/> M4.3-R4 : INTRODUCTION TO ICT RESOURCES JAN 2020

M4.3-R4 : INTRODUCTION TO ICT RESOURCES JAN 2020


M4.3-R4 : INTRODUCTION TO ICT RESOURCES JAN 2020

TOTAL TIME: 3 HOURS TOTAL MARKS: 100


(PART ONE – 40; PART TWO – 60)
PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “OMR” answer sheet supplied with the question paper, following
instructions therein. (1x10)



1. Whare is POST located?
A) DRAM
B) Hard-Drive
C) RAM 
D) ROM

2. The GSM network is divided into three major systems namely:
A) SS, BSS, OSS
B) BSS, BSC, OSS
C) SS, CELL, MSC 
D) Network Layer

3. Which of the following platforms do CHKDSK run on?
A) Windows Mac OS X and Linux
B) Windows 2000,  Windows XP, Windows Vista, Windows 7 and Linux
C) Microsoft Windows, Linux, Mac OS X,
D) MS-Dos and NT-based versions of Windows

4. If  a PC freezes or behaves otherwise erratically, and the system unit is very quiet, the most likely cause is: 
A) A virus has infected the system
B) The hard-drives is almost out of space
C) The CMOS-RAM is failing
D) The power-supply fan has failed and the system is overheating

5.  ________ refers to the structure or format of the data, meaning the order in which they are presented.
A) Semantics
B) Syntax
C) Timing  
D) All of the above

6. Communication between a computer and a keyboard involves  ________ transmission.
A) Automatic
B) Half-duplex
C) Full-duplex
D)Simplex

7. Which organization has authority over interstate and international commerce in the communications field?
A) ITU-T
B) IEEE
C) FCC 
D) ISOC

8. The OSI layer that arranges signals into logical units of information called frames.
A) Transport
B) Physical
C) Data-link 
D) Application

9. Press  ________ to open the windows task manager.
A) Shift + Alt + Ctrl
B) Ctrl + Alt + Esc
C) Ctrl + Alt + Delete
D) Shift + Ctrl + Delete


10. In CSS, What is the correct option to select all the tags on a page?
A) # p{}
B) p {}
C) .p{}
D) None

2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

2.1 Default port number for Web Server is 80 
TRUE

2.2 The model that file-sharing normally uses is 2-way sharing
TRUE

2.3 The destination address is used by the host on the network to determine whether the packet or frame is intended for them or for other hosts.
TRUE

2.4 The range of IP addresses in Class B is 192-223.
FALSE

2.5 You can prevent spyware from accessing your computer by keeping your computer password protected.
TRUE

2.6 A barcode reader has used an input device.
TRUE

2.7 The method used to transfer information to far off places instantly is called telecommunication.
TRUE

2.8 Malware is software that is available for use at a low monetary cost.
FALSE

2.9 LAN Switch works on the data link layer.
TRUE

2.10 1 GB is equal to 1050 megabytes.
FALSE

3. Match words and phrases in column X with the closest related meaning/word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)


Sr.No.
x
Y (Ans.)

Port address
16-bit length

ARP
Datalink layer

NetBEUI
NetBIOS

Transmission media are directly controlled by the
Physical Layer

Dot Matrix
Impact printer

WMA
Windows Media Audio

Date
Set date in DOS system

Telnet
User command

TPC uses
Congestion avoidance algorithm

A utility that removes unnecessary files from a slow-running hard drive
Disk cleanup

4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

A. Verification
B. Application Layer 
C. Recycle Bin
D. Register
E. Nero
F. NSLOOKUP
G. Server
H. McAfee 
I. Tab
J. Authentication 
K. traceroute
L. Presentation Layer
M. Tracert

4.1 The verification of your login name and password at the end of the process is called                      ___Authentication______.

4.2 ____Register_______ is a faster memory then RAM.

4.3 A  computer that provides services to other computer programs on the same computer or other computer is a ___Server______.

4.4 ____Tracert_______ is a command-line utility that you can use to trace the path that an Internet Protocol (IP) packet takes to its destination.

4.5 _____Application Layer_____ is an abstraction layer that specifies the shared communications protocol and interface methods used by hosts in a communications network.

4.6 ____Tab____ is used to select one hyperlink after another during a slide presentation in Power-point.

4.7 ___Nero_____ is a CD burning software.

4.8 Deleted files can be retrieved from. Recycle Bin

4.9 _____McAfee____ is a type of antovirus programe

4.10 _____traceroute_____ command is network utility programe used to obtin information about internet servers.

PART TWO /
(Answer any FOUR questions)
5
a) Explain the basic architecture of the computer system, What is the basic functionality of a          motherboard? 
b) What is the transmission medium? Explain the types of transmission mediums.
(7+8)

6
a) Explain the Client/Server method of computing with an example.
b) Explain the types of storage devices.
(7+8)

7
a) Explain the functionality of Data Compression utility.
b) Explain the geometry of hard disk drive.
c) What is IP addressing scheme? Explain the class C addressing scheme with example.
(5+5+5)

8
a) How lost file can be recovred in Windows OPerating System?
b) What is Defragmentation of hard disks? What is the advantage of it?
c) How can user configure IP adress in a Desktop Computer
(5+5+5)

9
a) Explain System Restore functionality of Windows XP.
b) How to format primary and secondary hard disks by using the DOS Operating System?
c) Explain static routing?
(5+5+5)



- o O o -

0/Post a Comment/Comments

Leave a Reply

Previous Post Next Post