Sunday 12 February 2017

NIELIT A Level Java Solve Paper Jan-12

 January, 2012
A10.1-R4: INTRODUCTION TO OBJECT ORIENTED PROGRAMMING THROUGH JAVA


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 The method signature consists of
A) Method name and parameter list
B) Method name and return type
C) Method name, return type and parameter list
D) Method name and access modifier
1.2 The dynamic method binding is performed at
A) Runtime
B) Compile time
C) Memory allocation time
D) Class definition time

NIELIT A Level Java Solve Paper

July, 2011
A10.1-R4: INTRODUCTION TO OBJECT ORIENTED PROGRAMMING THROUGH JAVA


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 ________ class of java.util package supports Internationalization
A) TimeZone
B) Currency
C) Locale
D) Calendar
1.2 Which one of the following is not an AWT listener interface?
A) ActionEvent
B) KeyListener
C) FocusListener
D) WindowListener

NIELIT A Level Java Solve Paper

 January, 2011
A10.1-R4: INTRODUCTION TO OBJECT ORIENTED PROGRAMMING THROUGH JAVA


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 Which one is not supported by OOP?
A) Abstraction
B) Polymorphism
C) Encapsulation
D) Global variables
1.2 Which one is not a valid jump statement
A) return
B) goto
C) continue
D) break

NIELIT A Level Java Solve Paper

July, 2010
A10.1-R4: INTRODUCTION TO OBJECT-ORIENTED PROGRAMMING THROUGH JAVA


PART ONE
(Answer all the questions)



1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1x10)
1.1 The minimum value of char type variable is
A) ‘\u0020’
B) ‘\u00ff’
C) ‘ ’
D) ‘\u0000’
1.2 Which of the following is correct?
A) int a = 16, a>>2 = 4
B) int b = -8, b>>1 = -4
C) int a = 16, a>>>2 = 4
D) All of the above

Saturday 11 February 2017

NIELIT A Level Solved Paper July-2016

A9-R4: DATA COMMUNICATION & NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

 1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 The ________ address identifies a
process on a host.
A) specific
B) port
C) IP
D) physical
1.2 When a host on network A sends a message to
a host on network B, which address does the
router look at?
A) logical
B) physical
C) port
D) none of the above

NIELIT A Level Solved Paper January-2016

January, 2016
A9-R4: DATA COMMUNICATIONS & NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Which is not a component of data communication?
A) Message
B) Sender
C) Receiver
D) None of the above
1.2 Which is a connectionless internet transport protocol?
A) IMAP
B) IP
C) UDP
D) TCP

NIELIT A Level Solved Paper July-2014

July, 2015
A9-R4: DATA COMMUNICATION AND NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Which of the following lines that are used by the telephone companies to provide high-data-rate
connections also use the high-bandwidth capability of unshielded twisted-pair cables?
A) PSTN
B) Full duplex
C) Fiber optics
D) DSL
1.2 The LLC provides how many data link control protocol for all types of IEEE LANs?
A) One
B) Two
C) Four
D) Eight

NIELIT A Level Solved Paper January-2015

January, 2015
A9-R4: DATA COMMUNICATIONS AND NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 The process-to-process delivery of the entire message is the responsibility of the
________ layer.
A) Network
B) Transport
C) Application
D) Physical
1.2 Which protocol is used for file transferring?
A) SMTP
B) FTP
C) Both A) and B)
C) None of the above

NIELIT A Level Solved Paper July-2014

 July, 2014
A9-R4: DATA COMMUNICATION AND NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Which of the following statement is NOT true with respect to Differential Phase Shift Keying
(DPSK)?
A) DPSK has the advantage of reduced receiver complexity
B) Energy efficiency of DPSK is inferior to that of coherent PSK by about 3 dB
C) DPSK is a general type of phase modulation that conveys data by changing the phase of the
carrier wave
D) DPSK is a coherent form of phase shift keying which needs a coherent reference signal at
the receiver
1.2 Wave Division Multiplexing (WDM) is an analog multiplexing technique to combine
________ signals.
A) Optical
B) Audio
C) Video
D) Noise

Friday 10 February 2017

NIELIT A Level Solved Paper January-2014

 January, 2014
A9-R4: DATA COMMUNICATION & NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Class A network with address 10.0.0.0 with 40 subnets is required to add 60 new subnets very
soon. Which subnet mask should be assigned to network?
A) 255.240.0.0
B) 255.248.0.0
C) 255.252.0.0
D) 255.254.0.0
1.2 Which of the following is done in the physical layer of the ATM network?
A) Monitoring of the user information field for bit errors and possible corrective actions
B) Transmission frame generation/recovery
C) Generic flow control
D) Cell multiplexing and demultiplexing

NIELIT A Level Solved Paper July-2013

July, 2013
A9-R4: DATA COMMUNICATIONS AND NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 Performance of a network can be measured by considering ________.
A) transit time
B) response time
C) both A) and B)
C) none of the above
1.2 The term ________ refers to the way in which a network is laid out physically.
A) physical topology
B) conceptual structure
C) network design
D) none of the above

NIELIT A Level Solved Paper Jan-13

January, 2013
A9-R4: DATA COMMUNICATION & NETWORKS TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 Interleaved digital signals from n devices forming frame of data take place in
A) FDM
B) TDM
C) WDM
D) None of the above
1.2 Upper support layers - session, presentation and application of OSI model are almost
invariably implemented in
A) Hardware (only)
B) Software (only)
C) Hardware and Software both
D) None of the above

NIELIT A Level Solved Paper July-2012

July, 2012
A9-R4: DATA COMMUNICATION AND NETWORKS TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 In TCP/IP, Packets may arrive out of sequence (they may have been routed differently, or
one may have been dropped), so the ________ in each packets allow TCP to reassemble
the packets in the correct order and to request retransmission of any missing packets
A) Sequence numbers
B) Port numbers
C) Source_id number
D) Reassembling of the packets in the correct order is not permitted
1.2 UDP is a fast, unreliable protocol and unreliable means there is
A) No sequencing
B) No guaranteed delivery
C) No automatic retransmission of lost packets
D) All of the above

NIELIT A Level Solved Paper January-2012

January, 2012
A9-R4: DATA COMMUNICATION & NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 A protocol is a set of rules governing a time sequence of events that must take place
A) between an interface
B) between modems
C) between peers
D) across an interface
1.2 Which of the following communications lines is best suited for interactive processing of
applications?
A) full duplex lines
B) narrow band channel
C) simplex lines
D) mixed band channels

Thursday 9 February 2017

Visual Basic Code with Microsoft Word

Visual Basic Code with Microsoft Word



Word enables you to add VB code into your document with the help of micro.

If you are familiar with vb , then think !

What the power you all have?

WYSIWYG with Microsoft Word

WYSIWYG is a Java script, CSS combination or a program or editor, which changes your text formatting into its equivalent HTML CSS code. WYSIWYG is useful when you are making a dynamic website where your client can add some text and he wants formatted text, then WYSIWYG helps. A format tool bar is displayed in front of the user. A user enters text in textarea control and applies Formatting with some GUI icon. WYSIWYG program change formatted text to related tag form.

Wednesday 8 February 2017

Microsoft Word Protection


Protection is important when word carry some confidential information. So word has built in many types of protection methods, Encrypt document is one of them. When document is encrypted then you need a key (password) to decrypt, no one read your confidential information by using any other method. To achieve this do following steps.

NIELIT A Level Solved Paper July-2011

July, 2011
A9-R4: DATA COMMUNICATION AND NETWORK TECHNOLOGIES


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 In Quadrature Phase Shift Keying (QPSK) modulation
A) a cosine carrier is varied in phase while keeping a constant amplitude and frequency
B) a sine carrier is varied in phase while keeping a constant amplitude and frequency
C) a cosine carrier is varied in amplitude while keeping a constant phase and frequency
D) a sine carrier is varied in amplitude while keeping a constant phase and frequency

NIELIT A Level Solved Paper January-2011

January, 2011
A9-R4: DATA COMMUNICATION & NETWORKING TECHNOLOGIES

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 Which of the following technique uses four twisted-pair cables that connect each station to a
common hub?
A) 10Base-2
B) 10Base-5
C) 10Base-T
D) 10Base-F

NIELIT A Level Solved Paper July-10

A9-R4 : Data Communication Network Technologies (DCN)

July-10 Solved

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “tear-off” answer sheet attached to the question paper, following instructions therein. (1x10)
1.1 What is true in case of CHAP?
A) It uses a three-way handshake
B) It encrypts the process using RC4
C) It repeats the challenge at random intervals
D) It is stronger than Kerberos