Page 60 - IP
P. 60

INFORMATICS PRACTICES
                                                 MODEL TEST PAPER -II

               Time allowed : 3 hours                                                                        Maximum Marks : 70
                                                      SECTION A

               Q1  Answer the questions after carefully reading the text.
                   Ms. Taufiq Ahmed wants to prevent unauthorized access to/from his company's local
                   area network. Write the name of a system (software/ hardware), which he should install
                   to do the same                                               1

                       Beauty Lines Fashion Inc. is a fashion company with design unit
                   and market unit 135 metres away from each other. The company
                   recently connected their LANs using Ethernet cable to share the stock
                   related information. But after joining their LANs, they are not able to share
                   the information due to loss of signal in between. Which device out of the
                   following. should you suggest to be installed for a smooth communication?
                       1
                   UPS
                   Modem
                   Repeater
                   (c)   Which of the following is not a feature of Networking?                      1

                   Resource sharing
                   Uninterrupted power supply
                      Reduced cost
                   Reliability

                         (d)   Name any two Indian scripts included in Unicode.                             1


                   Mr. Jayanto Das is confused between Shareware and Open source software
                             Mention at least two points of differences to help her understand the
                             same.                                                                          2

                   (f)       Identify the type of Topology from the following:                              2
                             (i   If each node is connected with the help of independent cable with
                             )    the
                                  help of a central switching (communication controller)
                             (ii
                             )    If each node is connected with the help of a single co-axial cable.

                   (g)       Define the following with reference to Threats to Network Security.            2
                             (i
                             )    Trojan Horse
                             (ii
                             )    Worm
                           While working in Netbeans, Ms Kanta Surbhi wants to display 'Cleared'
               Q2  (a)     or



                                                              1
   55   56   57   58   59   60   61   62   63   64   65