Full width home advertisement

Grade 10 Revision

Post Page Advertisement [Top]

Fundamentals Revision

Fundamentals Revision

 Collection 1 (OLD MODEL)

1. Define star topology with figure.

Ans. The topology in which all the computers in a network are connect to the central device known as hub or sometimes switch is called star topology.


2."Computer network reduces the cost". Give any two strong points to support this statement.

Ans.

i. Multiple computers can share a single hardware. For example a printer can facilitate multiple computers at a time.

ii.The expensive software needs not to be installed individually in every computers. Single software can be shared within all computers.


3.Define computer ethics.

Ans.

The moral principle that bounds the computer users to use the computer and ICT tools in good way is called computer ethics. Logging out of anyone's email if found logged in a random device can be considered as the example of computer ethics.


4.Write down two measure of each to protect computer hardware and software.

Ans.

Ways to protect the computer hardware are:

i. Insurance Policy

ii. CCTC surveillance

Ways to protect computer software are:

i. Password policy

ii. Backup 


5.What is Anti-virus software? Write down any two examples of anti¬virus software.

Ans. The software which is responsible to disinfect the computer from virus is called anti-virus software. Examples: AVG, Kaspersky


6. Differentiate between guided and unguided media.

Ans.

i. Guided media is wired and unguided media is wireless.

ii. Guided medial is also called bounded media whereas unbounded media is called unbounded media.

Example of guided media are co-axial cable, fibre optic etc. and example of unguided media are satellite, microwave etc.


7. Mention any four symptoms of computer virus.

Ans.

i. Slow in operation and process

ii. Frequent restart

iii. Shrinkage of memory and storage

iv. Files corruption


8.Write any four uses of email.

Ans.

i. Sending  mail.

ii. Receiving mail

iii. Basis for creating different social media accounts

iv. Communication platform for e-banking and e-commerce


9.What is virtual reality?

Ans.

Virtual reality (VR) refers to a computer-generated simulation in which a person can interact within an artificial three-dimensional environment using electronic devices, such as special goggles with a screen or gloves fitted with sensors.


10.What do you mean by ISP?

Ans.

The company that provides the internet service to its customers either individual or office and charges the amount as per their subscribed package is called ISP. In context of Nepal, examples of ISP are NTC, worldlink, vianet etc.


11. Define LAN toplogy.

Ans. The physical structure that defines the arrangement pattern of computers connected in LAN is called LAN topolgy. Examples: BUS toplogy.


12.Differentiate between LAN and MAN.

Ans.

i. LAN is limited within a room or building whereas MAN covers a particular city.

ii.LAN may contain 10 to 100 users MAN contains thousands of users at a time.


13.Define cybercrime.

Ans. 

The illegal activities done through the use of computer, internet or any ICT tools is called cybercrime. Example: Hacking, Phishing, Bullying etc.


14. Define multimedia.

Ans. 

The integration of several media including text, graphics, video, audio and animation for digital service delivery is called multimedia. Multimedia can be useful in interactive teaching learning activities, advertisements or entertainment purpose.


15.Match the following:                                                      

Group A Group B

Server     ( ) HTTP

Node     ( ) Workstation

Protocol             ( ) Main computer

Coaxial cable     ( ) Repeater 

            ( ) Communication Media

Ans.

Server = Main computer

Node = Workstation

Protocol = HTTP

Coaxial cable = Communication Media


16. Match the following:                                                       

Group A     Group B

Duplex             ( ) Online Business

e-commerce     ( ) Two way communication

Router                     ( ) Destructive Program

Virus                     ( ) One way communication

                     ( ) Network Element

Ans.

Duplex = Two way communication

e-commerce = Online Business

Router=  Network Element

Virus = Destructive Program


17. Match the following

Group A         Group B
(a) Intellectual property         (i) Protocol
(b) self-replicating         (ii) Unguided media
(c) Radio wave (iii) Copyright
(d) SPX/IPX         (iv) Virus
                (v) Security


Ans.

Intellectual property = Copyright

self replicating = Virus

Radio wave=  Unguided media

SPX/IPX = Protocol


18.Number System : Do it yourself

19. 11 Sets of Computer Fundamentals Objective Questions


SET -1

Match the following
a) Microwave             Multimedia
b) UPS                        Protocol
c) Sound Card             Unguided media
d) TCP/IP                    Power protection device
                                    Guided media
Ans:
a) Microwave =  Unguided media
b) UPS = Power protection device
c) Sound Card = Multimedia
d) TCP/IP = Protocol



Select the Best Answer
a) Which is not the hardware component?
i) Hub ii) Repeater iii) Router iv) Windows NT
Ans: Windows NT


b) In which communication media does data travel in the form of light?
i) Telephone wire ii) Fiber optic iii) Coaxial cable iv) Twisted pair cable
Ans: Fiber Optics

c) Which is not the protocol?
i) TCP/IP ii) IPX/SPX iii) NETBIOS/NETBEUI iv) Client
Ans: Client

d) Which is the anti-virus program?
i) Photoshop ii) NAV iii) Windows NT iv) MS-Excel
Ans: NAV

Technical Terms

a) Buying and selling products and services online .E-commerce
b) Cabling structure of LAN.Network Topology
c) Group of computers that can share resources.Computer network
d) A program that destroys the other programs.Computer virus

Full Forms

a) UPS – Uninterruptible Power Supply
b) WWW – World Wide Web
c) WAN¬– Wide Area Network
d) DVD – Digital Versatile Disk




Set-2

Match the following

a) FTP                             Unguided Media
b) Satellite                       Web browser
c) Firefox                         Destructive program
d) Computer virus           Protocol
                                        Watch TV
Ans:
a) FTP = Protocol
b) Satellite  = Unguided Media
c) Firefox = Web browser
d) Computer virus = Destructive program


Select the Best Answer
a) Which is used to convert digital signal to analog signal and vice versa?
i) CD ROM ii) MODEM iii) Radio wave iv) Pen drive
Ans:MODEM

b) The device which is used as a component of multimedia
i) Sound card ii) NIC card iii) Portable disk iv) All of them
Ans:Sound card

c) Which is antivirus software?
i) Mozilla Firefox ii) McAfee iii) PC-tools iv) CMOS
Ans:McAfee

d) Which type of network belongs to the single organization?
i) WAN ii) LAN iii) MAN iv) Network
Ans:LAN

Technical Terms
a) A device which connects two different types of network.Router
b) A device which is used for converting digital data to analog and vice versa.MODEM
c) The media in which data travels from one computer to another computer in the form of light signal.Fiber Optics
d) A set of rules and procedures that govern transmission of message.Protocol

Full Forms
a) PSTN – Public Switched Telephone Network
b) ATM – Automatic Teller Machine
c) DHCP – Dynamic Host Configuration Protocol
d) SMTP – Simple Mail Transfer Protocol




Set-3
Match the following
a) Star topology                 Multimedia system
b) Homepage                     Media
c) Computer                       Index Page
d) Bluetooth                       Hub
                                           None
Ans:
a) Star topology = Hub
b) Homepage = Index Page
c) Computer = Multimedia system
d) Bluetooth = Media



State whether the statements are true or false.
a) Infrared is a wired communication media.False
b) Anti-virus is a computer program which detects virus and removes it from computer.True
c) Topology is a cabling structure of network which resides in WAN.False
d) Multimedia is used for listening music.True

Technical Terms
a) A hardware device that provides common wiring point in Local Area Network.Hub
b) A technology which stores text, sound, graphics and other information as digital data.Multimedia technology
c) A type of computer virus which is designed to effect executable program having extensions .exe or .com.Program virus
d) A device used for providing continuous power to the computer device and protect them from losing data even if the power supply goes off. UPS

Full Forms
a) HTTP – Hyper Text Transfer Protocol
b) POP – Post Office Protocol
c) UPS – Uninterruptible Power Supply
d) W3C – World Wide Web Consortium



Set - 4
Match the following

a) Microwave                 Example of markup language
b) Volt guard                 Networking device
c) DHTML                    Component of computer
d) Switch                        Power protection device
                                       Wireless transmission media
Ans:
a) Microwave = Wireless Transmission Media
b) Volt guard = Power Protection Device
c) DHTML = Example of markup language
d) Switch = Networking device


Select the Best Answer

a) Which is the communication protocol?
i) TCP/IP ii) POP iii) FTP iv) All
Ans: All

b) Which are used in multimedia system?
i) Text-Audio ii) Text-Visual iii) Text, Graphics and Sound iv) Text, Graphics & Audio, Visual
Ans: Text,Graphics & Audio Visual

c) To protect data from losing, perform the operation
i) Backup ii) Password iii) All
iv) Do not use removable storage media without scanning the disk.
Ans: Backup

d) Which one is the online communication service to the internet?
i) E-mail ii) Chat iii) video conferencing iv) All
Ans: All

Technical Terms
a) Number of bits that can be transferred per second over a given transmission media.Bandwidth
b) Discussing between two or more people which are located at different places in the world.Newsgroup
c) The law that governs legal issues of cyberspace.Cyber law
d) The process of converting coded data into its original data. Decryption

Full Forms
a) MAN – Metropolitan Area Network
b) URL – Uniform Resource Locator
c) DNS – Domain Name System
d) FTP – File Transfer Protocol


Set-5

Match the following

a) Duplex                  i) Communication media
b) Wi-fi                     ii) Type of network
c) TV                         iii) Two way communication
d) MAN                     iv) Transmission media
                                   v) Network
Ans:
e) Duplex = Two way communication
f) Wi-fi = Transmission media
g) TV = Communication media
h) MAN = Type of network


Select the Best Answer
a)Which of the following devices copies electrical signals from one Ethernet to another?
i) Bridge ii)Repeater iii) Hub iv) Passive hub
Ans: Repeater

b) What is the name of the network topology in which these are bi-directional links between each possible node?
i)Ring ii)Star iii) Tree iv) Mesh
Ans: Mesh
c) A number of micro-computers connected together to share peripherals and programs is
i) Computer graphics ii) LAN iii)Modulator-Demodulator iv)None
Ans: LAN

e)Which of the following is voice band channel?
i) Telephone line ii) Telegraph line iii) Coaxial cable iv) Microwave
Ans: Telephone line

Technical Terms
a) A device which connects networks using the same communication protocol.Bridge
b) Plan formulated by the government for the development of IT sector.IT policy
c) A software which can cause malfunction in normal functioning of the computer.Computer virus
d) Face-to-face interactions among participating users with the help of internet.Video conferencing

Full Forms
a) HTTP – Hyper Text Transfer Protocol
b) VSAT – Very Small Aperture Terminal
c) STP – Shielded Twisted Pair
d) VOIP – Voice Over Internet Protocol


Set-6
Match the following
Group A                      Group B
a) Switch                      i. re-generates electric signals
b) Hub                          ii. Converts digital signals into analog signals and vice-versa
c) Repeater                   iii. Joins multiple network having different protocols
d) Gateway                   iv. Repeats the signals to all the connected node
                                      v. repeats the signals to only the destination node
Ans:
a) Switch =  repeats the signals to only the destination node
b) Hub =  Repeats the signals to all the connected node
c) Repeater = re-generates electric signals
d) Gateway= Joins multiple network having different protocols


Select the Best Answer
a) Which is not the network protocol?
i) TCP/IP ii) STP iii) FTP iv) All of above
Ans:STP

b) Which of the following is not cybercrime?
i) Forgery ii) Authentication iii) Salami Saving iv) Hacking
Ans: Authentication

c) Is an e-mail address hamronepal@yahoo.com , what does “yahoo” refer?
i) User account name ii) Domain name iii) To develop domain name iv) None of above
Ans:Domain Name

d) Which of the following is not the component of multimedia?
i) Pixel ii) Text iii) Audio iv) Video
Ans:Pixel

Technical Terms
a) A program that displays the contents of web pages on a client computer.Web browser
b) The law that governs the legal issues of cyber space.Cyber law
c) The moving images of real events. Video
d) A secret word that provides accessibility to a user to a file, application, or computer system.Password

Full Forms
a) IRC – Internet Relay Chat
b) POP – Post Office Protocol
c) Telnet – Telecommunication Network
d) VRML – Virtual Reality Modeling Language


Set-7
Match the following
Group A                      Group B
a) RJ-45                     Communication
b) AVG                      Wireless Media
c) Telephone              Wired Media
d) Co-Axial                 Anti-virus
                                    Media connector
Ans:
a) RJ-45 = Media connector
b) AVG = Anti-virus
c) Telephone = Communication
d) Co-Axial = Wired Media



Select the Best Answer
a) Which is not the network protocol?
i) TCP/IP ii) Ethernet iii) STP iv) FTP
Ans: STP

b) Cyber law is introduced in Nepal in………….. B.S.
i) 2061 ii) 2062 iii) 2063 iv)2064
Ans: 2061

c) ……………is used to develop web page.
i) HTTP ii) POPD iii)HTML iv)SGML
Ans: HTML

d) Virus that infects file having extension .COM or .DRV or .EXE is …………..
i) boot sector virus ii)Trojan Home iii)File virus iv)Dos System Infector
Ans: File virus

Technical Terms

a) An electrical card or board that connects network computer with server via cable.NIC
b) The process of converting data signal from analog to digital.Demodulation
c) Illegal / unethical activities in IT.Cybercrime
d) A main computer in network that provides resources to nodes.Server

Full Forms
a) NIC – Network Interface Card
b) TCP/IP – Transmission Control Protocol/Internet Protocol
c) UPS – Uninterruptible Power Supply
d) ISP – Internet Service Provider

Set-8
Match the following
Group A                          Group B
a) Microphone                  Co-axial cable
b) Avira                            hardware security
c) Fiber optics                  Multimedia
d) Volt guard                    wired communication media
                                         Anti-virus
Ans:
e) Microphone = Multimedia
f) Avira  = Anti-virus
g) Fiber optics = wired communication media
h) Volt guard = hardware security


Select the Best Answer

a) In ………… all the computer and devices are connected to a single cable.
i) Bus Topology ii) Ring topology iii) Star topology iv) Tree topology
Ans:Bus topology

b) Which is the service of the internet?
i) IRC ii) Telnet iii) Email iv)All of the above
Ans:All of the above

c) Which is related to multimedia?
i) Printer ii) Scanner iii)CD-ROM iv)Digitizer
Ans:CD-ROM

d) Which is the route of virus transmission among them?
i) Microphone ii)Printer iii)Joystick iv)Pen drive
Ans:Pen drive

Technical Terms

a) Crime with a use of computer technology. Cyber crime
b) A device that helps to do work by connecting two or more than two different computer systems.Gateway
c) Letters and pictures sent via electronic media.E-mail
d) Pair twisted wire made up of copper.Twisted pair cable

Full Forms
a) URL – Uniform Resource Locator
b) FTP – File Transfer Protocol
c) HTTP – File Transfer Protocol
d) IRC – Internet Relay Chat


Set-9
Match the following
Group A                     Group B
a) FTP                      Internet explorer
b) Webbrowser        protocol
c) CD-ROM             power regulating device
d) UPS                      storage device
                                  Mozilla Firefox
Ans:
a) FTP = protocol
b) Web browser =Internet explorer
c) CD-ROM = storage device
d) UPS = power regulating device


Select the Best Answer
a) The computer virus is created using the ……………..
i) Operating system software ii) Programming language iii) Application software
iv) None of the above
Ans:Programming Language

b) A set of rules that is followed by the sender and receiver to make communication possible.
i) Topology ii) Hub iii) Protocol iv)None of the above
Ans:Protocol

c) The service of the internet.
i) WWW ii) E-mail iii)both (i) and (ii) iv)None of the above
Ans:Both (i) & (ii)

d) Which is the element of multi-media?
i) DVD ii)CD-Drive iii)Windows XP iv)Sound
Ans:Sound

Technical Terms
a) A distributed network configuration in which all data and information pass through a central hub.Star Topology
b) The display of still frame pictures or photos on a computer screen.Graphics
c) A tool that is used to maintain performance and error free file management.Scandisk
d) It is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.Cybersquatting

Full Forms
a) ITSP – Internet Telephony Service Provider
b) MMS – Multimedia Messaging Service
c) URL – Uniform Resource Locator
e) CCTV – Closed Circuit Television


Set-10
Match the following
Group A                                  Group B
a) Intellectual property          Protocol
b) Self-replicating                Unbounded
c) Radio wave                      Copy right
d) SPX/IPX                           Virus
                                              Security
Ans:
a) Intellectual property = Copy right
b) Self-replicating =  Virus
c) Radio wave = Unbounded
d) SPX/IPX = Protocol


Select the Best Answer
a) ………….is the main line of defense between a local network, or intranet and the internet
i) USB port ii) Encryption key iii) Firewall iv) None
Ans:Firewall

b) …………..is someone who uses a computer and a network internet connection to intrude into another computer system to perform an illegal act.
i) Programmer ii) Hacker iii) Terrorist iv)Spammer
Ans:Hacker

c) Which is the web browser?
i) Bing ii) Facebook iii)Google Chrome iv)Explorer
Ans:Google Chrome

d) Each computer on the internet has a unique address called a (n)…………….
i) domain name ii)protocol address iii)IP address iv)URL
Ans:IP address

Technical Terms
a) Medium that carries data without physical path.Unguided medium
b) The display of still-frame pictures or photos on a computer screen.Graphics
c) A battery supported power unit, which supplies power during the failure of electricity.UPS
d) A company that provides the internet facility.ISP


Full Forms
a) VSAT– Very Small Aperture Terminal
b) CVT – Constant Voltage Transformer
c) MBPS – Mega Bytes Per Second
d) PSTN – Public Switched Telephone Network


Set-11
Match the following
Group A                     Group B
a) FTP                      Internet explorer
b) Webbrowser        protocol
c) CD-ROM             power regulating device
d) UPS                      storage device
                                  Mozilla Firefox
Ans:
a) FTP = protocol
b) Web browser =Internet explorer
c) CD-ROM = storage device
d) UPS = power regulating device

Select the appropriate answer:

a.Opera and Chrome is a/an…..

(i) Chat Program (ii) Search Engine

(iii) Web Browser (iv) None of above

Web Browser


b.Which is not the network hardware components?

 (i) HUB         (ii) Windows NT

(iii) Repeater (iv)  Router

Windows NT


c.E-commerce is a …………..

(i) type of business (ii) type of virus

(iii) Both i and ii (iv) None of above

type of business

d.Frodo and Joshi are the examples of ………..

(i) Stealth Virus (ii) Macro Virus

(iii) File Virus         (iv) Boot sector virus

Boot sector virus


5.Write appropriate technical term for the following:                    

a)Physical layout of LAN. LAN Topology

b)A card through which a computer is connected to the network. NIC

c)Networks of networks. Internet

d)The moral principle that control cyber crime. Computer ethics


6.Write the full forms of following:                                                     

a.POP : Post Office Protocol

b.W3C: World Wide Web Consortium

c.ICT: Information and Communication Technology

d.UPS: Uninterruptible Power Supply


Collection -2 ( NEW MODEL)
Very Short Answers
1. List any four services of internet.
Ans. 
i. Email
ii. www
iii. e-commerce
iv. Telnet

2. Define e-commerce.
Ans. 
Buying and selling goods and services online through computer or mobile using a particular application is called e-commerce.
Eg. Amazon, Alibaba, daraaz etc


3. Define www.
Ans.
 WWW stands for “World Wide Web”  which is responsible for compiling and managing all webpages and web contents throughout the internet.

4. Define email.
Ans.
The service of internet which allows sending and receiving the mail from one point to another through internet is called e-mail.
Eg. Gmail, Hotmail, yahoo etc.

5. Define internet telephony.
Ans.
Internet Telephony is the service of internet that allows users to make telephone communication through internet. Eg, Cooltalk, Netmeeting etc

6. Define LAN topology.
Ans. The physical structure that defines the arrangement of computers connected in a LAN is called LAN topology.

7. List out the types of LAN toplogy.
Ans.
i. Bus Topology
ii. Star Topology
iii. Ring Topology
iv. Tree Topology
v. Mesh Topology
vi. Hybrid Topology

8. Mention the two advantage of bus topology.
Ans.
i. It is easier and cheaper to setup.
ii. It is easy to extend. 

9. Mention the two advantages of star topology.
Ans.
i. Failure of a single node doesn’t affect the entire network. 
ii. Faster than bus topology.

10. Define LAN, MAN and WAN.
Ans.
The network that is limited within a room or a building is called LAN.

The network within a city is called MAN.

The network covering a particular geographic region or entire region is called WAN. Internet itself is an example of WAN.

11. List out the components of communication.
Ans.
i. Sender
ii. Receiver
iii. Medium
iv. Protocol
v. Encoding
vi. Decoding
vii. Feedback


12. Define simplex, half duplex and full duplex mode of communication.
Ans. 
Simplex is the unidirectional mode of communication in which sender keeps on sending without noticing whether the receiver is receiving the message or not. Examples: Radio Broadcasting 

Half Duplex:
Half Duplex is the semi bi-directional mode of communication in which sender and receiver both share messages but one at a time. Example: Walkie-Talkie 

Full Duplex
Full Duplex is the full bi-directional mode of communication  in which sender and receiver both share messages at the same time. 
Example: Mobile Phone etc. 


13. What do you mean by NIC?
Ans. NIC refers to Network Interface Card whose work is to connect the particular device in a network.


14. Define web browser.
Ans. Web browser is a software that browses and displays the web content searched or accessed by the user and provided by the server. Example: Google Chrome.


15. List any four network elements.
Ans.
i. Router
ii. Hub
iii. Switch
iv. NIC 

16.What do you mean by ISP?

Ans. The company that provides the internet service to its customers either individual or office and charges the amount as per their subscribed package is called ISP. In context of Nepal, examples of ISP are NTC, worldlink, vianet etc.


17. Differentiate between bridge and router.

Ans.  Bridge is the network element which allows the two different networks with similar protocols to connect with each other.

Router is the network element which allows to choose the best route for data transmission.






Technical Terms:
a. Medium that carries data without physical path.Unguided medium
b. The topology containing hub. Star Topology
c. The company that provides the internet service to the user. ISP
d. Buying and selling goods and sevices online. e-Commerce
e. The cabling structure of LAN. LAN Topology
f. The communication media without physical connection. Unguided media 
g.The unidirectional mode of communication. Simplex Mode 
h.Each computer in a network. Node
i. Device used to connect a PC with a telephone line. MODEM
j. The amount of data that transmits through communication channel in a fixed time period. Bandwidth
h.The network of networks. Internet
i. Loop topology. Ring Topology 
j. The set of rules that governs the connection of two devices. Network Protocol
k. A cable that transmits lights signals . Fibre Optic 
l. The main computer in a network. Server 
m. Teaching and learning through internet. e-learning 
n. Software that is used for surfing information through the internet. Web Browser
o.Voice communication through the internet. Internet  Telephony

Full Forms
a) URL : Uniform Resource Locator
b) FTP : File Transfer Protocol
c) HTTP : File Transfer Protocol
d) IRC : Internet Relay Chat
e) UPS : Uninterruptible Power Supply
f) WWW : World Wide Web
g) WAN : Wide Area Network
h) DVD :  Digital Versatile Disk
i)RDBMS : Relational Database Management System
j) ADSL : Asymmetric Digital Subscriber Line  
k) LAN : Local Area Network
l) STP : Shielded Twisted Pair
m) UTP : Unshielded Twisted Pair 
n) Email: electronic Mail
o) FTP : File Transfer Protocol
p) WLAN  :Wireless Local Area Network


Number System
Explore Yourself (from book or blog)



No comments:

Post a Comment

Bottom Ad [Post Page]