Friday, 29 May 2020

Solved January 2017 Introduction to ICT Resources

Solved: NIELIT (O-Level) January 2017 Introduction to ICT Resources

1. Each question below gives a multiple choice of answers. Choose the most answer sheet supplied with the question paper, following instructions therein. 
(1x10)

1.1 : When a computer is first turned on or restarted, a special type of absolute loader called ____ is executed
A) Compile and Go loader
B) Boot loader
C) Bootstrap loader
D) Relating loader
Answer


1.2 : Which among the following are the best tools for fixing the errors?
A) Fdisk
B) Scandisk
C) CHKDSK
D) Fixdisk
Answer

1.3 : Which command is not an internal command?
A) Dir
B) Edit
C) CD
D) CLS
Answer

1.4 : Which command does not exist in DOS?
A) Sum
B) CLS
C) CD
D) Dir
Answer

1.5 : To make directory
A) MKD
B) MKDIR
C) CD
D) All of the above
Answer

1.6 : Boot startup process
A) Loads system files to RAM
B) Checks the computer connections
C) Clean up the computer memory
D) Prepare the computer ready
Answer

1.7 : A zip is a program used to
A) Speed up the computer memory
B) Speed up the disk access
C) Compress files
D) All of above
Answer

1.8 : Bridges are also repeaters and
A) Regenerator
B) Preprocessor
C) Reposted
D) Redesigned
Answer

1.9 : In wireless ad-hoc network
A) access point is not required
B) access point is must
C) nodes are not required
D) none of the mentioned
Answer

1.10 : A device used for filtering network traffic.
A) Preprocessor
B) Firewall
C) Flip Flop
D) Decoder
Answer

2. Each statement below is either TRUE or FALSE. Choose the most appropriate one sheet supplied with the question paper, following instructions therein. (1x10)

2.1 Compression may be able to double the amount of information the drive can store.
2.2 LAN is used to connect computers placed within a building.
2.3 Lossless compression is used to compressing image and graphics file.
2.4 Winzip is the example of disk compression.
2.5 Deleted files can be restored from recycle bin.
2.6 Drive converter converts drive into FAT-64 file system.
2.7 Registry checker scans the contents of your Registry for problems and errors.
2.8 An IRQ helps a device to communicate directly with computer memory to speed up processing of information.
2.9 Bridge can operate on both layers, physical and data link layer.
2.10 Trojan Horse is self propagating virus program which has independent existence.

Answer


3.Match  words  and  phrases  in  column  X  with  the  closest  related  meaning/  word(s)/phrase(s) in    supplied  with  the  question paper,following instructions therein. (1x10)

X
Y
3.1
Wired Equivalent Privacy
A.
Bomb
3.2
UDP Packets
B.
Worm
3.3
Utility to remove scattered free space
C.
Anti-Virus
3.4
Create your own signature/Logo
D.
Lossy
3.5
Red Alert Software
E.
Lossless
3.6
Utility to compress data and archive files
F.
PKZIP
3.7
Compression for JPEG
G.
Disk Defragmenter
3.8
Virus which does not require host to propagate
H.
User datagram
3.9
Virus set by time or by any logic on event
I.
Message-oriented
3.10
TCP
J.
Provide error-checked delivery


K.
Virus


L.
Security algorithm for wireless networks


M.
Logo designer


4. Each  statement below has a blank space to fit one of the word(s) or phrase(s) in the list below.    the question paper, following instructions therein. (1x10)

A.
Dynamic
B.
reliable
C.
16
D.
32
E.
Scan Disk
F.
Router
G.
Transport
H.
Application
I.
MAC
J.
last
K.
first
L.
Nero
M.
Network Layer





4.1 The ________ of TCP/IP protocol is responsible for figuring out how to get data to its destination.
4.2 TCP is a(n) ________ transport protocol.
4.3 ________ address of a computer in unique and is used at data link layer.
4.4 ________ is CD writing software.
4.5 TCP assigns a sequence number to each segment that is being sent. The sequence number for each
segment is number of the ________ byte carried in that segment.
4.6 ________ does the traffic directing functions on the internet.
4.7 UDP and TCP are both ________ layer protocols.
4.8 ________ is used for checking disk space.
4.9 A port address in TCP/IP is ________ bits long.
4.10 The DLL extension stands for ________ link library.

Answer


PART TWO
(Answer any FOUR questions)

5.
a) How does a router differ from a bridge?
b) Write standard settings of a BIOS setup procedure.
c) How to create a new Windows NT user account?
(5+5+5)

6.
a) Write a procedure to configure networking on Windows NT Operating System.
b) What is a printer? Write steps to share a printer in Windows NT network.
(8+7)

7.
a) What is defragmenting a disk drive?
b) What are computer viruses? How do you detect and eliminate them?
c) What are gateways? Why default gateway setting is required on systems connected in network?
(4+5+6)

8.
a) Write about straight through and cross over cables?
b) What is the functionality of the commands 'netstart','nslookup' and 'ping'
c) How to Restore a System from Backup Procedure in Windows XP?
(5+5+5)

9.
Explain briefly any three from the following:
a) Computer viruses
b) TCP protocol.
c) Antivirus software
d) WAN
(3x5)

Next Set

No comments:

Post a Comment