SOLUTION OF FUNDAMENTAL UNITS + DBMS OF SUNRISE PUBLICATION
Chapter -1
Computer Network and Telecommunication
1. State
true or false:
a) Communication is
the process of sharing message from one point to another. True
b) In half
duplex mode of communication, data can be transmitted in both directions
simultaneously. False
c) Metropolitan
Area Network connects two or more LAN together with in a large city or
state. False
d) Computer
network allows sharing of software only. False
e) Coaxial cable
has much greater bandwidth than fiber optic cable. False
f) A
gateway is a network device which connects two dissimilar networks
together. True
g) Each computer
or device in a network is called node. True
h) Peer-to-peer
is a network model which has more security than client server. False
2. Choose
the correct answer:
a. Which of the
following acts as the central authority in the network?
i. protocol ii.client
iii.server iv.none of the above
Server
b. which of the following is not Media connector?
i.BNC
ii. terminator
iii.RJ-45
iv.NIC
NIC
c. In which of the following network model all the
computers have equal access?
i. Peer-to-peer
network
ii. apple talk network
iii. Client/server
network iv.
None of the above
Peer-to-peer network
d. Which is an inter networking device that connects two
dissimilar networks?
i.
Bridge ii.
Gateway iii.
Switch iv. Router
Gateway
e. Which of the following device is multi ports repeater?
i.
Hub
ii. router iii.
bridge iv. Gateway
Hub
f. Which of the following is not a protocol?
i.TCP/IP
ii.IPX/SPX iii.NETBIOS/NETBUI
iv. Client
Client
g. Which of the following is not the network operating
system?
i. windows
ii.MS-DOS iii.
Linux iv.
None of the above
MS-DOS
h. The speed of Modems is measured in terms of
i.
mbps
ii.bps iii.
kbps
iv. Bits
bps
i. Which of the following is guided communication media?
i. radio wave
ii. fiber optic cable
iii.satellite iv.Infrared
fiber optic cable
j. Which of the
following
topology uses hub as compulsory device
i. star topology ii. Bus
topology iii. Ring
topology iv.
None of the above
star topology
k. Which is not network hardware component?
i.HUB
ii. Repeater iii.
Router iv.
Windows NT
Windows NT
l. In which communication media does light travel in the
form of light signal?
Fiber optic
3. Match the following points:
a. Column
A
Column B
i. Computer
network
Windows NT ii)
ii. Network
OS
HTTP iv)
iii. Transmission
channel
Resource Sharing i)
iv.
Protocol
UTP iii)
Bit
b. Column
A
Column B
i.
Wi-Fi
Network within a building
ii. Linear
Bus
Software component iv)
iii.
BNC
Topology ii)
iv. Device Driver
Transmission Media i)
Media connector iii)
5. Write technical
terms for the following statements:
a) The modes of
transmission in which communication takes place from both the sides
simultaneously.
Full duplex mode
b) A computer network
limited within a room.
LAN
c) The interconnection
between two or more computers through physical and logical components to share
resources.
Computer network
d) The set of rules
and procedures that makes the communication possible among different
computers in a network.
Protocol
e) The computer that
acts as the central authority on a network.
Server
f) The computer
on which users run applications.
Workstation
g) The amount of data
that can be transmitted through communication channels in a fixed time period.
Bandwidth
h) A network which is
extended beyond the boundary of countries.
WAN
i) A
device with multiple ports that joins multiple computer together.
Hub
j) The
software which controls and manages all the operation in computer network.
NOS
k) The computer that
controls and coordinates all the activities of the entire computer in a
network.
Server
l) The
physical interface between cabling and network places.
Topology
m) The topology in which all the
computers are connected by a common distribution channel.
Bus Topology
n) The device which
accepts weak signals regenerates them and sends them back on their way.
Repeater
o) The topology on
which all the computers are connected to each other in a closed circular loop.
Ring Topology
p) A communication
media which use light to carry a data signal through the cable.
Fiber optics
q) The physical layout
or cabling structure of computers on Local area network.
Topology
r) The device
that connects communication media with network devices.
Connectors
s) An
intelligent device that connects two different networks by setting best network
traffics.
Router
t) The
device which connects similar networks having same protocols.
Bridge
6. Write the full forms of the following:
LAN, MAN, WAN, Wi-Fi, NIC, VOIP, UTP, Modem, NOS, PPP, SMTP,
POP, IMAP, NNTP,
NetBEUI, NCP, BNC, GPS, MAC
Chapter – 2
E-Mail and Internet
1. Fill in the
blanks:
a. Internet is also known
as network of networks .
b. Mozilla Firefox is web
browser program.
c. IRC is an
online textual communication with each other in real time.
d. FTP is a
protocol used to upload and download information.
e. The process of copying
and storing data, files, programs, etc. from internet server to user’s computer
is known as downloading.
2. Choose
the correct answer:
a) The unique address
of a web page on the internet is called
i.URL
ii. Browser iii.
Protocol
iv.HTTP
URL
b) Which is the
protocol used in internet?
i.
TCP/IP
ii.FTPiii.ICP iv.ISP
TCP/IP
c) Which one of the
following is internet service?
i.
Chat
ii. e-commerce iii.
e-mail
iv. all of the above
all of above
d) Which of the
following allows the user to surf and interact with the web-page?
i.website
ii.browser iii.web
page
iv.web server
browser
e) The ARPAnet was
developed by
i.ANSI ii.DARPA iii.POPA iv.None of them
None of them
f) Which is the
correct email ID?
i.Yahoo@ramesh ii.ramesh@yahoo.com iii.@ramesh.yahoo.co
iv.None of the above
ramesh@yahoo.com
g) Which device is necessary
to operate the internet?
i.CD-ROM
ii. ISPiii.
Modem
iv.All of above
ISP
Which is web browser software?
i.Windows
2007
ii.Internet explorer iii.Windows
NT
iv.All of the above
Internet explorer
h) Which is not
related to Internet?
i.ISP
ii.TCP/IP
iii.WWW
iv.UPS
UPS
3. Match the
following:
Column
A
Column B
a) Usenet
Instant
Chatting b)
b) MSN
Remote Login c)
c) Telnet
Internet component d)
d) Modem
Newsgroup a)
e) Website
6. Write technical
term for the following:
a) The process of
sending and receiving messages electronically through the internet.
E-mail
b) The very first page
of every web site.
Homepage
c) c.A company that
provides internet services to the users.
ISP
d) Software or
programs that search the website for us.
Search engine
e) Software that is
used for surfing information through the internet.
Web browser
f) The process
of copying files,documents, programs,etc from users computer to the web server.
Uploading
g) An internet tool
that helps to download /upload the file.
FTP
h) Buying and selling
products and services online.
E-commerce
i) The
private network within an organization that utilizes the internet services.
Intranet
7. Write full forms of the following:
TCP/IP, HTTP, NTC, FTP, WWW, IRC, NSFNet, URL, ISP, DARPA,
ISDN, HTML, MIIS.DNS
Chapter – 3
Computer Security
1. State true or
false:
a) Computer security
is concerned with hardware security only. False
b) Backup is
used for scanning and protecting computer from viruses. False
c) The use of ID card
prevents unauthorized person from being entered in computer room. True
d) The lost data and
information can be easily recovered in computer. False
e) The required
voltage for computer system is 220 to 240. True
f) Scan disk is a
disk tool that allows checking files, folders, bad sectors, lost clusters, lost
chains and any errors of the specific disk. True
2. Select the best
answer:
a) Which of the
following is not hardware security method?
i.Insurance
ii.Maintenance iii.Closed-circuit
cameras iv.Hard lock key
Hard lock key
b) Which of the
following measure allows to protect computers being opened from unauthorized
user?
i.Antivirus program
ii.Password
iii.Debug
iv.program
Password
c) The computer
security is purely concerned with the following
i.Hardware
security
ii.software security iii.Hardware and software
security iv.Data security
Hardware and
software security
d) Which of the
following is not power supply decide?
i.Volt
guard
ii.UPS iii.Constant Voltage
Transformer
iv.Power Plug
Power plug
e) Which of the
following is not software security measure?
i.Virus
Scanning ii.
Scan disk
iii. Password
iv. Security Guard
Security Guard
3.Match the
following:
Column
A
Column
B
a) Hard Lock
Key
Hardware Security c)
b) Spike
guard
Software security a)
c) Insurance
Power protection device d)
d) Burlar
alarm
Computer Security b)
Prevents unauthorized entrance
5. Write technical
term for the following:
a) The method applied
to increase the life of computers and its assets.
Regular
maintenance
b) The secret word or
phrase of authorized users to open computer and access programs.
Password
c) The scattering of
the parts of the same disk file over different locations.
Fragmentation
d) The process of
re-writing parts of a file to contiguous sector on a hard disk to increase the
speed of access and retrieval.
Defragmentation
e) The process of
making a reserve copy of file,which can be restored in case of original file is
corrupted.
Backup
f) The power
regulating device this supplies constant power to the computer from its backup
system.
UPS
g) The software used
to scan,locate and detect the disk for viruses.
Antivirus
h) An utility program
used to detect and repair lost clusters and bad sectors of hard disk.
Scan disk
6.Write the full forms of the following:
CPU, UPS, CCTV, CVT, AC, DC, DVD, RAM
Chapter – 4
Computer Virus
1. Fill in the blanks:
a) Computer virus replicates itself.
b) Antivirus is
used to remove virus from computer.
c) File infector viruses
corrupt only executable files form the computer.
d) The first person who
introduced the concept of replicating program was John Von Neumann.
e) Polymorphic viruses
are very difficult to identify and detect by anti-virus.
f) We should install Latest
and updated antivirus in our computer.
2. Match the
following:
Column
A
Column B
a) CPAV
Propagating virus c)
b) Software
piracy
Antivirus software a)
c) Worm
Virus
transfer
d) Password
Purpose of virus development b)
Virus safety
measure d)
3. Select the
correct answer:
a) Computer virus are
known as
i.computer
programs
ii.biological problems iii.hardware
components iv. None of the above
Computer programs
b) Which of the
following is not anti-virus
i.AVG
ii.NAV
iii,Kaspersky
iv.I Love you
I Love You
c) Which of the
following virus infects the various parts of operating system?
i.boot
sector
ii.
Worm
iii.Macro
iv.system infector
System infector
d) Which is the source
for virus transfer?
i.Mouse
ii.Pen
drive
iii.Printer
iv.None of the above
Pendrive
e) Which software
protects from computer virus?
i.Antivirus
software
ii.Word processing software
iii.Spreadsheet software
iv.Backup software
Antivirus Software
f) Computer
virus can destroy
i.Hardware
ii.Software
iii.Data
iv.All
Data
g) Boot sector virus
infects
i.System
files
ii.Master boot record
iii.Application software iv.Document file
Master boot record
5. Write technical
terms:
a) A program that
destroys other program.
Computer virus
b) The software used
to scan computer memory and disk to detect viruses.
Antivirus
c) The viruses which
have combination features of boot sector viruses and program viruses.
Multipartite Virus
d) A type of computer
virus that infects the document or template of word processing or spreadsheet.
Macro virus
e) The Program which
is used to detect and eliminate computer virus.
Antivirus program
6. Write full forms of the following:
MCP, MBR, NAV, CPAV, PAV, KAV, USB
Chapter – 5
Cyber Law and Computer Ethics
1. State true or false:
a) Cyber law of Nepal was
introduced in 2060 B.S. False
b) Cyber law covers those
areas including ICTS. True
c) Internet pornography
is a type of cyber crime. True
d) The term ‘cyberspace’
was used by William Gibson for the first time. True
e) Cyber ethics are moral
principles that make aware to the computer users. True
2. Match the
following:
Column A
Column
B
a) Digital
Signature
Cyber crime b)
b) Forgery
Electronic security system a)
c) Encryptions
Cyber law d)
d) Copy
right
Locking message c)
Computer crime
3. Choose the
correct answer:
a) Which of the
following is computer crime?
i.piracy
ii.pornography
iii.harassment
iv.All of above
All of above
b) When did cyber law
introduced in Nepal.
i.2002 A.D.
ii.2003
A.D.
iii.2004
A.D.
iv.2005 A.D.
2004 A.D
c) Which of the
following is not computer crime?
i.Plagiarism
ii.Password guessing
iii.Internet
iv.virus transferring
Internet
d) Which of the
following is included in cyber law?
i.Trademark right
ii.Copyright
iii.Data privacy
iv.All of the above
All of the above
e) Which of the
following is not computer ethics?
i.Not to steal
data
ii.Not to bear false message
iii.Not to use
Internet
iv.Not to harm the society
Not to use
internet
5.Write technical terms for the following:
a) The process of
unauthorized access to an information system intentionally.
Hacking
b) The rules and
procedures relates to the internet and cyberspace.
Cyber law
c) Moral rules to be
followed by computer and other professionals.
Computer ethics
d) A security
mechanism used on the internet that relies on two keys, one public and one
private.
Digital signature
e) Virtual space
created by computer networks, internet to make communication.
Cyber space
f) A person who
uses a computer to gain an unauthorized access.
Hacker
g) A computer user who
attempts to break into copyright protected software or an information system.
Cracker
h) The rules and
regulation to systematize the computer related technology.
Cyber law
6. Write full forms of the following:
ICT, IT, ATM, NITC, CCA, ETDSA, NITDC, MOST,
HLCIT
Chapter – 6
Multimedia and Its Application
1. Match the
following:
Column A
Column B
a) TOEFL
Multimedia software b)
b) PowerPoint
Multimedia component c)
c) Speaker
Interactive multimedia a)
d) Advertisement
Virtual reality
Multimedia application d)
2. Select the best
answer:
a) Which of the
following media are used in Multimedia system?
i.Text-audio
ii.Text-visual
iii.Text, graphic, audio and visual iv.Text,
graphic and sound
Text, graphic,
audio and visual
b) Which of the
following is multimedia application?
i. Education
ii.Entertainment
iii.virtual reality
iv.All of above
All of above
c) Which of the
following is software used in multimedia technology.
i.Office
XP
ii.Adope
Photoshop
iii.Basic
iv.None of the above
Adobe
Photoshop
d) Which of the
following is note multimedia software?
i. Windows media
player ii.Windows
XP
iii.Adobe
illustrator
iv.Macromedia flash
Windows
XP
e) Which of the
following are components of multimedia?
i.Computer
ii.Software
iii.Projector
iv.All of above
All of above
f) Which is a
technology that allows people to enter and interact with three dimensional
computer graphics world?
i.Virtual
system
ii.Virtual reality
iii.Graphics
system iv.All of the above
Virtual
reality
g) Which of the
following is main component of multimedia?
i.Floppy
disk
ii.Hard
disk
iii.Sound card
iv.Magnetic tap
Sound
card
4. Write technical
term for the following:
a) The process of
displaying alphanumeric characters on the screen to present information.
Text
b) An integration of
audio,video,graphics and text.
Multimedia
c) It is simulation
movement created by displaying a series of particular frames or pictures.
Animation
d) The artificial
environment created by computer technology to entertain user.
Virtual reality
e) A high capacity
storage device that can read and write data into storage media.
DVD
f) The computer
having capability to integrate two or more types of media for information
presentation.
Multimedia
computer
g) The program used to
create and present multimedia system.
Multimedia
Authority software
5. Write full forms of the following:
CBE, CAL, CAI, CBT, BMP, GIF, JPEG, LCD, CD-ROM, DVD
Chapter – 8
DBMS [Database Management System]
1. State true or false:
a) MS-Access is
spreadsheet software. False
b) The default extension
of MS-Access file is .DBF. False
c) Primary key field
cannot be left blank. True
d) We cannot change data
type of a field. False
e) Memo field is used to
store long information beyond of the text. True
f) Yes/No Logical
field stores one bit of data. True
g) More than one table
can be created in MS-Access. True
h) Query can be used to
apply mathematical calculations in the table. True
i) We can
make the form as the source of table. False
j) * is a
wild card that represents any one character in an expression. False
k) A form allows
displaying one complete information at once. True
l) A query is
used to select records from many tables. True
m) Index decreases the speed of the
query and short operations. False
n) Report is used to
prepare database for final printing. True
o) Field name can be up
to the 98 characters long. False
2. Select the best
answer:
a) Which of the
following is not MS-Access database object?
i.
Table
ii.
Form
iii.
Query
iv.
Print
b) Which of the
following data type is appropriate to store gender of person in terms M or F?
i.
Memo
ii.
Currency
iii. Yes
no
iv. Auto number
Yes no
c) Form is designed
for
i. filters
data
ii. Sort
data
iii. Sort data
iv. Modify data
Modify data
d) Query is used to
i. retrieves data from database
ii.
Create table in database
iii. Print database iv. All
of above
retrieves data from
database
e) Report is used for
i. Printing
database
ii. Process database iii. Filter
database iv. None
of the above
Printing
database
f) Which of the
following is not a data type?
i.
Picture
ii.date/time
iii.text
iv.number
Picture
g) What is the maximum
length of text field?
i.512
characters
ii.50
characters
iii. 255 characters iv.No limit
255 characters
h) Which of the
following is not field property?
i.
indexed
ii. Field
size
iii.color
iv.format
color
i) What
field type is used to store picture in a table?
i.memo
ii.OLE
iii.hyperlink
iv.None
OLE
j) Which
of the following uniquely identifies any field.
i.Index
ii.Memo
iii.Primary
key
iv.Query
Primary key
k) The object of
MS-Access that stores the data is known as
i.Query
ii.Table
iii.Form
iv.report
Table
l) Which
is the example of Relational Database Management System?
i.Oracle
ii.FoxBASE
iii.Sybase
iv.FoxPro
Oracle
m) The datatype which is used for
only integer value.
i.text
ii.currency
iii.number
iv.OLE
number
n) What kind of data
are kept in memo field?
i.Name of
Student
ii.Students phone number
iii.Students Bio
data
iv.Students picture
Students’ Bio data
o) Which of the
following is not the datatype of MS-Access?
i.yes/no
ii.true/false
iii.on/off
iv.All
Yes/no
p) A field is also
known as
i.records
ii.column
iii.Database
iv.entity
column
q) Which of the
following field property limits from wrong data entry.
i.Input
mask
ii.caption
iii.required
iv.validation rule
validation rule
3.Match the
following:
a) Column
A
Column B
Index
database
Data
redundancy
software d)
Record
easy
to search a)
DBMS
repetition of data b)
Tuple c)
b) Column
A
Column B
Form
database
Primary key
data type d)
Advance
Filter
text control a)
Hyperlink
unique
identification of record b)
Query c)
c) Column
A
Column B
Sort
mass
change d)
Single
precision
DBMS c)
FoxPro
memo field
Update
query
sub type of number b)
Arranging data a)
d) Column
A
Column B
Mark
ledger
Predefined formats c)
Wild
cards
database a)
Wizard
primary key d)
Relationship
*
and? b)
Report
Sir could u provide us PDF of sunrise computer book?
ReplyDeleteI also need
DeleteDear Arjunji, Namaste..
ReplyDeleteI am Sita Ram Bhatta. My Son is studying at Small Heaven Model School, Aanptaari chitwan in Grade 10. They are using the same book. Thus, I also need this in PDF if possible so I can guide him properly as I am outside Nepal.
If you support in getting easy for me to guide him from distance using digital platform.
My email ID is - sirabhatta@gmail.com
With Sincere thanks.
I need a solution of file handling in qbasic
ReplyDeleteI need solution of msaccess program examples practical.
ReplyDeleteSir can you provide me exercises solutions of contemporary technology chapter
ReplyDeletesir i need computer book pdf file
ReplyDelete