2)
a)
i)
iii)
b)
i)
iii)
c)
i)
iii)
d)
i)
iii)
e)
f)
g)
h)
i)
j)
k)
l)
m)
n)
o)
p)
q)
r)
iii)
MT-RJ
iv) None of the above
The device used to regenerate and strengthen signals
i)
NIC
ii) Booster
iii)
Hub
iv) Repeater
The combination of bus and star topology is
i)
Mesh topology
ii) Tree topology
iii)
Ring topology
iv) Mixed topology
The topology in which each computer is directly connected to either side of the computers
i)
Ring topology
ii) Bus topology
iii)
Mesh Topology
iv) Star topology
Device used to connect computer to telephone line
i)
Router
ii) NIC
iii)
Bridge
iv) Modem
Example of unguided transmission media
i)
Microwave
ii) Radio frequency
iii)
None of them
iv) Both i and ii
3)
a)
b)
c)
d)
e)
f)
g)
h)
NOS
MAN
LAN
WAN
WLAN
WiFi
UTP
TCP
m)
o)
p)
q)
r)
u)
v)
i)
TCP
ARPA
IPX
IP
RJ-45
BNC
WiMax STP
NIC
Computer Network
Exercise
1. Write technical terms of the following:
a) A cable technology that uses glass (or plastic) threads (fibers) to transmit data.
b) A computer that handles requests from other clients.
c) Standard connectors used for unshielded twisted-pair cable.
d) The unit of data sent across a network.
e) The amount of data that can be transmitted in a fixed amount of time.
2. Write full forms of the following:
a) NOS
b) MAN
c) UTP
d) STP
e) POP
f) NIC
g) MODEM
i) ARP
TCP
3. Choose the best alternatives:
a) Which of the following topology share a backbone channel to connect all workstations?
i) Ring
ii) Bus
iii) Star
iv) None of the above
b) Faster data communication is possible when using
i) Fibre optic
ii) Co-axial cable
j)
Computer Virus(Question)
1. Answer the following question
a) Define computer virus. List any two examples.
b) How can you understand that your computer is affected with virus?
c) What do you mean by boot sector virus?
d) What type of file does micro virus effect?
e) Define antivirus software with examples.
f) List any four preventive measures to stop virus infiltration in your computer.
2. Write technical terms of the following
a) A Trojan horse that watches the clock and gets activated on a certain date or certain time
of the day.
b) A file virus, which uses special techniques to hide its presence from users and virus
scanners.
c) Virus that infect both application programs and boot sector of a disk.
d) Software that prevents computer from virus.
e) A program that appears desirable but actually contains something harmful.
3. State if the following statements are true or false
a) Virus spreads across disks and networks by making copies of itself.
b) Computer virus is developed unknowingly while developing computer program.
c) Pirated software may copy viruses to the computer.
d) Worms get attach to files and modify them.
e) Computer viruses cannot delete files.
4. Fill in the blanks
a) The capability of generating the copies of itself is called.
b) . Viruses usually do not disturb the computer files but display interesting
information to entertain the users.
c) viruses replace the boot record program of a system disk.
d) Viruses can be removed from the system by using . Programs.
A.
Multimedia
1.
a)
b)
c)
d)
e)
f)
g)
2.
a)
b)
c)
d)
e)
3.
a)
b)
d)
e)
4.
a)
b)
c)
d)
e)
VGA
CD-ROM
GIF
AI
f)
g)
i)
j)
CD-RW
MPEG
JPEG
PDF
Inernet.
1. Answer the following questions
a)
b)
c)
d)
2.
What
What
What
Write
MS-Access
1. Answer the following questions:
a) What is a DBMS? Write any two examples.
b) List any four data types of MS-Access.
c) Define Query.
d) What is form? Write any two advantages of using form.
e) What is a database? Write any two examples.
f) Write down any two advantages of query.
g) While designing table structure which data types are suitable to store information
about teachersname, address, salary and date of birth.
h) Define data and database.
i) What is table? What rows and columns are called in MS-Access?
j) What is primary key? Write its importance.
k) Write any two advantages of DBMS.
l) What is report? Give its importance.
m) What is data sorting? Write the difference between sorting and filtering.
n) Define record and field.
o) Differentiate between select and action query.
p) List four basic objects of database in MS-Access.
q) Write any two uses of primary Key.
r) Differentiate between database and DBMS.
2. Choose the correct answer:
i. 255 characters
ii. Column name
iii. DBMS
iv. Field properties
v. Search Fast
i. Retrieves Data
ii. DBMS
iii. Memo Field
iv. Searching Fast
v. Report
a. Text
b. Row
c. Primary Key
d. Database
i. Unique field
ii. Dictionary
iii. Records in database
iv. Data type
v. MS-Access
a. MS-Access
i. Data type
b. Primary Key
ii. Data base
c. Report
iii. DBMS
d. Hyperlink
iv. Unique identification of report
v. Object of Access
a. Field
b. Data
c. Primary Key
d. Memo
i. Data entry
ii. Formatted Hardcopy
iii. 1 GB
iv. Up to 255 characters
v. Up to 2048 characters
b. Primary key field may contain the same value in two records.
c. A field cannot be declared without data type.
d. The extension of MS-Access database file is .MDB
e. Hyperlink field type is used to store photographs.
f. A report can be used to delete records from a table.
g. A row in a table is called a field.
h. The format field property specifies a pattern for all data to be entered in a field.
i. The select query makes changes to many records in just one operation.
5. Fill in the blanks:
a)
b)
c)
d)
e)
f)
g)
h)
i)