0% found this document useful (0 votes)
165 views2 pages

Comp UNIT I Class 8

This is a question paper of Computer science which includes Generations of Computer, Binary No system etc.

Uploaded by

Vazahat Husain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views2 pages

Comp UNIT I Class 8

This is a question paper of Computer science which includes Generations of Computer, Binary No system etc.

Uploaded by

Vazahat Husain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

St Aloysius School

Class VIII
Unit Test – I
Computer
Time: 1 hour MM: 50

A. Check the Right Answer (1*10)


1. Which technology allows networks to be deployed without cabling?
a. Wired Networking    b. Networking    c. Wireless Networking    d. Bluetooth
2. Which type of card is the most commonly used network card?
a. Ethernet Network Card    b. Internet Network Card    c. Intranet Network Card    d. Heaternet Card
3. How many general levels of network security do we have?
a. 3    b. 1    c. 2    d. 4
4. Which type of network is used in Corporate Offices?
a. LAN    b. MAN    c. Network    d. Server
5. How many types of network architecture are there?
a. 1    b. 2    c. 3    d. 4
6. Which type of network is restricted to a limited geographical area?
a. MAN    b. LAN    c. WAN    d. None of these
7. Which type of network is linked by satellite signals?
a. WAN    b. LAN    c. MAN    d. None of these
8. Which icon is selected on the desktop to access a file from a shared drive?
a. Document    b. Computer    c. Network    d. Desktop
9. Which is the most commonly used network card?
a. Wi-Fi    b. Bluetooth    c. Ethernet Network Card
10. What do we call the computers that are connected to the server?
a. PC    b. Nodes    c. Laptop
B. Fill in the blanks : (1*10)
1. Internet is an example of ……
2. ………… are the most common modes of communication.
3. Cable Television is the most common example of …………
4. In ………… , computers are connected in different cities or even countries.
5. ATM stands for …….
6. The computers that communicate with each other are called .....................
7. ................ and ................... are the different types of networking
8. The ............... are the certain sets of rules that determine how data should be transferred over the network.
9. ............... security means protecting data and resources from any unauthorised access.
10. ............. is a device that connects wireless communication devices to form a wireless network
C. State True (T) or False ( F) (1*10)
1. It is always better to store a shareable application on the network drive.   
2. Intranet refers to a computer network that allows controlled access to an information source.   

3. WAP stands for Wireless Access Point.   


4. LAN covers the largest distance and operates nationwide.   
5. Networking provides us the facility to share hardware components.   
6. The hardware devices, which are not used very often, cannot be shared on a network.   
7. A network card is used to physically attach a computer to a network.   
8. Protocols are the set of rules that determine how data should be transfered over networks.   
9. Computers, which are connected to the server are called workstations or nodes.   
10. In Client-Server network, there is no central server.   
D. Answer the following (1*10=10)
1. Which technology is used to interconnect mobile phones, computers, and printers using short range wireless
connection?
2. In which level of network security we are given a unique login name and password?
3. Name the type of network which is used to connect a small area, such as a room, an office building or a campus.
4. Name the device that connects wireless communication devices to form a wireless network.
5. Name the connector which is crimped at both ends of a network cable.
6. What is the base of binary number system?
7. How many digits does the Octal Number System consist of?
8. Name the most common Number System.
9. What kind of operations can be performed on Binary Numbers?
10. Name any two number systems.

E. Answer the following (Any 4) (2.5*4=10)


1. What is BLOG?
2. What is QBASIC?
3. Define NUMBER YSTEM.
4. Differentiate between LAN & MAN.
5. Explain network security.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy