Collection 1 (OLD MODEL)
1. Define star topology with figure.
Ans. The topology in which all the computers in a network are connect to the central device known as hub or sometimes switch is called star topology.
2."Computer network reduces the cost". Give any two strong points to support this statement.
Ans.
i. Multiple computers can share a single hardware. For example a printer can facilitate multiple computers at a time.
ii.The expensive software needs not to be installed individually in every computers. Single software can be shared within all computers.
3.Define computer ethics.
Ans.
The moral principle that bounds the computer users to use the computer and ICT tools in good way is called computer ethics. Logging out of anyone's email if found logged in a random device can be considered as the example of computer ethics.
4.Write down two measure of each to protect computer hardware and software.
Ans.
Ways to protect the computer hardware are:
i. Insurance Policy
ii. CCTC surveillance
Ways to protect computer software are:
i. Password policy
ii. Backup
5.What is Anti-virus software? Write down any two examples of anti¬virus software.
Ans. The software which is responsible to disinfect the computer from virus is called anti-virus software. Examples: AVG, Kaspersky
6. Differentiate between guided and unguided media.
Ans.
i. Guided media is wired and unguided media is wireless.
ii. Guided medial is also called bounded media whereas unbounded media is called unbounded media.
Example of guided media are co-axial cable, fibre optic etc. and example of unguided media are satellite, microwave etc.
7. Mention any four symptoms of computer virus.
Ans.
i. Slow in operation and process
ii. Frequent restart
iii. Shrinkage of memory and storage
iv. Files corruption
8.Write any four uses of email.
Ans.
i. Sending mail.
ii. Receiving mail
iii. Basis for creating different social media accounts
iv. Communication platform for e-banking and e-commerce
9.What is virtual reality?
Ans.
Virtual reality (VR) refers to a computer-generated simulation in which a person can interact within an artificial three-dimensional environment using electronic devices, such as special goggles with a screen or gloves fitted with sensors.
10.What do you mean by ISP?
Ans.
The company that provides the internet service to its customers either individual or office and charges the amount as per their subscribed package is called ISP. In context of Nepal, examples of ISP are NTC, worldlink, vianet etc.
11. Define LAN toplogy.
Ans. The physical structure that defines the arrangement pattern of computers connected in LAN is called LAN topolgy. Examples: BUS toplogy.
12.Differentiate between LAN and MAN.
Ans.
i. LAN is limited within a room or building whereas MAN covers a particular city.
ii.LAN may contain 10 to 100 users MAN contains thousands of users at a time.
13.Define cybercrime.
Ans.
The illegal activities done through the use of computer, internet or any ICT tools is called cybercrime. Example: Hacking, Phishing, Bullying etc.
14. Define multimedia.
Ans.
The integration of several media including text, graphics, video, audio and animation for digital service delivery is called multimedia. Multimedia can be useful in interactive teaching learning activities, advertisements or entertainment purpose.
15.Match the following:
Group A Group B
Server ( ) HTTP
Node ( ) Workstation
Protocol ( ) Main computer
Coaxial cable ( ) Repeater
( ) Communication Media
Ans.
Server = Main computer
Node = Workstation
Protocol = HTTP
Coaxial cable = Communication Media
16. Match the following:
Group A Group B
Duplex ( ) Online Business
e-commerce ( ) Two way communication
Router ( ) Destructive Program
Virus ( ) One way communication
( ) Network Element
Ans.
Duplex = Two way communication
e-commerce = Online Business
Router= Network Element
Virus = Destructive Program
Ans.
Intellectual property = Copyright
self replicating = Virus
Radio wave= Unguided media
SPX/IPX = Protocol
18.Number System : Do it yourself
19. 11 Sets of Computer Fundamentals Objective Questions
Match the following
a) Microwave Multimedia
b) UPS Protocol
c) Sound Card Unguided media
d) TCP/IP Power protection device
Guided media
Ans:
a) Microwave = Unguided media
b) UPS = Power protection device
c) Sound Card = Multimedia
d) TCP/IP = Protocol
Select the Best Answer
a) Which is not the hardware component?
i) Hub ii) Repeater iii) Router iv) Windows NT
Ans: Windows NT
b) In which communication media does data travel in the form of light?
i) Telephone wire ii) Fiber optic iii) Coaxial cable iv) Twisted pair cable
Ans: Fiber Optics
c) Which is not the protocol?
i) TCP/IP ii) IPX/SPX iii) NETBIOS/NETBEUI iv) Client
Ans: Client
d) Which is the anti-virus program?
i) Photoshop ii) NAV iii) Windows NT iv) MS-Excel
Ans: NAV
Technical Terms
a) Buying and selling products and services online .E-commerce
b) Cabling structure of LAN.Network Topology
c) Group of computers that can share resources.Computer network
d) A program that destroys the other programs.Computer virus
Full Forms
a) UPS – Uninterruptible Power Supply
b) WWW – World Wide Web
c) WAN¬– Wide Area Network
d) DVD – Digital Versatile Disk
Match the following
a) FTP Unguided Media
b) Satellite Web browser
c) Firefox Destructive program
d) Computer virus Protocol
Watch TV
Ans:
a) FTP = Protocol
b) Satellite = Unguided Media
c) Firefox = Web browser
d) Computer virus = Destructive program
Select the Best Answer
a) Which is used to convert digital signal to analog signal and vice versa?
i) CD ROM ii) MODEM iii) Radio wave iv) Pen drive
Ans:MODEM
b) The device which is used as a component of multimedia
i) Sound card ii) NIC card iii) Portable disk iv) All of them
Ans:Sound card
c) Which is antivirus software?
i) Mozilla Firefox ii) McAfee iii) PC-tools iv) CMOS
Ans:McAfee
d) Which type of network belongs to the single organization?
i) WAN ii) LAN iii) MAN iv) Network
Ans:LAN
Technical Terms
a) A device which connects two different types of network.Router
b) A device which is used for converting digital data to analog and vice versa.MODEM
c) The media in which data travels from one computer to another computer in the form of light signal.Fiber Optics
d) A set of rules and procedures that govern transmission of message.Protocol
Full Forms
a) PSTN – Public Switched Telephone Network
b) ATM – Automatic Teller Machine
c) DHCP – Dynamic Host Configuration Protocol
d) SMTP – Simple Mail Transfer Protocol
a) Star topology Multimedia system
b) Homepage Media
c) Computer Index Page
d) Bluetooth Hub
None
Ans:
a) Star topology = Hub
b) Homepage = Index Page
c) Computer = Multimedia system
d) Bluetooth = Media
State whether the statements are true or false.
a) Infrared is a wired communication media.False
b) Anti-virus is a computer program which detects virus and removes it from computer.True
c) Topology is a cabling structure of network which resides in WAN.False
d) Multimedia is used for listening music.True
Technical Terms
a) A hardware device that provides common wiring point in Local Area Network.Hub
b) A technology which stores text, sound, graphics and other information as digital data.Multimedia technology
c) A type of computer virus which is designed to effect executable program having extensions .exe or .com.Program virus
d) A device used for providing continuous power to the computer device and protect them from losing data even if the power supply goes off. UPS
Full Forms
a) HTTP – Hyper Text Transfer Protocol
b) POP – Post Office Protocol
c) UPS – Uninterruptible Power Supply
d) W3C – World Wide Web Consortium
a) Microwave Example of markup language
b) Volt guard Networking device
c) DHTML Component of computer
d) Switch Power protection device
Wireless transmission media
Ans:
a) Microwave = Wireless Transmission Media
b) Volt guard = Power Protection Device
c) DHTML = Example of markup language
d) Switch = Networking device
Select the Best Answer
a) Which is the communication protocol?
i) TCP/IP ii) POP iii) FTP iv) All
Ans: All
b) Which are used in multimedia system?
i) Text-Audio ii) Text-Visual iii) Text, Graphics and Sound iv) Text, Graphics & Audio, Visual
Ans: Text,Graphics & Audio Visual
c) To protect data from losing, perform the operation
i) Backup ii) Password iii) All
iv) Do not use removable storage media without scanning the disk.
Ans: Backup
d) Which one is the online communication service to the internet?
i) E-mail ii) Chat iii) video conferencing iv) All
Ans: All
Technical Terms
a) Number of bits that can be transferred per second over a given transmission media.Bandwidth
b) Discussing between two or more people which are located at different places in the world.Newsgroup
c) The law that governs legal issues of cyberspace.Cyber law
d) The process of converting coded data into its original data. Decryption
Full Forms
a) MAN – Metropolitan Area Network
b) URL – Uniform Resource Locator
c) DNS – Domain Name System
d) FTP – File Transfer Protocol
Match the following
a) Duplex i) Communication media
b) Wi-fi ii) Type of network
c) TV iii) Two way communication
d) MAN iv) Transmission media
v) Network
Ans:
e) Duplex = Two way communication
f) Wi-fi = Transmission media
g) TV = Communication media
h) MAN = Type of network
Select the Best Answer
a)Which of the following devices copies electrical signals from one Ethernet to another?
i) Bridge ii)Repeater iii) Hub iv) Passive hub
Ans: Repeater
b) What is the name of the network topology in which these are bi-directional links between each possible node?
i)Ring ii)Star iii) Tree iv) Mesh
Ans: Mesh
c) A number of micro-computers connected together to share peripherals and programs is
i) Computer graphics ii) LAN iii)Modulator-Demodulator iv)None
Ans: LAN
e)Which of the following is voice band channel?
i) Telephone line ii) Telegraph line iii) Coaxial cable iv) Microwave
Ans: Telephone line
Technical Terms
a) A device which connects networks using the same communication protocol.Bridge
b) Plan formulated by the government for the development of IT sector.IT policy
c) A software which can cause malfunction in normal functioning of the computer.Computer virus
d) Face-to-face interactions among participating users with the help of internet.Video conferencing
Full Forms
a) HTTP – Hyper Text Transfer Protocol
b) VSAT – Very Small Aperture Terminal
c) STP – Shielded Twisted Pair
d) VOIP – Voice Over Internet Protocol
Group A Group B
a) Switch i. re-generates electric signals
b) Hub ii. Converts digital signals into analog signals and vice-versa
c) Repeater iii. Joins multiple network having different protocols
d) Gateway iv. Repeats the signals to all the connected node
v. repeats the signals to only the destination node
Ans:
a) Switch = repeats the signals to only the destination node
b) Hub = Repeats the signals to all the connected node
c) Repeater = re-generates electric signals
d) Gateway= Joins multiple network having different protocols
Select the Best Answer
a) Which is not the network protocol?
i) TCP/IP ii) STP iii) FTP iv) All of above
Ans:STP
b) Which of the following is not cybercrime?
i) Forgery ii) Authentication iii) Salami Saving iv) Hacking
Ans: Authentication
c) Is an e-mail address hamronepal@yahoo.com , what does “yahoo” refer?
i) User account name ii) Domain name iii) To develop domain name iv) None of above
Ans:Domain Name
d) Which of the following is not the component of multimedia?
i) Pixel ii) Text iii) Audio iv) Video
Ans:Pixel
Technical Terms
a) A program that displays the contents of web pages on a client computer.Web browser
b) The law that governs the legal issues of cyber space.Cyber law
c) The moving images of real events. Video
d) A secret word that provides accessibility to a user to a file, application, or computer system.Password
Full Forms
a) IRC – Internet Relay Chat
b) POP – Post Office Protocol
c) Telnet – Telecommunication Network
d) VRML – Virtual Reality Modeling Language
Group A Group B
a) RJ-45 Communication
b) AVG Wireless Media
c) Telephone Wired Media
d) Co-Axial Anti-virus
Media connector
Ans:
a) RJ-45 = Media connector
b) AVG = Anti-virus
c) Telephone = Communication
d) Co-Axial = Wired Media
Select the Best Answer
a) Which is not the network protocol?
i) TCP/IP ii) Ethernet iii) STP iv) FTP
Ans: STP
b) Cyber law is introduced in Nepal in………….. B.S.
i) 2061 ii) 2062 iii) 2063 iv)2064
Ans: 2061
i) HTTP ii) POPD iii)HTML iv)SGML
Ans: HTML
d) Virus that infects file having extension .COM or .DRV or .EXE is …………..
i) boot sector virus ii)Trojan Home iii)File virus iv)Dos System Infector
Ans: File virus
Technical Terms
a) An electrical card or board that connects network computer with server via cable.NIC
b) The process of converting data signal from analog to digital.Demodulation
c) Illegal / unethical activities in IT.Cybercrime
d) A main computer in network that provides resources to nodes.Server
Full Forms
a) NIC – Network Interface Card
b) TCP/IP – Transmission Control Protocol/Internet Protocol
c) UPS – Uninterruptible Power Supply
d) ISP – Internet Service Provider
Group A Group B
a) Microphone Co-axial cable
b) Avira hardware security
c) Fiber optics Multimedia
d) Volt guard wired communication media
Anti-virus
Ans:
e) Microphone = Multimedia
f) Avira = Anti-virus
g) Fiber optics = wired communication media
h) Volt guard = hardware security
Select the Best Answer
a) In ………… all the computer and devices are connected to a single cable.
i) Bus Topology ii) Ring topology iii) Star topology iv) Tree topology
Ans:Bus topology
b) Which is the service of the internet?
i) IRC ii) Telnet iii) Email iv)All of the above
Ans:All of the above
c) Which is related to multimedia?
i) Printer ii) Scanner iii)CD-ROM iv)Digitizer
Ans:CD-ROM
d) Which is the route of virus transmission among them?
i) Microphone ii)Printer iii)Joystick iv)Pen drive
Ans:Pen drive
Technical Terms
a) Crime with a use of computer technology. Cyber crime
b) A device that helps to do work by connecting two or more than two different computer systems.Gateway
c) Letters and pictures sent via electronic media.E-mail
d) Pair twisted wire made up of copper.Twisted pair cable
Full Forms
a) URL – Uniform Resource Locator
b) FTP – File Transfer Protocol
c) HTTP – File Transfer Protocol
d) IRC – Internet Relay Chat
Group A Group B
a) FTP Internet explorer
b) Webbrowser protocol
c) CD-ROM power regulating device
d) UPS storage device
Mozilla Firefox
Ans:
a) FTP = protocol
b) Web browser =Internet explorer
c) CD-ROM = storage device
d) UPS = power regulating device
Select the Best Answer
a) The computer virus is created using the ……………..
i) Operating system software ii) Programming language iii) Application software
iv) None of the above
Ans:Programming Language
b) A set of rules that is followed by the sender and receiver to make communication possible.
i) Topology ii) Hub iii) Protocol iv)None of the above
Ans:Protocol
c) The service of the internet.
i) WWW ii) E-mail iii)both (i) and (ii) iv)None of the above
Ans:Both (i) & (ii)
d) Which is the element of multi-media?
i) DVD ii)CD-Drive iii)Windows XP iv)Sound
Ans:Sound
Technical Terms
a) A distributed network configuration in which all data and information pass through a central hub.Star Topology
b) The display of still frame pictures or photos on a computer screen.Graphics
c) A tool that is used to maintain performance and error free file management.Scandisk
d) It is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.Cybersquatting
Full Forms
a) ITSP – Internet Telephony Service Provider
b) MMS – Multimedia Messaging Service
c) URL – Uniform Resource Locator
e) CCTV – Closed Circuit Television
Group A Group B
a) Intellectual property Protocol
b) Self-replicating Unbounded
c) Radio wave Copy right
d) SPX/IPX Virus
Security
Ans:
a) Intellectual property = Copy right
b) Self-replicating = Virus
c) Radio wave = Unbounded
d) SPX/IPX = Protocol
Select the Best Answer
a) ………….is the main line of defense between a local network, or intranet and the internet
i) USB port ii) Encryption key iii) Firewall iv) None
Ans:Firewall
b) …………..is someone who uses a computer and a network internet connection to intrude into another computer system to perform an illegal act.
i) Programmer ii) Hacker iii) Terrorist iv)Spammer
Ans:Hacker
c) Which is the web browser?
i) Bing ii) Facebook iii)Google Chrome iv)Explorer
Ans:Google Chrome
d) Each computer on the internet has a unique address called a (n)…………….
i) domain name ii)protocol address iii)IP address iv)URL
Ans:IP address
Technical Terms
a) Medium that carries data without physical path.Unguided medium
b) The display of still-frame pictures or photos on a computer screen.Graphics
c) A battery supported power unit, which supplies power during the failure of electricity.UPS
d) A company that provides the internet facility.ISP
Full Forms
a) VSAT– Very Small Aperture Terminal
b) CVT – Constant Voltage Transformer
c) MBPS – Mega Bytes Per Second
d) PSTN – Public Switched Telephone Network
Group A Group B
a) FTP Internet explorer
b) Webbrowser protocol
c) CD-ROM power regulating device
d) UPS storage device
Mozilla Firefox
Ans:
a) FTP = protocol
b) Web browser =Internet explorer
c) CD-ROM = storage device
d) UPS = power regulating device
Select the appropriate answer:
a.Opera and Chrome is a/an…..
(i) Chat Program (ii) Search Engine
(iii) Web Browser (iv) None of above
Web Browser
b.Which is not the network hardware components?
(i) HUB (ii) Windows NT
(iii) Repeater (iv) Router
Windows NT
c.E-commerce is a …………..
(i) type of business (ii) type of virus
(iii) Both i and ii (iv) None of above
type of business
d.Frodo and Joshi are the examples of ………..
(i) Stealth Virus (ii) Macro Virus
(iii) File Virus (iv) Boot sector virus
Boot sector virus
5.Write appropriate technical term for the following:
a)Physical layout of LAN. LAN Topology
b)A card through which a computer is connected to the network. NIC
c)Networks of networks. Internet
d)The moral principle that control cyber crime. Computer ethics
6.Write the full forms of following:
a.POP : Post Office Protocol
b.W3C: World Wide Web Consortium
c.ICT: Information and Communication Technology
d.UPS: Uninterruptible Power Supply
16.What do you mean by ISP?
Ans. The company that provides the internet service to its customers either individual or office and charges the amount as per their subscribed package is called ISP. In context of Nepal, examples of ISP are NTC, worldlink, vianet etc.
17. Differentiate between bridge and router.
Ans. Bridge is the network element which allows the two different networks with similar protocols to connect with each other.
Router is the network element which allows to choose the best route for data transmission.
b) FTP : File Transfer Protocol
c) HTTP : File Transfer Protocol
d) IRC : Internet Relay Chat
f) WWW : World Wide Web
g) WAN : Wide Area Network
h) DVD : Digital Versatile Disk
No comments:
Post a Comment