SET -1
Match the followinga) Microwave Multimedia
b) UPS Protocol
c) Sound Card Unguided media
d) TCP/IP Power protection device
Guided media
Ans:
a) Microwave = Unguided media
b) UPS = Power protection device
c) Sound Card = Multimedia
d) TCP/IP = Protocol
Select the Best Answer
a) Which is not the hardware component?
i) Hub ii) Repeater iii) Router iv) Windows NT
Ans: Windows NT
b) In which communication media does data travel in the form of light?
i) Telephone wire ii) Fiber optic iii) Coaxial cable iv) Twisted pair cable
Ans: Fiber Optics
c) Which is not the protocol?
i) TCP/IP ii) IPX/SPX iii) NETBIOS/NETBEUI iv) Client
Ans: Client
d) Which is the anti-virus program?
i) Photoshop ii) NAV iii) Windows NT iv) MS-Excel
Ans: NAV
Technical Terms
a) Buying and selling products and services online .E-commerce
b) Cabling structure of LAN.Network Topology
c) Group of computers that can share resources.Computer network
d) A program that destroys the other programs.Computer virus
Full Forms
a) UPS – Uninterruptible Power Supply
b) WWW – World Wide Web
c) WAN¬– Wide Area Network
d) DVD – Digital Versatile Disk
Set-2
Match the following
a) FTP Unguided Media
b) Satellite Web browser
c) Firefox Destructive program
d) Computer virus Protocol
Watch TV
Ans:
a) FTP = Protocol
b) Satellite = Unguided Media
c) Firefox = Web browser
d) Computer virus = Destructive program
Select the Best Answer
a) Which is used to convert digital signal to analog signal and vice versa?
i) CD ROM ii) MODEM iii) Radio wave iv) Pen drive
Ans:MODEM
b) The device which is used as a component of multimedia
i) Sound card ii) NIC card iii) Portable disk iv) All of them
Ans:Sound card
c) Which is antivirus software?
i) Mozilla Firefox ii) McAfee iii) PC-tools iv) CMOS
Ans:McAfee
d) Which type of network belongs to the single organization?
i) WAN ii) LAN iii) MAN iv) Network
Ans:LAN
Technical Terms
a) A device which connects two different types of network.Router
b) A device which is used for converting digital data to analog and vice versa.MODEM
c) The media in which data travels from one computer to another computer in the form of light signal.Fiber Optics
d) A set of rules and procedures that govern transmission of message.Protocol
Full Forms
a) PSTN – Public Switched Telephone Network
b) ATM – Automatic Teller Machine
c) DHCP – Dynamic Host Configuration Protocol
d) SMTP – Simple Mail Transfer Protocol
Set-3
Match the followinga) Star topology Multimedia system
b) Homepage Media
c) Computer Index Page
d) Bluetooth Hub
None
Ans:
a) Star topology = Hub
b) Homepage = Index Page
c) Computer = Multimedia system
d) Bluetooth = Media
State whether the statements are true or false.
a) Infrared is a wired communication media.False
b) Anti-virus is a computer program which detects virus and removes it from computer.True
c) Topology is a cabling structure of network which resides in WAN.False
d) Multimedia is used for listening music.True
Technical Terms
a) A hardware device that provides common wiring point in Local Area Network.Hub
b) A technology which stores text, sound, graphics and other information as digital data.Multimedia technology
c) A type of computer virus which is designed to effect executable program having extensions .exe or .com.Program virus
d) A device used for providing continuous power to the computer device and protect them from losing data even if the power supply goes off. UPS
Full Forms
a) HTTP – Hyper Text Transfer Protocol
b) POP – Post Office Protocol
c) UPS – Uninterruptible Power Supply
d) W3C – World Wide Web Consortium
Set - 4
Match the followinga) Microwave Example of markup language
b) Volt guard Networking device
c) DHTML Component of computer
d) Switch Power protection device
Wireless transmission media
Ans:
a) Microwave = Wireless Transmission Media
b) Volt guard = Power Protection Device
c) DHTML = Example of markup language
d) Switch = Networking device
Select the Best Answer
a) Which is the communication protocol?
i) TCP/IP ii) POP iii) FTP iv) All
Ans: All
b) Which are used in multimedia system?
i) Text-Audio ii) Text-Visual iii) Text, Graphics and Sound iv) Text, Graphics & Audio, Visual
Ans: Text,Graphics & Audio Visual
c) To protect data from losing, perform the operation
i) Backup ii) Password iii) All
iv) Do not use removable storage media without scanning the disk.
Ans: Backup
d) Which one is the online communication service to the internet?
i) E-mail ii) Chat iii) video conferencing iv) All
Ans: All
Technical Terms
a) Number of bits that can be transferred per second over a given transmission media.Bandwidth
b) Discussing between two or more people which are located at different places in the world.Newsgroup
c) The law that governs legal issues of cyberspace.Cyber law
d) The process of converting coded data into its original data. Decryption
Full Forms
a) MAN – Metropolitan Area Network
b) URL – Uniform Resource Locator
c) DNS – Domain Name System
d) FTP – File Transfer Protocol
Set-5
Match the following
a) Duplex i) Communication media
b) Wi-fi ii) Type of network
c) TV iii) Two way communication
d) MAN iv) Transmission media
v) Network
Ans:
e) Duplex = Two way communication
f) Wi-fi = Transmission media
g) TV = Communication media
h) MAN = Type of network
Select the Best Answer
a)Which of the following devices copies electrical signals from one Ethernet to another?
i) Bridge ii)Repeater iii) Hub iv) Passive hub
Ans: Repeater
b) What is the name of the network topology in which these are bi-directional links between each possible node?
i)Ring ii)Star iii) Tree iv) Mesh
Ans: Mesh
c) A number of micro-computers connected together to share peripherals and programs is
i) Computer graphics ii) LAN iii)Modulator-Demodulator iv)None
Ans: LAN
e)Which of the following is voice band channel?
i) Telephone line ii) Telegraph line iii) Coaxial cable iv) Microwave
Ans: Telephone line
Technical Terms
a) A device which connects networks using the same communication protocol.Bridge
b) Plan formulated by the government for the development of IT sector.IT policy
c) A software which can cause malfunction in normal functioning of the computer.Computer virus
d) Face-to-face interactions among participating users with the help of internet.Video conferencing
Full Forms
a) HTTP – Hyper Text Transfer Protocol
b) VSAT – Very Small Aperture Terminal
c) STP – Shielded Twisted Pair
d) VOIP – Voice Over Internet Protocol
Set-6
Match the followingGroup A Group B
a) Switch i. re-generates electric signals
b) Hub ii. Converts digital signals into analog signals and vice-versa
c) Repeater iii. Joins multiple network having different protocols
d) Gateway iv. Repeats the signals to all the connected node
v. repeats the signals to only the destination node
Ans:
a) Switch = repeats the signals to only the destination node
b) Hub = Repeats the signals to all the connected node
c) Repeater = re-generates electric signals
d) Gateway= Joins multiple network having different protocols
Select the Best Answer
a) Which is not the network protocol?
i) TCP/IP ii) STP iii) FTP iv) All of above
Ans:STP
b) Which of the following is not cybercrime?
i) Forgery ii) Authentication iii) Salami Saving iv) Hacking
Ans: Authentication
c) Is an e-mail address hamronepal@yahoo.com , what does “yahoo” refer?
i) User account name ii) Domain name iii) To develop domain name iv) None of above
Ans:Domain Name
d) Which of the following is not the component of multimedia?
i) Pixel ii) Text iii) Audio iv) Video
Ans:Pixel
Technical Terms
a) A program that displays the contents of web pages on a client computer.Web browser
b) The law that governs the legal issues of cyber space.Cyber law
c) The moving images of real events. Video
d) A secret word that provides accessibility to a user to a file, application, or computer system.Password
Full Forms
a) IRC – Internet Relay Chat
b) POP – Post Office Protocol
c) Telnet – Telecommunication Network
d) VRML – Virtual Reality Modeling Language
Set-7
Match the followingGroup A Group B
a) RJ-45 Communication
b) AVG Wireless Media
c) Telephone Wired Media
d) Co-Axial Anti-virus
Media connector
Ans:
a) RJ-45 = Media connector
b) AVG = Anti-virus
c) Telephone = Communication
d) Co-Axial = Wired Media
Select the Best Answer
a) Which is not the network protocol?
i) TCP/IP ii) Ethernet iii) STP iv) FTP
Ans: STP
b) Cyber law is introduced in Nepal in………….. B.S.
i) 2061 ii) 2062 iii) 2063 iv)2064
Ans: 2061
c) ……………is used to develop web page.
i) HTTP ii) POPD iii)HTML iv)SGML
Ans: HTML
i) HTTP ii) POPD iii)HTML iv)SGML
Ans: HTML
d) Virus that infects file having extension .COM or .DRV or .EXE is …………..
i) boot sector virus ii)Trojan Home iii)File virus iv)Dos System Infector
Ans: File virus
Technical Terms
a) An electrical card or board that connects network computer with server via cable.NIC
b) The process of converting data signal from analog to digital.Demodulation
c) Illegal / unethical activities in IT.Cybercrime
d) A main computer in network that provides resources to nodes.Server
Full Forms
a) NIC – Network Interface Card
b) TCP/IP – Transmission Control Protocol/Internet Protocol
c) UPS – Uninterruptible Power Supply
d) ISP – Internet Service Provider
Set-8
Match the followingGroup A Group B
a) Microphone Co-axial cable
b) Avira hardware security
c) Fiber optics Multimedia
d) Volt guard wired communication media
Anti-virus
Ans:
e) Microphone = Multimedia
f) Avira = Anti-virus
g) Fiber optics = wired communication media
h) Volt guard = hardware security
Select the Best Answer
a) In ………… all the computer and devices are connected to a single cable.
i) Bus Topology ii) Ring topology iii) Star topology iv) Tree topology
Ans:Bus topology
b) Which is the service of the internet?
i) IRC ii) Telnet iii) Email iv)All of the above
Ans:All of the above
c) Which is related to multimedia?
i) Printer ii) Scanner iii)CD-ROM iv)Digitizer
Ans:CD-ROM
d) Which is the route of virus transmission among them?
i) Microphone ii)Printer iii)Joystick iv)Pen drive
Ans:Pen drive
Technical Terms
a) Crime with a use of computer technology. Cyber crime
b) A device that helps to do work by connecting two or more than two different computer systems.Gateway
c) Letters and pictures sent via electronic media.E-mail
d) Pair twisted wire made up of copper.Twisted pair cable
Full Forms
a) URL – Uniform Resource Locator
b) FTP – File Transfer Protocol
c) HTTP – File Transfer Protocol
d) IRC – Internet Relay Chat
Set-9
Match the followingGroup A Group B
a) FTP Internet explorer
b) Webbrowser protocol
c) CD-ROM power regulating device
d) UPS storage device
Mozilla Firefox
Ans:
a) FTP = protocol
b) Web browser =Internet explorer
c) CD-ROM = storage device
d) UPS = power regulating device
Select the Best Answer
a) The computer virus is created using the ……………..
i) Operating system software ii) Programming language iii) Application software
iv) None of the above
Ans:Programming Language
b) A set of rules that is followed by the sender and receiver to make communication possible.
i) Topology ii) Hub iii) Protocol iv)None of the above
Ans:Protocol
c) The service of the internet.
i) WWW ii) E-mail iii)both (i) and (ii) iv)None of the above
Ans:Both (i) & (ii)
d) Which is the element of multi-media?
i) DVD ii)CD-Drive iii)Windows XP iv)Sound
Ans:Sound
Technical Terms
a) A distributed network configuration in which all data and information pass through a central hub.Star Topology
b) The display of still frame pictures or photos on a computer screen.Graphics
c) A tool that is used to maintain performance and error free file management.Scandisk
d) It is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.Cybersquatting
Full Forms
a) ITSP – Internet Telephony Service Provider
b) MMS – Multimedia Messaging Service
c) URL – Uniform Resource Locator
e) CCTV – Closed Circuit Television
Set-10
Match the followingGroup A Group B
a) Intellectual property Protocol
b) Self-replicating Unbounded
c) Radio wave Copy right
d) SPX/IPX Virus
Security
Ans:
a) Intellectual property = Copy right
b) Self-replicating = Virus
c) Radio wave = Unbounded
d) SPX/IPX = Protocol
Select the Best Answer
a) ………….is the main line of defense between a local network, or intranet and the internet
i) USB port ii) Encryption key iii) Firewall iv) None
Ans:Firewall
b) …………..is someone who uses a computer and a network internet connection to intrude into another computer system to perform an illegal act.
i) Programmer ii) Hacker iii) Terrorist iv)Spammer
Ans:Hacker
c) Which is the web browser?
i) Bing ii) Facebook iii)Google Chrome iv)Explorer
Ans:Google Chrome
d) Each computer on the internet has a unique address called a (n)…………….
i) domain name ii)protocol address iii)IP address iv)URL
Ans:IP address
Technical Terms
a) Medium that carries data without physical path.Unguided medium
b) The display of still-frame pictures or photos on a computer screen.Graphics
c) A battery supported power unit, which supplies power during the failure of electricity.UPS
d) A company that provides the internet facility.ISP
Full Forms
a) VSAT– Very Small Aperture Terminal
b) CVT – Constant Voltage Transformer
c) MBPS – Mega Bytes Per Second
d) PSTN – Public Switched Telephone Network
No comments:
Post a Comment