Professional Documents
Culture Documents
Final Revision - Computer Science 2080 - 10 Marks
Final Revision - Computer Science 2080 - 10 Marks
1. What is communication?
Communication is sending and receiving information between two or more persons.
2. What is Tele-Communication?
The transmission of data and information from one place to another for the purpose of communication is
known as telecommunication.
6. Give reason in short that "Computer network reduces the cost of operation."
Ans: Computer network reduces the cost of operation by sharing hardware and software.
8. What is topology?
Ans. Network topology is the inter-connected pattern of network components.
9. Define bandwidth.
Bandwidth can be defined as the maximum volume of data that can be transmitted through a
communication system.
10. Write any two examples of full duplex modes of data transmission.
Any two examples of full duplex modes of data transmission are telephone and mobile.
25. Write the name of the protocol used for sending email messages.
-Simple Mail Transfer Protocol (SMTP)
55. List some points about how we can protect our data.
Antivirus software can detect and remove virus from the computer.
Software for backup helps in securing the information by keeping backup.
72. Which data type is used to store alpha numeric characters or special symbols in MS-Access?
Text data type is used to store alpha numeric characters or special symbols in MS-Access.
74. Which data types are used to store graphics and numeric characters in MS-Access?
OLE object is used for graphic and Numeric data type is used for numeric character
75. Which data type is used to store your school fee in MS-Access?
Currency is the data type used to store school fee in MS-Access.
78. Which data type is used to store date of birth of an employee in MS-Access?
Date/Time data type is used to store date of birth of an employee in MS-Access
80. Which data type of MS Access is used for data that can store only one of two possible values?
The data type that can store only one of two possible values is Yes/No.
88. What is the storage size of text and currency data type?
The storage size of text data type is 255 and currency data type is 8 bytes.
89. What is the storage size of memo and text data type in MS- Access?
Text can store up to 255 characters and Memo can store up to 65,535 characters
93. Which object of MS-Access is used to retrieve data from the table?
Select Query
96. Which object of MS-Access is used to retrieve data from the table?
Query is used to retrieve data from a table.
98. What is the primary component of a database that organizes data into rows and columns?
-Table
101. Which object of MS Access is used to provide graphical interface to enter data into a table?
-Form
104. Which field property speeds up searching and sorting of records based on a field?
Indexing
121. What terms are used to refer to a row and a column in a table?
- Row is refers to Record or Tuple and Column refers to Field or Attribute.
132. Which mode is used to read and display data from an existing sequential data file?
-Input Mode
10 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
151. Write any two features of C programming language?
Any two features of c programming language are:
C is a Structured Programming Language. which break down a program in several small modules and
makes the programmer easier to manage and debug the code.
C is a case-sensitive programming language. It understands the capital alphabets and small alphabets as
different values.
158. Give the name of any two header files used in C language
<stdio.h> and <conio.h>
159. Name the header/library file that handles mathematical functions in C Language.
- <math.h>
11 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
165. Write the name of two selection statement used in C language.
- if and switch statement
167. List any two examples of format specifier (Conversion Character) used in C Language.
Any two examples of format specifier (Conversion Character) used in C Language are %d (int) and %f
(float)
168. Data transmission in one direction only that is to send or receive only. Simplex Mode
169. Law that governs the legal issues of cyberspace. Cyber Law
170. Laws made to prevent criminal activities through the internet. Cyber Law
171. Crimes committed using electronic devices and cyber space. Cyber crime
172. The smallest unit to represent information on a quantum computer. Qubit (Quantum bit)
173. A system of copying data and information reading in computer into another location. Backup
174. The process of making copies of data or data files to use in the event the original data or data
files are lost or destroyed. Backup
175. A company which provides services of Internet. Internet Service Provider (ISP)
176. Network of Networks. Internet
177. The arrangement of connection patterns of computers or nodes and others
resources. Network Topology
178. Arrangements of nodes in a Network. Topology
179. A concept of transferring data from your computer to server Computer. Uploading
180. Computer program that protects computer from computer virus. Antivirus software
181. A program that can disinfect a file from virus. Antivirus software
182. A malicious program of computer that damages data and Software. Malware
183. A malicious program of computer that damages data and software. Computer virus
184. A program that destroys other programs. Computer Virus
185. Learning through the electronic media. E-learning
186. Commerce done by mobile. M-Commerce
187. business through internet. E- Commerce
188. The amount of data transmitted per second through the communication channel. Bandwidth
189. The money that is exchanged electrically. Digital currency
190. A computer which provides the services to the other computer in a network. Server
191. A main computer of a computer network. Server
192. A powerful program that controls and coordinates a computer’s hardware devices and runs
software and applications. Operating System
193. The protocol that makes the network communication possible. TCP/IP
194. Digital marks created while using Internet. Digital Footprint
195. Secret group of characters which helps to protect file from unauthorized person. Password
196. A secret code that gives the user to access particular program and System. - Password
197. A type of network in which every computer works as both client and server. Peer to Peer
Network
198. The protection of computer systems and sensitive information from unauthorized access, theft
or damage. Cybersecurity
199. ) Paying money in E-Commerce using internet. Online Payment
200. The Internet tool which is used to upload download data. FTP
12 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
201. A collective online communications channels dedicated to community based input, interaction,
content sharing and collaboration. Social media
202. A process of performing a variety of tech-enabled activities via virtual communities and
network.
203. -Social Media
204. Hacking done with permission from the client. Ethical Hacking
205. The process of identifying an individual usually based on a username and
password. Authentication
206. The mode of data communication in which data/information/signals are transmitted
in both side simultaneously. Full Duplex Mode
207. The network security systems that monitor and control the traffic flow (data packets).
Firewall
208. The process of repeatedly executing some code until condition satisfies. Looping
209. Device used to connect a PC with a telephone line. MODEM
210. Device to convert analog signal into digital signal and, vice versa. MODEM
211. Making data and information unreadable by unauthorized person. Encryption
212. it is the process of converting plain text to cipher text. Encryption
213. The technology to encode file or message. Encryption
214. The method by which information is converted into secret code that hides the information's
true meaning. Encryption
215. The conversion of encrypted data into its original form.
216. -Decryption
217. A device that controls two dissimilar networks. Gateway
218. Physical layout of computers in a network. Network Topology
219. The mode of data communication in which data can be transferred in both directions at a time.
Full Duplex Mode
220. A unique numerical identifier for every device or network that connects to the internet. IP
Address
221. Combination of private and public cloud. – Hybrid Cloud
222. Software require for browsing and surfing content on the WWW. Web Browser
223. The fake attempt to obtain sensitive information such as username, password by disguising
oneself as a trustworthy entity. Phishing
224. Network connecting device that boosts the data signals. Repeater
225. A logical collection of Internet-connected devices such as computers, smartphones or internet
of things (IoT) devices whose security have been breached and control is given away to a third party.
Botnet
226. A network device which broadcasts the information packets to all computer connected
network. Hub
227. An applications that look like they are doing something harmless, but secretly have malicious
code that does something else. Trojan Horse
228. Numbers are only allowed in the secret code. Personal Identification Number (PIN)
229. A unique numerical identifier for every device or network that connects to the internet. IP
Address
230. The issues related to cybercrime and also help in making and implementing laws over
cybercrime. Cyber Law
231. The internet service that enables to connect a remote or host computer. Telnet
232. The combination of username and password that is used to access a resource. credentials
233. Paperless payment through Internet. Online Payment
234. Any software installed on your PC that collects your information without your knowledge.
Spyware
13 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
235. An intelligent device that has ability to determine the best possible path for data transmission.
Router
236. The kind of harmful computer code or web script designed to create system vulnerabilities.
Malicious Code
237. Combination of information technology and telecommunication technology. ICT
238. A collection of internet host systems that make services available on the Internet using the
HTTP (HyperText Transfer Protocol). WWW
239. A way to get the investment whole or part of it back in case the computer system is damaged.
Insurance
14 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
259. 20. MODEM - Modulator-Demodulator.
15 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0
300 Questions Collections - Final Revision – Very Short Questions – Technical Terms
and Full Forms Collections 2080 – Computer Science [10 Marks]
283. 44. WiFi – Wireless Fidelity
16 | P a g e P r e p a r e d B y : D e e p a k S h r e s t h a – S E E C O M P U T E R S C I E N C E 2 0 8 0