Computer Science SSC-I Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a commonly used technology for long-distance WAN connections?

Fiber Optics

Which storage device provides the fastest read/write access?

Hard Disk

What MS-Word feature allows authors to add external links to websites?

Hyperlink

Which transmission mode is exemplified by television broadcasting?

<p>Simplex</p> Signup and view all the answers

What is the term for the rate of change of electrical signals per second?

<p>Baud rate</p> Signup and view all the answers

What device is used to connect two different types of networks?

<p>Gateway</p> Signup and view all the answers

Which network topology allows easy addition of nodes?

<p>Star topology</p> Signup and view all the answers

What is the maximum time allowed for Section A of the exam?

<p>15 Minutes</p> Signup and view all the answers

Which operating system is commonly used in an airline traffic control system?

<p>D. Real time system</p> Signup and view all the answers

How are additional devices connected to a motherboard?

<p>A. Expansion slot</p> Signup and view all the answers

What does 'Multimodal Authentication' refer to?

<p>B. Use of two or more authentication methods</p> Signup and view all the answers

In a ring topology, how many neighbors does each device have?

<p>B. Two</p> Signup and view all the answers

What does 'D6' signify in a spreadsheet context?

<p>A. Column D, Row 6</p> Signup and view all the answers

What is the name of the text modifying feature in Word for decorative effects?

<p>C. WordArt</p> Signup and view all the answers

What are two characteristics of third generation computers?

<p>Integrated circuits and increased data processing speed.</p> Signup and view all the answers

What are the two main parts of a motherboard?

<p>CPU and RAM.</p> Signup and view all the answers

Name two applications of Bluetooth technology.

<p>Wireless audio streaming and file transfer between devices.</p> Signup and view all the answers

How does synchronous transmission differ from asynchronous transmission in terms of speed and accuracy?

<p>Synchronous transmission is faster and more accurate because it uses a clock signal to synchronize data transmission.</p> Signup and view all the answers

Why is accurate data transmission important in a communication system?

<p>Accurate data transmission ensures that the information sent is received as intended, preventing misunderstandings.</p> Signup and view all the answers

List two difficulties a company may face without having a computer network.

<p>Inefficiency in communication and inability to share resources quickly.</p> Signup and view all the answers

Why is mesh topology considered the most reliable? Give two reasons.

<p>It provides multiple paths for data transmission and ensures redundancy if one connection fails.</p> Signup and view all the answers

State two ways to protect a computer from virus attacks.

<p>Using antivirus software and regularly updating software.</p> Signup and view all the answers

Describe Batch Processing and Time Sharing Operating Systems.

<p>Batch Processing collects data and processes it all at once, while Time Sharing allows multiple users to share system resources simultaneously.</p> Signup and view all the answers

What are computer ethics? Write any four moral guidelines for ethical use of computer technology.

<p>Computer ethics are principles governing the use of computers and information technology. Guidelines include respecting copyright, not sharing personal data without consent, avoiding malware distribution, and maintaining honesty in online interactions.</p> Signup and view all the answers

Explain Wide Area Network (WAN) based on spatial distance.

<p>A Wide Area Network (WAN) spans large geographic areas, connecting multiple Local Area Networks (LANs) and often uses public or private data links.</p> Signup and view all the answers

Describe storage devices in computer hardware.

<p>Storage devices are components used to store data permanently or temporarily, including hard drives, SSDs, and USB flash drives.</p> Signup and view all the answers

What is the use of hyperlinks in word processing?

<p>Hyperlinks allow users to navigate between different documents, websites, or sections within a document, enhancing navigation and accessibility.</p> Signup and view all the answers

Define data transmission modes.

<p>Data transmission modes refer to the methods used to transmit data over a network, such as simplex, half-duplex, and full-duplex.</p> Signup and view all the answers

Elaborate on data rate with its formula and unit.

<p>Data rate measures the speed of data transmission, calculated as Data Rate = Total Data / Time, commonly measured in bits per second (bps).</p> Signup and view all the answers

Describe the uses of a dial-up modem.

<p>A dial-up modem connects a computer to the internet using telephone lines, enabling data transmission by converting digital data to analog signals.</p> Signup and view all the answers

Explain bus topology in network configuration.

<p>Bus topology connects all devices to a single central cable, or bus, allowing data to travel bidirectionally along the cable.</p> Signup and view all the answers

Describe the types of operating systems.

<p>Operating systems can be classified into batch, time-sharing, distributed, and real-time systems, each serving different computing needs.</p> Signup and view all the answers

What is batch processing in computing?

<p>Batch processing refers to the execution of a series of jobs on a computer without manual intervention, often involving processing large volumes of data in batches.</p> Signup and view all the answers

Describe the purpose of the motherboard in a computer.

<p>The motherboard serves as the main circuit board, connecting all components of a computer, including the CPU, RAM, and peripherals.</p> Signup and view all the answers

What is multimodal authentication?

<p>Multimodal authentication employs multiple methods of verification from different categories, such as something you know, something you have, and something you are.</p> Signup and view all the answers

Explain the characteristics of a good communication system.

<p>A good communication system should be reliable, fast, efficient, scalable, and secure.</p> Signup and view all the answers

What are the main functions of an operating system?

<p>The main functions of an operating system include memory management and file management.</p> Signup and view all the answers

Describe the star topology in network design.

<p>Star topology connects all devices to a central hub or switch, allowing for easy management and failure isolation.</p> Signup and view all the answers

What is the purpose of application software?

<p>Application software is designed to allow users to perform specific tasks, such as word processing, accounting, or browsing the internet.</p> Signup and view all the answers

What are the symptoms of a malware attack?

<p>Common symptoms of a malware attack include slow system performance, unexpected crashes, and unusual messages or pop-ups.</p> Signup and view all the answers

What distinguishes asynchronous transmission modes from synchronous modes?

<p>Asynchronous transmission modes send data without a clock signal, using start and stop bits, while synchronous modes use a clock signal to coordinate data transmission.</p> Signup and view all the answers

List two types of operating systems and their interfaces.

<p>Two types of operating systems are Command Line Interface (CLI) and Graphical User Interface (GUI).</p> Signup and view all the answers

What is Digital Subscriber Line (DSL) primarily used for?

<p>DSL is used for high-speed internet access over conventional telephone lines.</p> Signup and view all the answers

How does Integrated Services Digital Network (ISDN) differ from traditional telephone lines?

<p>ISDN provides a higher quality and speed of data transmission compared to standard analog telephone lines.</p> Signup and view all the answers

Explain one benefit of using unguided media in communications.

<p>Unguided media allows data transmission through air, making it more flexible and easier to install.</p> Signup and view all the answers

What are the common applications of operating systems in computers?

<p>Operating systems manage hardware resources and provide a user interface for executing applications.</p> Signup and view all the answers

What is the purpose of computer ethics?

<p>Computer ethics addresses the moral principles and standards guiding the use of computers and technology.</p> Signup and view all the answers

Identify one characteristic of an operating system.

<p>An operating system provides multitasking capabilities to run multiple applications simultaneously.</p> Signup and view all the answers

What are transmission media in networking?

<p>Transmission media refers to the physical pathways through which data is transmitted from one device to another.</p> Signup and view all the answers

Name a type of guided media and its function.

<p>Fiber optic cables are a type of guided media used for high-speed data transmission.</p> Signup and view all the answers

What does the acronym K+A represent in cognitive learning objectives?

<p>K+A represents Knowledge and Application.</p> Signup and view all the answers

List one advantage of using a computer network.

<p>A computer network allows for resource sharing, such as files and printers, among multiple users.</p> Signup and view all the answers

What distinguishes Section C from other sections in assessments?

<p>Section C typically focuses on application-based questions that test practical understanding.</p> Signup and view all the answers

What type of question is typically found in Section A?

<p>Section A usually contains knowledge-based questions that assess basic understanding.</p> Signup and view all the answers

What is the focus of Unit 3 in the computer science curriculum?

<p>Unit 3 focuses on practical skills in data communication.</p> Signup and view all the answers

Why is ethical behavior important in computer science?

<p>Ethical behavior is crucial to ensure responsible use of technology and protect user rights.</p> Signup and view all the answers

Flashcards

WAN connection

A wide area network (WAN) is a computer network that spans a large geographical area.

Fastest storage

Hard Disk drives (HDDs) are known for their fast read/write speeds compared to other types of storage.

External link

A hyperlink or external link in a document allows the user to navigate to a separate website or resource.

Television broadcasting

A one-way communication method where signals are transmitted from a source to a receiver.

Signup and view all the flashcards

Data Rate

The amount of data transferred per unit time.

Signup and view all the flashcards

Network Connection Devices

Devices like routers, bridges, switches, and gateways connect different types of networks.

Signup and view all the flashcards

Network Topology, Easily Addable

Star topology network is the one where a central node connects to multiple other nodes. Adding a new node to this topology is remarkably easy.

Signup and view all the flashcards

Network Topology, Node Addition

In a star topology, adding a new node is easy as you just add a new connection to the central node.

Signup and view all the flashcards

Tree Topology

A network topology where computers are connected in a hierarchical structure resembling a tree.

Signup and view all the flashcards

Real-time System

An operating system that processes data immediately as it arrives, crucial for applications needing quick responses, like air traffic control.

Signup and view all the flashcards

Expansion Slot

A socket on a motherboard that allows for connecting additional devices or components.

Signup and view all the flashcards

Multimodal Authentication

A security method using two or more authentication methods (e.g., password, biometric scan) for access.

Signup and view all the flashcards

Ring Topology

A network topology where devices are connected in a closed loop, with each device having two neighbors.

Signup and view all the flashcards

Spreadsheet Cell D6

Refers to the cell located in column D and row 6 of a spreadsheet.

Signup and view all the flashcards

WordArt

A text-modifying feature in word processors to add decorative effects to text.

Signup and view all the flashcards

Memory Management

The task of an operating system to allocate and manage the computer's memory efficiently.

Signup and view all the flashcards

Bluetooth applications

Bluetooth technology is used for short-range wireless communication, enabling connections between devices like headphones and smartphones.

Signup and view all the flashcards

Synchronous vs. Asynchronous transmission

Synchronous transmission sends data in continuous streams, while asynchronous transmission sends data in packets with start and stop signals. Synchronous is more accurate but also faster.

Signup and view all the flashcards

Accurate data transmission importance

Accurate data transmission is crucial because errors can lead to incorrect outputs, financial damages, and other real-world issues.

Signup and view all the flashcards

Timeliness in data transmission

Real-time data transmission is important in situations where prompt updates are necessary, like online stock trading or live video streams.

Signup and view all the flashcards

Computer network difficulties

Running a business without a computer network can lead to communication problems, data management issues, and difficulties sharing resources.

Signup and view all the flashcards

Mesh topology reliability

Mesh topology is highly reliable because if one connection fails, data can still be routed through alternative paths.

Signup and view all the flashcards

Computer virus protection

Using antivirus software and practicing safe browsing habits can help protect computers from virus attacks.

Signup and view all the flashcards

Software piracy disadvantages

Software piracy is using or copying software without paying for a license, which can hurt software developers and the company.

Signup and view all the flashcards

Wide Area Network (WAN)

A network that covers a large geographical area, connecting devices across distances.

Signup and view all the flashcards

Computer Storage Devices

Hardware components that store data, including hard drives, SSDs, and cloud storage.

Signup and view all the flashcards

Hyperlink

A connection from one document to another.

Signup and view all the flashcards

Data Transmission Modes

Different ways data is sent over a network.

Signup and view all the flashcards

Data Rate

The speed at which data is transmitted.

Signup and view all the flashcards

Communication Devices (Dialup Modem, NIC, Router, Switch/AP)

Devices used to connect and transmit data on a network.

Signup and view all the flashcards

Network Topology (Bus, Ring, Star, Mesh)

The physical or logical arrangement of nodes in a network.

Signup and view all the flashcards

Operating System (OS) Types

Software programs that manage and control computer hardware and software.

Signup and view all the flashcards

Batch Processing

A computer processing method that groups similar tasks together and executes them later..

Signup and view all the flashcards

Time Sharing

Allows multiple users to access a single computer at the same time, dividing processing time.

Signup and view all the flashcards

Real-time Processing

A processing method where data is processed immediately as it comes in.

Signup and view all the flashcards

Multimodal Authentication

Security using more than one method (like password and fingerprint).

Signup and view all the flashcards

Spreadsheet Addressing

Using letters for columns and numbers for rows to define a cell location.

Signup and view all the flashcards

Network Topologies

Different ways computers are connected in a network (bus, ring, star, mesh).

Signup and view all the flashcards

Computer Generations

Stages of computer development based on technological advancements.

Signup and view all the flashcards

File Management (OS)

An operating system function for organizing and managing files.

Signup and view all the flashcards

Computer Hardware (Motherboard)

The computer's main circuit board, connecting components.

Signup and view all the flashcards

Operating System Functions

Tasks an operating system performs, including memory and file management.

Signup and view all the flashcards

Fundamentals of Operating Systems

The core principles and tasks of an operating system, including memory management, process management, file system management, and device management.

Signup and view all the flashcards

Communication over Networks

The methods and technologies for computers to transfer data over networks.

Signup and view all the flashcards

Computer Ethics

Set of principles that guide responsible behavior with computer systems and resources.

Signup and view all the flashcards

DSL

Digital Subscriber Line, a method of internet access that uses existing telephone lines for data transfer.

Signup and view all the flashcards

ISDN Lines

Integrated Services Digital Network lines, a digital telecommunications network for both data and voice.

Signup and view all the flashcards

Computer Security

Protecting computer systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction.

Signup and view all the flashcards

Office Automation

Use of software applications and tools to streamline office processes.

Signup and view all the flashcards

Data Communication

Transmission and exchange of data between devices.

Signup and view all the flashcards

Fundamentals of Computer

The basic components, functions, and operations of a computer system.

Signup and view all the flashcards

Knowledge-based Assessment

Assessment that focuses on factual information recall and recognition.

Signup and view all the flashcards

Understanding-based Assessment

Assessment focusing on comprehending the meaning and application of information.

Signup and view all the flashcards

Application-based Assessment

Assessment of the skill in applying knowledge to solve problems.

Signup and view all the flashcards

Unit 1

Fundamentals of Computer

Signup and view all the flashcards

Unit 2

Fundamentals of Operating Systems

Signup and view all the flashcards

Unit 3

Data Communication

Signup and view all the flashcards

Study Notes

Computer Science SSC-I - Section A

  • Time allowed: 15 minutes
  • Instructions: Answer all questions on a separate bubble sheet. Do not use lead pencil.
  • Q1 (1): Long-distance WAN connections use Coaxial cable.
  • Q1 (2): The storage device with fastest read/write access is the Hard Disk.
  • Q1 (3): Authors use Hyperlinks to add external website links in MS Word.
  • Q1 (4): Television broadcasting uses Simplex transmission mode.
  • Q1 (5): The rate of change of electrical signals per second is called Baud rate.
  • Q1 (6): A Gateway device connects two different types of networks.

Computer Science SSC-I - Section B

  • Time allowed: 2.45 hours
  • Instructions: Answer all questions from Section B. All Parts have equal marks.
  • i) Two characteristics of 3rd generation computers:
    • Smaller size
    • More reliable
  • ii) Two parts of a motherboard: (a) and (b) (Image needed to identify specific parts)
  • iii) CAD stands for Computer Aided Design. CAM stands for Computer Aided Manufacturing.
  • iv) Career interests in IT and reasons. (Specific career choices and justifications need to be filled)
  • v) Importance of memory management in modern operating systems despite increasing memory sizes. Two reasons need to be provided.
  • OR (v): Two common operations of file management in operating systems. (Two operation descriptions needed.)
  • vi) Suitable software for preparing student result sheets, and why. (Software recommendation and justification needed.)
  • vii) Importance of protocols in data communications.
  • OR (vii): Two applications of Bluetooth technology.
  • viii) Differences between synchronous and asynchronous transmission in speed and accuracy.
  • ix) Importance of accurate data transmission and an example.
  • OR (ix): Situation where data transmission timeliness is essential.
  • x) Two difficulties a company faces without a computer network.
  • OR (x): Two reasons why Mesh topology is considered reliable.
  • xi) Two ways to protect a computer from viruses.
  • OR (xi): Two disadvantages of software piracy.

Computer Science SSC-I - Section C

  • Instructions: Attempt all questions. Marks for each question are in brackets.
  • Q3: Explain two categories of application software with examples.
  • OR (Q3): Explain the four basic operations of a computer system, and diagram it.
  • Q4: Explain command line and graphical user interfaces, providing an example of each.
  • Q5: Describe batch processing and time-sharing operating systems, and provide one application for each.
  • OR (Q5): Describe two types of unguided transmission media and their applications.
  • Q6: Explain DSL and ISDN data communication lines, providing one merit and one demerit for each.
  • OR (Q6): Define computer ethics and provide four moral guidelines.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer Hardware & Networks Unit 3
18 questions
Computer Processes and Hardware Overview
18 questions
Computer Science Fundamentals: Units 1-3
10 questions
Use Quizgecko on...
Browser
Browser