O Level
July, 2010
M4.3-R4: INTRODUCTION TO ICT RESOURCES
NOTE:1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.
2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the mostappropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1x10)
1.1 What is the most important role of BIOS?
A) loading the operating system
B) initializing Input/Output devices
C) initiating the microprocessor
D) running applications MIDI means
1.2 Which of the following is a special database that holds key information about your system
including the device drivers?
A) BOOT.INI
B) CONFIG.SYS
C) Registry
D) SYSTEM.INI
1.3 The .DLL extension stands for Dynamic _________ Library file.
A) Lever
B) Link
C) Lower
D) License
1.4 Which standard body created the cables and connector specification used to support
Ethernet implementation?
A) ISO
B) NSI
C) EIA/TIA
D) IETF
1.5 On a Windows NT system, where would you go to manage shares to work with other
computers?
A) Windows Explorer
B) User Manager
C) Primary Domain Controller
D) Network Manager
M4.3-R4 Page 2 of 5 July, 2010
1.6 One important benefit a hub brings to the home network is
A) protection against virus
B) shared storage
C) ability to share files among connected computers
D) to protect computer from power problems
1.7 Number of hosts possible with address 192.168.1.4/32
A) one
B) thirty two
C) four
D) none of the above
1.8 How can you easily clear the CMOS, including clearing the password?
A) Unplug the PC
B) Unplug the PC and remove the CMOS battery.
C) Issue a ClearCMOS command from the command line.
D) This can not be done
1.9 Where does the motherboard store the keyboard controller support program?
A) DRAM
B) Harddrive
C) RAM
D) ROM
1.10 Which of the following handles the interconnection between most of the devices and the
CPU?
A) Northbridge
B) RAM
C) ROM
D) Southbridge
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein. (1x10)
2.1 BIOS is a type of hardware.2.2 WinZip utility encrypts the contents of file.
2.3 To execute the Windows Media Player at the Start\Run dialog box you would type
‘mplayer2.exe’.
2.4 Defrag utility is non-destructive process.
2.5 A router is a specialized computer that is programmed to interface between different
networks.
2.6 Ethernet uses the Carrier Sense Multiple Access with Collision Detection access method.
2.7 To connect two computers directly, a straight through cable is used.
2.8 Total number of possible TCP ports is 65536.
2.9 WINS server is used for name resolution in Windows NT.
2.10 Mesh topologies are the least expensive and are easier to maintain.
3. Match words and phrases in column X with the closest related meaning/word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
X Y
3.1 POST A. Extension of windows installation file3.2 byte B. Wireless Ethernet
3.3 twisted pair C. Forward packets
3.4 Wi-Fi D. Standard alphanumeric code
3.5 TRACERT E. Name resolution
3.6 MAC F. Network Interconnection
3.7 router G. Cross talk
3.8 bridge H. Set up default gateway address
3.9 TCP/IP I. Check path to destination computer
3.10 dns J. Power on self test
K. Ethernet Access
L. Unit is used to measure the capacity of RAM
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
A. Physical B. Administrator C. Folder
D. Star E. MAN F. Formula
G. Defragmentation H. Attrib I. Protocols
J. Format K. NTLDR L. Header
M. DPI N. NIC O. Amplifier P. Ring
Q. Memory R. Fiber-optic S. Repeater T. Application
4.1 Every ________ comes with its own physical address
4.2 A user interface can be provided on the ________ OSI layer.
4.3 ________ user has full right on windows computer.
4.4 ________ is a bootstrap program in windows.
4.5 ________ type of cable has glass centre core.
4.6 ________ define a common method of communication between computers.
4.7 ________ makes the computer to access files in hardisk faster.
4.8 ________ utility removes everything on a hard-disk partition.
4.9 ________ topology uses token passing.
4.10 ________ is used to regenerate network signal to extend distance.
PART TWO
(Answer any FOUR questions)
5.a) What is bootstrap loader? Explain bootstrap process in Windows Operating System.
b) How to run scandisk utility? What are the features of scandisk utility?
c) What is network topology? Discuss any four most commonly used topologies.
(4+4+7)
6.
a) How does a router differ from a bridge?
b) Write standard settings of a BIOS setup procedure.
c) How to create a new Windows NT user account?
(5+5+5)
7.
a) How to setup a printer in windows using wizard?
b) How to burn a CD with files from your computer using Nero?
c) What is an IP Address? Explain network address part and host address part in IP address
with an example.
(4+4+7)
8.
a) What is defragmenting a disk drive?
b) What are computer viruses? How do you detect and eliminate them?
c) What are gateways? Why default gateway setting is required on systems connected in
network?
(4+5+6)
9.
a) How to back up files and folders by using the Backup utility.
b) Why subnetting is required? How a class-C network can be subnetted into four networks of
equal size.
c) What is compression? Explain compression ratio with respect to text files.
(5+5+5)
No comments:
Post a Comment