Monday, 30 April 2018

DOEACC O LEVEL JAN 2012 Solved Paper

                                                                          PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein.                                                                                                                (1x10)
1. The rules with regards to conduct for Internet users is known as
A) Mosaic
B) Netiquette
C) Protocol
D) Internet Protocol

2. TCP/IP is
A) Abbreviation for Transmission Control Protocol and Internet Protocol
B) A suite of networking protocols
C) A standard protocol that lets disparate types of computers communicate over the Net
D) All the above

3. The protocol that allows a computer to use the Internet Protocol with standard voice-grade
telephone line and a high-speed modem is
A) SLIP
B) SMTP
C) SGML
D) RTF

4. A Spider is
A) A Computer virus
B) A Browser
C) A program that catalogs web sites
D) A hacker community

5. FTP does not use
A) Two transfer mode
B) Control connection to remote computer before file can be transferred
C) User Datagram Protocol
D) Authorization of a user through login and password verification

6 A terminal emulation protocol that allows users to log-on to a host computer from remote
computers is
A) Telnet
B) TCP/IP
C) FTP
D) Point-to-Point protocol (PPP)

7 Which of the following is used to enable the use of active documents?
A) HTML
B) CGI
C) JAVA
D) All of the above

8 A networking standard developed by Xerox, Intel and DEC; capable of connecting as many as
1,024 workstations and transmitting data at a maximum speed of 10 Mbps
A) Ethernet
B) FDDI
C) File Transfer protocol
D) Gopher

9 The HTML tags that create a table header are
A) <head></head>
B) <ttop></ttop>
C) <th></th>
D) <td></td>

10 Which of the following is the correct HTML for inserting background image?
A) <background img=”background.gif”>
B) <img src=”background.gif” background />
C) <a href=”background.gif”>
D) <body background=”background.gif”>



2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the “tear-off” sheet attached to the question paper, following instructions therein.

1 Client server computing is the fundamental relationship of computers on the Net (or any
network) in which one computer acts as a client by remotely connecting to another computer
that acts as a server. True

2 Domain name will change if a system’s IP address changes. False

3 Firewall protects an organization’s computer systems from external access.True

4 XML is a cross platform, software and hardware independent tool for transmitting information
over the Net.True

5 Just as HTML, XML also uses predefined tags.False

6 IP only allows fixed packet sizes.False

7 Cipher text is the meaningful form of encrypted message that can be read in transit by anyone.False

8 Meta search engines are search engine tools that pass queries to a maximum of 6 search
engines. True

9 TELNET is a network protocol used on Internet to provide a bidirectional interactive textoriented
communications via a virtual terminal connection. True

10 JavaScript can read and write HTML elements. True

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet

attached to the question paper, following instructions therein.

                X                                                                                                                 Y
3.1 An internet standard that extends the format of
e-mail to support text in character sets   C. MIME                                       A. EDI System
3.2 A hardware device connected to a host on a LAN                                  B. User Interface
that acts as a gateway between different types of                                        C. MIME
networks D. Router                                                                                       D. Router
3.3 A set of formatting codes for creating documents. G. SGML                E. B2C E-commerce
3.4 A self service model where customers configure                                   F. <HTML> and </HTML>
and customize the products and services they                                              G. SGML
wish to pay E. B2C E-commerce                                                                 H. Dogpile
3.5 An example of metasearch engine H. Dogpile                                      I. Public Key Infrastructure
3.6 The screen in which you type a query and which                                   J. Bing
displays the search resultsB. User Interface                                                K. B2B E-commerce
3.7 Set of computer interchange standards for                                              L. Signature
business documents such as invoices, bills and                                            M. IPv6
purchase orders A. EDI System
3.8 Any web document must began and end withF. <HTML> and </HTML>
3.9 It is automatically appended to an outgoing mail
message or network news postL. Signature
3.10 A technique in which two different keys are used
for performing encryption and decryption I. Public Key Infrastructure


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question paper,
following instructions therein.                                                                                         (1x10)
A. POP B. Hyperlinks C. CERN D. Hacker E. Client-server computing F. Flame G. Geocities H. Address book I. WAIS J. Filter K. Authentication L. Webmaster M. XBM


4.1 A(n) Address book is a place where you can store the information about the people with whom you correspond.
4.2 CERN is a Swiss organization that developed WWW.
4.3 Geocities is one of the popular free Web presence providers, which helps you to create your
own Website free of cost.
4.4 WAIS is a powerful system for searching and retrieving information from databases
scattered across the Net.
4.5 System administrator for a World Wide Web server is called as L. Webmaster.
4.6 POP is a protocol that is used to retrieve e-mail from a mail server.
4.7 The fundamental relationship of computers on the Net in which one computer acts as a client by
remotely connecting to another computer that acts as a host is called as Client-server computing.
4.8 Authentication is a security feature that allows access to information on an individual basis.
4.9 An inflammatory remark or a message usually associated with e-mail or an article posted to a
newsgroup is referred to as Flame.
4.10 Hacker is a computer user who illegally visits networked computers to look around or cause
harm.

No comments:

Post a Comment

O level M@-R4-01-2018

1. A webpage displays a picture. What tag was used to display that picture? (a) pictur (b) Image (c) Img (d) Src 2. <b> tag make...