Podcast
Questions and Answers
What is a commonly used technology for long-distance WAN connections?
What is a commonly used technology for long-distance WAN connections?
Fiber Optics
Which storage device provides the fastest read/write access?
Which storage device provides the fastest read/write access?
Hard Disk
What MS-Word feature allows authors to add external links to websites?
What MS-Word feature allows authors to add external links to websites?
Hyperlink
Which transmission mode is exemplified by television broadcasting?
Which transmission mode is exemplified by television broadcasting?
Signup and view all the answers
What is the term for the rate of change of electrical signals per second?
What is the term for the rate of change of electrical signals per second?
Signup and view all the answers
What device is used to connect two different types of networks?
What device is used to connect two different types of networks?
Signup and view all the answers
Which network topology allows easy addition of nodes?
Which network topology allows easy addition of nodes?
Signup and view all the answers
What is the maximum time allowed for Section A of the exam?
What is the maximum time allowed for Section A of the exam?
Signup and view all the answers
Which operating system is commonly used in an airline traffic control system?
Which operating system is commonly used in an airline traffic control system?
Signup and view all the answers
How are additional devices connected to a motherboard?
How are additional devices connected to a motherboard?
Signup and view all the answers
What does 'Multimodal Authentication' refer to?
What does 'Multimodal Authentication' refer to?
Signup and view all the answers
In a ring topology, how many neighbors does each device have?
In a ring topology, how many neighbors does each device have?
Signup and view all the answers
What does 'D6' signify in a spreadsheet context?
What does 'D6' signify in a spreadsheet context?
Signup and view all the answers
What is the name of the text modifying feature in Word for decorative effects?
What is the name of the text modifying feature in Word for decorative effects?
Signup and view all the answers
What are two characteristics of third generation computers?
What are two characteristics of third generation computers?
Signup and view all the answers
What are the two main parts of a motherboard?
What are the two main parts of a motherboard?
Signup and view all the answers
Name two applications of Bluetooth technology.
Name two applications of Bluetooth technology.
Signup and view all the answers
How does synchronous transmission differ from asynchronous transmission in terms of speed and accuracy?
How does synchronous transmission differ from asynchronous transmission in terms of speed and accuracy?
Signup and view all the answers
Why is accurate data transmission important in a communication system?
Why is accurate data transmission important in a communication system?
Signup and view all the answers
List two difficulties a company may face without having a computer network.
List two difficulties a company may face without having a computer network.
Signup and view all the answers
Why is mesh topology considered the most reliable? Give two reasons.
Why is mesh topology considered the most reliable? Give two reasons.
Signup and view all the answers
State two ways to protect a computer from virus attacks.
State two ways to protect a computer from virus attacks.
Signup and view all the answers
Describe Batch Processing and Time Sharing Operating Systems.
Describe Batch Processing and Time Sharing Operating Systems.
Signup and view all the answers
What are computer ethics? Write any four moral guidelines for ethical use of computer technology.
What are computer ethics? Write any four moral guidelines for ethical use of computer technology.
Signup and view all the answers
Explain Wide Area Network (WAN) based on spatial distance.
Explain Wide Area Network (WAN) based on spatial distance.
Signup and view all the answers
Describe storage devices in computer hardware.
Describe storage devices in computer hardware.
Signup and view all the answers
What is the use of hyperlinks in word processing?
What is the use of hyperlinks in word processing?
Signup and view all the answers
Define data transmission modes.
Define data transmission modes.
Signup and view all the answers
Elaborate on data rate with its formula and unit.
Elaborate on data rate with its formula and unit.
Signup and view all the answers
Describe the uses of a dial-up modem.
Describe the uses of a dial-up modem.
Signup and view all the answers
Explain bus topology in network configuration.
Explain bus topology in network configuration.
Signup and view all the answers
Describe the types of operating systems.
Describe the types of operating systems.
Signup and view all the answers
What is batch processing in computing?
What is batch processing in computing?
Signup and view all the answers
Describe the purpose of the motherboard in a computer.
Describe the purpose of the motherboard in a computer.
Signup and view all the answers
What is multimodal authentication?
What is multimodal authentication?
Signup and view all the answers
Explain the characteristics of a good communication system.
Explain the characteristics of a good communication system.
Signup and view all the answers
What are the main functions of an operating system?
What are the main functions of an operating system?
Signup and view all the answers
Describe the star topology in network design.
Describe the star topology in network design.
Signup and view all the answers
What is the purpose of application software?
What is the purpose of application software?
Signup and view all the answers
What are the symptoms of a malware attack?
What are the symptoms of a malware attack?
Signup and view all the answers
What distinguishes asynchronous transmission modes from synchronous modes?
What distinguishes asynchronous transmission modes from synchronous modes?
Signup and view all the answers
List two types of operating systems and their interfaces.
List two types of operating systems and their interfaces.
Signup and view all the answers
What is Digital Subscriber Line (DSL) primarily used for?
What is Digital Subscriber Line (DSL) primarily used for?
Signup and view all the answers
How does Integrated Services Digital Network (ISDN) differ from traditional telephone lines?
How does Integrated Services Digital Network (ISDN) differ from traditional telephone lines?
Signup and view all the answers
Explain one benefit of using unguided media in communications.
Explain one benefit of using unguided media in communications.
Signup and view all the answers
What are the common applications of operating systems in computers?
What are the common applications of operating systems in computers?
Signup and view all the answers
What is the purpose of computer ethics?
What is the purpose of computer ethics?
Signup and view all the answers
Identify one characteristic of an operating system.
Identify one characteristic of an operating system.
Signup and view all the answers
What are transmission media in networking?
What are transmission media in networking?
Signup and view all the answers
Name a type of guided media and its function.
Name a type of guided media and its function.
Signup and view all the answers
What does the acronym K+A represent in cognitive learning objectives?
What does the acronym K+A represent in cognitive learning objectives?
Signup and view all the answers
List one advantage of using a computer network.
List one advantage of using a computer network.
Signup and view all the answers
What distinguishes Section C from other sections in assessments?
What distinguishes Section C from other sections in assessments?
Signup and view all the answers
What type of question is typically found in Section A?
What type of question is typically found in Section A?
Signup and view all the answers
What is the focus of Unit 3 in the computer science curriculum?
What is the focus of Unit 3 in the computer science curriculum?
Signup and view all the answers
Why is ethical behavior important in computer science?
Why is ethical behavior important in computer science?
Signup and view all the answers
Study Notes
Computer Science SSC-I - Section A
- Time allowed: 15 minutes
- Instructions: Answer all questions on a separate bubble sheet. Do not use lead pencil.
- Q1 (1): Long-distance WAN connections use Coaxial cable.
- Q1 (2): The storage device with fastest read/write access is the Hard Disk.
- Q1 (3): Authors use Hyperlinks to add external website links in MS Word.
- Q1 (4): Television broadcasting uses Simplex transmission mode.
- Q1 (5): The rate of change of electrical signals per second is called Baud rate.
- Q1 (6): A Gateway device connects two different types of networks.
Computer Science SSC-I - Section B
- Time allowed: 2.45 hours
- Instructions: Answer all questions from Section B. All Parts have equal marks.
-
i) Two characteristics of 3rd generation computers:
- Smaller size
- More reliable
- ii) Two parts of a motherboard: (a) and (b) (Image needed to identify specific parts)
- iii) CAD stands for Computer Aided Design. CAM stands for Computer Aided Manufacturing.
- iv) Career interests in IT and reasons. (Specific career choices and justifications need to be filled)
- v) Importance of memory management in modern operating systems despite increasing memory sizes. Two reasons need to be provided.
- OR (v): Two common operations of file management in operating systems. (Two operation descriptions needed.)
- vi) Suitable software for preparing student result sheets, and why. (Software recommendation and justification needed.)
- vii) Importance of protocols in data communications.
- OR (vii): Two applications of Bluetooth technology.
- viii) Differences between synchronous and asynchronous transmission in speed and accuracy.
- ix) Importance of accurate data transmission and an example.
- OR (ix): Situation where data transmission timeliness is essential.
- x) Two difficulties a company faces without a computer network.
- OR (x): Two reasons why Mesh topology is considered reliable.
- xi) Two ways to protect a computer from viruses.
- OR (xi): Two disadvantages of software piracy.
Computer Science SSC-I - Section C
- Instructions: Attempt all questions. Marks for each question are in brackets.
- Q3: Explain two categories of application software with examples.
- OR (Q3): Explain the four basic operations of a computer system, and diagram it.
- Q4: Explain command line and graphical user interfaces, providing an example of each.
- Q5: Describe batch processing and time-sharing operating systems, and provide one application for each.
- OR (Q5): Describe two types of unguided transmission media and their applications.
- Q6: Explain DSL and ISDN data communication lines, providing one merit and one demerit for each.
- OR (Q6): Define computer ethics and provide four moral guidelines.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on key concepts covered in the Computer Science SSC-I course. This quiz includes questions about networking, computer generations, and hardware components, encompassing both theoretical and practical aspects of the subject. Challenge yourself and see how well you understand the fundamentals!