Wednesday 8 February 2017

Microsoft Word Protection


Protection is important when word carry some confidential information. So word has built in many types of protection methods, Encrypt document is one of them. When document is encrypted then you need a key (password) to decrypt, no one read your confidential information by using any other method. To achieve this do following steps.

NIELIT A Level Solved Paper July-2011

July, 2011
A9-R4: DATA COMMUNICATION AND NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 In Quadrature Phase Shift Keying (QPSK) modulation
A) a cosine carrier is varied in phase while keeping a constant amplitude and frequency
B) a sine carrier is varied in phase while keeping a constant amplitude and frequency
C) a cosine carrier is varied in amplitude while keeping a constant phase and frequency
D) a sine carrier is varied in amplitude while keeping a constant phase and frequency

NIELIT A Level Solved Paper January-2011

January, 2011
A9-R4: DATA COMMUNICATION & NETWORKING TECHNOLOGIES

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 Which of the following technique uses four twisted-pair cables that connect each station to a
common hub?
A) 10Base-2
B) 10Base-5
C) 10Base-T
D) 10Base-F

NIELIT A Level Solved Paper July-10

A9-R4 : Data Communication Network Technologies (DCN)

July-10 Solved

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 What is true in case of CHAP?
A) It uses a three-way handshake
B) It encrypts the process using RC4
C) It repeats the challenge at random intervals
D) It is stronger than Kerberos