Pages

Monday, 25 May 2020

Solved : July 2016 Introduction to ICT Resources

Solved : NIELIT (O-Level)  July 2016  Introduction to ICT Resources 


1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein.
(1x10)

1.1 : SMPS means
A) System Management Power Supply
B) Synchronous Mode Power Supply
C) Switched Mode Power Supply
D) Sequential Mode Power Supply
Answer


1.2 : A circuit switch
A) has large buffers to hold data before forwarding
B) can switch data based on the incoming frequency
C) can interconnect shared links
D) needs to be programmed prior to data transfer
Answer

1.3 : The ‘Taskbar’ in windows will
A) Show you all the programs you currently have open
B) Show you only the programs you used the last two times you were on the computer
C) Show you every program you've ever used on the computer
D) Show you only those programs you have installed on the computer
Answer

1.4 : Virtual Memory is part of
A) RAM
B) ROM
C) HARD DISK
D) PROM
Answer

1.5 : What can a computer virus do?
A) Kill the mouse
B) Change how your computer operates
C) Spoil hard disk
D) Backup your data
Answer

1.6 : Telnet is a
A) Network of Telephones
B) Television Network
C) Remote Login
D) Remote Copy
Answer

1.7 : A file with extension of ‘zip’ indicates
A) a folder
B) a backup file
C) an encrypted file
D) a compressed file
Answer

1.8 : Press ______ to open the windows task manager.
A) Shift + Ctrl + Esc
B) Ctrl + Alt + Esc
C) Ctrl + Alt + Delete
D) Shift + Ctrl + Delete
Answer

1.9 : The IPv4 address contains ________ bits.
A) 4
B) 32
C) 12
D) 8
Answer

1.10 : Ping command can
A) Measure round-trip time
B) Report packet loss
C) Report latency
D) All of the above
Answer

 2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)

2.1 In the OSI model, mail service is application layer service.
2.2 Image files cannot be compressed on Windows.
2.3 Dot Matrix printer is non-impact type printer.
2.4 The maximum segment length on a 10BaseT network is 100 meters.
2.5 Deleting a program from the Program Files folder on the C drive is the best way to remove a program from the system.
2.6 In Peer-to-Peer network, each computer runs both client and server software..
2.7 UDP is connection-oriented protocol.
2.8 When you copy a file to another location, the original file is deleted.
2.9 Guest login name cannot be changed.
2.10 The number of IP addresses in Class C block is 256.

Answer



 3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein.

X
Y
3.1
PKZIP
A.
MS-Office file extension
3.2
Trojan
B.
Taskmgr.exe
3.3
Windows file loads applications that run when Windows open
C.
Graphical Object
3.4
RAID
D.
File
3.5
Gateway
E.
A type of windows file system
3.6
ppt
F.
Data Compression Software
3.7
CAT 5
G.
Telephone Communications
3.8
Icon
H.
A type of malicious program
3.9
Simplex communication
I.
Fiber Optics
3.10
fastest media for data transfer
J.
Fault tolerant disk


K.
Television transmission


L.
Four-pair wire medium


M.
Connects two incompatible networks


Answer


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Choose the most appropriate option, enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein.

A.
Nero
B.
Authentication
C.
.doc
D.
TCP
E.
Ring
F.
FTP
G.
Topology
H.
dlt
I.
Mesh
R.
DLL
K.
BOOT
L.
TCP/IP
M.
NIC





4.1 ________ is CD burning software.
4.2 ________ provides full transport layer services to applications.
4.3 A ________ is a description of the layout of area covered by a network.
4.4 The verification of your login name and password at the end of the boot process is called ________.
4.5 ________ extension stands for Dynamic Link Library file.
4.6 ________ is an adapter card used to send and receive signals on a network.
4.7 One of the extensions of Microsoft Word file is ________.
4.8 The logical addresses in the ________ protocol suite are called IP addresses.
4.9 The power-on self-test compares its results to the information stored in CMOS before proceeding with the ________ process.
4.10 ________ topology uses token passing.

Answer


PART TWO
(Answer any FOUR questions)

5.
a) Write detailed steps to install motherboard with details of the configuration used. Clearly write the precautions to be used for installation. Also how will you educate the customer for using licensed version of the software only, write three benefits of licensed software?
b) Write about Uninterrupted Power Supply. Why it is important to have UPS? Write five factors to keep in mind while designing for a power supply to a lab of 50 computers.
(10+5)

6.
a) How do you create and use compress (zipped) folders in Windows Operating System?
b) How do you change System Date and Time in Windows Operating System? Explain how can you restrict unauthorized change?
c) Explain System Restore functionality of Windows Operating System. Write steps to restore registry of Windows System. Why is registry important?
(5+5+5)

7.
a) What is the difference between LAN, MAN and WAN? What are the advantages of Coaxial Cable and Optical Fiber?
b) What is IP addressing scheme? Explain class C addressing scheme with example? How many IP numbers are possible in a Class B network using IPv4 addressing scheme. Give an example of one Class B network in the form of net id and subnet mask.
(5+10)

8.
a) Explain the creation of user and group in Windows Server Operating System. What do you understand by roles assigned to user?
b) How to Share Files and Folders Over a Network for Workgroups in Windows Server Operating System?
(7+8)

9.
Explain the following:
a) Backup and Restore operations in context of PC troubleshooting
b) Deletion and Removal of Virus infected files from a compressed file and role of Antivirus definitions
c) Hub, Switch, Bridge, Router and Gateway
(5+5+5)



No comments:

Post a Comment