1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Assembly language
A) uses alphabetic codes in place of binary numbers of machine language.
B) is easiest language to write program.
C) need not be translated to machine language.
D) none of the above.
1.2 The circuit used to store one bit of data is known as
1.3 A router
A) Screens incoming information.
B) Distributes information between networks
C) Clears all viruses from a computer system
D) Is a work virus.
1.4 Telnet is a
A) Network of Telephones
B) Television Network
C) Remote Login
D) Remote Copy.
1.5 Mechanism to protect private networks from outside attack is
C) Digital signature
1.6 When CPU is executing a Program that is part of the Operating System, it is said to be in
A) Interrupt mode
B) System mode
C) Half mode
D) Simplex mode
1.7 A Windows utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations
B) Disk Cleanup
C) Disk Defragmenter
1.8 Dangerous programs that can be “caught” in a variety of ways including opening e-mail attachments and downloading software from the Internet.
1.9 Tool that is used to transfer data/files among computers on the Internet
1.10 A computer system that permits multiple users to run programs at same time
A) Real time system
B) Multi programming system
C) Time sharing system
D) Multi tasking system
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
2.1 Telnet is a service that runs remote program .
2.2 Co-axial cables the fastest media of data transfer.
2.3 Multi tasking system permits multiple users to run programs at same time.
2.4 Floating point representation is used to store real integers.
2.5 Accumulator keeps track of the instructions stored in program stored in memory.
2.6 Arithmetic operations with fixed point numbers take longer time for execution as compared to with floating point numbers.
2.7 Trojan horse is a program that performs not only a desired task but also includes unexpected malicious functions.
2.8 In computers, subtraction is carried out generally by 2’s complement method.
2.9 LDAP stands for Large Directory Access Protocol.
2.10 Hard disk is used as a main memory in computer for high speed operation.
3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
|3.1 Windows||A. MS-Office file extension|
|3.2 SMTP|| B. The horizontal naming system.
|3.3 AD||C. Simple Mail Transfer Protocol|
|3.4 PPT||D. Network layer|
|3.5 PKZIP||E. Address Register|
|3.6 NTFS||F. Network protocol|
|3.7 CMOS||G. Data Compression Software|
|3.8 ADSL||H. File Management|
|3.9 DVDs||I. Volatile Storage|
|3.10 DNS||J. Asymmetric Digital Subscriber Line|
|K. Optical Discs|
|L. Centrally Monitor Operating System|
|M. Operating System|
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
4.1 ________ Protocol used for transferring message between end user and Mail Server.
4.2 The time interval between adjacent ________ is called Bit-time.
4.3 Secret-key encryption is also known as ________.
4.4 ________ is the fastest media for data transfer.
4.5 A device that forwards data packet from one network to another is called a ________.
4.6 An Internet security suite is a collection of ________.
4.7 A Microprocessor development system and an ________ are essential tools for writing large assembly language programs.
4.8 ________ operate by screening packets to/from the Network and provide controllable filtering of network traffic.
4.9 Microsoft extension of word file is ________.
4.10 The logical addresses in the TCP/IP protocol suite are called ________ addresses.
Options ; Answer
A. SMTP B. doc C. Assembler D. Private encryption E. bits F. IP G. Compiler H. Switch I. Symmetric encryption J. Utility programs K. Fiber Optic L. Internet M. Firewalls