measured in terms of
mbps ii.bps iii. kbps iv. bits
26. Which device is used to connect
multiple networks that uses the same protocol. [SLC 2074]
(i) Bridge (ii)
NIC (iii) Switch (iv) Gateway
27.
Which
of the following is used to connect
totally dissimilar networks?
i) Router ii) Bridge iii) Gateway iv) None of
the above
28.
A
networking device that joins multiple networks having different protocols is_
Switch ii.
Router iii. Gateway iv. Bridge
29.
Which
is not a network device?
Hub Repeater switch
TCP/IP
30.
Which
is not a physical component of computer network ?
i) Cable ii) NIC iii)
Network OS iv) Hub
31.
Which
is not network hardware component?
HUB ii.
Repeater iii. Router iv. Windows NT
32.
Which
is the component of a network?
i. MSDOS ii.
Hub iii. Volt guard iv. None of them
33.
Devices
installed on long cable runs to amplify the signal are called:
Repeaters Adapters Switches Routers
34.
A
network navigation device that merely retransmits a signal to all other nodes
attached to it:
Router NIC Hub Adapter
35.
A
device that lets you link two networks together.
i. Switch ii. Hub iii. Router iv.
None of above
36.
Which
of the following device is multi ports repeater?
Hub ii.
router iii.
bridge iv. Gateway
37.
Any
network device that can connect to the network and can generate ,process or
transfer network data.
i)
Node ii) Client iii) Peer
38.
A
network interface card is the card that physically makes the connection between
the computer
and the
network cable.
i) Network cables ii) Network connector iii) NIC
39.
Which
is not the network operating system:
Linux UNIX MS-DOS Windows
Server 2012
40.
Which
is Network operating system(NOS)? [SLC 2064]
i.
Linux ii. Windows XP iii. MS-DOS iv. All
41.
Which
is the network operating system used in a server computer?
i.
Windows XP ii. Windows Vista iii.
Windows NT server iv. None of them
42.
Which
one is an operating system software? [SLC 2070]
i) MS-Word ii) MS-Excel iii)
Firefox iv) MS-DOS
43.
Protocols
in network means
i)
Language
for communication between computer
ii)
Rules
for exchange of message between two or more hosts
iii) Both i) and
ii) iv)
None of the above
44.
Which
of the following is not a protocol? [SLC 2068] [SLC 2074]
i) POP ii) TCP/IP iii) NOS iv) FTP
i) POP ii) TCP/IP iii) NOS iv) FTP
45.
Which
is not a network protocol?
i. TCP/IP ii. HTTP iii. LAN iv. FTP
46.
Which
of the following is not a protocol?
TCP/IP ii.IPX/SPX iii.NETBIOS/NETBUI
iv. Client
47.
Which
is not the network protocol?
TCP/IP ii. STP iii. FTP iv. SMTP
48.
Which
of the following is protocol?
TCP/IP HTTP FTP All of them
49.
The communication
protocol used to connect to web servers on the internet or on a local network
(intranet).
i) TCP/IP ii) HTTP i)
SMTP iv)
POP
50.
_______
is the protocol used to send email:
HTTP SMTP POP FTP
51.
Which protocol is used to receive
mail from mail server?
POP FTP HTTP SMTP
52.
Which
of the following networking solution is suitable for networking within a
building?
i) WAN ii) LAN iii)
MAN iv)
None of above
53.
A
data communications system allowing a number of independent devices to communicate
directly with each other, within a moderately sized geographic area.
i.LAN ii.WAN iii. MAN iv.CAN
54.
A
network of computer spread over a city or town located in the same geographical
area.
i) LAN ii) MAN iii)
WAN
55.
A telecommunication
network, usually used for connecting computers, that spans a wide
geographical area.
i)
LAN ii)
MAN iii)
CAN iv) WAN
56.
Which
type of network is used in the internet?
LAN MAN GAN WAN
57.
Which
of the following topologies share a single channel on which all stations can
receive and transmit the data?
i) LAN ii) BUS iii)
TREE iv)
None of the above
58.
Physical
layout of computer:
Network Topology LAN MAN
59.
Which
is not a network topology? [SLC 2066]
STAR Ring Client Server BUS
60.
A
topology with a single cable that connects all the workstations, servers,
printers and other devices on the network.
i. Ring Topology ii.
Bus Topology iii. Star
Topology iv. Mesh Topology
61.
Which
of the following topologies is least affected by addition/removal of a node?
i) Star ii)
Ring iii) Bus iv) None of the above
62.
In
which topology network devices are connected through hub? [SLC 2067]
i) Ring topology ii) Bus topology iii) Star topology iv)
None of the above
63.
Token
passing system is used in _____ topology.
Star Ring Bus Mesh
64.
The
network architecture used in most home networks is:
Client-server LAN Peer-to-peer LAN Client-server
WAN Peer-to-peer WAN
65.
A
_______ is a self-sufficient computer that acts both as a server and a client
to other similar computers on the network.
i. Node ii. Client iii. Peer
66.
A group of computers
that functions both as a client and as a server.
Centralized
computing ii)
Client/server iii) Peer-to-peer
iv)Local Area Network
67.
In
which of the following network model all the computers have equal access?
i.
Peer-to-peer network ii. apple talk network
iii. Client/server network iv. None of the above
68.
A
specialized network device on a host-based network that transmits the data
entered by the user to the host for processing and displays the results.
i. Client ii. Network Server iii. Terminal iv.
None of the above
69.
A
centralized computing network is a type of network where all the users connect to a host computer that
is the acting agent for all communication.
i) Peer-to peer ii)
Client/server iii) None of the above
70.
A
network in which a central host computer performs data processing and storage
on behalf of clients.
i.
Centralized computing network ii. Client/Server network iii. Peer-to-peer network
71.
Which
of the following acts as the central authority in the network?
protocol ii.client
iii.server iv.none of the above
72.
A
server in LAN is a
i) Device offering
service to user ii)
NIC
iii) Workstation with huge
secondary storage iv) None of
the above
73.
A
dedicated server that manages printers and printing jobs is_
Network Server ii. Printer Server iii. Modem Server iv. File Server
74.
The
maximum speed at which data can be transmitted between two nodes on a network.
Bit rate Bandwidth Band length None of them
75.
The
bandwidth of digital signal is measured in_
i.
Hertz ii. Cycle per
second iii. Bits per second iv.
None of the above
Internet and Its services
76.
The internet was
developed by US.
Department of Defence Department of Electronics Department of Commerce None
77.
The
large group of millions of computers around the world that are all connected to
one another.
LAN
Intranet Internet All of above
78.
Which
is not related to Internet? [SLC 2067]
i.ISP ii.TCP/IP iii.WWW iv.UPS
79.
Which of the following network connects
computer to the Internet? [SLC 2069 S]
i) Intranet ii) LAN iii) WAN iv) MAN
i) Intranet ii) LAN iii) WAN iv) MAN
80.
Which
device is necessary to operate the internet? [SLC 2066 S]
i.CD-ROM
ii. ISP iii. Modem iv. All of above
81. Connection between a computer
and the Internet done using a normal
telephone is called
i.
Satellite
network Dial-Up network Cable network None of them
82.
Which
is the protocol used in internet?
i.
TCP/IP ii.FTP iii.ICP iv.ISP
83.
__________
is the main line of defense between a local network or intranet and the
Internet.
USB port Encryption key Firewall Decryption key
84.
Each computer on the Internet has a unique
numeric address called a/an …. [SLC 2069 S]
i) Web address ii) Domain address iii) Network binding iv) IP address
i) Web address ii) Domain address iii) Network binding iv) IP address
85. The ARPAnet that helped to
develop protocol is
i.
TCP/IP ARP POPA None of above
86.
Which of the flowing is the internet
service? [SLC 2069]
IRC E-Mail Telnet All of above
87.
Which is the internet service? [SLC 2064]
i) Telnet ii)
POP iii) Both iv) None
88.
Which
one is not the service of the Internet?
Electronic Fax ii. Chatting iii.
Sharing hardware iv.
Electronic mail
89.
Which is not an internet service? [SLC 2066 S]
i)
e-mail ii) e-telephone iii)e-fax iv) e-commerce
90. WWW is a
Protocol
of Internet Service of Internet Language of Internet None of them
91. Email is
i.
Mail
concerning electronic devices
ii.
Transaction of letters,messages
and memos over a communication network.
iii.
Transaction
of messages within a computer. None
of them.
92.
E-mail is a/an …………… [SLC 2067 S]
i) organization which controls internet ii) protocol to access internet iii) service of Internet iv) none
i) organization which controls internet ii) protocol to access internet iii) service of Internet iv) none
93.
Which
is the correct Email ID? [SLC 2065]
i) Yahoo@ramesh ii) Ramesh@yahoo.com iii) @ramesh.yahoo.com iv) None of the above
i) Yahoo@ramesh ii) Ramesh@yahoo.com iii) @ramesh.yahoo.com iv) None of the above
94.
In
an email address : abc@yahoo.com, what does ‘yahoo’ refer?
User account name ii. Domain name iii. Top level domain name iv.
None of them.
95.
Which of the following is online
business?
E-Commerce E-shopping E-Business All of the above
96.
E-commerce is ………….[SLC 2067 S]
i) a type of business ii) a type of virus iii) both (i) &(ii) iv) None of the above
i) a type of business ii) a type of virus iii) both (i) &(ii) iv) None of the above
97.
Each web page has its
own unique address known as
i) Uniform Resource Locator
ii) Universal Resource Locator
iii) Uniform Resources
Locator
iv) Universal Resources Locator
98.
The
unique address of a web page on the internet is called
i.URL ii. Browser iii. Protocol iv. HTTP
99.
Which
of the following allows the user to surf and interact with the web-page?
i. website ii.
Browser iii.web
page iv.web server
100.
Which
is web browser software? [SLC 2067]
i. Windows 2007 ii. Internet explorer iii. Windows NT iv. All of the above
101.
Web
sites that allow the users to search information based on keywords or a
combination of keywords.
i)World
Wide Web ii) Electronic
mail iii) Search engines
102.
Which
is not the search engine?
Yahoo.com ii.
Google.com iii. Bing.com iv. Ebay.com
103.
Yahoo!
Is a ……..
i. browser ii .home page iii. search engines
104.
FTP
is used to
i.
Browse
the Internet Send emails
ii.
transfer files from one computer
to another None
of above
105.
Used to transfer file from one computer to another
computer in Internet. [SLC 2070 S]
i. FAQ ii.
IRC iii. FTP iv. TPF
106.
Which
of the following is remote login service? [SLC 2068 S] [SLC 2071]
i) Video conferencing ii) Telnet iii) FTP iv) TCP/IP
i) Video conferencing ii) Telnet iii) FTP iv) TCP/IP
107.
A
web site in the internet that brings people together in central location to
talk, share ideas, share
interests,
make new friends.
i)USENET ii) Social network iii) Web chat
108.
An
online interactive communication mechanism that lets people to make a real time
decision with
one
or more people through the Internet.
i)Web chat ii)Newsgroup
iii)Videoconferencing
109.
The
service of the Internet that provides audio and video conversation is_
Chat ii.
E-mail iii. Video conference iv.
Video chat
110.
The process of transferring file
from a remote computer to local computer is:
Uploading Downloading Searching File transfer protocol
111.
The process of transferring file from
a local computer to internet is:
Uploading Downloading Searching File
transfer protocol
112.
Web-site is a
collection of
HTML documents Graphics
File audio and video files All
of above
113.
A
set of interconnected WebPages, usually including a homepage, generally located
on the same server, and prepared and maintained as a collection of information
by a person, group, or organization.
i.
Web site ii. Web Browser iii.
Web server iv. None of above
114.
A
technology that allows the creation of collaborative web sites.
i. Wiki
ii. E-Mail iii. Search
Engine iv. All of above
Computer Security
115.
The term computer security refers
to:
Use
of antivirus Protection
of software
Protection to a computer system Use of firewall
116.
Common
computer security is
Hardware
Security Software security
Hardware
& software security None
of them
117.
_______ protect the
machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information
security ii) Hardware security
iii) Software
security iv)
None of the above
118.
Some of the methods of
hardware protection are:
i) Fire
Alarms ii) Security Lighting iii) Closed-circuit cameras
iv)
All of above
119.
Some
of the methods of hardware protection are:
i. Password security ii. Security lighting iii. Scandisk
iv. All of the above
120.
Which
of the following is not hardware security method?
i.
Insurance ii. Maintenance iii. Closed-circuit cameras iv.
Hard lock key
121.
Hardware
security includes
Regular maintenance Use
of power of regulator devices Both
None of them
122.
Which is not the power protection
device?
UPS Spike Guard Volt Guard Scan disk
123.
Which
of the following is not power supply device?
i.
Volt guard ii.UPS iii. Constant Voltage Transformer iv. Power Plug
124.
A device that protects
your PC against power surges and spikes.
i)
UPS
ii) Voltage Regulator iii) Surge suppressor
iv) All of the above
125.
An
electrical regulator designed to automatically maintain a constant voltage
level.
i.UPS ii. Voltage regulator iii. Surge processor iv. All of the above
126.
UPS
is a
Voltage filtration
device Voltage processing device Voltage regulator device None
127.
………..
is a device that allows your computer to keep running for at least a short time
when the primary power source is lost.
i.UPS ii. Voltage regulator iii. Surge processor iv. All of the above
128.
To prevent the loss of data during
power failures, we use:
Encryption
program Surge protector Firewall UPS
129.
Which
device protects hardware? [SLC 2068]
i) UPS ii) MODEM iii) Gateway iv) All of the above
i) UPS ii) MODEM iii) Gateway iv) All of the above
130.
The temperature in
computer system should be maintained between ______to________
i)21`C to
24`C
ii) 20`C to 25`C iii) 23`C to
28`C iv)
None of the above
131.
The
temperature in the computer system should be maintained between ……….
and ……….
i.
68 to 72 degree Fahrenheit ii.88
to 78 degree Fahrenheit
iii.68 to 27 degree Fahrenheit iv. All
132.
The type of security
that provides barriers and other cyber –tools that protect programs, files
and the information
flow to and from a computer.
i) Computer
security ii)
Hardware security iii) Software security iv)
None of the above
133.
Which
of the following is not software security measure?
i.
Virus Scanning ii. Scandisk iii. Password iv. Security Guard
134.
Data
and software security includes
Protection
from computer virus
Cover the computer property Both None of them
135.
An important counter measure against
data corruption or loss.
Password
policy Defragmentation Scan disk Backup system
136.
Which
of the following measure allows to protect computers being opened from
unauthorized user?
i.
Antivirus program ii. Password iii. Debug iv. program
137.
Scan disk is used for
Removing
virus Removing bad clusters Backup
data All of above
138.
Scan
disk is performed by using
Application software Operating
system software Utility
software None
139.
Backup
is way of
i.
Securing data and information Securing
internal part of the computer
ii.
Securing
external parts of the computer None
of them
140.
refers to the condition of a disk in which
files are divided into pieces scattered around the disk.
i.
Fragmentation ii. Defragmentation iii. Scan disk iv.
All of the above
141.
Process
of arranging the scattered parts of file into a contiguous manner. [SLC 2068 S]
[SLC 2071] [SLC 2074]
i) Backup ii) Defragmentation iii) Debugging iv) All of the above
i) Backup ii) Defragmentation iii) Debugging iv) All of the above
142.
The
process of loading the noncontiguous fragments of data, rearranging the fragments and restoring them into fewer
fragments or into the whole life.
i)Fragmentation ii) Defragmentation iii) Scan disk
143.
Defragmentation
is a process of
Formatting the
disk Relocation of the disk
Relocation
of the files of the disk None
of them
Computer Virus
144.
Computer
virus is___________software.
i. Malware ii.
Utility iii.
Application iv. Operating System
145.
Computer virus is ………. [SLC 2068 S]
i) dust particle ii) computer programs iii) useful program iv) none of the above
i) dust particle ii) computer programs iii) useful program iv) none of the above
146.
Virus
is a [SLC 2071]
i. Utility
program ii. Destructive program iii.
System program iv. None
147.
Computer
virus can
i.
Hide in a host file ii.
Replicate iii. Spread iv. All of the above.
148.
Computer
virus can destroy
i.
Hardware ii.
Software iii. Data iv.
All
149.
Which
is not a virus? [SLC 2064]
i. Worm ii. Logic bomb iii. Trojan Horse iv. Win-zip
150.
Which one is not a type of virus? [SLC 2067 S]
[SLC 2070]
i)
Message Carrying virus ii)
Boot sector virus
iii)System
virus iv)Special Purpose Application Infector
151.
Route of virus transmission. [SLC 2065]
Mouse Printer Microphone Pen drive
152.
What is the route of virus transmission? [SLC 2070
S]
i.
Monitor ii. Flash drive iii. Mouse iv. Cable
153.
Computer
virus can spread from one computer to another through_
i.
Infected portable disk ii. The
Internet iii. Pirated
software iv. All of the above.
154.
A
program or set of programs designed to prevent, search for, detect, and remove
software viruses, and other malicious software like worms, Trojans, adware and
more.
i)Shareware ii)Freeware ii)Antivirus
155.
Which
of the following is not anti-virus
i.AVG ii.NAV iii, Kaspersky iv. I Love you
156.
Which
of the following is an anti-virus program? [SLC 2068 S]
i) NAV ii) Windows iii) Photoshop iv) All of the above
i) NAV ii) Windows iii) Photoshop iv) All of the above
157.
An
example of antivirus software is
i. NAV ii. McAfee
iii. CPAV iv.
All
158.
Which
is antivirus software?
i. Scan ii. Defrag iii. Kaspersky iv. Power
point
159.
Norton
antivirus, when loaded onto a computer system , checks the following areas for
viruses
boot record programs at the time you use them both
160.
________ Virus are often transmitted
by a floppy disk left in the floppy disk drive.
Boot-sector Trojan
horse Script logic bomb
161.
Which
computer virus damages the master boot record? [SLC 2068]
i) Macro virus ii) File virus iii)
New folder virus iv) Boot sector virus
162.
Which
virus infects boot sector files? [SLC 2069]
i) Macro virus ii) Multipartite virus iii) Boot sector virus iv) Program virus
i) Macro virus ii) Multipartite virus iii) Boot sector virus iv) Program virus
163.
Boot
sector virus infects [SLC 2066]
i.
System files ii. Master boot record iii.
Application software iv. Document file
164.
Disk Killer, stoned
and Michelangelo are examples of ________________
i) Boot sector virus ii) File infecting virus
iii) Polymorphic virus iv) All of the above
165.
A
virus that infects the part of the computer called a system sector.
i. Boot
sector virus ii.
File infecting Virus iii. Polymorphic
virus iv. None of the above
166.
Which
of the following virus infects the various parts of operating system?
i.
boot sector ii.
Worm iii. Macro iv.
system infector
167.
A type of virus that
infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus ii) File infecting iii)
Script
virus iv) Macro virus
168.
__________ Virus can infect both
programs and boot sectors.
Stealth virus File
infectors Multipartite virus Polymorphic
virus
169.
Multipartite
viruses have combination features of
i. Boot sector &
stealth virus ii. Boot sector ¯o virus
iii.
Boot sector & program virus iv.
None
170.
Viruses attach themselves to
documents such as Word and Excel.
Macro
virus File infectors Polymorphic
virus
171.
A
type of virus that replaces a macro , which is what enables a program to work
and instigates a designated group of actions and commands.
i)Macro
virus ii)File infecting
virus
iii)Polymorphic virus
172.
A virus that can
change its appearance with every infection is called_____________
i) Boot
virus ii) Micro virus iii) Script
virus
iv) None of them
173.
is a
self-encrypted virus designed to avoid detection by a scanner.
i.
Polymorphic virus ii. Macro virus iii. Script virus iv. None of the above
Multimedia and Its Application
174.
A computer-derived
electronic system that allows the user to control, combine, and manipulate
different types different types of media, such as text, sound, video, computer
graphics and animation.
Monomedia Multimedia Hypermedia None of the above
175.
In
order to work with multimedia a personal computer typically requires the
following hardware components.
i)Faster CPU ii)Large main memory iii)All of above iv)None of above
176.
In order to work with multimedia, a
personal computer typically requires the following hardware components.
Power
microprocessor Huge
main memory Compact disk All
of them
177.
Which
of the following media are used in Multimedia system?
i. Text-audio ii. Text-visual iii.
Text, graphic, audio and visual iv. Text, graphic and sound
178.
The
types of media used in multimedia includes
i.
Text Graphics Sound All of them
179.
A
MUK consists of the
i.
CD-ROM
Drive Sound
Card Speaker All
of them
180.
Which
of the following are components of multimedia?
i.
Computer ii.
Software iii. Projector iv. All of above
181.
Which
of the following is main component of multimedia? [SLC 2065]
i. Floppy disk ii. Floppy drive iii. Sound card
iv. Magnetic tape
182.
Which of the following is the component of
multimedia? [SLC 2069 S]
i) Network ii) Microphone iii) Power cable iv) Printer
i) Network ii) Microphone iii) Power cable iv) Printer
183.
Select
the common components of the multimedia computer system.
i.
Floppy Floppy drive CD-ROM None
184.
Which
is not related to multimedia? [SLC 2069]
i) Printer ii)
Sound card iii)
Microphone iv) CD-ROM
185.
Which of the following is an audio output device?
[SLC 2070]
i) Microphone ii) Speaker iii) Monitor iv) Printer
186.
Which of the following
is an audio input device? [SLC
2071]
i.
Printer ii. Microphone iii. Head
phone iv.
Speaker
187.
Which
of these software is used for photo editing? [SLC 2074]
(i) Ms-Excel (ii) Photoshop (iii)
Power-Point (iv) Ms-Word
188.
Which one is the software used in
multimedia?
CD-ROM Sound Card Sound Forge MS-Word
189.
Software used in multimedia system.
Photoshop Flash Maya All
of them
190.
The
software associated with the multimedia technology is .
i. Macromedia
Flash ii. Microsoft Word. iii. Adobe In design iv. None of the above
191.
Software
associated with the multimedia technology is
Windows XP Macromedia Flash QBASIC None
192.
Which
of the following is software used in multimedia technology.
i.
Office XP ii. Adobe Photoshop iii. Basic iv. None of the above
193.
Which
of the following is not multimedia software?
i.
Windows media player ii. Windows XP iii. Adobe illustrator iv. Macromedia flash
194.
Which
of the following is multimedia application?
i.
Education ii.
Entertainment iii.
virtual reality iv. All
of above
195.
Multimedia
technology is very effective in
i.
Market Classroom War None
196.
Multimedia
technology is used in ……… [SLC 2066]
i)
Education ii) Business iii) Health care iv) All of the above
197.
An artificial reality
that projects the user into a 3D space generated by the computer.
Virtual Reality Virtual Computer All of the above None
of the above
198.
An
upcoming technology that makes users feel in Virtual Environment(VE) by using
computer hardware and software.
i)Virtual space ii)Virtual computer iii)Virtual
reality iv)None of above
199.
_____ deals with the recording and
display sequence of images at a reasonable speed to create an impression of
movement.
Graphics Video Animation Text
200.
Graphics
that contain movement often referred to as .
i. Graphics ii. Video iii. Animation iv. Text
201.
_______ provides a visual impact.
Image Graphics Video None of them
202.
The
process of displaying still images in a rapid sequence to create the illusion
of movement.
i)Text
ii)Graphics iii)Video iv)Animation
203.
An extension to
hypertext supports linking graphics, sound and video elements in addition to
text elements.
Interactive media Hypermedia All
of the above None of the above
Cyber Law and Computer Ethics
204.
A genetic term that is concerned to
the legal and regulatory aspects of Internet and computer technology.
Copyright
law Cyber law Computer
Crime None of them
205.
“The
Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
i. Intellectual Property Law Cyber Law
ii. Telecommunication Law Data Protection
Law
206.
When
did cyber law introduced in Nepal?
i.2002
A.D. ii.2003 A.D. iii.2004 A.D. iv.2005 A.D.
207.
When
did cyber law introduced in Nepal? [SLC 2066] [SLC 2070 S]
i) 2061 B.S. ii)
2062 B.S. iii) 2007 B.S. iv) 2016 B.S.
208.
The
government of Nepal has passed the cyber law on:
31st Bhadra 2061 BS 29th Bhadra
2061 BS 30thBhadra 2062 BS 30thBhadra
2061 BS
209.
The
term ‘cyberspace’ was used in:
1984
1884 1985 1885
210.
A criminal activity within the
information technology infrastructure.
Digital
crime Intellectual
property Cybercrime All of them
211.
Which
of the following is computer crime?
i.
piracy ii. pornography iii. harassment iv.All of above
212.
Which
of the following is not computer crime?
i.
Plagiarism ii. Password
guessing iii. Internet iv. virus
transferring
213.
_______ is the normal Principal that
regulates the use of computers.
Cyber
Law Cyber act Computer ethics All
of them
214.
Which
of the following is not computer ethics?
Not
to steal data Not to
bear false message Not to use Internet
Not to harm the society
215.
Premeditated, usually
politically-motivated violence committed against civilians through the use of,
or with the help of, computer technology
i) Cyber
stalking ii)
Cyber laundering iii) Cyber
theft iv) Cyber terrorism
216.
The act of attempting to
acquire sensitive information like usernames, passwords and credit card details
by disguising as a trust worthy source.
i) Hacking ii) Phishing iii) Computer
Virus iv)
Cyber stalking
217.
Electronic
transfer of illegally-obtained monies with the goal of hiding its source and
possibly its destination.
i)Cyber stalking ii)
Cyber laundering iii) Cyber
theft iv) Cyber
terrorism
218.
The method of making the data or
message unreadable by unauthorized people.
Digital signature Decryption Encryption All of them
219.
Which
of the following is included in cyber law?
i.
Trademark right ii. Copyright iii. Data privacy iv. All of the above
220.
The
law which includes literature and art, films, computer programs, invention,
designed used by traders for their goods or services is called:
i. Data Privacy Law Intellectual Property Law
ii. Telecommunication Law Cyber crime Law
221.
The
Process of ensuring the preservation, integrity and reliability of data is
Known as:
i. Intellectual Property Law Data Protection and Privacy law
ii. Cyber Law Telecommunication Law
222.
The
law that provides a legal framework to facilitate and safeguard electronic
transaction in the electronic medium.
i. Digital
signature law ii. Intellectual property law ii. Telecommunication law
223.
A
federal law enacted in 1970 to ensure confidentiality of consumer credit
information held by lenders and credit reporting agencies.
i. Fair credit
reporting act ii.Federal privacy act iii.Copyright act
Database Management System
224.
Database
is a
i.tool
of editing documents ii. way
to automate common tasks
iii. collection of related
information
225.
A (n)
____________________ is an organized collection of the related information.
Object database Property document
226.
Which
is the database?
Data
of SLC Exam Oracle MS-Access Excel
227.
Which
is not the database?
i. Phone diary ii. Mark ledger iii. Attendance Register iv. Report Card
228.
Which
is the example of Relational Database Management System?
i.Oracle ii.FoxBASE iii.Sybase iv.FoxPro
229.
__________
is a Database Management System.
DBase MSAV EXCEL All of above
230.
MS-Access
is a
DBMS RDBMS Database Metabase
231.
MS-Access
is used to create _____________.
Database DBMS Record Table
232.
___________
is not DBMS.
Oracle dBase FoxPro Paint
233.
Which
is an example of database? [SLC 2064]
DBase MS-Access Telephone Directory All
234.
……………
is the DBMS. [SLC 2065]
i) Fox-Pro ii) MS-Excel iii) Lotus-123 iv) All of the above
i) Fox-Pro ii) MS-Excel iii) Lotus-123 iv) All of the above
235.
Which
of the following is database application? [SLC 2070]
i) MS-Word ii) MS-Access iii) MS-Excel iv) QBASIC
236.
Which
of the following is not a database application? [SLC 2069]
i) Oracle ii) Foxpro iii) MS-Access iv) MS-Excel
i) Oracle ii) Foxpro iii) MS-Access iv) MS-Excel
237.
MS-Access
is a ------------ software.
i.
Utility ii.
Application iii. System iv. None of the above.
238.
Which
is DBMS?
i. Database ii.
Metabase iii. dBase iv. MS-Excel.
239.
A
Database Management System can be used to .
i. retrieve information ii. search information iii. sort information iv.
all of the above
240.
___________________ is a
set of rules used by Access to ensure that the relationships between tables are
valid and that the related data is not accidentally changed or deleted.
Relationship Referential integrity Query Forms
241.
What is extension of access
database? (MS-Access 2003 version) [SLC 2066]
DBF MDB MBD DBM
242.
_____ is the table design creating
option to create custom table design.
Datasheet Design view Wizard Link Table
243.
_____ is a data type used for
lengthy text and numbers
Text Long Text OLE Object Memo
244.
A field name can be up to _____ characters
long.
40 46 64 2048
245.
Data type that requires 8 bytes of
storage.
Yes/No Currency Long
Integer All of them
246.
Memory
space consumed by a currency data type maximally is …………[SLC 2069]
i) 2 bytes ii) 4 bytes iii) 8 bytes iv) 1 GB
i) 2 bytes ii) 4 bytes iii) 8 bytes iv) 1 GB
247.
The
data type appropriate to store salary is: [SLC 2067]
i)Memo ii)Currency iii)Text iv) Auto number
248.
The name of caption can be declared
up to _____ characters.
1024 2024 2048 2005
249.
Memory space used by a auto number
data type is _____
1
Byte 2 Bytes 4 Bytes 8 Bytes
250.
What
is the default size of Access?
(i) 10 (ii) 20 (iii)
30 (iv) 50
251.
Date/Time
occupies ………. bytes of memory. [SLC
2066] [SLC 2067]
i) 4 ii) 2 iii) 8 iv) 16
i) 4 ii) 2 iii) 8 iv) 16
252.
The
maximum size of text field in MS-Access is …………. [SLC 2068 S] [SLC 2070]
i) 50 ii) 10 iii) 6400 iv) 255
i) 50 ii) 10 iii) 6400 iv) 255
253.
Format symbol that converts all
characters to uppercase.
@ & < >
254.
……………
is not the data type of MS-Access. [SLC 2065] [SLC 2068]
i)
Number ii) Text iii) Memo iv) Form
255.
The
logical field data type of MS-Access is______________ [SLC 2064]
i. Yes/No ii. True/False iii. On/Off iv. All of the above.
256.
The
field size of logical field data type is __________ in MS-Access.
i. 1 bit ii. 1 byte iii. 2 bytes iv. 2 bits
257.
Which
data type consumes the least storage space? [SLC 2074]
(i) Text (ii) Yes/No (iii) OLE object (iv) Memo
258.
Which
of the following data type is appropriate to store gender of person in terms M
or F?
i.
Memo ii. Currency iii. Yes no
iv. Auto number
259.
The
default data type of MS-Access is: [SLC 2068 S] [SLC 2069] [SLC 2074]
i) Number ii)Text iii) Memo iv) Auto number
i) Number ii)Text iii) Memo iv) Auto number
260.
The
default field size of “AutoNumber” data type is .
i. Byte ii.
Integer iii. Long
Integer iv. Long Integer
261.
Which
is the subtypes for the number data type?
Hyperlink Bit Index Integer
262.
Which
is the subtype of number data type?
i.
Integer ii. Byte iii. Single iv. All of the above.
263.
Number
field is used for storing only _______________.
Number Text
and Number Number and Time Number and Year
264.
The
datatype which is used for only integer value.
i.text ii.currency iii.number
iv.OLE
265.
Which
of them is not a data type?
Memo Yes/No Time/Date Caption
266.
Which
of the following is not a data type?
i. Picture ii.date/time iii.text iv.number
267.
Which
of the following is not the data type used in MS-Access?
i.
Date/Time ii. Counter iii. Hyperlink iv. Caption
268.
Which
of the following is not a data type in Microsoft Access?
i. Text
ii. Currency iii. Hypertext iv.
Date/Time
269.
What
field type is used to store picture in a table?
i.memo ii.OLE
iii.hyperlink iv.None
270.
Which
is suitable data type to store video? [SLC 2070] [SLC 2073]
i) Text ii) Number iii) Hyperlink iv) OLE object
271.
The
data type appropriate to store address is .
i. Memo ii. Currency iii. Text iv. Auto number
272.
What
kind of data is kept in memo field?
(i) Hyperlink (ii) Software (iii) Data (iv) Pictures
273.
What
kind of data are kept in memo field?
i.Name
of Student ii.Students phone
number iii.Students Bio data
iv.Students picture
274.
Which specifies the expression that
checks the invalid data?
Validation Rule Validation Text Input Mask Required
275.
_____ is not a field property of
MS-Access.
Caption Index Color Format
276.
……………
defines a standard pattern for the appearance of all data entered in the field
i.format ii.input mask iii.default
value
277.
A
field property that limits the data to be entered in a field is___________
i. Validation Rule ii.
Format iii. Input
Mask iv. Indexed
278.
The
maximum number of characters that can be stored in a field is determined by_
i.
Field Type ii. Field Size iii. Field
Length iv. Field width
279.
Field size, format,
input mask, caption and default values are:
Key
elements field properties Navigating
modes data types
280.
The primary key contains _____
value.
Null No Null Number Auto number
281.
The _________________
key uniquely identifies each record. [SLC 2066]
Primary database Object premier
282.
Primary
key does not accept …………… [SLC 2064] [SLC 2065] [SLC 2068] [SLC 2074]
i) Text ii) Number iii) Null value iv) None of the above
283.
In
MS-Access data are stored in ……………… [SLC 2068]
i) Form ii) Query iii) Table iv) All of the above
i) Form ii) Query iii) Table iv) All of the above
284.
Form
is designed for
i.
filters data ii. Sort
data iii. Print data iv. Modify data
285.
Which
component of MS-Access is used to enter data? [SLC 2065]
Query Forms Report Both (i) and (ii)
286.
Which
component of MS-ACCESS does not allow entering data? [SLC 2064]
i. Table ii. Query iii.
Form iv. None of them
287.
Query
is used to
i. retrieves data
from database ii. Create table in database iii. Print database iv. All
288.
……………..
query changes value in main table. [SLC 2068 S]
i) Select ii) Update iii) Both (i) &(ii) iv) None of the above
289.
Which
is not a type of query? [SLC 2067] [SLC 2073]
i) Search ii) Select iii) Update iv)All of the above
i) Search ii) Select iii) Update iv)All of the above
290.
Report
can be generated by using data from …………[SLC 2068 S]
i) Table ii) Query iii) Forms iv) Both (i) &(ii)
i) Table ii) Query iii) Forms iv) Both (i) &(ii)
291.
………………..
object of access is used to print formatted data. [SLC 2068] [SLC 2073]
i) Query ii) Form iii) Report iv) Table
i) Query ii) Form iii) Report iv) Table
292.
The
object of MS-Access that is used to generate hard copy of records. [SLC 2066]
i) Query ii) Table iii) Form iv) Report
i) Query ii) Table iii) Form iv) Report
293.
__________allows
MS-Access to query and sort record faster.
i.
Sorting ii. Editing iii. Filtering iv. Indexing
294.
Which
of the following is not MS-Access database object?
i.
Table ii. Form iii. Query iv. Print
295.
A
collection of records for a single subject, such as all of the customer
records.
i. Field ii. Record iii.
Table iv.
Data
296.
Collecting
multiple related fields is called: [SLC 2067]
i)Records ii)Table iii) Forms iv)Query
i)Records ii)Table iii) Forms iv)Query
297.
A
field is also known as
i.records ii.column iii.Database iv.entity
298.
Row
is also called …………[SLC 2069] [SLC 2074]
i) Record ii) Field iii) Database iv) Table
i) Record ii) Field iii) Database iv) Table
299.
The
columns in database tables are called: [SLC 2070] [SLC 2073]