Sie sind auf Seite 1von 49

LESSON 7A

NETWORKING BASICS
MULITIPLE CHOICE QUESTIONS

1. ____________ includes all the computers and devices in a department, a building or multiple buildings spread
over a wide geographical area such as city or even a country.
Network

2. If you connect computers together to communicate and exchange information, the result is called a _________
Network
3. A _________ is a way to connect computers for communication, data exchange and resource sharing
Network
4. ___________is a set of technologies including hardware, software and media that can be used to connect
computers together enabling them to communicate exchange of information and sharing resources in real time.
Network
5. _____________is a central computer with a large storage device and other resources that all users can share.
Network Server
6. If the server stores date files for users to access, it is commonly called a __________File server
7. Under a ______________ , business buys a single copy of an application and then pays the developer for a
license to copy the application onto a specified number of computers.
OR
Under a _____________, each user has a complete, individual copy of the program running on his or her PC, but the
business generally pays less money than it would by purchasing a complete copy of the software for each user.
Site Licenses
8. In a ______________ of software, only one copy of the application is stored on the server, with a minimum
number of supporting files copied to each user’s PC. Network Version
9. The network server is also called an _____________because it handles some application processing as well as
storage. Application server
10. The ability to share ____________ is one of the best reasons for small businesses to set up a network
Peripheral devices
11. ________________ and _______________ are the two common ways to share a printer.
Connection of printer directly to a network
Attachment to a print server
12. ______________ is a computer that manages one or more printers. Print Server
13. ___________ is a system for exchanging written messages through a network E-mail
14. A ______________ is any kind of multiway communication carried out in real time using telecommunications
or computer networks and equipmentTeleconference
15. ________________enables real-time communication over a distance by allowing people to connect to two or
more sites to communicate with each other by seeing a video picture of the people at the other sites.
Videoconferencing
16. CODEC means ______________ which processes the audio and video Compressor/Decompressor
17. The effect known as ______________ aims to create a sense of person at a distant site appearing to be there in
the same room
Virtual Presence
18. ______________ provides an audio link similar to that of a conventional telephone, except that it offers much
higher-quality audio and enables more than two sites to be linked together. Audio-Conferencing
19. ______________enables participants at two or more sites to have a shared workspace on their computer
desktops Data-Conferencing
20. _____________system bypass the need for the cost of regular telephone service by using the company’s
internal network to send and receive phone calls.
Voice over Internet Protocol (VoIP)
21. IP means ______________ Internet Protocol
22. POTS means ______________ Plain Old Telephone Service
23. _____________ gateways allow phone calls to jump the gap between the POTS and the Internet.
POTS gateway
24. ____________________ is a data communication system consisting of several devices such as computers and
printers and that are relatively near to each other and are physically connected using cables, infrared links, or wireless
media. Local Area Networks (LANs)
25. Any network that exists within a single building, or even a group of adjacent buildings is considered a
_____________ Local Area Networks (LANs)
26. ____________ is two or more LANs connected together generally across a wide geographical area.
WANs (Wide Area Networks)
27. The remote LANs are connected through a telecommunication network or via the provider known as
______________ Internet Service Provider (ISP)
28. CANs means____________ Campus Area Networks
29. With a ___________, different campus offices and organisations can be linked together
Campus Area Network (CAN)
30. MANs means _____________ Metropolitan Area Networks
31. The ______________ network is a large scale network that connects multiple corporate LANs together.
Metropolitan Area Networks (MANs)
32. A __________________ is a network contained within a user’s home that connects a person’s digital devices,
from multiple computers and their peripheral devices, such as a printer, to telephones, VCRs, DVDs, televisions,
video games, home security systems, “smart” appliances, fax machines, and other digital devices that are wired into
the network.
Home Area Networks (HANs)
33. The company’s internal version of the Internet is called an _____________ Intranet
34. ____________ are becoming a popular method for employees to exchange information using the company’s
Web site or e-mail while travelling or working from home. Extranets
35. A ________ is processing location that can be a PC or some other device such as a networked printer.
Node
36. A popular type of server-based network where individual computers share the processing and storage
workload with a central server. Client/Server Networks
37. In a ________________network, all nodes on the network have equal relationships to all others, and all have
similar types of software that support the sharing of resources. Peer to peer network (P2PN) or Work Group
38. Which among the following client operating systems feature built-in support for peer to peer networking
Windows 9x
Windows 2000 Professional
Windows Me
Windows XP
Macintosh OS
All of the above
(f) All of the above
39. Usage of company’s computers for personal or recreational purposes instead of work is known as
_____________ Cyberslacking

40. _____________is one of the benefits of using a Network Peripheral Sharing


41. If a server stores data files for users to access, it is commonly called a _____________ File Server
42. A ____________ generally does not connect to the public environment using phone or data lines.
LAN
43. A network which is present within the user’s home and can be used to connect a person’s digital devices is
called a __________. HAN
44. Which network has the distinguishing character of management and control point of access to shared resources
such as files and printers Peer to Peer Network
45. Which among the following tools are used to combat Cyberslacking?
(a)Web Filters
(b)Proxy Servers
(c)Packet Sniffers
(d)Surveillance Software
(e)All of the above
(e)All of the above
46. ____________ software enables companies to block employee access to certain Web sites Web Filters
47. A type of software which enables managers to review an employee’s Internet activities in real time.
Surveillance Software
48. A type of software which is configured to trap network traffic that is coming from or configured to trap
network traffic that comes from unauthorised source. Proxy Servers
49. ____________ examines all packets being transmitted over a network Packet Sniffers
50. A program that actually captures each keystroke as the user types and directs the keystroke to a hidden file on
the user’s disk or network Keystroke capturing
51. With computer networks, _________ refers to the means used to link a network’s nodes together Media
52. Network Media can be classified into 2 categories they are _________ and __________
Wire-based and Wireless media
53. _________ consists of four pairs of wires twisted around each other and bound together in a layer of plastic.
Twisted-pair cable
54. UTP means _______________ Unshielded twisted-pair
55. Some twisted pair wire is encased in a metal sheath and therefore is called ___________
Shielded Twisted-pair (STP)
56. Twisted pair wire support transmission speeds up to ________. 1 Gbps
57. Co-axial cable has ________ number of conductors and can support transmission speed up to _______Mbps
2 conductors and 10 Mbps
58. A ____ is a thin strand of glass that transmits pulsating beams of light rather than electric current and can carry
a billion bits per second and is immune to electromagnetic interference
Fibre optic cable
59. Fibre optic cable has a transmission speed of __________ 100 Gbps
60. _____ use radio or infrared signals that travel through the air (ether) for transmitting data Wireless Media
61. __________ can use radio signals to transmit data between nodes in a building.
Office LANs
62. ___________ network use microwave transmission to connect LANs within the same metropolitan area
Corporate WANs
63. WANs covering long distances often use __________ and ___________ communication
Satellites and Microwave Communication
64. Each computer on the network needs a hardware component to control the flow of data. The device that
performs this function is called the ___________.
Network Interface Cards (NICs) / Network Adapter Card/ Network Card
65. In case of a _________, there will not be a port, an antenna will be showing, or a light will indicate that an
internal antenna is activated. Wireless NIC
66. __________ works with the operating system and tells the computer how to use the NIC. Network Software
67. The _______ accepts a network cable, which physically attaches the computer to the network.
Network Interface Card
68. A linking mechanism which is needed to interconnect two computers using a network cable is known as
__________ Crossover cable
69. A _________ is a device that learns which machine is connected to its port by using the PC, printer, or other
devices’ IP address. Switches
70. A ________is a device that connects two LANs or two segments of the same LAN. Bridges
71. A ________is a complicated device that stores the routing information for networks Routers
72. Routers allowing multiple LANs to be interconnected by linking each LAN’s switches together. This is called
an ______ Uplink
73. ____________table hides the company’s internal node IP addresses from the Internet
NAT (Network Address Translation)
74. To create a connection between different types of networks a _________ is needed Gateway
75. A _______ is a node on a network that serves as an entrance to another network Gateway
76. In the small business or home network, the _________ is the device that routes data from a local PC to an
outside network such as the internet Gateway
77. DHCP means ________________
Dynamic Host Control Protocol (Dynamic Addressing)
78. ___________ equipment is designed to work with a certain kind of network topology, and each one has certain
standard features. Cabling equipment
79. ____________ are those who spend a great deal of time mapping the Internet; that is, trying to identify as
many vulnerable computers as they can Malicious hackers / crackers
80. A _________ is a hardware and/or software tool that prohibits unauthorised access to a network, especially
over the Internet Firewall
81. ISP means _________ Internet Service Provider
82. Network media are compared by the amount of data they can carry the factor commonly referred to as
____________ Bandwidth
83. A Category 5 (Cat 5) cable, can carry data ________meters without attenuation upto 100 meters
84. Is the following statement true or false?
The higher a medium’s bandwidth the more data it can transmit at any given time. - True
Bandwidth is expressed in cycles per second (Hertz) or in bits per second - True
85. With Cat 5 Cable, data can move at a speed up to ________100 Mbps
86. The most popular implementation of Ethernet which uses the star topology and twisted pair wires and can
achieve transmission speeds up to 10 Mbps 10 Base-T
87. The original implementations of Ethernet used coaxial cable and were called _________ and _________
10 Base-5 and 10 Base-2
88. 10 Base –T makes use of an access method called ___________
Collision Detection (CD) / Carrier Sense Multiple Access (CSMA)
89. The most commonly used network technology is the ___________Ethernet
90. The type of network that commonly uses the Category 5 network cable or Category 6 cable and can achieve
transmission speed of up to 100 Mbps where topology is similar to Ethernet but NIC used is different.
Fast Ethernet (100 Base-T)
91. __________ is a version of Ethernet technology that supports data transfer rates of one gigabit per second
Gigabit Ethernet (1000 Base - T)
92. The _________protocol can allow a network administrator to back up 2 TB (terabytes) of data in about 27
minutes The Ethernet Protocol
93. The controlling hardware in a __________network transmits an electronic token – a small set of data- to each
node on the network many times each second if the token is not already in use by a specific node.
Token Ring
94. The transmission rate of Token Ring network is now up to __________ 100 Mbps
95. __________ is primarily used to connect two or more LAN’s with each other, often over large distances
Fiber Distributed Data Interface (FDDI)
96. A _________or a ________ is used for linking an FDDI network with a local area network (LAN)
Router or Switch
97. Which of the character is true for FDDI?
Fibre optic cable is used
Media accessing method – Token passing
Speed – 100 Mbps
Maximum length of network – 100 kms
Maximum number of nodes on the network – 500
98. ___________ has the capability of transferring the data at a speed of 155 Mbps or even higher in the form of
small packets which are of a fixed size.
Asynchronous Transfer Mode (or ATM)
99. ATM makes use of ___ topology and uses both twisted pair cables and fiber optic cables
Star Topology
100. The logical layout of the cables and devices that connectthe nodes of the network is known as
_____________ Topology
101. Network topology can be either _________ or _________ Logical and physical topology
102. In a ________ topology, there is actual transfer of the data in the network as per its design plan.
Logical Topology
103. In a ________topology, the physical design of a network which consists of location, devices and the cable
installation is referred. Physical Topology
104. Data moves through the network in a structure. These are also pieces of a message broken down into small
units by the sending PC and reassembled by the receiving PC _______ Packets
105. ________ and ________ are the two parts of the packet Header and payload
106. ________ is the first part of the packet, which contains information needed by the network Header
107. The _________ is the actual data that is being transmitted between the two nodes. Payload
108. In the Internet environment, packets are called __________ Datagrams
109. Why is network topologies important ?
Appropriate topology for the organisation’s needs, will move data packets as efficiently as possible
Network topology plays a role in preventing collisions, which is what happens when multiple nodes try
to transmit data at the same time. Their packets can collide and destroy each other.
110. In a ___________network, one cable connects all the devices together in a series
Bus topology
111. A special device, called a ________, is attached at the cable’s start and end points, to stop network signals so
they do not bounce back down the cable Terminator
112. In a _________ topology, all nodes are connected to a hub or Switch and communicating through it.
Star topology
113. Some hubs known as __________ can monitor traffic and help prevent collisions Intelligent hubs
114. In a star topology, will a broken connection between a node and the hub affect the rest of the network? No
115. In a _____ topology there is a linked circular chain with each node connected to the next
Ring topology
116. If the data – known as a _______ is not addressed to the node examining it, that node passes it to the next
node. Token
117. In a ________ topology, all nodes are connected to each Other or a cable runs from every computer to every
other computer Meshed network
118. _________ topology connects groups of workstations to a linear bus backbone cable or it is a combination of
the characteristics of a star topology and a bus topology. Tree topology / hierarchical topology
119. ___________ topology is a combination of two or more Topologies Hybrid topology
120. _________ and ________ are examples of hybrid network Star-bus network and star-ring network
121. In a _________ network, two or more star topologies are connected using a bus trunk that act as the backbone
of the networkStar-bus network
122. In a _________ network, two or more star topologies are connected as a centralised hub using a multi-station
access unit (MAU) Star-ring network
123. ________ is an agreed upon format for transmitting data between two devices Protocols
124. ________,________ and _________ are protocols
TCP/IP, NetBIOS/NetBEUI, or IPX/SPX protocols
125. ________ is the protocol of the Internet and is required on any computer that must communicate across the
Internet. TCP/IP (the Internet Protocol)
126. __________ is the default networking protocol of Windows 2000 Professional (Client) and Server Editions,
Windows XP, Windows Server 2003, and many other operating systems TCP/IP
127. A proprietary protocol of Novell, _______ has been used in most versions of the Net Ware network operating
system for networking offices throughout the world.IPX/SPX
128. A relatively simple protocol that has no real configurable parameters, _____________ sends messages to
every computer that can receive them and also an excellent protocol for networking small offices or homes, but it does
not expand well into larger environments.
NetBIOS / NetBEUI
129. _________ is a standard ISO model for distributed applications and networking protocols
OSI (Open System Interconnection)
130. How many layers are there in an OSI model? 7
131. Layer 7 is known as _______ Application Layer (end-user services like e-mail)
132. Some examples of network applications are ______,______,______, _______ and _____
DNS, NIS, Mail, telnet, frp, NFS
133. Layer 6 is known as ________ Presentation Layer (Compression and encryption)
134. Layer Five is Known as _________ Session Layer (Formatting the data)
135. Layer Four is known as __________
Transport Layer (fragmentation and reassembly of messages delivered between the hosts in a network)
136. Layer Three is known as _________
Network Layer (Usage of routers for transferring data throughout the network)
137. Layer Two is known as __________
Data Link (All the communications which happen between adjacent nodes in the network are
established in the Data Link Layer)
138. Layer One is known as _________
Physical Layer (bit level transmissions happening between the nodes in a network are established in
the Physical Layer. Information regarding type of cables, type of connectors, pin-outs and voltages are
defined in this layer)
139. Many networks are built around a central computer called a ________, which provides storage and other
resources that users can share.
Server
140. A __________ consists of computers that are relatively close to one another, it can have a few PCs or
hundreds of them in a single building or several buildings
LANs (Local Area Networks)
141. A _________ results when multiple LANs are connected through public utilities such as phone lines or
microwave systems.
WANs (Wide Area Networks)
142. Many networks are built around a (a)________. The PCs And other devices that connect to the server are
called (b)__________
(a)Central Server (b)Nodes
143. In a __________, the server provides storage and file-sharing services for the nodes
File Server network
144. ___________is a server that is used to run applications from a centralised location on the network to free up
resources on the nodes.
Application server
145. In a _________ network, nodes and the server share the storage and processing tasks
Client / server network
146. A ____________network is a small network that usually does not include a central server. Users can share
files and resources on all the network’s nodes.
Peer – to – Peer Network
147. A __ is the physical layout of the cables and devices that connect the nodes of a network.
Topology
148. When used in the context of networks, the term _______ refers to the wires, cables, and other means by which
data travels from its source to its destination Media
149. The performance of network media is measured by the amount of data they can transmit each second. This
value is called _________. Bandwidth
150. A _________ is an agreed-upon format for transmitting data between two devices.Protocol
151. A _______ is a network of computers that serves users located relatively near each other. LANs
152. The physical layout of wires and devices that connect the network’s nodes is called the network’s _________
Topology
153. In a bus topology network, a special device called ___ is placed on each end of the cable. Terminator
154. A _________ is a thin strand of glass that transmits pulsating beams of light at speeds that approach 100 Gbps.
Fibre Optic Cable
155. A _________ is the device that is added to a PC that allows it to connect to a LAN
NIC (Network Interface Card)
156. A centralised computer that allows multiple remote users to share the same printing device is referred to as a
__________ Print Server
157. __________ cables have two conductors: one is a single wire in the center and the other is a wire mesh shield
that surrounds the first wire. Co-axial Cable
158. A _________ is a popular device used to connect a LAN. It substantially reduces broadcast traffic.
Switches
159. High-end peer-to-peer networks allow for _______. This lets users access the power of multiple computers to
process programs such as 3-D illustration software. Distributed computing
160. A ________ is a device which is used for connecting two LANs or two segments of the same LAN.
Bridge
161. Companies store data on a network server because it is ________
Easier to track changes made to important data
162. In a ________ network, all devices are connected to a device called a hub and communicate through it
Star Topology
163. A solution that connects users’ computers to a central network server that enables them to share programs is
called __________
Network version programs
164. When software is stored and run from a centralised location, the computer containing such software is called a
___________ Application server
165. A _________is an agreed –upon format for transmitting data between two devices. Protocol
166. _________ means any kind of multiway communication carried out in real time using telecommunications or
computer network equipment.
Teleconferencing
167. A_________ is two or more LANs connected together, generally across a large geographical area.
WAN
168. An extranet is like an intranet except that it allows company employees across to corporate Web sites from the
_________ Internet
169. A ________ is a type of network usually found where students and school administrators have a need to share
files across several buildings.
CANs (Campus Area Network)
170. An arrangement where user accounts are centralised on a server and PCs gain access to network resources by
accessing this server is called a _______ Client / Server Network
171. A central computer with a large storage device and other resources which can be shared by all users is called a
_______ server. Network
172. In data-conferencing, participants can share a ________where they can draw, write or import images.
Whiteboard
173. POTS _________ allow phone calls to jump the gap present between the POTS and the Internet.
POTS gateways
174. _____________ is an example of hybrid network HAN
175. __________ is a processing location which can be a PC or some other device such as a networked printer.
Node.

*******************************************
LESSON 7B
DATA COMMUNICATION
MULITIPLE CHOICE QUESTIONS

1. Data communications over a media (such as cables or wireless links) that is specifically set up for the
network, thus are known as __________ Dedicated Media
2. The alternative to using dedicated media is to use the telephone system called __________ for data
communication. Plain old telephone system (POTS)
3. The telephone system was originally designed to carry voice messages, which are _____ Analog signals
4. The world’s largest network is the _________ Internet
5. Attaching a computer to an analog telephone line requires a __________ Modem
6. A device called a ________is needed to translate the digital signals into analog signals that can travel over
standard telephone lines. Modem (modulator-demodulator)
7. In the ________ phase, the modem turns the computer’s digital signals into analog signals, which are then
transmitted across the phone line. Modulation Phase
8. In the ________ phase, as the modem receives analog signals from the phone line and converts them into
digital signals for the computer. Demodulation Phase
9. A modem’s transmission speed is measured in __________ Bits per second (bps)
10. The fastest modems for dial-up connections on standard phone lines have a maximum theoretical transmission
speed of ___________ 56,ooo bits per second or 56 kilobits per second (Kbps)
11. An ________ modem plugs into one of the computer’s expansion slots Internal modem
12. Modems and communication software use __________ protocols to recover from transmission errors and this
protocol enables a modem to detect errors in the data it is receiving and to request that error-ridden data be resent
from its source. Error-correction protocol
13. An _________ modem is a box that houses the modem’s circuitry outside the computer.
External Modem
It connects to the computer using a serial, USB or FireWire port, and connects to the telephone system with a
standard telephone jack.
14. Most modems used with personal computers also can emulate a fax machine called _________.
Fax modems
15. Those workers who work at a remote location rather than their employer’s office are called ____
Telecommuters
16. Which among the following are the checklist of a telecommuter
A Reliable Computer
Data Communications Media
Faxing Alternatives
Wireless Communications
Service Accounts
All of the above Ans. All of the above
17. If a person use a computer to send file to another person’s computer , that person is said to be_________.
Uploading the file
18. If a person use a computer to copy a file from a remote computer, that person is said to be _________
Downloading the file
19. A file to be transferred from one computer to another through a pair of modems, both computers must use the
______________protocol. Same file transfer protocol
20. Which among the following are the commonly used file transfer protocols:
Kermit
Xmodem
Ymodem
Zmodem
MNP
All of the above
Ans: All of the above
21. The term modem is short for _________ Modulator/demodulator
22. If a modem detects an error in data it has received from another computer, it can request that the data be
________. Resent
23. An _________ modem is similar to a circuit board and can be plugged into one of the computer’s expansion
slots. Internal modem
24. _________ transmit analog signals in which sound is translated into an electrical current.
Standard Telephone Lines
25. ___________ is needed to translate data into a form that can be sent over telephone lines Modem
26. The term ____________ is used to describe any data connection that can transmit data faster than is possible
through a standard dial-up connection using a modem. Broadband
27. ISDN means _____________ Integrated Services Digital Network
28. Examples of ISDN includes the following: TI, T3, DSL, cable modems, ATM
29. _______________ connection combines two 64 Kbps data channels and one 19 Kbps error-checking channel.
Basic Rate Integrated Services Digital Network (Basic Rate ISDN) or (BRI)
30. In the United States, a _________ connection provides 24 channels at 64 Kbps each for a total bandwidth
increase of 1.544 Mbps. This level of bandwidth is also known as ___________
Primary Rate ISDN (PRI)
Fractional T1 service
31. A __ offers 672 channels of 64 Kbps each (plus control lines) for a total of 44.736 Mbps. T3 line
32. A _________ system combines a typical cable television network with a wide area network, which is
connected to the internet. Cable Modem System
33. Which of the following are included in the various types of DSL:
Asymmetrical DSL (ADSL)
Rate Adaptive DSL (RADSL)
High-bit-rate DSL (HDSL)
ISDN DSL (IDSL)
Symmetrical DSL (SDSL)
Very-high-bit-rate DSL (VSDL)
All of the above Ans: All of the above
34. In a typical cable network, a facility called a _____ serves as the primary point where the television signals
enter the system through satellite and standard over-the-air broadcast means. “head-end”
35. ATM means ____________
Asynchronous Transfer Mode
36. ______________ is a protocol designed by the telecommunications industry as a more efficient way to send
voice, video, and computer data over a single network.
Asynchronous Transfer Mode (ATM)
37. To install ATM, the purchase of _________ for every networked device and ____________ is required.
Special Network Adapter Cards
Special Higher-Level switches
38. ____________ technology allows connectivity so that portable and handheld computers can move around
while being continuously connected to a network
Wireless Technology
39. The wireless standard that is becoming very popular follows the family of specifications called ___________
802.11 or Wi-Fi
40. The _________ standard describes specifications for wireless speeds up to 11 Mbps, which is a little faster
than the slowest form of Ethernet (10 Mbps) but much faster than the typical 1.5 Mbps high-end DSL connection.
802.11 b
41. The __________ standard describes specifications for wireless LANs that provide 20+ Mbps connection
speeds
802.11 g
42. To create a wireless LAN, a ___________ is needed. Wireless access point
43. In a wireless environment, single or multiple PCs can connect through a single ________
Wireless Access Point (WAP)
44. If the wireless network grows to handle more users, or expand its range, ______________ can be added.
Extension Points
45. The individuals responsible for managing a company’s network infrastructure are known as ______________.
Network Administrators
46. Those who are responsible for managing a team of information professionals, including network
administrators, software developers, project managers, and other staff are known as ___
Information System (IS) Managers
47. Those managers are responsible for setting up and maintaining Internet, Intranet, and extranet sites are known
as ___________
Data Communications Managers
48. Networks and especially home users, commonly transmit data across ____________lines
Telephone lines
49. _____________is better suited to data transmission. Analog lines or Digital lines?
Digital lines
50. To transfer digital data over analog telephone lines, computers must use _________Modem
51. Modem transmission speeds are measured in __________. Bits per second (bps)
52. Using _________ connections, businesses and homes can transmit data many times faster than is possible over
standard phone lines Digital Connections
53. ______________ is adapted for transmitting high-volume data files such as audio, video and multimedia files.
ATM
54. _________ services offered by cable companies now offer Internet connections to homes and businesses
through the same lines that carry cable television services which can be as fast as T1 and some types of DSL services.
Cable modem services
55. Wireless technology follows a standard called __________
802.11
56. ____________standards describes specifications for speeds up to 11 Mbps wireless technology connections.
802.11b
57. _________ standards describes specifications for 20+ Mbps wireless technology connections.
802.11g
58. To gain access to an Ethernet LAN wirelessly, you need a __________ and a ___________ to be added to the
Ethernet LAN.
Wireless NIC and a wireless access point (WAP)
59. The process of copying a file from a remote computer onto your computer is called ____
File Transfer or downloading
60. The process of sending a file to another user’s computer over a network is called ______ Uploading
61. A modem’s transmission speed is measured in __________ bps (bits per second)
62. A device that is added into an expansion slot that allows users to connect the PC to the telephone line is called
an _____________ Internal Modem
63. ____________ service is a good choice for businesses that need to transmit very large files, such as live audio
or video feeds.ATM
64. The term _________ describes any data connection that can transfer data faster than a standard dial-up
connection Broadband
65. Your telephone connects to an “old-fashioned” network, called the _________
POTS (Plain Old Telephone System)
66. Modems and communications software use ____________ protocols to recover from transmission errors.
Error correction protocol
67. _____________ is another name to describe 802.11 technology. Wi-Fi
68. In a PC, faxes can be exchanged with any other fax machine by using a __________ Fax Modem
69. You should consider ____________when purchasing a modem. Error correction and Transmission Speed
70. The abbreviation bps stands for ___________. Bits per second
71. ___________ service offers a total of 44.736 Mbps of bandwidth. T3
72. In a cable network, the ________is where the cable TV network connects to the Internet. Head end
73. If you want to connect to a remote network or the Internet using a modem, you need to connect the modem to
a __________.Analog Telephone Line
74. The expression Mbps stands for _______________ Megabits per second
75. The basic Rate ISDN service provides _____________
Two 64 Kbps data channels and one 19Kbps error-checking channel
76. A modem converts the computer’s digital data into analog signals in the _____________ phase of its operation
Modulation
77. A computer’s signal is digital, it consists of on/off pulses representing 1s and 0s
LESSON 9A
CONNECTING TO THE INTERNET
MULITIPLE CHOICE QUESTIONS
1. Connections, such as __________ must be initiated every time you desire Internet access.
Dial-up Connection
2. In many homes and small businesses, individual users connect to the Internet by using a telephone line and a
__________
Dial up modem (56 Kbps)
3. The _______________ maintains banks of modems at its facility to process the incoming dial-up requests
from customers and route traffic between customers’ computers and the Internet.
ISP server (Internet Service Provider)
4. In a ________connection, your computer uses its modem to dial a telephone number given to you by the ISP
Dial-up Connection
5. If an online server such as AOL or CompuServe is used, the service provides _______________ that dials the
connection for you.
Client Software
6. The high speed services are sometimes called __________ connections, because they use media that can
handle multiple signals at once, such as fibre optics, microwave, and other technologies.
Broadband Connection
7. To be considered broadband, the connection must be able to transmit data at a rate faster than is possible with
the fastest ___________ connection.
Dial-up connection(56 Kbps)
8. The ___________in Windows XP guides you through the process of configuring a dial-up or other type of
network or Internet connection
New Connection Wizard
9. ______________ is a digital telephone service that simultaneously transmits voice, data and control signalling
over a single telephone line.
Integrated Services Digital Network (ISDN) Service
10. An ______data connection can transfer data at up to 128,000 bits per second (128 Kbps).
ISDN
11. In remote parts of the world, ______________broadband services are used.
Satellite Communications
12. _______ service is similar to ISDN in its use of the telephone network, but it uses more advanced digital
signal processing and algorithms to compress more signals through the telephone lines.
DSL (Digital Subscriber Line) Services
13. Can DSL service provide simultaneous data, voice and fax transmissions on the same line?
Yes
14. Two most common type of DSL services are________.
Asynchronous DSL (ADSL) and Synchronous DSL (SDSL)
15. HDSL means ________
High-data-rate DSL
16. VSDL means
Very High-data-rate DSL
17. The abbreviation used to refer to DSL service in general begins with an ______ reflecting the variation of the
first character in the DSL versions.
X (xDSL)
18. The transmission speeds range from _________ for basic DSL Services
128 Kbps
19. The transmission speeds range upto ________ Mbps for high-end services.
8.448 Mbps
20. In a ________, the download speed is much faster than its upstream speed, while ______ provides the same
speed in each direction but is usually more expensive
ADSL
SDSL
21. _____________service is recommended for customers who must upload a great deal of data
SDSL
22. The transmission speed for DSL services vary greatly due to :
Distance
Wire and equipment type
Service Provider Capabilities
None of the above
All of the above
Ans: All of the above
23. _______ provides broadband communications between the customer and the phone company. From there,
customers access the Internet through the phone company network
DSL services
24. __________ modem provide fast data-transfer speeds at costs comparable to a standard ISP account.
Cable modem
25. Cable television companies now use a portion of their network’s bandwidth to offer Internet access through
existing cable television connections. This Internet connection option is called ____________.
Cable Modem Service
26. Cable television systems transmit data over _________ which can transmit data as much as 100 times faster
than common telephone lines.
Coaxial Cable
27. ____________cable allow transmission over several channels simultaneously – the Internet data can be
transmitted on one channel while audio, video and control signals are transmitted separately.
Coaxial Cable
28. Standards for software that acts as an interface between the applications and the network drivers. Such a
software interface is called an ___________
Application Programming Interface (API)
29. _________ is the name of an API for UNIX computers.
Sockets
30. _________ is an adaptation of Sockets for Microsoft Windows Operating systems.
Windows Sockets or Winsock
31. __________ make it possible to mix and match application programs from more than one developer, and to
allow those applications to work with each other and with any type of networking hardware.
Application Programming Interface
32. One can connect to the Internet through the following:
Cellular Networks
Wireless Wide Area Networks (WWANs)
Wireless LAN (WLAN)
Satellite
None of the above
All of the above
Ans: All of the above
33. A ___________ is a wireless digital network that extends over a large geographical area.
Wireless Wide Area Network (WWAN)
34. A ________ network receives and transmits data using radio signals over cellular sites and satellites, which
make the network accessible to mobile computer systems.
Wireless Wide Area Network (WWAN)
35. A _________ is a fully bidirectional wireless network capable of data transfer at speeds in excess of 100 Mbps
for a cost comparable with most DSL connections.
Wireless Wide Area Network (WWAN)
36. __________ offer connection speeds between 1 and 10 Mbps.
Basic Wireless Wide Area Network (WWAN)
A WWAN system requires an _______ tuned to receive the proper Radio Frequency (RF).
Antenna
37. This type of connection needs to be initiated every time the computer needs to access the Internet.
Dial-up
38. DSL service is provided by this type of organisation
Telephone company
39. Cable television systems send data over _____________
Coaxial cable
40. In ________ connection, your computer uses its modem to dial a telephone number given by the ISP.
Dial-up
41. _________ is a wireless network solution selected by the SACPD, offering TCP/IP connectivity from the base
station to patrol cars.
Radio Router
42. AVL software means __________
Automatic Vehicle Location (AVL)
43. ________ provides two way data communications between the customer and the Internet
Satellite Services
44. ___________ are suitable for large businesses and for small offices, cyber-cafes, and homes and also used by
armed forces, business and individuals for mobile communications.
Satellite Connections
45. When an individual or organisation contracts with an ISP for a satellite server, an earth-based communications
station is installed. The generic name for this station is ____________.
Very Small Aperture Terminal (VSAT)
46. VSAT includes two parts :
A transceiver and a modem-like device
47. A ________ travels from a VSAT, to a satellite, then back to earth to a large hub station where it is connected
to the internet.
Signal
48. Which of the following are network connections:
Broadband Connection
Dial – Up Connection
Ans: Both
49. _________ are very common now, and are based on a technology that is often referred to as Wi-Fi
Wireless LANs
50. Wi-Fi means _________
Wireless Fidelity
51. The distance covered by a Wireless LANs is usually measured in _____rather than miles
Feets or meters
52. On a WLAN, a _________ acts as a wireless hub or switch
Wireless Access Point
53. To connect to the Internet, the wireless access point is connected to a ________ and then the computer with
the wireless NICs can access the LAN.
Wired LAN
54. To connect to the wireless access point, the PC or laptop will need a _______. This device can be a PCI card
NIC, an external USB NIC, or a Type II card that goes into the slot on the side of the laptop.
Wireless NIC
55. _________ feature in Windows set up the shared connection.
Internet Connection Sharing (ICS)
56. ICS is available in which all versions of Windows?
Windows 98 Second Edition,
Windows Me,
Windows 2000,
Windows XP
57. __________ is an alternative to ICS.
WinGate or WinProxy
58. A ________ connected via an access point to a wired LAN
WLAN
59. A growing practice, called _______, in which people travel around a city carrying a specialized device or
simple notebook computer equipped with a wireless NIC, searching for unprotected WLANs.
War driving
60. Unprotected WLANS are referred to as _______
Hotspots
61. The advertising of an unprotected WLAN gives access to a _______ network, which opens up the possibility
of all types of threats.
Private Network
62. Most WLAN devices and OSs support an encryption standard called ____________
Wire Equivalent Privacy (WEP)
63. The encryption method called WEP has proven easy to defeat by war drivers and others. As a result, another
standard, ________ was created.
Wi-fi Protected Access (WPA)
64. _________works with the existing hardware and software that have been upgraded and new devices that is
WEP-enabled out of the box.
Wi-fi Protected Access (WPA)
65. There are ways to connect to the Internet through a telephone line and _________ establishing a dial up
connection.
Standard 56 Kbps Modem
66. A ________ connection in which the computer’s modem must dial a telephone number to contact the ISP’s
servers.
Dial-up connection
67. A connection which is faster than a dial-up connection where data transmission is as much as 10 times faster
than is possible through a standard dial-up connection.--Broadband Connection
68. ___________ service can transmit data up to 128 Kbps using a standard phone line, but the service is falling
out of favour because of faster services which are available
Integrated Service Digital Network (ISDN)
69. There are several types of __________services, each with a different name and different level of service and
can transmit data at speeds ranging from 128 Kbps to 8.448 Mbps
Digital Subscriber Line (DSL) Services
70. Subscribers to cable television services can use a ______ to access the Internet through their cable TV
connection.----Cable modem
71. To communicate with the Internet, PC applications use a special type of program, called an _____________.
Application Programming Interface
72. The API for Windows is called ________Winsock
73. ______________ connections are increasingly popular and take several forms.
Wireless Internet Connections
74. ___________allows users to connect over a large geographic area, as long as their wireless devices can
transmit and receive the proper signals. Transmission of data can be higher than 100 Mbps
Wireless WAN (WWAN)
75. ___________ requires additional security measures to prevent unauthorised users from tapping into the
network and gaining access to sever or other users’ systems.
Wireless LANs
76. Security schemes such as _______ and _______ are designed to prevent unauthorised access to wireless
networks.---WEP and WPA
77. In a ________ connection, your computer uses its modem to dial a telephone number given to you by the ISP.
Dial up connection
78. To be considered a ________ connection, a connection must be able to transmit data at a rate faster than is
possible with a dial-up connection.----Broadband connection
79. A ________ data connection can transfer data up to 128 Kbps.---ISDN
80. ________ service is similar to ISDN, but uses more advanced digital signal processing and algorithms to
compress more signals through the telephone lines.--DSL
81. _______provides downstream speeds that is much faster than its upstream speeds.--ASDL
82. Because of its costs _______ DSL service is only recommended for customers who must upload a great deal
of data.SDSL
83. _________ service transmits data through coaxial cable
Cable Modem
84. The adaptation of the Sockets API for Windows is called _________
WinSoc
85. The distance covered by a _______ is usually measured in feet (or meters)
WLAN
86. An unprotected wireless LAN is sometimes called a _______
Hotspots
87. _________ is a term used for a practice where people travel around the city with a specialised device,
searching for unprotected WLAN.
War-driving
88. Many homes and small businesses connect to the Internet by using a telephone line and _________.
56 Kbps modem
89. High-speed Internet connections are sometimes called _______.Broadband
90. Abbreviation is used to refer to DSL service in general?xDSL
91. Sockets and Winsock are examples of _______ software.API
92. Which of the following is a network that extends over a large geographical area?WWAN
93. Wi-Fi Protected Access was created as a replacement for _________encryption standard.WEP
94. ISDN service can transmit data up to _______ using a standard phone line128 Kbps
95. ISDN stands for ________Integrated Services Digital Network
96. Cable television systems transmit data over ______ cable.Co-axial
97. ________ is a generic name given for the station that is installed, when an organisation contracts with an ISP.
VSAT
98. Wi-Fi stands for ________Wireless Fidelity
LESSON 10A
PRODUCTIVITY SOFTWARE
MULITIPLE CHOICE QUESTIONS
1. ___________ is designed to help users be productive and one class of it is called productivity software.
Application Software
2. The term __________ refers to any software program that must be paid for in some way.
Commercial Software
3. A ___________ is an application that performs only one type of task, such as a word processing program, a
graphic program, or an e-mail program.
Stand-Alone Programs
4. __________ programs that are very commonly used – such as word processing software, spreadsheets, Web-
authoring tools and e-mail programs – often packaged together and sold
Software Suites
5. Which of the following comes under software suites?
Microsoft Office family of products –
Word, Excel, Outlook, PowerPoint, Access
Corel Family of graphics software
All of the above
All of the above
6. The developers of __________ encourage users to share the software with one another, and to try out the
software before purchasing it.
Shareware Programs
7. In order to utilise the shareware program what are the modes by which it can be attained?
Payment Mode and User registration of the program
8. _________ is any software that is made available to the public for free, the developers does not expect any
payment from users.
Freeware
9. Is freeware public domain software?--No
10. If a person uses a shareware or freeware program, one must abide by the terms of a _______that prohibits one
from making changes to the software or selling it to someone else.--License
11. In the case of a _____________, no compensation is usually expected and the source code is free for anyone to
use for any purpose.--Public Domain Software
12. ___________ is the underlying instructions that make a program work.--Source code
13. ________ is a software of any type whose source code is available to users.--Open-source software
14. A ___________ provides tools for creating all kinds of text-based documents.
Word-processing program
15. Can a chart be linked from spreadsheet into a word processing report – to create complex documents that
update themselves automatically.--Yes
16. Can a word processor be used to create documents for publishing on the World Wide Web?--Yes
17. _________ is an area which is where you view the document.--Document Area
18. _________ bar displays titles of menus (list of commands and options)--Menu bar
19. _________ displays buttons that represent frequently used commands--Toolbars
20. ____ shows you the position of text, tab, margin, indents and other elements on the page.--Ruler
21. ______ let you scroll through a document that is too large to fit inside the document area--Scroll-bar
22. A _________ displays information related to the position in the document, the page count and status of
keyboard keys.--Status Bar
23. A temporary memory used for current activities. It is volatile when the computer is switched off, everything
in it will be lost.--Random Access Memory(RAM)
24. The process of transferring the contents of the RAM to the hard disk is called _________Saving
25. ___________ are used frequently to create business letters and resumes--Word processors
26. The _____________ shows your place in a document as you type--Insertion Point
27. The process known as __________ which means creating a document by typing on the keyboard
Entering Text
28. The blinking insertion point is called _________Cursor
29. Changing an existing document is called __________ Editing the document
30. A _________ is a contiguous group of characters, words, lines, sentences, or paragraphs in your document that
you mark for editing or formatting. --Block
31. ___________ Includes settings that control the attributes of individual text characters such as fonts, font size,
and type style.--Character Formatting
32. A ________ is named set of characters that have the same characteristics and _________ is measured in
points.--Font and Font Size
33. __________ are effects applied to characters such as boldface, underline or italic.--Type styles
34. ____________ includes settings applied only to one or more entire paragraphs, such as line spacing,
paragraph spacing, indents, alignment, tabs, borders or shading.
Paragraph formatting
35. In a word processor, a paragraph is any text that ends with a special character called a _________
Paragraph Mark
36. To apply bullets to your text____________Format menu – Bullet and Numbering
37. _____________ includes the size of the page, its orientation, and headers or footers.
Document Formatting
38. _________ are collection of various types of shapes which include the basic shapes, such as rectangles and
circles--AutoShapes
39. A _______ is a saved sequence of commands, action or keystrokes that is stored and can be recalled with a
single command or keystroke.--Macro
40. __________ is a software tool for entering, calculating, manipulating, and analyzing sets of numbers.
Spreadsheet Program
41. In a spreadsheet program, you work in a document called a ________ and a collection of related worksheet is
called a _________
Worksheet and Workbook
42. Spreadsheet programs also display a special ___________, where you can create or edit data and formulas in
the worksheet.---Formula Bar
43. ___________ programs enable you to create elaborate reports with charts, text, colors and graphics.
Spreadsheet
44. A _______ is a horizontal group of cells in a spreadsheet and it is numbered at the left.--Row
45. A ________ is a vertical group of cells in a spreadsheet and it is lettered at the top--Column
46. The intersection of any column and row is called a _____Cell
47. The active cell in a worksheet, is indicated by a _____, a rectangle that makes the active cell’s borders look
bold--Cell pointer
48. _________ helps you navigate a worksheet.--Cell address
49. You can Try out ___________ before you have to register or pay for it--Shareware
50. Word processors contain tools for creating ________ documents--Text-based
51. An empty ________ looks likes a grid of rows and columns.--Worksheet
52. In a spreadsheet, _________ helps you make sense of worksheets contents and also helps organise the
information in a worksheet.--Labels
53. In a spreadsheet, a ________is any number you enter or that results from a computation--Value
54. The power of the spreadsheet lies in _________which calculate numbers based on values in other cells and
can recalculate automatically if any of their base data changes.--Formulas
55. ____________ means arranging the contents of the cell in ascending or descending order.
Sorting a range of cells
56. A _________ is a type of information in graphic format that represents tabular numeric data--Charts
57. The __________ in Microsoft Excel helps create various kinds of charts using spreadsheet data.
Chart Wizard
58. The orientation of the worksheet can be changed from portrait to landscape or vice versa and to set margin
Page Setup – Landscape/Portrait Orientation
Page Setup – Margin
59. ________ is an agreement between a person and the software’s maker--License
60. ________ is the act of copying software without the developers consent--Piracy
61. Most license agreements state that you cannot make __________to a program’s source code.
Modifications
62. ___________ allows the user to design slides – single screen images that contains a combination of text,
number and graphics
Presentation Programs
63. A series of slides, displayed in a specific order to an audience is called a __________.
Presentation
64. The view used for editing that is to enter text, graphics, multimedia etc.
Normal View
65. The view, in which all the slides in the presentation are displayed as thumbnails
Slide Sorter View
66. The view in which the slides of the presentation are displayed fully on the screen
Slide Show View
67. The view which shows the slides in the upper half of the window and the notes in the bottom half of the
window
Notes Page View
68. A ________ is a pre-designed document that already has coordinating fonts, a layout, and a background.
Template
69. When you choose a slide layout that contains a chart, the charts data in a separate window is called a _______.
Datasheet
70. _________ are a group of readymade shapes including several categories of shapes such as basic shapes, lines,
connectors, flowchart elements, stars and banners and callouts.
AutoShapes
71. In a PowerPoint presentation, a _________ is a link from a slide to another slide web page, show or file.
Hyperlink
72. An __________ is a ready-made button which can be inserted into your presentation
Action Button
73. __________ are the visual movements that happen as one slide changes to another
Slide Transitions
74. In a PowerPoint, ____________ can be defined as the movement of text, pictures, auto shapes and other slide
objects with or without sound effects.
Animation
75. ____________ contains preset visual effects which can be applied to paragraphs, bulleted items and titles from
three types of animation groupings, namely Subtle, Moderate and Exciting.
Preset Animation Scheme
76. __________ is applied when you want to make specific modifications or additions to existing animations.
You can alter the speed, timing, direction and order of animation effects.
Custom Animation
77. A ________ is a list of commands, keystrokes, or other actions that have been saved and given a name
Macros
78. If you are presenting slides to a few people you can use the _________
PC Screen
79. If you are presenting slides to a considerable sizable audience to view comfortably you can use the _______
Large Format Monitor
80. Using a ________ converter, you can connect your computer to a standard television and view the PC’s video
output on the television monitor.
PC to TV convertor
81. _________ programs make it easy to take slides out of sequence or rearrange slides during a presentation
Presentation Programs
82. The term ________ refers to the U.S Postal Service
Snail Mail
83. The explosion of contact information has given rise to a special type of software called the __________
Personal Information Manager (PIM)
84. PIMs are sometimes referred to as _________ or __________
Contact Managers or Contact Management Software
85. __________ lets you manage contact lists, your schedule and other important information. It is also a
powerful e-mail program.
Microsoft Outlook
86. _________ is any program you must purchase and sell in the form of stand-alone programs.
Commercial Software
87. Which of the following software does not have to be purchased:
Freeware
Public Domain Software
Open Source Software
All of the above
88. _________ are used to create and format text-based documents such as letters and reports
Word processing Programs
89. ___________ programs are used to create number based documents such as budgets.
Spreadsheet
90. _______ work with four basic kinds of data: label, numbers dates and formulas. It can perform complex
calculations on the numbers in its cells
Spreadsheets
91. Presentation programs include tools found in word processors, spreadsheets, and graphic programs, so you can
combine all manner of text and images on your slides and present slides directly from your computer’s disk.
True
92. ___________ are special programs designed to manage contact information, schedules and other personal or
business information
PIMs
93. Many PIMs are ______ programs, making it easy to send e-mail messages to anyone in the programs address
book.
E- mail programs
94. You can try out a ________ program before you must purchase or register it.
Shareware
95. _______ is software of any type whose source code is available to users.
Open Source Software
96. Changing an existing document is called _______ the document.
Editing
97. Word processors enable you to perform three basic types of formatting ______ , _______and _______
Character Formatting, Document Formatting and Paragraph Formatting
98. In a spreadsheet program, you actually work in a document called a _________
Worksheet
99. A column letter and a row number combine to form a ______.
Cell
100. A spreadsheet program uses _______ to calculate numbers based on the contents of a worksheets cells.
Formulas
101. You use a presentation program to design ______, which are single-screen images containing a combination of
text, numbers, and graphics.
Slides
102. In a slide, you enter text in a special placeholder, which is called a _______
Text box
103. The term _______ refers to the U.S Postal Service.
Snail Mail
104. A _____ is designed to keep track of different kinds of contact information for different people.
PIM
105. A word processing program or an e-mail program is an example of a _______ program
Stand-alone
106. Most word processors features one or more _______, which provide buttons that issue commands
Toolbars
107. In a word processor, you _______ text to mark it for editing or formatting
Select
108. To navigate a worksheet, you should understand its system of _______
Cell addresses
109. _________ can help you make sense of a worksheet’s contents.
Labels
110. In a spreadsheet program, a ________ is a set of worksheets in the same file
Workbook
111. In a worksheet, a _______is the intersection of a row and a column.
Cell
112. To create a chart in a slide, you enter data in a separate window called a _______
Datasheet
113. A ________ is designed to keep track of many different kinds of contact information, for many different
people
PIM
114. In a personal information manager, a contact list may be called a ________
Address Book
115. Spreadsheets work with four basic kinds of data; viz., labels, numbers, date and _______
Formula
116. Spreadsheet programs are used to create _______ based documents such as budgets.
Alphanumeric
117. PIM stands for ______
Personal Information Manager
118. Any software which is available to the public for free is known as a _______
Free ware
119. In MS-Word, a paragraph mark can be created on pressing the ______ key.
Enter
LESSON 10B

GRAPHIC AND MULTIMEDIA


MULITIPLE CHOICE QUESTIONS
1. A grid whose cells are filled with one or more colours is called a ________.
Bitmap
The individual cells in grid can all be filled with the same colour or different colour.
2. The term ________ is sometimes used to describe bitmap images.
Raster
The individual pieces that make up a bitmapped image are often called ______
Pixels
3. When you magnify the bitmap, you can see the individual pieces called ________that make up the bitmap
image
Pixels
4. A set of _______, which are mathematical equations describing equations describing the size, shape,
thickness, position, colour and fill of lines or closed graphical shapes.
Vectors
5. If you want to be able to retouch a photo, create seamless tiling textures for the Web or for 3-D surfaces, or
create an image that looks like a painting, the best graphic software that is easy to choose from is:
Bitmap-based software
6. If you want flexibility of resizing an image without degrading its sharpness , the ability to reposition elements
easily in an image, or the ability to achieve an illustrative look as when drawing with a pen or pencil, the best graphic
software that is best to be chosen from is:
Vector-based software
7. __________ software uses mathematical equations to define the thickness and colour of a line, its pattern or
fill, and other attributes.
Vector –based software
8. A ___ is defined as a line stretching between two endpoints, rather than as a set of pixels.
Vector
9. ________ is a popular bitmap-based graphic program.
Paint Shop Pro
10. In ___________ file format, the sole control of the software is under the developer who invented the format.
Proprietary
11. _________ file format is based on openly published specifications and are commonly used by many different
programs and operating systems.
Universal
12. In the case of Adobe Photoshop, images are saved in proprietary ______ format.
PSD
13. TIFF, GIF, JPEG, PICT,TGA are _________ formats.
Universal
14. Word-processing programs can read and save files in specific formats such as _________
DOC or RTF, or TXT
15. With the help of the bitmap based program, can file be opened, read and saved from a GIF format to TIF
format?
Yes
16. DXF (Data Exchange Format) and IGES (Initial Graphics Exchange Specification) are the file formats exists
for__________.
Vector graphics
17. _____ is the native format defined by Apple for use on Macintosh computers. It is widely used on Macs but is
not usually used on PCs.
PICT or PICTure
18. _______ is a bitmap format defined in 1986 by Microsoft and Aldus (now part of Adobe) and widely used on
both Macs and PCs.
TIFF (Tagged Image File Format)
19. _______ bitmap format is common on the World Wide Web and is often used for photos and other high-
resolution (24-bit or millions of colours) images that will be viewed on screen.
JPEG or JPG or Joint Photographic Experts Group
20. A _______ bitmap format similar to JPEG images, often found on World Wide Web pages, but contain only
256 or fewer unique colours.
GIF (Graphic Interchange Format)
21. The__________ format was originally developed for the Microsoft Office suite of Applications. It uses the
Windows built-in Graphics Device Interface (GDI) to create images that can be scaled to display at the highest-
possible resolution on any device selected. This technology creates something of a hybrid between the vector
graphics and bitmap types; they can be resized without any loss of quality.
EMF (Windows Enhanced Metafile)
22. Which among the following ways by which images are loaded into a computer for editing?
Scanner
Digital Cameras
Digital Video Camera
All of these
23. An _______is like a photocopy machine, but instead of copying an image onto paper, it transfers the image
directly into the computer.
Image scanner
24. A scanned image is usually a ________ file, but software tools are available for translating images into vector
format.
Bitmap file
25. The term ____ originated with large books filled with professionally created drawings and graphics that could
be clipped from the pages and glued to a paper layout.
Clip Art
26. Which among the following are the major categories of graphics software?
Paint programs
Photo-editing programs
Draw programs
Computer-aided Design (CAD) Programme
3-D modelling and animation programs
27. Paint programs and Photo – editing programs are ______ based paint programs
Bitmap
28. Draw programs, Computer-aided design (CAD) programs and 3-D modelling and animation programs are
______ based draw programs.
Vector
29. 3-D programs can either work with vectors or bitmaps. True or false?
True
30. Paint Programs are _______based graphic programs
Bitmap
31. Draw Programs are __________ graphics programs that are well suited for work when accuracy and flexibility
are as important as colouring and special effects
Vector based
32. Does paint programs provides the flexibility as they do not recognise lines, shapes and fills as unique objects?
No
33. Draw programs are sometimes referred to as object oriented programs. True or false?
True
34. All object created in a draw program consist of an ______and a ______
Outline and fills
35. A fill can be a _____
Solid color
A vector pattern
A photo
36. ___________now take the place of a photographer’s darkroom for many tasks.
Photo-editing programme
37. _______ programs edit images at the pixel level; they can control precisely how a picture will look. They also
are used to edit non-photographic images and to create images from scratch.
Photo-editing programme
38. Which among the following are true for photo-editing programs?
Sharpening Focus
Adjusting contrast
Removing flaws from digitized images
39. ___________ also called computer-aided drafting or computer aided drawing is the computerised version of
the hand-drafting process that used to be done with a pencil and ruler on a drafting table
Computer-aided design (CAD)
40. CAD is used in mechanical, electrical and industrial engineering. True or false?
True
41. 3-D imaging in movies, television and print are images which are created with a special type of graphics
software
3-D modelling software
42. ____________ has changed the world of animation in many ways.
Computer Generated Imaging (CGI)
43. The computer-generated image looks so realistic that it could be mistaken for a photograph of real-life object
Photorealistic scenes
44. ASPs means ______
Application Software Providers
45. _______ provides access to an application over a network connection to a central application server
Application Software Providers
46. The individual pieces that make up a bitmapped image are often called
Pixels
47. A ___________ tells a program what kind of data is contained in a file and how the data is organised.
File format
48. A ______ program’s drawings are often used as the basis for construction documents
CAD
49. _______ is the native graphics format defined by Apple for use on Macintosh computers
PICT
50. Using more than one medium at the same time is called _______.
Multimedia
51. ________ has been defined in many ways, but in the realm of multimedia, the term means that the user and the
program respond to one another.
Interactivity
52. _______ ensures that the technological process of a project works and that it accommodates all project
components and media
Technical Lead
53. _______ directs the development of the user interface for a product, which includes not only what users see
but also what they hear and touch.
Interface Designer
54. _______ the instructional system for the product, which determines how material is taught, if the product is
educational.
Instructional Designer
55. _______ creates the various art forms, usually within a specialised area.
Visual Designer
56. _____ weaves the project’s content among various media and forms of interactivity.
Interactive Scriptwriter
57. ______ uses 2-D and 3-D software to create animation and effects.
Animators
58. As a manager, creative artist and programmer, a ______designs and produces all the audio in a product.
Sound producer
59. A _____ is a standardised method of encoding data for storage
File Format
60. If a program can use a specific file format, the two are said to be _______
Compatible
61. The DXF (Data Exchange Format) and IGES (Initial Graphic Exchange Specification) file formats are two of
the common file formats used for________.
Vector graphics
62. ______ programs keep track of each and every pixel on the screen.
Paint Program
63. ______ programs are cousins to paint programs and now take the place of a photographer’s darkroom for
many tasks.
Photo editing
64. High-quality animation is usually played at a speed of ____ Frames per second.
30
65. If a multimedia program can accept and respond to input from the user, it is said to be ______
Interactive
66. A ______ image is defined as a grid whose cells are filled with colour.
Bitmap
67. A _____ image consists of mathematical equations describing the size, shape, thickness, position, colour, and
fill of lines or closed graphical shapes.
Vector
68. A ______ can convert a printed image into digital format.
Scanner
69. The _____ graphics file format was defined for use on Macintosh computers.
PICT
70. If a program and a file format cannot work together, they are said to be ______
Incompatible
71. You can use a paint program to change every ____ in an image from one colour to another colour.
Pixels
72. _____ is the computerised version of the hand-drafting process.
CAD
73. This term media is the plural form of _______.
Medium
74. Although television is an example of multimedia, it is not _____.
Interactive
75. _______ is a common file format that exists for vector graphics.
IGES
76. TIFF stands for ______.
Tagged Image File Format
77. GIF images are often found on WWW pages, they contain only ______ or fewer colours.
256
78. Programs can read and save files in specific formats such as RTF by using ______
Word Processing
LESSON 11 A
DATABASE MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS
1. A ______ is complete collection of records
Table
2. A ______ database is made up of a set of tables where a common field in any two tables creates a relationship
between the tables.
Relational
3. A _______ can store an object such as a picture, rather than text or numeric data.
Binary field/Binary Large Objects(BLOB)
4. Clerks or other data entry personnel fill in a ______
Form
5. You use a _____ sort order to arrange records alphabetically from A to Z
Ascending
6. A unique numeric value that the DBMS assigns to each record is called a _____
Counter field
7. A _____ field can hold only one of two values, such as Yes or No.
Logical(Boolean)
8. Characters that are not used in calculations are usually stored in a _____
Text field
9. The fields which typically include automatic error checking features are ______
Date and time
10. A ______ is a software tool that enables users to add, view, and work with the data in the database.
DBMS
11. The user-generated sets of data usually printed as a document are called _____
Reports
12. ______ databases are two-dimensional tables of fields and records that do not form relationships with other
tables.
Flat-file
13. SQL stands for ______.
Structured Query Language
14. In a database table, each row represents a _____
Record or Tuple
15. In a record, it is not necessary for every _____ to contain data.
Field
16. A _____ contains a single table.
Flatfile
17. _______ is an English like query language used by nearly all PC-based database management systems.
SQL
18. ______ is a DBMS feature used to display a selected list or subset of records from a table.
Filter
19. A _____ field allows you to enter text of any length.
Memo
20. You can create printed _____ from the data in a database
Reports
21. DBMS means _______
Data Base Management System
22. The term column is sometimes used instead of the more popular term ___
Field
23. _____ stores binary objects
Binary Field/BLOB
24. A _____ is a repository for collections of related data or facts.
Database
25. A ______ is a software tool that enables many users to add, view, and work with the data in a database.
DBMS
26. _____ are two-dimensional tables of fields and records. They cannot form relationships with other tables.
Flat-file databases
27. _______ are powerful because they can form relationships among different tables.
Relational Databases
28. To create database, first thing to be set up is the _____ and define the types of fields each table will contain.
Table
29. _____ are custom screens for displaying and entering data that can be associated with database tables and
queries.
Forms
30. ______ let you browse through selected records that meet a set of criteria.
Filters
31. _____ arranges records in a table according to specific criteria.
Sorting
32. ______ are user- constructed statements that set conditions for selecting and manipulating data
Queries
33. ______ are user-generated sets of data usually printed as a document.
Reports
34. A complete collection of records makes a ____.
Table
35. The process by which data is manipulated is ________.
Data processing
36. Data is stored in ______.
Databases
37. A ______ is a software tool that allows people to store, access, and process data or facts into useful
information.
Data Base Management Systems (DBMS)
38. Small database programs that run on personal computers are not referred to as databases or database
management programs instead they are called ______
Personal Information Managers (PIMs)
39. Which is true for DBMS?
Sorting thousand of address by ZIP code
Find all records of people who live in a certain state
Print a list of selected records
Allow users to easily make use of that data
Find relationships between data
40. Each piece of data in the address book is stored in its own location called a _____
Field
41. Column is referred to as _____
Field
42. One full set of fields – that is, all the related data about one person or object is called a __
Record
43. Row is also known as _____
Record
44. A complete collection of records makes a _____
Table
45. Data is stored in tables. A table is divided into records, and each record is divided into _
Fields
46. ______ are documents that are filled in to create records.
Forms
47. ______ are documents that display a select portion of a database’s information in an easily read format.
Reports
48. Lotus Approach is an example for _____ .
PC database application
49. The table consists of a set number of named ___ and an arbitrary number of unnamed __
Columns (fields) and Rows (records)
50. What is the limit to the table’s size?
Storage capacity of the computer system
51. A database file that consists of a single data table is called a ______
Flat-file database
52. ______ are useful for maintaining lists such as address lists or inventories.
Flat-file database
53. Which database system leads to a lot of data redundancy which increases the chance for errors, wastes time
and uses excess storage space?
Flat file database
54. In a _____database made up of a set of tables – a common field existing in any two tables creates a
relationship between the tables.
Relational database
55. A ____ is a collection of data.
Database
56. A ____ is a program, or collection of programs, that allows any number of users to access and modify the data
in a database.
Database Management System
57. _____ provides tools which enable users to construct special requests called queries.
DBMS
58. Which of the following are the tasks of database management?
Entering data into the database
Housekeeping tasks
Sorting the data
Obtaining subsets of the data
Finding records
59. A _______system provides the means for multiple users to access and share data in the same database by way
of networked computer systems.
DBMS
60. Data management functions includes the following
Creating tables
Viewing records
Sorting records
Creating queries
Generating reports
61. _____ accepts any string of letters or numbers that are not used in calculations. It might be a person’s name, a
company’s name, an address, a phone number, or any other textual data.
Text field
62. ______ store purely numeric data. It represents currency, percentage, statistics, quantities, integer or floating
point
Numeric Fields
63. A _____stores date or time entries. These field types convert a date or tie entry into a numeric value. These
include automatic error-checking features and for calculating elapsed time periods, such as finding records for
invoices 31 days overdue.
Date field or time field
64. ______ store binary objects, or BLOBs.
Binary field
65. A ______ can be a graphic image file such as clipart, a photograph, a screen image, a graphic or formatted text
BLOB (binary large-object)
It contain audio file, video clip etc.
66. In some DBMS ______ stores a unique numeric value that the DBMS assigns to each record.
Counter Fields, Index or Auto number fields
67. _____ fields for entering notes or comments of any length.
Memo fields or description fields
68. A _____ is nothing more than a custom view of the table that typically shows one record at a time and
includes special controls and labels that make data entry less confusing.
Form
69. A _____ can even direct input into multiple tables
Form
70. _____ view is used to create a database table and to modify field specifications.
Datasheet views / Table views
71. _____ are a DBMS feature for displaying a selected list or subset of records from a table.
Filters
72. A DBMS also allows you to create ____ for viewing records.
Forms
73. One of the most powerful features of a DBMS is the ability to ____ a table of data, either for a printed report
or for display on the screen.
Sort
74. A _____lets the user work with information for a single record
Form
75. A user-constructed statement that describes data and sets criteria so that the DBMS can gather the desired data
and construct specific information
Query
76. A _____ is a more powerful type of filter that can gather information from multiple tables in a relational
database.
Query
77. Database systems provide special windows or forms for creating ____
Queries
78. Who framed SEQUEL?
Mainframe database developers in 1970
79. SEQUEL means _____
Structured English Query Language
80. SQL means ______
Structured Query Language
81. Give examples of DBMS?
SQL Server, Oracle, DB2, Microsoft Access
82. ______query/programming language which is more complicated because its commands cover the full range of
database activities, not just queries.
Xbase
83. While querying a database or enter expression what criteria should be followed?
Allow the DBMS to locate records
Establish relationships or links between tables to update records
List a subset of records
Performs calculations
Delete obsolete records
Perform other data management tasks
84. QBE means _____
Query by example
85. A ______ is printed information that like a query result, is assembled by gathering data based on user-supplied
criteria
Report
86. _____ create reports from queries
Report generators
87. A program used for creating, updating and administering a relational database is a _____
Relational Database Management System (RDBMS)
88. Who invented the relational database in 1970?
E.F.Codd
89. A _____ is defined for all possible data values in the column and any further constraints which might apply to
that data value
Domain
90. The standard application program and user interface to a relational database is called the ______
Structured Query Language
91. Every table in the database is assumed to be a single _____
Entity
92. In an RDBMS, there are two types of keys which are they?
Primary Key and Foreign Key
93. A field used to identify a specific record present in a table uniquely is called a _______
Primary Key
94. When there is no logical number present, it is created automatically by most of the databases which is called
an ____
Auto number
95. A _____ is present as a field in one table but it is already the primary key of another table.
Foreign key
96. A ______ is a link between two tables of database.
Relationship
97. Which are the three types of Relationships?
One-to-one Relationships
One-to-many Relationships
Many to many Relationships
98. In _______ relationship, a row in table A can have only one matching row in table B, and vice versa. It is
created if either both the related columns have unique constraints or both are primary keys in their tables.
One to one relationships
99. In ______ relationship, a row in table A has many matching rows in table B.
One-to-Many Relationships
100. In _______ relationship, rows in table A can match with more than one row in table B, and vice versa.
Many-to-many Relationships
101. ______ is a set of rules which are designed for ensuring the organisation of a database in the best possible
way.
Normalisation
102. The _____ rules are based on the relationships established between the entities for creating a functional
dependency among them.
Normalisation
103. Which of the following process are involved in normalisation process?
Finding and grouping all the entities together along with their attribute
Repeated groups of data are removed
Every entity in the database system is assigned a unique key.
104. ______ is the first level of normalisation.
First Normal Form (INF)
105. An entity or a table is said to be in the INF _____
If it has attributes or a group of attributes which do not get repeated
106. In the ____ form, the repeated attributes are removed and a unique identifier is added.
First normal
107. Which of the following is true for the First Normal Form?
The repeating or multiple groups within the primary entities or tables are removed in order to ensure that
all the records or rows in an entity are of the same length.
The repeating groups form new entities which are linked with one another by a one-to-many relationship
Relationships should be created by adding a primary key from an entity as a foreign key to another entity.
108. In _____ form, the attributes are not dependent on the primary key. Applicable with concatenated primary
keys.
Second Normal Form
109. Attributes in 2NF is tested for dependency and uniquely identified using the entire ____key
Primary Key
110. A _____ is a separate table which stores redundant information like city, state, and a zip. The relationship
between the two tables is created using zip code which is the ZIP table’s primary key.
ZIP
111. An entity is said to be in ______, if all its attributes completely depend on the primary key only.
Third Normal Form (3NF)
112. Which of the following is true for 3NF?
Each attribute is checked to find out its dependency on primary key.
113. ______ dependency is a condition where an attribute depends on one or more attributes other than the primary
key.
Transitive
114. The most familiar products of RDBMS are
SQL Server
Oracle
DB2
115. ____ is the lifeblood of a corporation
Data
116. ______is a massive collection of corporate information, often stored in gigbytes or terabytes of data.
Data warehouse
117. ______ is the most popular mass-storage schemes based on a redundant array of independent disks
Storage Space
118. RAID means ____
redundant array of independent disks
119. ______ is a storage system that links any number of disk drivers so that they act as a single disk.
RAID
120. What are the features of large scale RAID?
Terabytes of storage and incredibly fast access and data transfer time
121. _____ and _____ are the two technologies used to control data warehouses
Symmetrical Multiprocessing (SMP)
Massively parallel processing (MPP)
COLLECT DATA, ERROR CHECKING RETRIVE BACKUP
122. What are the factors to be considered while investing in a data warehousing structure?
Storage Space
Processing Scheme
Backup Strategy
Speed
123. RAID’s capabilities are based on three basic techniques
Mirroring
Striping
Striping with parity
124. In a ____, data is written to two or more disks simultaneously, providing a completed copy of all the
information on a drive in the event one drive should fail.
Mirroring system
125. _____ provides the user with a speedy response by spreading data across several disks.
Striping
126. ______ provides the speed of striping with the reliability of mirroring
Striping with Parity
127. Newer data-warehousing systems not only incorporate huge disk drives, but some interconnect the drives with
______ lines
Fiber-optic lines
128. Huge _____ are used to store and support thousands or millions of transactions per day on active Web sites,
such as the popular electronic auction and retail Web sites.
Warehouses
LESSON 11B
SURVEY OF DATABASE SYSTEMS
MULTIPLE CHOICE QUESTIONS
1. _____software that can be any type of large scale program that is meant to handle the needs of many users.
Enterprise software
2. What are the specialities of enterprise software?
Always networked
Readily available to the users via a large private network or the Internet
Very large complex databases
3. An enterprise means _____
Organisation
4. A ______ is a very large-scale computer system.
Enterprise System
5. _______is typically a suite of applications used by hundreds, or even thousands, of people at the same time,
which handles millions of records, or both
Enterprise software
6. An application that executes on separate PCs is called a ______
Distributed Application
7. The word _____ is another term used to describe distributed application.
Tier
8. Division of job of managing a database between two computers it is called a _______
Two tier application
9. In a _____ one computer displays a visible user interface for data entry, a second computer executes the
business logic and the third computer holds the database itself.
Three – tier application
10. Some databases applications divide among even more than three machines are known as _____
n-tier application
11. _____ means figuring out what data is needed from the database, how to connect to the database, and so on
Business Logic
12. One popular type of enterprise software is called an ______ system. It tracks documents, keeps related ideas
together, and aids in facilities management
Electronic Document Management (EDM)
13. Microsoft Access can efficiently maintain between______ simultaneous updating user connections
10 and 30
14. _______ is a type of database utility designed to analyse data and report back with useful information.
Knowledge Discovery
15. ______ is one type of Knowledge discovery where a program searches a database, discovering hidden
information
Data mining
16. With the help of _____ data mining can predict trends or relationships that likely would never be noticed by a
human analyst
Statistics, artificial intelligence, modelling techniques and other tools
17. Search engines work by sending out _______ or ______ . These robot agents continually look for new Web
pages and send their Internet addresses back to the search engines’ database.
Crawlers or Spiders
18. ______ is the clear leader for personal databases and come bundled with some versions of Microsoft Office.
Microsoft Access
19. If there are some tasks that you frequently repeat, what is created to do that job quickly and automatically?
Macros
20. A _____ is designed to display a message, so you see a list of available arguments or qualities you can give to
your message box.
MsgBox
21. ______ is the most popular personal and small business database system.
Microsoft Access
22. Which of the following are the elements of Microsoft Access?
Title Bar
Menu Bar
Tool Bar
Database Window
Object Bar
Database Objects
Status Bar
23. The ____ displays the name of the program currently in use.
Title Bar
24. _____ shows a list of menus which you can be used to give commands to Access.
Menu Bar
25. ______ contains shortcuts to various functions in MS Access
Tool Bar
26. The _____ is the command centre for a database which allows you to view create, edit and modify database
objects.
Database Windows
27. The _____ shows different types of database objects which are categorised
Object Bar
28. The basic components that are used for creating a database are the _____. These includes tables, queries,
forms etc.
Database Objects
29. The _____ displays messages and feedback.
Status Bar
30. Databases have _______ table
More than one table
31. In a database tables can be created using ______
Design View or wizard
32. A _____ is a special type of indexed field that uniquely identifies each record in a table.
Primary key
33. Which of the following data types are supported by MS-Access?
Text
Memo
Number
Date/Time
Currency
AutoNumber
Yes/No
OLE Object
Hyperlink
34. ______ is used for storing text, numbers, combination of text and numbers, upto to 255 characters
Text Data types
35. _____ data type which is used for storing text entries which are long up to 64000 characters
Memo
36. ______ data type stores numbers that can used in calculations
Number
37. ______data types used to store date or time, or both
Date/Time
38. _____ data type is used for storing symbols and numbers and symbols which are used to represent money
Currency
39. _______ data type is used for filling a unique number automatically for each record
Auto Number
40. _______data type is used for storing one or two values say for example Yes or No, True or False, etc.
Yes/No
41. ______ data type is used for storing objects that are created using any other program like word document,
Excel spreadsheet or graphics
OLE Object
42. ______ data type is used for storing links which can be clicked to reach files on the computer, network or any
Web page on the Internet
Hyperlink
43. _____ helps in creating a field which has certain values that are selected from a query, preset list of values or a
table.
Lookup Wizard
44. A table can have one primary key – Yes/No
Yes
45. Can Yes/No, OLE or hyper link fields be used as primary key?
No
46. A ____ is a link between two tables of a database
Relationship
47. Which are the types of database?
One to one relationship
One to many relationship
Many to many relationship
48. A table in the database can be created using ____ or ____
Design View or Table Wizard
49. ______ is a method that allows you to view only specific records meeting a certain criterion
Filtering
50. What are the following ways provided in Microsoft Access to filter data?
Filter by Selection
Filter by Form
Advanced Filters
51. In _____ method, records containing similar values of data for a specific field are filtered
Filter by selection
52. In _____ method, a blank table is created for the selected table which contains all the fields of the table and
each field has a drop down box
Filter by Form
53. In ______, you can sort records by multiple fields
Advanced Filtering
54. _____, ______and ______ fields cannot be indexed
Memo, OLE and Hyperlink
55. A ____ is a type of a database object that is used to enter or display data, or as a dialog box that accepts input
and carries out an action based on the input
Form
56. A form is created in MS-Access is by using the ____
Auto Form Wizard
57. The _____ icon is clicked to add controls to your form
Control Wizard
58. The ____ icon is used to create a static text label that is the same for every record.
Label
59. The ____ icon is clicked to create a text box that displays information from a table and query or to enter text
Text Box
60. The _____ is clicked to create a box around a group of option buttons so that you are only allowed to make
one selection from the group box.
Option Group
61. The _____ icon is clicked to create a toggle button that allows you to display and enter data from a Yes/No
Field
Toggle Button
62. The ___ icon is clicked to create an option button or radio button that allows you to make a single selection
from two or more choices.
Option Button
63. The icon which is clicked to create a box that is checked or unchecked. Use to enter data from a Yes/No field.
Check Box
64. The _____ icon is clicked to create a drop down box that lets you enter text or select an item from a list of
options
Combo Box
65. The ____icon is clicked to create a box that lets you select an item from a list of options
List Box
66. The _____ icon is clicked to create a button that runs a macro or visual Basic Function
Command Button
67. The ____ icon is used to display a picture or graphic file that you specify
Image
68. The ______ icon is used to display a picture or graphic file that you specify
Image
69. The _____ icon is used to insert an OLE object that is not bound to a field in the current database
Unbound Object Frame
70. The _____icon is used to insert an OLE object that is bound to a field in the database.
Bound Object Frame
71. The _____icon is used to insert a page break
Page Break
72. The _____ icon is clicked to create tabs to include more than one page of controls on the form
Tab Control
73. The _____icon is clicked to insert another form/report within the main form/report
Subform / Subreport
74. The _____ icon is used to draw a line
Line
75. The ___ icon is used to draw a rectangle
Rectangle
76. The ___ icon is used to display other OLE objects
More controls
77. The properties of a control can be displayed by selecting Properties option from _____menu
View
78. For creating an expression or calculation in a query, display the query in _____view
Design view
79. _____ queries are used for finding and displaying data from one or more queries or tables
Select queries
80. ______ is used to summarise the data in the form of a table which facilitates easy comparison and better
readability of the information
Crosstab query
81. _____query is used for adding or appending the selected records from one table to another
Append query
82. _____ deletes selected records from one or more tables
Delete query
83. _____ updates selected information in a table
Update query
84. Enterprise software means ______
A very large scale computer system
85. The data analysis technique that can give your answers to questions you didn’t even ask is called ____
Data mining
86. Microsoft Access can effectively accommodate ____ simultaneous updating users
10 to 30
87. _____ is a common corporate DBMS developed by IBM
DB2
88. _____ are used to present information from tables and queries in a formatted manner and also summarises and
analyses the information in a database.
Report
89. Creating reports are of two types what are they?
Auto Report: columnar
Auto Report: Tabular
90. In the early 1980’s _____ was the dominant commercial database system.
dBASE
91. Which are the examples of enterprise systems?
Oracle Database,
DB2
SQL Server
92. Is MySQL is used for free?
Yes
93. Oracle dominated ___ percent of the market
40
94. _____ is an enterprise DBMS that offers a large suite of applications, utilities, and languages that can be used
together to solve business problems and manage data and has the reputation as the most flexible enterprise DBMS
Oracle
95. In which all OS does Oracle works?
UNIX, LINUX, Windows, Macintosh
96. The capabilities of running on various operating system is known as ____
Platform Independence
97. DB2 was developed by ___
IBM
98. DB2 runs on ____OS
LINUX, UNIX, Windows
99. DB2 dominates ______ percent of market
34
100. SQL was also developed by ____
IBM
101. _____ enterprise system offers a stable, robust system that’s capable of high-volume activity, and includes the
guarantees and support expect from a major company like IBM
DB2
102. SQL server dominates ____ per cent of the market
11
103. Why is SQL Server gaining popularity?
Because it offers improved language features, greater speed and efficiency on some bench mark test.
104. ______ is the ability to adjust to changes in scale – to offer stability and efficient
Scalability
105. _____ is the most popular enterprise DBMS for open source
My SQL
______ is often recommended for new Web application, particularly where cost is a major factor
My SQL
106. _____ is the leading DBMS for the LINUX platform
My SQL
107. _______ is a relatively large software system of interacting applications and one or more databases.
Enterprise software
108. The application in which enterprise software usually splits its tasks among two or more applications, running
on different PCs. This is known as _____
Distributed application
109. The parts of a distributed applications are known as ____
Tiers
110. One of the best ways to handle heavy user traffic is to allow users to ____ parts of a database. These
disconnected datasets are a copy of a table or query, and they solve the problem of too many users simultaneously
interacting with a database
Check-outs
111. ______ is a sophisticated utility that searches a database, discovering hidden information. It often provides
surprising results; it can give you useful answers to important questions that you didn’t even think to ask
Data mining
112. The ____ itself is a huge, super-database, a searchable database containing millions of other databases- a good
portion of all human knowledge
Internet
113. ______ can be useful for organising collections, keeping track of anniversaries, managing recipes, and many
other tasks.
Personal databases
114. The major business database systems- ____, ____ and ___ may someday face competition from open source
software such as MySQL.
Oracle, SQL Server and DB2
115. When an application is divided into several parts running on different computers, it’s called a _____
Distributed Application
116. If a program can run on various operating systems, it is described as having _____
Platform Independence
117. A _______ is a portion of a database that a user can check out without maintaining a connection to the
database
Disconnected dataset
118. A distributed application with two components is described as being a _____ application
Two tier
119. A program’s ability to adjust in drastic changes in usage levels is known as _____
Scalability
120. ______ is the most popular enterprise DBMS for the open source community
MySQL
121. Automated programs that roam the Internet, gathering information such as the addresses of active Web sites,
are called _____
Crawlers
122. ______ is IBMs suite of database programs used mostly for high-volume enterprise systems.
DB2
123. ______ refers to an application that either manages large amounts of a data or handles large numbers of users
simultaneously or both
Enterprise software
124. In a three-tier application, one computer may be responsible for executing the _____ which is figuring out
what data is needed from the database, and other issues.
Business Logic
125. _____ keeps related ideas together, tracks documents, and aids in facilities management.
EDM (Electronic Document Management), EDI
126. Applications that can handle high- volume traffic are called _____
Enterprise
127. An application’s ability to successfully manage changes in scale is known as
Scalability
128. _____ is the most popular enterprise DBMS for the open source community
MySQL
129. If a distributed application is divided among more than three machines, it is called a ______ application
n-tier
130. When a user checks out a disconnected dataset, the connection to the database is _____
Broken
131. Database programs often provide _____that resemble familiar paper forms
Interfaces
132. _____ is a type of database utility designed to analyse data and report back with useful information
Knowledge discovery
133. Many commercial Web sites access a _____
Mainframe Computers
134. If the job of managing a database between two computers is divided, it is called a ______
Two tier
135. ______ is one type of knowledge discovery where a program searches a database discovering hidden
information
Data mining
136. ______continually look for new Web pages and send their addresses back to the search engine’s database
Crawlers
137. The dominant database system in the 1980’s was ||_____
Dbase
LESSON 13 A
UNDERSTANDING THE NEED FOR SECURITY MEASURES
MULTIPLE CHOICE QUESTIONS
1. What is the first step of computer security?
Awareness
2. A _____ is anything that can cause harm.
Threat
3. Which of the following is a threat?
Burglar
Virus
Earthquake
Simple user error
All
4. A ______ is a weakness anything that has not been protected against threats, making it open to harm
Vulnerability
5. A ____ is any step you take to ward off a threat – to protect yourself, your data, or your computer from harm.
Countermeasure
6. Regularly backing up your data is a countermeasure against the threat of _____
Data loss
7. A _____ is a counter measure against the threat of hackers.
Firewall
8. What are the two classes of countermeasure?
The first shields the user from personal harm, such as threats to personal property, confidential
information, financial records, medical records etc.
The second safeguard protects the computer system from physical hazards such as theft, vandalism, power
problems, etc.
9. Which of the following are the threats to users?
Identity theft
Injuries stemming from computer use often due to fault of poor design or poor work habits
10. ________ occurs when someone impersonates you by using your name, Social Security number, or other
personal information to obtain documents or credit in your name.
Identity Theft
11. Which of the following methods are used by Identity thieves?
Shoulder Surfing
Dumpster Diving
Social Engineering
High Tech Methods
12. A trick known as _______ is as simple as watching someone enter personal identification information for a
private transaction, such as an ATM machine.
Shoulder Surfing
13. In the right setting, a thief can try ______ information by listening in on a telephone extension, through a
wiretap, or over a cubicle wall while the victim gives credit card or other personal information to a legitimate agent
Snagging
14. A popular low-tech approach is _____ where a thief can go through garbage cans, dumpsters, or trash bins to
obtain cancelled cheques, credit card statement or bank account information that someone has carelessly thrown out
Dumpster Diving
15. In ______, the ID thief tricks victims into providing critical information under the pretext of something
legitimate.
Social Engineering
16. High – Tech Methods are not common because of security technology such as _____
Sockets Layer (SSL) and Secure HTTP (S - HTTP)
17. Which are the predominant sources of identity theft?
Social Engineering and Low tech swindles
18. Anytime you use a store loyalty card to rent movies or buy groceries, the purchases are logged in a ______
Databases
19. ______ is business intelligence – gathering process that every large organisation, from banks to grocery stores,
employs to sift through computerised data.
Data mining
20. Public records on the internet can be obtained from which all websites?
Intelius and WhoWhere.com giving detailed reports about most people
21. Which of the following are public records?
Criminal Records including sex offender registry, felonies, misdemeanours, federal and country offenses
Background information including marriage records, divorce records etc
22. The legal records which are available to anybody who wants to view them.
Public Records
23. Data about when you visited, what you looked at, and how long you stayed is used by most commercial Web
sites. Use of this data is called______
Online profiling
24. The reports containing information about browsing habits and may contain accompanying marketing
conclusions, called __________
Psychographic data
25. Which of the following are examples of online spying tools?
Cookies
Web bugs
Spyware
26. _____ is a small text file that a Web server asks your browser to place on your computer. This contains
information that identifies your computer, you and information about your visit to the Web site
Cookies
27. A _____ is a small GIF-format image file that can be embedded in a Web Page or an HTML-format e-mail
message. It can be as small as a single pixel in size and can easily be hidden anywhere in an HTML document.
Web Bugs
28. The term _____ is used to refer to many different kinds of software that can track a computer user’s activities
and report them to someone else.
Spyware
29. Another common term for spyware is ____ because Internet advertising is a common source of spyware.
Adware
30. Which are the sources from which spyware can land on your PC?
Web pages, e-mail messages, and pop – up ads
31. _____ is a spyware removal tool.
X-Cleaner
32. Spam is known as___________.
Internet Junk Mail
Unsolicited Commercial E-mail (UCE)
33. Which website gives us more information about anti-spam laws and citizen movements?
The SpamCon Foundation’s website
Spamcon.org
34. People who send out endless streams of spam is called a
Spammer
35. How does spammer get e-mail addresses?
Purchasing lists of e-mail addresses through brokers
Harvesting e-mail addresses from the Internet
Generating random strings of characters in an attempt to match legitimate addresses.
36. Which are the law regulating spams?
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003n (CAN-SPAM Act of
2003)
37. Which of the following are illegal and applicable to law (CAN-SPAM Act of 2003) ?
Sending a commercial e-mail message with header information that is false or misleading
Spoofing the originating addresses, or relay a message from another computer in order to disguise its point
of origin.
Not clearly identifying the message in an advertisement or solicitation
38. _____ is a social engineering term that describes an attempt by the sender of the message to convince the
recipient that the message is from someone else.
Spoofing
39. Which of the following causes that lead to physical injuries while using computers?
Prolonged mouse and keyboard usage
Prolonged staring at a monitor
Poor seating conditions
40. Which of the following are threats to hardware?
Theft
Vandalism
Disaster such as fire and flood
41. Which of the following are threats related to power?
Power fluctuations
Power failure
42. The _____ in which the strength of electrical service rises or falls can cause component failures.
Power fluctuations
43. The ___ in which the power is lost altogether, causes systems to shut down.
Power failure
44. What are the counter measures against power related problems?
Surge Suppressors
Line Conditioners
Uninterruptible Power Supplies (UPS)
45. _____ protect against voltage spikes.
Surge Suppressors
46. ______ safeguards against line noise from high demand electrical equipment operated near your computer.
Line conditioners
47. Voltage drops are also known as_________
Sags
48. A _____ protects the system from electrical events including a total loss of power.
Uninterruptible power supplies(UPS)
49. _____ is the important function of UPS
Soft landing feature
50. _____ ensures that the computer will be shut down normally if the device’s battery runs out before power is
restored
UPS
51. A ____ is your best defence against power fluctuations or outages
UPS
52. Which of the following method is used to prevent theft and vandalism?
Special Locks
Home alarms
53. Two types of disasters
Manmade disaster
Natural disaster
54. Examples of natural disaster
Earthquake and hurricane
55. Which of the following are natural disasters?
Localised or area floods
Lightning storms
Snowstorms and extreme cold
Tornado
Hurricane
Earthquake
56. Which of the following are site disasters?
Building and forest fires
Water and sewer emergencies
Telephone or cable service interruptions
Chemical and gas leaks or spills
Explosions
Failure of the building structure
57. Which of the following are threats to data
Malicious code
Malware
Criminal acts
Cyber terrorism
58. A backup is a _____against data loss.
Countermeasure
59. To assume your identity, an ID thief needs only the right ____
Information
60. A _____ is a small text file which is placed on your computer on the request made by the web server to your
browser.
Cookie
61. The term ____ describes viruses, worms, Trojan horse attack applets, and attack scripts. These virulent
programs represent the most common threat to your information.
Malware
62. _____ are pieces of a computer program (code) that attach themselves to host programmes.
Viruses
63. ______ are particular to networks, spreading to other machines on any network you are connected to and
carrying out pre-programmed attacks on the computers.
Worms
64. _______introduce malicious code under the guise of as useful program
Trojan Horse
65. Another form of malware which is specifically written, usually by expert programmers, to exploit the Internet
_____
Attack Script
66. ______ is aimed at stealing the computer, damaging information, or stealing information
Computer Crime
67. The use of a computer to carry out any conventional criminal acts such, as fraud, is called _____
Cybercrime
68. A _____is someone who uses a computer and network or internet connection to intrude into another computer
or system to perform illegal act which may amount to simple trespassing or acts that corrupt, destroy or change data.
Hacker
69. In which all manner is hacking classified?
Recreation attack
Business or financial attacks
Intelligence attacks
Grudge and military attacks
Terrorist Attacks
70. Is hacking is a criminal or antisocial activity?
Yes, Both
71. Those hackers who just attempt to prove their abilities without doing any damage
Recreational Hackers
72. The act in which hackers forge or change records for personal gain, or attempting to copy the data from the
penetrated system
Data diddling
73. Which are the common methods of hacking?
Sniffing
Social Engineering
Spoofing
74. The term _____ refers to finding a user’s password.
Sniffing
75. Which of the following methods to sniff a password?
Password sharing
Password guessing
Password capture
76. _____ is the most common and occurs when a victim simply discloses his or her password to a hacker
Password sharing
77. _____ is done exactly as the term implies, a hacker tries to guess a user’s password and keeps trying until he
or she get it right
Password guessing
78. A password capture, a password is obtained by some type of malware program and forwarded to the hacker.
Password capture
79. ______ is also known as running a confidence game. The hacker may use any number of frauds to con
victims out of their passwords
Social Engineering
80. The method in which hacker may contact potential victims by phone or e-mail, and ask the victims to provide
password information for an apparently legitimate reason this method is also known as ____
Phishing
81. Which of the following are examples of social engineering?
Phone survey
The application and the emergency situation
82. In which method hackers may alter an e-mail header to make it appear that a request for information originated
from another address. This is called ____
Spoofing
83. Gaining electronic entry by pretending to be at a legitimate computer which is called ____
IP Spoofing
84. ______ is to harm or control key computer systems or digital controls and to accomplish an indirect aim such
as to disrupt a power grid or telecommunications.
Cyber terrorism
85. CIPB means _____
Critical Infrastructure Protection Board
86. CERT means ______
Computer Emergency Response Team
87. The goal of computer security is to ______
Eliminate or protect against threats
88. A ____is anything that can cause harm
Threat
89. A _____ is any step taken to ward off a threat. It is meant to protect data and systems from damage
Countermeasures
90. Which of the following are threats to the users?
The risk of identity theft
The loss of privacy
The exposure to spam
Physical injury
91. In ___, an ID thief impersonates someone else by using the victims name and personal information.
Identity theft
92. _____ is unwanted or junk e-mail messages.
Spam
93. _____ is vulnerable to physical harm from power-related problems, theft, vandalism, and natural disasters.
Computer hardware
94. ______ is any criminal act that is carried out via a computer.
Cyber crime
95. ______ is a form of warfare in which terrorists attempt to harm or gain control of important computer systems,
such as the systems that run electrical or communications systems.
Cyber terrorism
96. A ______is a weakness – anything that has not been protected against threats, making it open to harm
Vulnerability
97. ______ occurs when someone impersonates you by using your name, Social Security number, or other
personal information.
Identity Theft (ID Theft)
98. A low-tech ID thief might resort to ______, searching for personal information in garbage cans.
Dumpster Diving
99. In ____ an ID thief tricks victims, into providing critical information under the pretext of something
legitimate.
Social Engineering
100. If a legal record is available to anyone who wants to see it, the record is said to be a _____
Public Record
101. The correct term for spam is ______
Unsolicited Commercial E-mail (UCE)
102. In _____, the sender of an e-mail message tries to convince the recipient that the message is from someone
else.
Spoofing
103. A special device, called a ______, protects equipment from line noise
Line conditioners
104. The term _____ describes viruses, worms, Trojan Horses, and attack scripts.
Malware
105. The use of a computer to carry out any conventional criminal act, such as fraud, is called _____
Cybercrime
106. By pretending to be legitimate computer, the hackers gain an electronic entry into one’s computer and this
process is known as ____
IP Spoofing
107. Burglar, viruses, and earthquakes are all examples of _____ because they can harm a computer or its data.
Threats
108. If you regularly back your data, this is a _____against the threat of data loss.
Countermeasure
109. In the right setting, a thief can try ____ information by listening in while the victim gives credit card or other
personal information to a legitimate agent
Snagging
110. Because of the attention paid to the protection of _____, social engineering and low-tech swindles are the
predominate sources to identity theft.
Transmitted data
111. The use of data about your Web-surfing habits is called _____
Online profiling
112. A _____ is a small text file that a Web server can place on your computer.
Cookie
113. A _____ protects your computer system against voltage spikes.
Surge suppressor
114. A ____ is someone who uses a computer and a network or Internet connection to intrude into another
computer or system to perform an illegal act.
Hacker
115. A _____ is a step taken to protect data and systems from damage or any kind of threat.
Countermeasure
116. ______ is unwanted e-mail messages that are usually commercial in nature.
Spam
117. ______ is a form of warfare which is used by the cyber terrorists to harm or gain control of important
computer systems.
Cyber terrorism
118. ______ refers to finding a users password by sharing, guessing or by capturing.
Sniffing
119. The illegal copying of computer software is known as _____
Software Piracy
120. _____ is a device, program, or agreement that attempts to prevent users from illegally copying a program
Copy protection
121. A device which has to be installed by the user before installing a program
Hardware lock
LESSON 13 B
TAKING PROTECTIVE MEASURES
MULTIPLE CHOICE QUESTIONS
1. From the moment they (documents) enter your mailbox until they reach the landfill, many of your most
valuable documents are ______
Vulnerable
2. Before discarding documents, you should ______ any document that contains sensitive information such as
your Social Security number, account numbers, or passwords.
Shred
3. If a company asks you to complete a form on its Web site, you should first check the company’s _____
Security settings
4. If the web site you are viewing places a cookie on your system, the cookie is called a _____ cookie.
First – party
5. An e-mail program’s filters also may be called _____
Rules
6. ______ occurs when magnetic media is close enough to a magnetic source to erase its contents.
Degaussing
7. You should always be keep a floppy disk away from _____
Source of magnetism
8. A __ offers many options for identifying and removing unwanted cookies from your PC.
Cookies management utility
9. Banner ads are examples of _____ cookies
Third party
10. _____ utilities can detect the spyware and Web bug programs.
Anti-spyware
11. ______ are small utilities in your PC which prevent secondary browser windows from appearing when you are
on the Web.
Pop-up blocker
12. A _____ is a document that lists all your financial accounts that can be a source of credit or that you can use to
make purchases or other transactions
Credit Report
13. If you select the _____ on a company’s Web page or warranty form, the company promises either not be share
your information or not to send you advertisements.
Opt-out Option
14. The _____ Act of 1970 mandates that personal information assembled by credit reporting agencies must be
accurate, fair, and private.
Fair Credit Reporting
15. A _____ cookies is temporary it is automatically deleted when you close your browser.
Session
16. A _____ cookie comes from a different Web site than the one you are viewing.
Third Party
17. A _____ window is a secondary browser window that may contain an advertisement and carry spyware.
Pop-up
18. Your _____ e-mail account is the one you set up with your ISP as part of your Internet access package.
Primary
19. By creating a ____ in your e-mail program, you can tell the program to ignore messages from a specific sender
Filter
20. A _____ is a blank screen or a moving image that appears on the screen after the computer has gone unused
for several minutes.
Screen Saver
21. You can use a backup copy of your data to _____ lost files to your PC.
Restore
22. ______ is a tool in windows XP that lists important or unusual events occurring within the system while an
information log is created.
Event Viewer
23. _____ and _____ are personal information that needs to be protected against identity theft and privacy
Social Security Number or account numbers
24. Is it safe to give out account numbers or passwords via e-mail –
No, do so over phone only if you are sure you are dealing with a legitimate business.
25. The purpose served by credit report is _____
To look for suspicious transactions and errors
If someone else is making transactions in your name
26. ______ utility will offer more options for identifying and removing unwanted cookies from your PC.
Cookie management utility
27. ______ software to find and delete spyware from your system. Some antivirus programs also target spyware
Anti spyware
28. Spam can be reduced by setting up a ____ e-mail account using e-mail account, using _____ filters, and
working with your ISP to block spam messages.
Secondary e-mail account
e-mail filters
29. What are the means by which you can secure data?
Limiting physical access to your computer
Using a firewall to prevent hackers
30. ______ are an effective counter measure against threats to your data.
Regular data backups
31. If a disk becomes damaged the data it stores may be lost
True
32. How can you protect PC hardware and data?
Keeping the system clean
Avoiding exposure to magnetism or extreme temperatures
Avoiding Dust which may cause system components to fail
33. While managing your papers against identity theft what are the measures to be taken?
Guard Your Mail
Check Your Statements Immediately
Discard important documents wisely
34. What are the steps to be taken while guarding personal information?
Never give anyone an account number over the phone
Never give out account numbers, passwords, or other personal information via e-mail
When buying something online, make sure the Web site is secure
35. What are the steps taken to protect your credit as well as your personal information?
Check your credit Report at least once a year
Maintain a Good filing System
Check with your Bank and Credit Card Company
36. A _____report is a document that lists all your financial accounts that can be a source of credit or that you can
use for making purchases or for other transactions which includes bank accounts, mortgages.
Credit Report
37. Which of the following methods can you protect your privacy?
Keeping Marketers at Bay
Knowing your rights
38. What are the points to be remembered while providing information to marketers?
Be Wary about filling out forms
Guard your primary E-mail Address
39. Many companies provide an ______ on their registration or warranty forms. By selecting this option, the
company promises either not to share your information with anyone else or not to send you ads
opt- out option
40. Does the comsumer have right to control access to their information?
Yes
41. ______ cookies are temporary cookies that are automatically deleted when you close your browser. It is
essential for viewing some web pages, etc. these are also known as transient cookies
Session
42. ______ are stored on your computer’s hard disk until they expire or you delete them. These have expiration
date. These are also called stored cookies.
Persistent cookies
43. _____ cookies come from the Web site you are currently viewing. These are persistent and usually store
preferences you have set for viewing the site. Some stores information that can personally identify you
First party cookies
44. _____ Cookies come from a different Web site than the one you are currently viewing. Banner Ads are
examples. These often track your browsing history for marketing purposes. These can be session or persistent in
nature.
Third party cookies
45. In which all ways can cookies be managed?
Manually Delete Them
Use Cookie Management Software
46. A ____ utility can locate and delete all the cookies on your PC, either automatically or when you tell it to
Cookie Management Utility
47. _____ is a program that handles cookies
Cookie Crusher
48. ______ program can remove cookies and other types of files from your system, making it difficult for anyone
to track your surfing habits.
Windows Washer
49. _____ utilities can detect both types of programs which include Web bugs and spyware together.
Anti – spyware utilities
50. Which of the following are examples of anti spyware programs?
SpyGuard, NoAdware, XoftSpy
51. Another key to avoiding _____ is to be careful about downloading files and programs from the Internet.
Spyware
52. _____ are small utilities prevent secondary browser windows from appearing when you are on the Web.
Pop-up blocker
53. ______ are secondary browser windows which appear when you are on the Web.
Pop-up Windows
54. Counter measure against spam
Contact the ISP (Internet Service Provider)
55. _____ e-mail account is the one you set up with your ISP as part of your Internet access package.
Primary E-mail Account
56. _______ e-mail account is used when making a purchase or registering for a service.
Secondary e-mail account
57. A ____ is a rule you establish that the program must follow when receiving mail.
Filters
58. e-mail filters are also called ____
Rules
59. ______ programs monitor e-mail messages as you receive them, can block messages from known spammers,
and can mark suspicious messages.
Spam Blockers
60. NAI means _____
Network Advertising Initiative
61. The website which is targeted to opt out of any kind of targeted advertising is operated by ____which
voluntarily respond to the objections to secretive tracking and spamming of Internet users.
NAI
62. The main purpose of _____ is to prohibit unauthorised access to your computer via Internet
Firewall
63. Firewall is of two types
Hardware and software
64. A connection that is always active is called _____
Always on connection
65. Egs of always on connection include the following
Cable modem
DSL connection
66. Always on connection requires _____
Firewall
67. Give some examples of software firewall
ZoneAlarm
BlackICE PC Protection
Norton Personal Firewall
68. You can use a backup copy of your data to _____ lost files to your PC.
Restore
69. To avoid ID theft, you should ____ your mail as soon as it arrives
Pick up
70. _____ cookies are temporary cookies which are automatically deleted on closing a browser.
Session
71. ____ is a tool in Windows XP to see events relating to your system’s applications, security and hardware
devices.
Event Viewer
72. ______ occurs when a magnetic medium is close enough to a magnetic source to erase its contents.
Degaussing
73. Which of the following generate magnetic fields?
Loudspeakers
Computer Monitor
Fluorescent light fixtures
74. Never store disks where they can be exposed to extreme heat or cold
True
75. Exposure to heat can ____ the disk
Melt
76. Exposure to extreme cold can ____ the disk
Shrink or crack
77. Moisture should be avoided
True
78. Dust, dirt can make the disk unreadable
True
79. From what all should you protect your loose storage media from?
Magnetism
Heat and cold
Moisture
Dust, Dirt and Fingerprints
80. How are computer equipments to be stored?
Never store your equipment near large electrical equipment
Store your equipment in climate and heat-controlled environments
Determine whether natural hazards such fire and flood might affect the storage
Ensure that the stored equipment is properly stacked
81. A common cause of component failure is dust
True
82. Which two tools are used to clean your PC?
Canned air and small vacuum
83. PDA means_____
Portable Digital Assistants
84. AI means _____
Artificial Intelligence
GENERAL MULTIPLE CHOICE QUESTIONS FROM TEXT
INTRODUCTION TO COMPUTERS – PETER NORTON
7TH EDITION

1. A generic database language used to construct queries. Similar to SQL but more complex because its
commands cover the full range of database activities beyond querying
Xbase
2. XHTML means ______
Extensible Hypertext Markup Language
3. XHTML MP means _____
Extensible Hypertext Markup Language Mobile Profile
4. XML means _____
Extensible Markup Language
5. XSL means _____
Extensible Stylesheet Language
6. WAN means ____
Wide Area Network
7. WAP means ____
Wireless Access Point
8. The act of searching an area covered by a Wi-Fi network to locate spots where wireless Internet access is
available
War driving
9. A program what enables the user to view Web pages, navigate Web sites, and move from one Web site to
another?
Web browser
10. A GIF format graphic file, placed in a Web page or HTML-format e-mail message that can be used to track a
person’s online activities. It is considered to be a form of spyware
Web bug
11. A document developed using HTML and found on the World Wide Web. It contains information about a
particular subject with links to related Web pages and other resources.
Web pages
12. An internet host computer that may store thousands of Web sites
Web server
13. A collection of related web pages
Web site
14. An inexpensive video camera that connects directly to a PC and captures video images that can be broadcast
over the Internet or through a network connection
Webcam
15. A person or group responsible for designing and maintaining a Web site
Webmaster
16. WEP means ____
Wire Equivalent Privacy
17. A pointing device that features a wheel, located between its two buttons. The user can spin the wheel to scroll
through a document
Wheel mouse
18. A computer network that spans a wide geographical area
WAN
19. Wi-Fi stands for
Wireless Fidelity
20. A networking standard that supports data communications without the use of wire-based media
Wi-Fi
21. An encryption method designed to protect data and private information as it is being transmitted over a
wireless network
WPA / Wi-Fi Protected Access
22. An area on the computer screen in which an application or document is viewed and accessed.
Window
23. A family of OS products developed and produced by Microsoft Corp. The vast majority of personal
computers run Windows, with versions including Windows 3x, 95.x, NT, 2000 and XP. Windows versions 3.x and
earlier were actually operating environments – graphical interfaces that ran on top of the DOS operating system. In
versions 95 and later, Windows is a full- fledged operating system.
Windows
24. An application programming interface (API) for the Windows operating system that assists in connecting
Windows computer to the Internet
Winsock
25. A networking standard that provides wireless networks a level of security similar to that found in secure wire-
base networks
Wire Equivalent Privacy (WEP)
26. WAP means
Wireless Access Point
27. WLAN means _____
Wireless Local Area Network
28. A development language used to create Web pages that can be displayed on small-format Web-enabled
devices such as PDAs or cell phones
WML / Wireless Markup Language
29. A network that transmits data without the use of wires or cables, such networks typically transmit data via
radio waves or infrared signals
Wireless network
30. A network interface card that connects a computer to a wireless network
Wireless NIC
31. A wide area network that uses wireless means rather than wires or cabling for data transmission
WWAN (Wireless Wide Area Network)
32. WLAN means
Wireless Local Area Network
33. WML means
Wireless Markup language
34. Software used to create and edit text documents such as letters, memos, reports, and publications.
Word processors or Word processors programs
35. The size of the registers in the CPU, which determines the amount of data the computer, can work with at any
given time. Larger word sizes lead to faster processing; common word sizes include 16 bits, 32 bits and 64 bits
Word size
36. A data file created with spreadsheet software, containing multiple worksheets.
Workbook
37. The data file created with spreadsheet software
Worksheet
38. A fast, powerful microcomputer used for scientific applications, graphics, CAD, CAE and other complex
application. They are usually based on RISC technology and operated by some version of UNIX, although an
increasing number of Intel/Windows-based workstations are coming into popular use.
Workstation
39. An internet service developed to incorporate footnotes, figures and cross-references into online hypertext
documents.
World Wide Web
40. WPA means ____
Wifi Protected Access
41. WWAN means ____
Wireless Wide Area Network
42. WWW means ____
World Wide Web
43. A numerical entry in a spreadsheet – representing currency, a percentage, a date, a time, a fraction and so on –
that can be used in calculation
Value
44. A mathematical equation that describes the position of a line
Vector
45. VSAT means _____
Very Small Aperture Terminal
46. An earth based communications station that allows an individual or organisation to connect to the internet via
satellite.
VSAT
47. VGA means ______
Video Graphics Array
48. A specialised expansion board that enables the user to connect video devices – such as VCRs, and camcorders
to the PC. This enables the user to transfer images from the video equipment to the PC, and vice versa. Many video
cards enables the user to edit digitized video and to record the edited images on videotape.
Video Capture Card
49. A circuit board attached to the motherboard that contains the memory and other circuitry necessary to send
information to the monitor for display on screen. This controller determines the refresh rate, resolution, and number
of colours that can be displayed. Also called the display adapter.
Video card
50. An IBM video display standard capable of displaying resolutions of 640x480 with 16 colours.
VGA
51. Memory on the video controller (dual ported memory) that can send a screen of data to the monitor while
receiving the next data set
Video RAM (VRAM)
52. A live, real time video communications session involving two or more people using computers, video cameras,
telecommunications and videoconferencing software
Videoconference
53. CRT means
Cathode Ray Tube
54. LCD means
Liquid Crystal Display
55. The widest angle from which a display monitor’s image can be seen clearly
Viewing Angle
56. Which provide a wider viewing angle?
CRT Monitors
57. The actual portion of a computer monitor that displays an image
Viewing Area
58. Space on a computer’s hard drive that acts as a backup to system RAM. Programs can store instructions or
data in virtual memory that is not needed immediately, when an instruction or data is needed, it can quickly be moved
into RAM, where the processor can access it.
Virtual memory
59. Technologies that allow data to be exchanged securely and privately over a public network, such as the
Internet
Virtual Private Network
60. A parasitic program that infects another legitimate program, sometimes called the host. To infect the host
program, the virus modifies the host so that it contains a copy of the virus.
Virus
61. A database of information about specific viruses that enables an antivirus program to detect and eradicate
viruses. Also called a virus pattern.
Virus Definition
62. A protocol that allows voice data to travel over the internet
VoIP
63. VoIP means ____
Voice Over Internet Protocol
64. The tendency for memory to lose data when the computer is turned off, as is the case with RAM
Volatile
65. VPC means_____
Virtual Private Connection
66. VPN means_____
Virtual Private Network
67. Any aspect of a system that is open to harm. For example, if a computer does not have antivirus software, this
is vulnerability because the system can easily become infected by a virus.
Vulnerability
GENERAL MULTIPLE CHOICE QUESTIONS FROM TEXT
INTRODUCTION TO COMPUTERS – PETER NORTON
7TH EDITION

1. XML means
Extensible Markup Language
2. XHTML means
Extensible Hypertext Markup Language
3. XHTML MP means
Extensible Hypertext Markup Language Mobile Profile
4. XSL means
Extensible Stylesheet Language
5. A development language used to create Web pages that can be displayed on small-format Web-enabled
devices such as PDAs or cell phones
Wireless Markup Language (WML)
6. WML means
Wireless Markup language
7. A program what enables the user to view Web pages, navigate Web sites, and move from one Web site to
another?
Web browser
8. A document developed using HTML and found on the World Wide Web. It contains information about a
particular subject with links to related Web pages and other resources.
Web pages
9. An internet host computer that may store thousands of Web sites
Web server
10. A collection of related web pages
Web site
11. An inexpensive video camera that connects directly to a PC and captures video images that can be broadcast
over the Internet or through a network connection
Webcam
12. A person or group responsible for designing and maintaining a Web site
Webmaster
13. WAN means
Wide Area Network
14. WAP means
Wireless Access Point
15. The act of searching an area covered by a Wi-Fi network to locate spots where wireless Internet access is
available
War driving
16. An application programming interface (API) for the Windows operating system that assists in connecting
Windows computer to the Internet
Winsock
17. A computer network that spans a wide geographical area
WAN
18. WAP means
Wireless Access Point
19. WLAN means
Wireless Local Area Network
20. Wi-Fi stands for
Wireless Fidelity
21. A networking standard that supports data communications without the use of wire-based media
Wi-Fi
22. A networking standard that provides wireless networks a level of security similar to that found in secure wire-
base networks
Wire Equivalent Privacy (WEP)
23. WEP means
Wire Equivalent Privacy
24. An encryption method designed to protect data and private information as it is being transmitted over a
wireless network
WPA Wi-Fi Protected Access
25. A network that transmits data without the use of wires or cables, such networks typically transmit data via
radio waves or infrared signals
Wireless network
26. A network interface card that connects a computer to a wireless network
Wireless NIC
27. A wide area network that uses wireless means rather than wires or cabling for data transmission
WWAN (Wireless Wide Area Network)
28. An internet service developed to incorporate footnotes, figures and cross-references into online hypertext
documents.
World Wide Web
29. WPA means
Wifi Protected Access
30. WWAN means
Wireless Wide Area Network
31. WWW means
World Wide Web
32. Technologies that allow data to be exchanged securely and privately over a public network, such as the
Internet
Virtual Private Network
33. A protocol that allows voice data to travel over the internet
VoIP
34. VoIP means
Voice Over Internet Protocol
35. VPC means
Virtual Private Connection
36. VPN means
Virtual Private Network
37. A data file created with spreadsheet software, containing multiple worksheets.
Workbook
38. The data file created with spreadsheet software
Worksheet
39. A numerical entry in a spreadsheet – representing currency, a percentage, a date, a time, a fraction and so on –
that can be used in calculation
Value
40. Software used to create and edit text documents such as letters, memos, reports, and publications.
Word processors or Word processor programs
41. An area on the computer screen in which an application or document is viewed and accessed.
Window
42. The size of the registers in the CPU, which determines the amount of data the computer, can work with at any
given time.
Word size
(Larger word sizes lead to faster processing; common word sizes include 16 bits, 32 bits and 64 bits)
43. The tendency for memory to lose data when the computer is turned off, as is the case with RAM
Volatile
44. A fast, powerful microcomputer used for scientific applications, graphics, CAD, CAE and other complex
application.
Workstation
45. An earth based communications station that allows an individual or organisation to connect to the internet via
satellite.
Very Small Aperture Terminal (VSAT)
46. VGA means
Video Graphics Array
47. A specialised expansion board that enables the user to connect video devices – such as VCRs, and camcorders
to the PC which enables the user to transfer images from the video equipment to the PC, and vice versa.
Video Capture Card
48. A circuit board attached to the motherboard that contains the memory and other circuitry necessary to send
information to the monitor for display on screen which determines the refresh rate, resolution, and number of colours
that can be displayed.
Video card (Display adapter)
49. Memory on the video controller (dual ported memory) that can send a screen of data to the monitor while
receiving the next data set
Video RAM (VRAM)
50. A live, real time video communications session involving two or more people using computers, video cameras,
telecommunications and videoconferencing software
Videoconference
51. CRT Means
Cathode Ray Tube
52. LCD means
Liquid Crystal Display
53. The widest angle from which a display monitor’s image can be seen clearly
Viewing Angle
54. Which provide a wider viewing angle?
CRT Monitors
55. The actual portion of a computer monitor that displays an image
Viewing Area
56. Space on a computer’s hard drive that acts as a backup to system RAM.
Virtual memory
(Programs can store instructions or data in virtual memory that is not needed immediately, when an instruction or
data is needed, it can quickly be moved into RAM, where the processor can access it)
57. A parasitic program that infects another legitimate program, sometimes called the host. To infect the host
program, the virus modifies the host so that it contains a copy of the virus
Virus
58. A database of information about specific viruses that enables an antivirus program to detect and eradicate
viruses.
Virus Definition. Also called a virus pattern.
59. A GIF format graphic file, placed in a Web page or HTML-format e-mail message that can be used to track a
person’s online activities which is considered to be a form of spyware
Web bug
60. A mathematical equation that describes the position of a line
Vector

Das könnte Ihnen auch gefallen