O Level
January, 2011
M4.3-R4: INTRODUCTION TO ICT RESOURCES
NOTE:1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.
2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)1.1 The device which allows you to enter data into the computer
A) mouse
B) keyboard
C) floppy disk
D) scanner
1.2 The name given to a device that is attached to a computer.
A) program
B) CPU
C) peripheral
D) registry
1.3 The .WMA file extension stands for
A) Windows Media Access
B) Windows Media Audio
C) Windows Media Authentication
D) Windows Memory Access
1.4 Nero software is used to write on
A) Floppy
B) RAM
C) CD-ROM
D) Disk
M4.3-R4 Page 2 of 5 January, 2011
1.5 The command used to erase all the data on a disk
A) FORMAT
B) ERASE
C) REMOVE
D) DELETE
1.6 Anti-virus software is used to
A) Remove bad programs
B) Delete corrupted files
C) Clean infected files
D) Fragment a disk
1.7 Which network topologies are affected by the loss of one computer?
A) bus
B) star
C) hub
D) square
1.8 Which type of cable has glass center core?
A) UTP
B) Fiber-Optic
C) STP
D) Coaxial
1.9 Which one of the following is built-in user group in Windows NT?
A) guest
B) someone
C) everyone
D) all of the above
1.10 Which of the following permission is not required to list a folder in Windows?
A) fullcontrol
B) modify
C) read & execute
D) write
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1x10)
2.1 The Network Monitor tool is used to analyze protocol problems in Windows NT.
2.2 It is not possible to turn-off simple file sharing in windows.
2.3 Baseband is a transmission technique.
2.4 Format utility is a destructive process.
2.5 Windows NT server can be configured as a domain controller.
2.6 MS Office can be installed in windows system folder.
2.7 Registry backup is not possible in Windows Server.
2.8 Windows XP defragmenter can fragment only one volume at a time.
2.9 Printer can be shared in a LAN by many users.
2.10 PKZIP utility is used to encrypt or decrypt files.
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1x10)
X Y
3.1 CMOS A. Set date in DOS system
3.2 com B. Command to check the availability of remote device
3.3 Date C. MS-Office file extension
3.4 PDC D. Wi-Fi
3.5 PING E. File Management
3.6 802.11 F. Format
3.7 xls G. Loader
3.8 Nero H. Sharing data
3.9 peer-to-peer I. CD burn
3.10 NTFS J. Real Time Clock
K. Primary Domain Controller
L. executable file extension
M. Centrally Monitor Operating System
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
D. ATM E. DDR F. LUN
G. NTLDR H. LDAP I. DHCP
J. GIF K. NetBEUI L. Infrared
M. Network
4.1 ________ service allocates network parameters dynamically to clients.
4.2 ________ network setting determines the size of network.
4.3 ________ transmission technique is used in wireless networks.
4.4 ________ is a boot loader of windows operating system.
4.5 ________ is a network protocol.
4.6 ________ is a cell-based switching technique.
4.7 ________ is a data connection between two or more devices.
4.8 ________ is a type of computer memory.
4.9 ________ is a compressed image file format.
4.10 ________ is a hardware device that is used to network multiple computers together.
PART TWO
(Answer any FOUR questions)
5.a) Explain the Post-Assembly inspection procedure.
b) Write any five features of Scandisk utility.
c) What is a router? Explain static routing.
(5+5+5)
6.
a) What is file sharing in Windows Operating System? How to protect files in a shared folder?
b) Explain the advantages and disadvantages of bus topology.
c) Explain the features of WinZip utility.
(5+5+5)
7.
a) Write about straight through and cross over cables?
b) What is the functionality of the commands ‘netstat’, ‘nslookup’ and ‘ping’?
c) How to Restore a System from Backup Procedure in Windows XP?
(5+5+5)
8.
a) What is the functionality of Anti-virus software?
b) Explain the system startup process.
c) What is a switch? How does the switch work as a layer two device?
(5+5+5)
9.
a) Write about Wide Area Network.
b) How to format a primary and secondary hard disks by using DOS Operating System.
c) Write a short note on TCP protocol.
(5+5+5)
No comments:
Post a Comment