Material Content for INTRODUCTION TO ICT RESOURCES July 2014

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

1.1 What characteristic of RAM memory makes it not suitable for permanent storage?

A) too slow

B) unreliable

C) it is volatile

D) too bulky

1.2 The circuit used to store one bit of data is known as

A) Register

B) Encoder

C) Decoder

D) Flip Flop

1.3 ________ Command is used to manipulate TCP/IP routing table.

A) route

B) ipconfig

C) ifconfig

D) traceroute

1.4 Which of the following is related to ipconfig in Microsoft Windows?

A) Display all current TCP/IP network configuration values

B) Modify DHCP settings

C) Modify DNS settings

D) All of the above

1.5 Ping command can

A) Measure round-trip time

B) Report packet loss

C) Report latency

D) All of the above

1.6 What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

A) Application

B) Host-to-Host

C) Internet

D) Network Access

1.7 What command is used to create a backup configuration?

A) copy running backup

B) copy running-config startup-config

C) config mem

D) wr mem

1.8 The total time to prepare a disk drive mechanism for a block of data to be read from is its

A) latency

B) latency plus transmission time

C) latency plus seek time

D) latency plus seek time plus transmission time

1.9 FTP Tool

A) Used to transfer data/files among computers on the Internet

B) Archie data/files

C) Copy file from

D) Delete from file Internet

1.10 Multi programming system is

A) A computer system that permits multiple users to run programs at same time

B) A computer system that permits run same programs at multiple time

C) A computer system that permits multiple Program to run programs at same time

D) None of the above

2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

2.1 Action implementing instruction’s meaning are a actually carried out by Instruction program.

2.2 The mainreasons to encrypt a file is to Secure it for transmission.

2.3 Linux is an operating system.

2.4 Relocatable programs can be loaded almost anywhere in memory.

2.5 A program in execution is called Procedure.

2.6 Simple Mail Transfer Protocol use for encryption files.

2.7 DVD is Memory Devices.

2.8 Printer can be shared in a LAN by many users.

2.9 PKZIP utility is used to encrypt or decrypt files.

2.10 The .DLL extension stands for Dynamic License Library file.

3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

QUESTION OPTION
3.1 Assembly language  A. MS-Office file extension
3.2 Process  B. uses alphabetic codes in place of binary numbers used in machine language.
3.3 Cache memory C. A program in execution is called
3.4 An assembler is D. Machine dependent.
3.5 .DOC E. Write Through technique is used in which memory for updating the data
3.6 An assembly language is a F. Numbers of programs processed by it per unit time
3.7 Virtual memory is G. Data Compression Software
3.8 Throughput of a system is H. used in all major commercial operating systems
3.9 Bootstrap loader I. Volatile Storage
3.10 FTP J. File Transfer protocol
  K. low level programming language
  L. is executed when a system is first turned on or restarted
  M. Operating System

4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

4.1 SMTP Protocol used for transferring message between end user & ________.

4.2 Shell is the exclusive feature of ________.

4.3 Cache memory acts between CPU and ________.

4.4 ________ in an Operating System similar to Unix.

4.5 ________ in Programmable Read Only Memory.

4.6 The logical addresses in the ________ protocol suite are called IP addresses.

4.7 ________ is the time required by a sector to reach below read/write head.

4.8 ________ register keeps track of the instructions stored in program stored in memory.

4.9 ________ are present in the network to interconnect the LAN with WANs.

4.10 ________ in Wide Area Network connecting for located computers.

Options ; Answer

A. PROM B. LINUX C. Assembler D. Private encryption E. PC (Program Counter) F. WAN G. Router H. TCP/IP I. Symmetric encryption J. UNIX K. RAM L. Mail Server M. Latency Time

View More Material

Share