TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “OMR” answer sheet supplied with the question paper, following
instructions therein. (1x10)
one and enter in the “OMR” answer sheet supplied with the question paper, following
instructions therein. (1x10)
1.1 SMPS means
A) System Management Power Supply
B) Synchronous Mode Power Supply
C) Switched Mode Power Supply
D) Sequential Mode Power Supply
1.2 A circuit switch
A) has large buffers to hold data before forwarding
B) can switch data based on the incoming frequency
C) can interconnect shared links
D) needs to be programmed prior to data transfer
1.3 The ‘Taskbar’ in windows will
A) Show you all the programs you currently have open
B) Show you only the programs you used the last two times you were on the computer
C) Show you every program you've ever used on the computer
D) Show you only those programs you have installed on the computer
1.4 Virtual Memory is part of
A) RAM
B) ROM
C) HARD DISK
D) PROM
1.5 What can a computer virus do?
A) Kill the mouse
B) Change how your computer operates
C) Spoil hard disk
D) Backup your data
1.6 Telnet is a
A) Network of Telephones
B) Television Network
C) Remote Login
D) Remote Copy
1.7 A file with extension of ‘zip’ indicates
A) a folder
B) a backup file
C) an encrypted file
D) a compressed file
1.8 Press ______ to open the windows task manager.
A) Shift + Ctrl + Esc
B) Ctrl + Alt + Esc
C) Ctrl + Alt + Delete
D) Shift + Ctrl + Delete
1.9 IPv4 address contains ________ bits.
A) 4
B) 32
C) 12
D) 8
1.10 Ping command can
A) Measure round-trip time
B) Report packet loss
C) Report latency
D) All of the above
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
2.1 In the OSI model, mail service is application layer service.
2.2 Image files cannot be compressed on Windows.
2.3 Dot Matrix printer is non-impact type printer.
2.4 The maximum segment length on a 10BaseT network is 100 meters.
2.5 Deleting a program from the Program Files folder on the C drive is the best way to remove a program from the system.
2.6 In Peer-to-Peer network, each computer runs both client and server software..
2.7 UDP is connection-oriented protocol.
2.8 When you copy a file to another location, the original file is deleted.
2.9 Guest login name cannot be changed.
2.10 The number of IP addresses in Class C block is 256.
2.2 Image files cannot be compressed on Windows.
2.3 Dot Matrix printer is non-impact type printer.
2.4 The maximum segment length on a 10BaseT network is 100 meters.
2.5 Deleting a program from the Program Files folder on the C drive is the best way to remove a program from the system.
2.6 In Peer-to-Peer network, each computer runs both client and server software..
2.7 UDP is connection-oriented protocol.
2.8 When you copy a file to another location, the original file is deleted.
2.9 Guest login name cannot be changed.
2.10 The number of IP addresses in Class C block is 256.
3. Match words and phrases in column X with the closest related meaning/word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
SR NO. | X | Y(Ans.) |
1 | PKZIP | Data Compression Software |
2 | Trojan | A type of malicious program |
3 | Windows file loads applications that run when Windows open | Taskmgr.exe |
4 | RAID | |
5 | Gateway | |
6 | ppt | |
7 | CAT 5 | |
8 | Icon | |
9 | Simplex communication | |
10 | fastest media for data transfer |
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “OMR” answer sheet supplied with the question paper,following instructions therein. (1x10)
A. Nero
B. Authentication
C. .doc
D. TCP
E. Ring
F. FTP
G. Topology
H. dlt
I. Mesh
j. DLL
K. BOOT
L. TCP/IP
M. NIC
4.1 ________ is CD burning software.
4.2 ________ provides full transport layer services to applications.
4.3 A ________ is a description of the layout of area covered by a network.
4.4 The verification of your login name and password at the end of the boot process is called ________.
4.5 ________ extension stands for Dynamic Link Library file.
4.6 ________ is an adapter card used to send and receive signals on a network.
4.7 One of the extensions of Microsoft Word file is ________.
4.8 The logical addresses in the ________ protocol suite are called IP addresses.
4.9 The power-on self-test compares its results to the information stored in CMOS before proceeding with the ________ process.
4.10 ________ topology uses token passing.
B. Authentication
C. .doc
D. TCP
E. Ring
F. FTP
G. Topology
H. dlt
I. Mesh
j. DLL
K. BOOT
L. TCP/IP
M. NIC
4.1 ________ is CD burning software.
4.2 ________ provides full transport layer services to applications.
4.3 A ________ is a description of the layout of area covered by a network.
4.4 The verification of your login name and password at the end of the boot process is called ________.
4.5 ________ extension stands for Dynamic Link Library file.
4.6 ________ is an adapter card used to send and receive signals on a network.
4.7 One of the extensions of Microsoft Word file is ________.
4.8 The logical addresses in the ________ protocol suite are called IP addresses.
4.9 The power-on self-test compares its results to the information stored in CMOS before proceeding with the ________ process.
4.10 ________ topology uses token passing.
PART TWO
(Answer any FOUR questions)
5.
a) Write detailed steps to install motherboard with details of the configuration used. Clearly write the precautions to be used for installation. Also how will you educate the customer for using licensed version of the software only, write three benefits of licensed software?
b) Write about Uninterrupted Power Supply. Why it is important to have UPS? Write five factors to keep in mind while designing for a power supply to a lab of 50 computers.
(10+5)
6.
a) How do you create and use compress (zipped) folders in Windows Operating System?
b) How do you change System Date and Time in Windows Operating System? Explain how can you restrict unauthorized change?
c) Explain System Restore functionality of Windows Operating System. Write steps to restore registry of Windows System. Why is registry important?
(5+5+5)
7.
a) What is the difference between LAN, MAN and WAN? What are the advantages of Coaxial Cable and Optical Fiber?
b) What is IP addressing scheme? Explain class C addressing scheme with example? How many IP numbers are possible in a Class B network using IPv4 addressing scheme. Give an example of one Class B network in the form of net id and subnet mask.
(5+10)
8.
a) Explain the creation of user and group in Windows Server Operating System. What do you understand by roles assigned to user?
b) How to Share Files and Folders Over a Network for Workgroups in Windows Server Operating System?
(7+8)
9. Explain the following:
a) Backup and Restore operations in context of PC troubleshooting
b) Deletion and Removal of Virus infected files from a compressed file and role of Antivirus definitions
c) Hub, Switch, Bridge, Router and Gateway
(5+5+5)
a) Write detailed steps to install motherboard with details of the configuration used. Clearly write the precautions to be used for installation. Also how will you educate the customer for using licensed version of the software only, write three benefits of licensed software?
b) Write about Uninterrupted Power Supply. Why it is important to have UPS? Write five factors to keep in mind while designing for a power supply to a lab of 50 computers.
(10+5)
6.
a) How do you create and use compress (zipped) folders in Windows Operating System?
b) How do you change System Date and Time in Windows Operating System? Explain how can you restrict unauthorized change?
c) Explain System Restore functionality of Windows Operating System. Write steps to restore registry of Windows System. Why is registry important?
(5+5+5)
7.
a) What is the difference between LAN, MAN and WAN? What are the advantages of Coaxial Cable and Optical Fiber?
b) What is IP addressing scheme? Explain class C addressing scheme with example? How many IP numbers are possible in a Class B network using IPv4 addressing scheme. Give an example of one Class B network in the form of net id and subnet mask.
(5+10)
8.
a) Explain the creation of user and group in Windows Server Operating System. What do you understand by roles assigned to user?
b) How to Share Files and Folders Over a Network for Workgroups in Windows Server Operating System?
(7+8)
9.
a) Backup and Restore operations in context of PC troubleshooting
b) Deletion and Removal of Virus infected files from a compressed file and role of Antivirus definitions
c) Hub, Switch, Bridge, Router and Gateway
(5+5+5)
Post a Comment
Leave a Reply