Computer Science SSC-I Quiz
56 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a commonly used technology for long-distance WAN connections?

Fiber Optics

Which storage device provides the fastest read/write access?

Hard Disk

What MS-Word feature allows authors to add external links to websites?

Hyperlink

Which transmission mode is exemplified by television broadcasting?

<p>Simplex</p> Signup and view all the answers

What is the term for the rate of change of electrical signals per second?

<p>Baud rate</p> Signup and view all the answers

What device is used to connect two different types of networks?

<p>Gateway</p> Signup and view all the answers

Which network topology allows easy addition of nodes?

<p>Star topology</p> Signup and view all the answers

What is the maximum time allowed for Section A of the exam?

<p>15 Minutes</p> Signup and view all the answers

Which operating system is commonly used in an airline traffic control system?

<p>D. Real time system</p> Signup and view all the answers

How are additional devices connected to a motherboard?

<p>A. Expansion slot</p> Signup and view all the answers

What does 'Multimodal Authentication' refer to?

<p>B. Use of two or more authentication methods</p> Signup and view all the answers

In a ring topology, how many neighbors does each device have?

<p>B. Two</p> Signup and view all the answers

What does 'D6' signify in a spreadsheet context?

<p>A. Column D, Row 6</p> Signup and view all the answers

What is the name of the text modifying feature in Word for decorative effects?

<p>C. WordArt</p> Signup and view all the answers

What are two characteristics of third generation computers?

<p>Integrated circuits and increased data processing speed.</p> Signup and view all the answers

What are the two main parts of a motherboard?

<p>CPU and RAM.</p> Signup and view all the answers

Name two applications of Bluetooth technology.

<p>Wireless audio streaming and file transfer between devices.</p> Signup and view all the answers

How does synchronous transmission differ from asynchronous transmission in terms of speed and accuracy?

<p>Synchronous transmission is faster and more accurate because it uses a clock signal to synchronize data transmission.</p> Signup and view all the answers

Why is accurate data transmission important in a communication system?

<p>Accurate data transmission ensures that the information sent is received as intended, preventing misunderstandings.</p> Signup and view all the answers

List two difficulties a company may face without having a computer network.

<p>Inefficiency in communication and inability to share resources quickly.</p> Signup and view all the answers

Why is mesh topology considered the most reliable? Give two reasons.

<p>It provides multiple paths for data transmission and ensures redundancy if one connection fails.</p> Signup and view all the answers

State two ways to protect a computer from virus attacks.

<p>Using antivirus software and regularly updating software.</p> Signup and view all the answers

Describe Batch Processing and Time Sharing Operating Systems.

<p>Batch Processing collects data and processes it all at once, while Time Sharing allows multiple users to share system resources simultaneously.</p> Signup and view all the answers

What are computer ethics? Write any four moral guidelines for ethical use of computer technology.

<p>Computer ethics are principles governing the use of computers and information technology. Guidelines include respecting copyright, not sharing personal data without consent, avoiding malware distribution, and maintaining honesty in online interactions.</p> Signup and view all the answers

Explain Wide Area Network (WAN) based on spatial distance.

<p>A Wide Area Network (WAN) spans large geographic areas, connecting multiple Local Area Networks (LANs) and often uses public or private data links.</p> Signup and view all the answers

Describe storage devices in computer hardware.

<p>Storage devices are components used to store data permanently or temporarily, including hard drives, SSDs, and USB flash drives.</p> Signup and view all the answers

What is the use of hyperlinks in word processing?

<p>Hyperlinks allow users to navigate between different documents, websites, or sections within a document, enhancing navigation and accessibility.</p> Signup and view all the answers

Define data transmission modes.

<p>Data transmission modes refer to the methods used to transmit data over a network, such as simplex, half-duplex, and full-duplex.</p> Signup and view all the answers

Elaborate on data rate with its formula and unit.

<p>Data rate measures the speed of data transmission, calculated as Data Rate = Total Data / Time, commonly measured in bits per second (bps).</p> Signup and view all the answers

Describe the uses of a dial-up modem.

<p>A dial-up modem connects a computer to the internet using telephone lines, enabling data transmission by converting digital data to analog signals.</p> Signup and view all the answers

Explain bus topology in network configuration.

<p>Bus topology connects all devices to a single central cable, or bus, allowing data to travel bidirectionally along the cable.</p> Signup and view all the answers

Describe the types of operating systems.

<p>Operating systems can be classified into batch, time-sharing, distributed, and real-time systems, each serving different computing needs.</p> Signup and view all the answers

What is batch processing in computing?

<p>Batch processing refers to the execution of a series of jobs on a computer without manual intervention, often involving processing large volumes of data in batches.</p> Signup and view all the answers

Describe the purpose of the motherboard in a computer.

<p>The motherboard serves as the main circuit board, connecting all components of a computer, including the CPU, RAM, and peripherals.</p> Signup and view all the answers

What is multimodal authentication?

<p>Multimodal authentication employs multiple methods of verification from different categories, such as something you know, something you have, and something you are.</p> Signup and view all the answers

Explain the characteristics of a good communication system.

<p>A good communication system should be reliable, fast, efficient, scalable, and secure.</p> Signup and view all the answers

What are the main functions of an operating system?

<p>The main functions of an operating system include memory management and file management.</p> Signup and view all the answers

Describe the star topology in network design.

<p>Star topology connects all devices to a central hub or switch, allowing for easy management and failure isolation.</p> Signup and view all the answers

What is the purpose of application software?

<p>Application software is designed to allow users to perform specific tasks, such as word processing, accounting, or browsing the internet.</p> Signup and view all the answers

What are the symptoms of a malware attack?

<p>Common symptoms of a malware attack include slow system performance, unexpected crashes, and unusual messages or pop-ups.</p> Signup and view all the answers

What distinguishes asynchronous transmission modes from synchronous modes?

<p>Asynchronous transmission modes send data without a clock signal, using start and stop bits, while synchronous modes use a clock signal to coordinate data transmission.</p> Signup and view all the answers

List two types of operating systems and their interfaces.

<p>Two types of operating systems are Command Line Interface (CLI) and Graphical User Interface (GUI).</p> Signup and view all the answers

What is Digital Subscriber Line (DSL) primarily used for?

<p>DSL is used for high-speed internet access over conventional telephone lines.</p> Signup and view all the answers

How does Integrated Services Digital Network (ISDN) differ from traditional telephone lines?

<p>ISDN provides a higher quality and speed of data transmission compared to standard analog telephone lines.</p> Signup and view all the answers

Explain one benefit of using unguided media in communications.

<p>Unguided media allows data transmission through air, making it more flexible and easier to install.</p> Signup and view all the answers

What are the common applications of operating systems in computers?

<p>Operating systems manage hardware resources and provide a user interface for executing applications.</p> Signup and view all the answers

What is the purpose of computer ethics?

<p>Computer ethics addresses the moral principles and standards guiding the use of computers and technology.</p> Signup and view all the answers

Identify one characteristic of an operating system.

<p>An operating system provides multitasking capabilities to run multiple applications simultaneously.</p> Signup and view all the answers

What are transmission media in networking?

<p>Transmission media refers to the physical pathways through which data is transmitted from one device to another.</p> Signup and view all the answers

Name a type of guided media and its function.

<p>Fiber optic cables are a type of guided media used for high-speed data transmission.</p> Signup and view all the answers

What does the acronym K+A represent in cognitive learning objectives?

<p>K+A represents Knowledge and Application.</p> Signup and view all the answers

List one advantage of using a computer network.

<p>A computer network allows for resource sharing, such as files and printers, among multiple users.</p> Signup and view all the answers

What distinguishes Section C from other sections in assessments?

<p>Section C typically focuses on application-based questions that test practical understanding.</p> Signup and view all the answers

What type of question is typically found in Section A?

<p>Section A usually contains knowledge-based questions that assess basic understanding.</p> Signup and view all the answers

What is the focus of Unit 3 in the computer science curriculum?

<p>Unit 3 focuses on practical skills in data communication.</p> Signup and view all the answers

Why is ethical behavior important in computer science?

<p>Ethical behavior is crucial to ensure responsible use of technology and protect user rights.</p> Signup and view all the answers

Study Notes

Computer Science SSC-I - Section A

  • Time allowed: 15 minutes
  • Instructions: Answer all questions on a separate bubble sheet. Do not use lead pencil.
  • Q1 (1): Long-distance WAN connections use Coaxial cable.
  • Q1 (2): The storage device with fastest read/write access is the Hard Disk.
  • Q1 (3): Authors use Hyperlinks to add external website links in MS Word.
  • Q1 (4): Television broadcasting uses Simplex transmission mode.
  • Q1 (5): The rate of change of electrical signals per second is called Baud rate.
  • Q1 (6): A Gateway device connects two different types of networks.

Computer Science SSC-I - Section B

  • Time allowed: 2.45 hours
  • Instructions: Answer all questions from Section B. All Parts have equal marks.
  • i) Two characteristics of 3rd generation computers:
    • Smaller size
    • More reliable
  • ii) Two parts of a motherboard: (a) and (b) (Image needed to identify specific parts)
  • iii) CAD stands for Computer Aided Design. CAM stands for Computer Aided Manufacturing.
  • iv) Career interests in IT and reasons. (Specific career choices and justifications need to be filled)
  • v) Importance of memory management in modern operating systems despite increasing memory sizes. Two reasons need to be provided.
  • OR (v): Two common operations of file management in operating systems. (Two operation descriptions needed.)
  • vi) Suitable software for preparing student result sheets, and why. (Software recommendation and justification needed.)
  • vii) Importance of protocols in data communications.
  • OR (vii): Two applications of Bluetooth technology.
  • viii) Differences between synchronous and asynchronous transmission in speed and accuracy.
  • ix) Importance of accurate data transmission and an example.
  • OR (ix): Situation where data transmission timeliness is essential.
  • x) Two difficulties a company faces without a computer network.
  • OR (x): Two reasons why Mesh topology is considered reliable.
  • xi) Two ways to protect a computer from viruses.
  • OR (xi): Two disadvantages of software piracy.

Computer Science SSC-I - Section C

  • Instructions: Attempt all questions. Marks for each question are in brackets.
  • Q3: Explain two categories of application software with examples.
  • OR (Q3): Explain the four basic operations of a computer system, and diagram it.
  • Q4: Explain command line and graphical user interfaces, providing an example of each.
  • Q5: Describe batch processing and time-sharing operating systems, and provide one application for each.
  • OR (Q5): Describe two types of unguided transmission media and their applications.
  • Q6: Explain DSL and ISDN data communication lines, providing one merit and one demerit for each.
  • OR (Q6): Define computer ethics and provide four moral guidelines.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on key concepts covered in the Computer Science SSC-I course. This quiz includes questions about networking, computer generations, and hardware components, encompassing both theoretical and practical aspects of the subject. Challenge yourself and see how well you understand the fundamentals!

More Like This

Networking 101
5 questions

Networking 101

PrizeAquamarine avatar
PrizeAquamarine
Computer Hardware & Networks Unit 3
18 questions
Network Fundamentals Quiz
40 questions

Network Fundamentals Quiz

JawDroppingPelican avatar
JawDroppingPelican
Use Quizgecko on...
Browser
Browser