Professional Documents
Culture Documents
RE-334
SEE 2074 (2018)
P]lR5s låtLo sDKo'6/ lj1fg
lbOPsf lgb]{zgsf cfwf/df cfkm\g} z}nLdf l;h{gfTds pQ/ lbg'xf];\ .
;do M ! 3G6f #) ldg]6 k"0ff{ª\s M %)
;d"x ‘s’ (Group 'A')
Computer Fundamental (22 Marks)
!= tnsf k|Zgx¿sf] pQ/ lbg'xf];\ (Answer the following questions): %x@=!)
-s_ sDKo'6/ g]6js{sf] kl/efiff n]Vg'xf];\ . (Define computer network.)
-v_ Internet sf] kl/efiff n]Vg'xf];\ . (Define Internet)
-u_ sDKo'6/ k|0ffnLnfO{ ;'/lIft /fVgsf] nflu power protection pks/0fsf]
dxŒjaf/] pNn]v ug'x{ f];\ .
Write the importance of power protection device to protect the computer system.
-3_ sDKo'6/ efO/; eg]sf] s] xf] < sDKo'6/df efO/; nfu]kl5 b]lvg] s'g} b'Oc{ f]6f nIf0fx?
pNn]v ug'x{ f];\ .
What is computer virus? Mention any two symptoms that can be seen
when a computer is infected by computer virus.
-ª_ ;fOa/ ck/fw eg]sf] s] xf] < s'g} b'Oc{ f]6f pbfx/0f lbg'xf];\ .
What is cybercrime? Give any two examples.
@= s_ lgb]{zgcg';f/ ?kfGt/ ug'{xf];\ M @ x! = @
Perform the conversion as per the direction:
(i) (523)8 into Binary (ii) (2074)2 into hexadecimal.
v_ Binary lx;fa ug'{xf];\ (Perform the binary calculation): @ x! =@
(i) 110 x 101 (ii) 111010 ÷ 110
#= hf]8f ldnfpg'xf];\ (Match the following) : $ x)=% =@
Group 'A' Group 'B'
(a) RJ 45 connector (i) Duplicate copy
(b) Back up (ii) Multimedia
(c) Microphone (iii) Twisted pair cable
(d) Hub/switch (iv) Ring Topology
(v) Star Topology
$= tn lbOPsf k|Zgx?sf] ;a}eGbf ldNg] pQ/ 5fGg'xf];\ M $ x)=%
)=%=@@
Select the best answer of the following:
-s_ tn lbOPsf dWo] s'grflx“ g]6js{ k|f6] f]sn xf]Og <
Which of the following is not a network protocol?
(i) POP (ii) FTP (iii) TCP/IP (iv) NOS
-v_ tn lbOPsf dWo] s'grflx“ ;k\m6j]o/ kmf]6f] ;Dkfbgsf] nflu k|of]u ul/G5 <
Which of these software is used for photo editing?
(i) Ms-Excel (ii) Photoshop (iii) Power-Point (iv) Ms-Word
-u_ tn lbOPsf dWo] s'grflx“ pks/0f pxL k|f6] f]sn k|of]u ug{ w]/} g]6js{x? hf]8g\ sf
nflu k|of]u ul/G5 <
Which device is used to connect multiple networks that uses the same protocol.
(i) Bridge (ii) NIC (iii) Switch (iv) Gateway
j|mdzM
RE-334 (2)
-3_ 5l/P/ /x]sf kmfOnsf efux?nfO{ PsLs[t ug]{ k|lj|mof
Process of arranging the scattered files into a contiguous manner.
(i) Scandisk (ii) Backup (iii)Defragmentation (iv) Debugging
% = pko'Qm k|fljlws zAbx¿ n]Vg'xf];\ M $ x)=% =@
Write the appropriate technical terms of the following:
-s_ nf]sn Pl/of g]6js{sf] physical layout .
The physical layout of local area network.
-v_ Internet sf] dfWodaf6 ul/g] Aofkf/ . (The business conducted through Internet.)
-u_ sDKo'6/ tyf OG6/g]6sf] k|of]u u/L ul/g] ck/fwnfO{ lgoGq0f ug]{ sfg'g .
The law which controls the crime which is done with the help of
computer and Internet.
-3_ s'g} sDKo'6/ jf pks/0f h;n] sDKo'6/ g]6js{sf c? sDKo'6/x?nfO{ ljleGg ;]jf k|bfg ub{5 .
A computer or device which provides different services to other
computers connected to the network.
^ = k"0f{ ¿k n]Vg'xf];\ (Write the full form): $ x)=% =@
(i) SMTP (ii) WAN (iii) URL (iv) VOIP