Networking and Telecommunication
1.
[SLC 2064]
a) Radio
Wave
(d) Device to connect
network having different technology
b) Cyber
ethics
(c) power protection device
c) Spike
guard
(-) internet
d) Gateway (b) professionally guided principles
(a) Wireless
Media
2.
[SLC 2065]
a) Server (c) HTTP
b) Node (b) Work
Station
c) Protocol (a) Main
Computer
d) Coaxial
Cable (-) Repeater
(d) Communication
Media
3.
[SLC 2066]
a) T-connector (b)Network device
b) Bridge (d)Power protection
c) CD-ROM (a)Coaxial cable
d) Spike
Guard (c)Multimedia component
(-)Virus
scanning
4.
[SLC 2067]
Satellite (-)Multimedia
HTTP (b)Protocol
Online
business (a)Unguided media
Fiber
optics (c)E-commerce
(d)Guided
media
5.
[SLC 2068]
Microwave (c)Multimedia
Volt
guard (d)Protocol
Sound
card (a)Unguided
media
TCP/IP (b)Power
protection devices
(-)Guided
media
6.
[SLC 2069]
RJ-45 (c)Multimedia
WAN (d)Duplicate copy
Back
up (-)Fiber optic
cable
Microphone (a)Twisted pair cable
(b)Internet
7.
[SLC 2070]
Combination
of several media (c)Guided
Media
POP (d)Power Protection Device
UTP (a)Multimedia
UPS (-)Protocol used in e-mail
(b)CD-ROM
8.
[SLC 2071]
E-commerce (b)Power
protection device
Volt
guard (a)Online
shopping
Satellite
link (c)WAN
Sound
card (-)Optical
fiber
(d)Multimedia
9.
[SLC 2065 S]
McAfee (b)Supplies
continuous power
UPS (d)Internet
protocol
Web
Browser (-)Antivirus
software
TCP/IP (c)Internet
explorer
(a)Computer virus
10.
[SLC 2066 S]
Bandwidth (b)ISP
Internet ()FAT
Network (a)bps
Software
security (d)NAV
(c)NIC
11.
[SLC 2067 S]
Pictures
in motions (c)Guided media
TCP/IP (a)animation
UTP (d)Random Access
Memory
Volatile
memory (-)CD-ROM
(b)Protocol used
in Internet
12. [SLC
2068 S]
LAN (b)Within a city
MAN (d)Internet
protocol
UPS (a)Within a room
IPX/SPX (c)Power supply
device
(-)Between
countries
13.
[SLC 2069 S]
Sound
card (d)WAN
Virus (c)Internet
explorer
Web
browser (a)Multimedia
Satellite
link (b)damage or
corrupt data
()Bridge
14.
[SLC 2070
S]
TCP/IP (c)Multimedia
Back
up (d)Web address
Sound
card (b)Software
security
URL (a)Protocol
(-)RJ45
15.
[SLC 2072]
(a)
Microwave (c) Power
protection device()
(b)
UTP (d)
Protocol()
(c)
UPS (a)
Unguided media()
(d)
SMTP (-)
Internet()
(b)
Guided media
16.
[SEE 2073]
Group
'A' Group 'B'
(a)
Malicious
software (c)
UPS ()
(b)
Primary storage device (a) virus ()
(c)
Power protection device (d) copyright ()
(d)
Intellectual property law (b) RAM ( )
(-)
CD-ROM ( )
17.
[SLC 2074]
Group
'A' Group 'B'
(a)
RJ 45
connector (b) Duplicate copy()
(b)
Back
up (c) Multimedia()
(c)
Microphone (a) Twisted pair cable()
(d)
Hub/switch (-) Ring Topology()
(d)
Star Topology()
18.
Protocol (c)MODEM
WAN (d)Fiber Optic
Network
component (a)HTTP
Transmission
media (b)Internet
19.
Coaxial
Cable (c)RJ45
Optical
Fiber cable (a)BNC
Twisted
Pair (b)ST
Telephone
Wire (d)RJ11
20.
Star (c)Powerful
computer
WAN (d)Computers on
the network provided to users
Server (b)Internet
Node (a)Topology
21.
Host
computer (b)A computer circuit board
NIC (e)A
self-sufficient computer
Windows
NT (a)A powerful,
centralized computer system
TCP/IP (c)Popular network
operating
Peer (-)Node
(d)Network
protocol
22.
Computer
network (b)Windows NT
Network
OS (d)HTTP
Transmission
channel (a)Resource Sharing
Protocol (c)UTP
(-)Bit
23.
Wi-Fi (-)Network within
a building
Linear
Bus (d)Software
component
BNC (b)Topology
Device
Driver (a)Transmission
Media
(c)Media
connector
24.
Protocol (b)Network within a building.
LAN (d)BNC
MAN (e)RJ-45
Coaxial (f)Central
device for star topology.
Cat
5 (a)Rules to
exchange data.
Hub (c)Network within
a city.
(-)Wireless media
25.
Node (b)a network
computer that utilizes the resources of other computer
Client (e)a set of
rules by which computers communicate with each other over a network
Host (d)a
self-sufficient computer that acts both as a server and a client(shares and
uses resources
Peer (a)any network
device that can connect to the network and can generate, process or transfer network
data
Protocol (c)the most
powerful type of computer on the network, that does all the processing for the
user
26.
Ring
topology (c)A group of
computers that functions both as a client and server.
Simplex
connection (e)A group of
computers and associated devices that share a common communications line or
wireless link.
Peer-to
peer network (a)A network
topology in which network nodes are connected in continuous
circle.
Fiber
optic
cable (b)A connection
in which the data flows in only one direction from the transmitter to the
receiver.
Local
area network (a)A network
cable that contains stands of glass fibers inside an insulated casing
Internet and Its services
27.
TCP/IP (a)Addressing
data, converting them into packets and Routing
FTP (d)Transfer mail
and attachment on the network
POP (b)Transfer files
between two computers
SMTP (c)Fetching mails
from the mail server to a user’s computer
28.
NCSA
Mosaic (d)Internet
Protocol
ARPA (e)Online shopping
WWW (b)Funded by US
DOD
TCP/IP (c)Dr.
Berners-Lee
E-commerce (a)First web
browser
29.
E-mail (e)A private
network within an organization.
World
Wide
Web (c)The opening
or main page of a website.
Home
Page (d)The buying
and selling of goods and services on internet.
Electronic
commerce (b)The leading information –
exchange service of the internet.
Intranet (a)The exchange of
computer-stored messages telecommunication
30.
Usenet (b)Instant
Chatting
MSN (c)Remote
Login
Telnet (d)Internet
component
Modem (a)Newsgroup
(-)Website
31.
Internet (c)Service
of internet
HTTP (d)Internet
Service provider
Email (a)Networks
of networks
ISP (b)Protocol
(-)online
chat
32.
E-mail (b)a global collection of
millions of computers of different types belonging to various networks worldwide
Internet (d)an online
communication mechanism that lets people to make a real time discussion with one or more people through
the internet
Newsgroup (a)electronic message sent from
one computer to another
Web
Chat (c)world wide discussion group in
which people share information and ideas on a particular area of interest.
Computer Security
33.
A)
password (c)Duplicate
copy of data
B)
Encryption (a)Secret
word or phrase
C)
Backup (d)Authentication
D)
Access
Control (-)Rearrangement
of fragmented file
(b)Scrambled
and unreadable form of information
34.
A)
Antivirus (d)Software
that prevent gaining access
B)
Scandisk (c)Arranging
the scattered data
C)
Defragmentation (b)Checking
for disk error
D)
Firewall (a)Software
to remove malicious Programs
(-)Duplicating
disk
35.
A)
Hardware
security (-)Rewriting
the files to contiguous sector
B)
Software (c) Scattering
the disk file over different locations
C)
Fragmentation (d)Provide
access to the computer system
D)
Password (b)Antivirus
(a)Insurance
policy
36.
A)
Hard Lock
Key (c)Hardware Security
B)
Spike
guard (a)Software
security
C)
Insurance (b)Power protection device
D)Burlar
alarm (-)Computer Security
(d)Prevents
unauthorized entrance
37.
A)
Backup (d)Software
that destroys data
B)
Password (c)Utility
software
C)
Scan Disk (a)Copy
of data
D)Computer
virus (b)Allows
the user to access system
(-)System
Software
Computer Virus
38.
a)
Boot sector
virus (-) McAFee
b)
File infecting
virus (c) W97M.Melissa
c)
Macro
virus (a) stoned
d)
Polymorphic
virus (e) Frodo
e)
Stealth
virus (b) Friday the 13th
(d) Involuntary
39.
a)Macro
virus (c)A
virus that infects the part of the computer called a system sector.
b)Antivirus (d)A virus that
directly attack and modify program files, which are usually .EXE or
.COM files.
c)Boot
virus (a)The special
macros that self- replicate in the data files of personal productivity
applications such as Microsoft Word and Excel.
d)File
virus (b)A class of
program that searches your hard drive and floppy disks for any known or
potential viruses.
40.
a)Boot
virus (e)A computer virus that infect
files and boot records.
b)Files
virus (a)A computer virus designed to
infect the boot sector of the disk.
c)Polymorphic
virus (d)A computer virus that
infect program written in scripting language.
d)Script
virus (b)A computer virus that infect
executable program files having an extension .exe, .com or .dll.
e)
Stealth
virus (c)A computer virus that can
change its appearance with every infection.
41.
a)
CPAV (c)Propagating virus
b)
Software
piracy (a)Antivirus
software
c)
Worm (-)Virus
transfer
d)
Password (b)Purpose of virus development
(d)Virus
safety measure
42.
a.
Boot virus (c)Cascade
b.
Parasitic
virus (a)Disk Killer
c.
polymorphic virus (e)Whale
d.
Script
viruses (d)I LOVE YOU
e.
stealth
virus (b)Jerusalem
Multimedia and Its Application
43.
Edutainment (c) Components of
multimedia
Virtual
Reality (d) Multimedia
software
Graphics (a) Multimedia in
education
Adobe
Photoshop (b) Simulated software
44.
Virtual
Reality (-)Combination of various
media
Graphics (a)Artificial environment
Animation (b)Visual impact
Multimedia (c)Moving images
(d)Adobe
Photoshop
45.
Audio (b)Monitor
Video (a)Speaker
Sound
Card (d)Still
frame pictures
Graphics (c)Recording
and playing
sound (-)Multimedia
card
46.
Real
player (b)Upgrade
the PC
MUK (d)Headsets
and data gloves
Animation (a)Software
to view multimedia content
Virtual
reality (c)Cartoon
on television
(-)Multimedia
component
47.
Animation (e)A
computer-delivered electronic system that allows the user to control, combine,
and manipulate different types of media, such as text, sound video, computer
graphics, and animation.
Edutainment (c)The
process of giving the illusion of movement to drawings, models, or interested
object
Multimedia (b)A
form of education which is designed to be entertaining, in order to keep people
interested and engaged.
Virtual
Reality (e)An
extension of hypertext that supports linking sound, and video element in
addition to text elements.
Hypermedia (d)An
artificial reality that projects the user into a 3D Space generated by the
computer.
Cyber
Law and Computer Ethics
48.
|
|
a)
Cyber stalking
|
(c)Electronic
transfer of illegally-obtained monies with the go with the goal of
hiding its source and
possibly
its destination
|
b)
Phishing
|
(e)The
activity of breaking into a computer system to gain
to unauthorized access
|
c)
Cyber laundering
|
(a)The
use of communication technology, mainly the internet,
to torture other individuals
|
d)
Cyber Contraband
|
(b)The
act of attempting to acquire sensitive information like usernames, passwords
and credit card details by distinguishing as a trustworthy source
|
e)
Hacking
|
(d)Transferring
illegal items through the internet (such as encryption technology)
that is banned in some locations.
|
49.
|
|
a)
Hacking
|
(c)The
use of communication technology, mainly the Internet, to torture other
individual.
|
b)
Phishing
|
(-)The
computer program that can replicate themselves and harm the computer system
on a network
(d)within
the knowledge of the system users.
|
c)
Cyber stalking
|
(a)The
activity of breaking into a computer system to gain an unauthorized access.
|
d)
Computer viruses
|
(e)This
is one of the most serious frauds as it involved stealing money and obtaining
other benefits
through
the use of false identity.
|
e)
Identity Theft
|
(b)The
act of attempting to acquire sensitive information like usernames, passwords,
and credit card
details
disguising as a trustworthy source.
|
50.
|
|
a)
Digital Signature
|
(b)Cyber
crime
|
b)
Forgery
|
(a)Electronic
security system
|
c)
Encryptions
|
(d)Cyber
law
|
d)
Copy right
|
(c)Locking
message
|
51.
|
|
a)
Fair Credit reporting Act
|
(d)1988
|
b)
Copyright
|
(g)Encryption
and decryption
|
c)
Cyber law of Nepal
|
(e)1992
|
d)
Video Privacy Protection Act
|
(a)1970
|
e)
Copyright Act
|
(c)2004
|
f)
Federal Privacy Act
|
(f)1974
|
g)
Digital Signature
|
(b)Intellectual
property
|
52.
|
|
a)
Computer ethics
|
(c)The
block of data at the end of an electronic message that attests the
authenticity of the said message
|
b)
Cyberspace
|
(d)A
method of making the data or message transmitted through the internet
unreadable by everyone
except
the receiver.
|
c)
Digital signature
|
(b)The
world-wide network of computers.
|
d)
Encryption
|
(a)A
branch of applied ethics which studies and analyzes social and ethical
impacts of information
Technology.
|
Database
Management System
53.
Data (d)-presentation
of result
Record (j)-organized
collection of data information
Field (i)-graphical
interface for data entry
Report (c)-column
on datasheet
Query (a)-value
Table (h)-software
Primary
key (b)-row
on a datasheet
DBMS (e)-retrieving
editing information conditionally
Form (f)-sorting
data in rows and columns
Database (g)-a
field with unique field content
54.
Number (d)50
Yes/No (c)8
bytes
Currency (a)Long
integer
Text (b)1
bit
(-)short
integer
55.
Data
redundancy (b)Error
message
Validation
Text (c)Pattern
of data in a field
Input
Mask (-)Lookup
wizard
Validation
Rule (a)Data
duplication
(d)Limits
the value
56.
Indexing
data (-)Retrieves
data
Long
text (d)Caption
FoxPro (b)Memo
field
Label
for a
field (c)DBMS
(a)Searching
fast
57.
Text (d)2048
characters
Currency (a)up
to 255 Characters
Memo (b)8
Bytes
Hyperlink (c)0-65535
Characters
(-)4
Bytes
58.
Data
Integrity (c)No.
of character can be entered
Automatic (d)Contains
distinct value
Field
size (a)Validation
Rule
Primary
key (-)Indexed
(b)Default
value
59.
Query (b)A
collection of programs that enables you to store, modify, and extracts
information from a database
DBMS (e)A
field which uniquely identifies every record in a
table.
Table (d)A
set of information stored about a particular entry.
Record (c)An
arrangement of data in row and column format.
Primary
Key (a)A
database object that creates a datasheet of selected fields and records from
one or more tables.
60.
Data
type (b)Field
property
Format (d)Relationship
Form (-)Referential
Integrity
One-to-one (c)Database
Object
(a)Memo
61.
Index (-)database
Data
redundancy (d)software
Record (a)easy
to search
DBMS (b)repetition
of data
(c)Tuple
62.
Form (-)database
Primary
key (d)data
type
Advance
Filter (a)text
control
Hyperlink (b)unique
identification of record
(c)Query
63.
Sort (d) mass
change
Single
precision (c)DBMS
FoxPro (-)memo
field
Update
query (b)sub
type of number
(a)Arranging
data
64.
Mark
ledger (c) Predefined
formats
Wild
cards (a) database
Wizard (d) primary
key
Relationship (b) *
and?
(-)Report
65.
Default
value (c)255 Characters
Fox
Pro (d)Column
Name
Text (b)DBMS
Field (a)Field
Properties
(-)Search fast
66.
[SLC 2065 S S]
Group
A Group
B
i)
MS-ACCESS (d)
analyze and present data in a printed format
ii)
Data
update (b)
Query
iii)
Field (c)
a piece of information related to someone or something
iv)
Report (a)
Database management software
(-)
collection of related fields.
67.
[SLC 2066]
Group
A Group
B
a)
Default value (c)
255 Characters
b)
Fox
Pro (a)
Column Name
c)
Text (b)
DBMS
d)
Field (d)Field
Properties
(-) Search fast
68.
[SLC 2066 S]
Group
A Group
B
a)
OLE (d)
Formatted output
b)
Primary
key (c)
Interface
c)
Form (-)
64,000 characters
d)
Report (b)
Unique Field
(a) Picture
69.
[SLC 2067]
a)OLE (d)Report
b)
Data
entry (a)
Picture
c)Indexing (-)
Table
d)Formatted
printout (c)Fast
searching
(b)Form
70.
[SLC 2067 S]
Group
A Group
B
a)
MS-Access (d)
DATA entry and editing interface
b)
Query (-)
Electronic Spreadsheet software
c)
Record (b)
Tool to retrieve data from one or more than one tables
d)Form (a)
Data base management software
(c) Collection of related fields
71.
[SLC 2068]
Group
A Group
B
a)
Indexing (c)
Limits the value
b)
Report (d)
Data type
c)
Validation
Rule (-)
Error messages
d)
Hyper
link (b)
Final output
(a) Search fast
72.
[SLC 2068 S]
Group A Group
B
a) Indexing
data (d)
Retrieves data conditionally
b) Long
Text (c)
DBMS
c) Fox
Pro (b)
Memo field
d)
Query (a)
Searching fast
(-) Report
73.[SLC
2069]
Group
A Group
B
i)
OLE (d)
Data Entry
ii)
Hyperlink (c)
Formatted Hardcopy
iii)
Report (a)
1 GB
iv)
Form (-)
Up to 255 characters
(b)
Up to 2048 characters
74.
[SLC 2069 S]
Group
A Group
B
a) Report (b)
Data type
b)
Currency (d)
Column
c) Long
Text (a)
Database object
d)
Field (-)
Record
(c)
Memo
75.
[SLC 2070]
Group
A Group
B
i)
Indexing Data (d)
Size upto 1 GB
ii)
Form (c)
Column of datasheet
iii)
Field (-)
Row on a datasheet
iv)
OLE
object (a)
Searching Fast
(b)
Graphical interface for data entry
76.
[SLC 2070 S]
a) dBASE (c)OLE
b) Primary
key (d)Memo
c) Photo (a)DBMS
d) Long
text (b)Uniquely
defined
()Hyper
links
77.
[SLC 2071]
a. Indexing
data (b)Final
output
b. Report (d)View
data
c. Yes/No (a)Searching
fast
d. Select
query (-)Picture
(c)Data
type
78.
[SLC 2072]
Group
'A' Group
'B'
(a)
OLE (c)
Data Entry
(b)
Validation
Rule (-)
Stores data
(c)
Form (b)
Limits the value
(d)
Indexing (a)
Data type
(d)
Easy to search
79.
[SLC 2065] [SEE 2073]
Group
'A' Group
'B'
(a)
Query (d)
Printed format
(b)
Form (c)
Stores data
(c)
Table (b)
Allows view, edit, input data
(d)
Report (a)
Extracts selected record for view
(-)
DBMS
80.
[SLC 2074]
Group
'A' Group
'B'
(a)
Data (b)
Input, view, edit data
(b)
Form (c)
Formated output
(c)
Report (a)
Collection of raw facts
(d)
Table (-)
Question to the database
d)
Stores data in database
how to download the program
ReplyDelete