0% found this document useful (0 votes)
9 views5 pages

"O" Level: Model Question Paper

computer basic notes

Uploaded by

mukesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views5 pages

"O" Level: Model Question Paper

computer basic notes

Uploaded by

mukesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

IT WORLD COMPUTER’S

Mid Term
“O” Level
Model Question Paper

ICT
TOTAL TIME: 2:30 HOURS TOTAL MARKS: 100 (PART ONE - 40; PART TWO - 60)

NOTE:

1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO
contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the question paper, as
per the instructions contained therein. PART ONE is NOT to be answered in the answer book.

3. Maximum time allotted for PART ONE is 30 minutes. Answer book for PART TWO will be supplied at the
table when the answer sheet for PART ONE is returned. However, candidates, who complete PART ONE
earlier than one hour, can collect the answer book for PART TWO immediately after handing over the
answer sheet for PART ONE.

PART ONE

1. Each question below gives a multiple choices of answers. Choose the most appropriate one.
1.1 The computer memory used for temporary storage of data and program called.
(A) ROM (B) SECTOR (C) RAM (D) HARD DISK

1.2 The hardware in which data may be stored for a computer system is called?
(A) Register (B) chip (C) memory D) peripheral

1.3 The LPT is related to


(A) serial port (B) centronics port (C) parallel port (D) none of the above

1.4 Reducing the size of data is called?


(A) Data encryption (B) Data compression (C) Decryption (D) Decompression

1.5 the device that determines best path from a set of available once in networks is
A) Gateway B) Bridge C) Switch D) Router

1.6 To safeguard your computer from disruption in power supply, you must install a/an.
A) UPS B) Inverter C) MCB D) Transformer

1.7 Dynamically address can be obtained if you have selected this option in network properties.
A) ICMP B) SMTP C) DNS D) DHCP

1.8 The process of restoration of database in case of failure is called.


A) System Restore B) Recovery C) Backup D) Data protection
1.9 A small buffer located between RAM and CPU Registers.
A) Cache Memory B) Flash Memory C) EPROM D) PROM

1.10 It is responsible for handling details of Input and Output operations.A) CMOS B) RAM
C) ROM D) BIOS

2. Fill in the blanks in 2.1 to 2.10 below, by choosing appropriate words and Phrases given in
the list below:

2.1A window’s………contains the sizing buttons, which enable you to change the window’s
size easily.

2.2 ……… is a faster memory than Hard Disk.

2.3 ………….refers to one spot in a grid of thousands of such spots that form the images on
the computer screen.

2.4 A………….is a description of the layout of area covered by a network.


2.5 The………….OSI layer carries signals between computers.
2.6 --------- is a protocol for file transfer.
2.7 A peer- to-peer networks, is also known a……………..
2.8 ………….contain ink for printing in inkjet printers.
2.9 Cache Memory is …………in speed than secondary storage device.
2.10 ………… is one of the most common network media.

A. Title B. Pixel C. RAM D. Physical

E. Faster F. Co-axial G. Workgroup H. PKzip

I. Slower J. Cartridge K. Topology L.FTP

M. Firewall N.COMS

3. Each statement below is either TRUE or FALSE. Identify and mark them accordingly in
the answer book.

3.1 BIOS are Basic input output Sequence.


3.2 You can easily delete files stored in a CD.
3.3 Using the file encryption utility you can reduce the size of a file.
3.4 JPEG is a popular text file format.
3.5 Defrag utility moves the fragmented pieces of files to one location so that one file
occupies a contiguous disk space.
3.6 Nero is popular Data compression software.
3.7 NIC is capable of only sending signals. It cannot receive signals.
3.8 Subnet mask of class C address is 255.255.255.0
3.9 Router operates on layer 2 of OSI reference model.
3.10Ping command is ICMP echo message and its reply. It is used in networks to test the
reach ability of a device.

4. Match words and phrases in column X with the nearest in meaning in column
Y.

SR x y

4.1 Simplex A. System composed of two


connected devices that can
communicate with one
another in both directions.

4.2 Local area network protocol which resides at B. Device to attach multiple
the data link layer of the OSI model. network stations in a star
topology in a token ring
network.

4.3 ATM C. star

4.4 FDDI d. links two or more devices


using some wireless distribution
method

4.5 Adhoc network e. Switching technique for


telecommunication networks

4.6 WLAN f. Data transmission is always on


way.

4.7 Defines actual wires, plugs, electrical signals g. Temporary networks to meet
etc. some immediate needs.

4.8 Consists of one central switch, hub or h. Provides a 100 MBit/s optical
computer, which acts as a conduit to transmit standard for data transmission in
messages. a local area networks that can
extend in range up to 200
kilometers (124 miles).
4.9 MAU I. Physical layer

4.1 Duplex J. Token ring


0

PART TWO
(Answer ANY Three questions)

5.
A. Explain different types of guided transmission media available?
B. writes a short note on Windows NT operating system

6.
A. write functions of each layer of OSI reference model.
B. what is difference between hubs and switches?
7.
A. writes about uninterrupted power supply.
B. Explain the bus topology and star topology.
8.
A. how to join a windows client to a windows domain?

B. Explain the following:-

1. Laser printer

2. Routers

3. Remote login

4. Simplex and duplex

9.

A. what is difference between LAN, MAN & WAN?


B. What is virus and explain the virus attack?

You might also like