SlideShare ist ein Scribd-Unternehmen logo
1 von 47
LESSON 67
Introduction to Computer Networks
and Communications

SCORE

1. The actual connecting medium that carries the message between your sending
computer devices and receiving computer devices.
Answer:
2. Computers and peripheral devices that are connected together in order to exchange
information (e.g. email, chat and web site) and share resources (e.g. printers).
Answer:
3. This device converts digital signals into analog and back again into digital signals for
information to move across the telephone line.
Answer:
4. A set of defined rules of communications for exchange of information to be possible
among computing devices in a network.
Answer:
5. Network communications through the medium of the atmosphere using radio waves.
Answer:

1. Using hardware and _______________ interconnected computing devices can
communicate with each other through defined rules of data communications.
2. Communications is about the transfer of information from a ______________across a
distance, to a receiver.
3. A computer network can be a _____________connection and a wireless connection.
4. Computers communicate with ________________signals.
5. Other forms of communications technology, such as the telephone, use _________
signals.

1
ICT WORKSHEET, FORM 4
1. For communications in a network to
be possible, there must be
I. a physical medium
II. a set of speakers
III. a set of rules called protocols
IV. a system application for managing
network information flow
A. I, II, III
B. II, III, IV
C. I, III, IV
D. All the above

6. The function of the modem is to
____
A. convert digital signals into text and
vice versa
B. convert digital signals into sound
and vice versa
C. convert digital signals into analog
and vice versa
D. convert digital signals into images
and vice versa
7. In a network, information and data
in the form of codes is transmitted
through a physical medium such as
wire, cable, or even the atmosphere
using________
A. electricity and water
B. electricity, radio waves or light
C. radio waves and electromagnetic
tape
D. radio waves, light waves or
magnetic signals

2. Information that is sent across a
network can be text, voice, sound,
video, graphics and images, or a
combination of all these, which we
call____________
A. multimedia
B. information
C. multitasking
D. communications
3. In a ______computers can
exchange and share information and
resources.
A. office
B. network
C. restaurant
D. organization

8. The physical medium over which
data signals travel can
be____________
A. cables, modems or wires
B. wires, cables or the atmosphere
C. cables, wires or suitable software
D. wires, the atmosphere or hardware

4. What happens if protocols between
interconnected devices are not the
same?
A. Computers will be able to share
resources
B. Data transmission will not be
understood between devices
C. Communications will not be able to
convert from analog to digital signals
D. Network communications will use a
special set of rules to connect devices

9. A computer network is a system of
interconnected computers and
peripheral devices. It may
connect_________
A. computers, satellites and chairs
B. computers, printers, scanners and
cameras
C. computers, cameras, motors and
hardware tools
D. computers, scanners, x-ray
equipment and log books

5. Modem stands for_________
A. Motivator/ Demotivator
B. Modelling/ Demodelling
C. Modulator/ Demodulator
D. Modes/ Demonstrations

10. The following device uses digital
signals to send data ___________
A. Radio
B. Television
2
ICT WORKSHEET, FORM 4
C. Microwave oven

D. Notebook computer

LESSON 68
Components of Communications

SCORE

1. Signals which carry information in a
communications system travel through
A. a vacuum
B. a liquid medium
C. a physical medium
D. a software medium

III. fibre-optic cable
IV. wireless systems
A. I and II
B. I, II, III
C. I, II, III and IV
D. None of the above

2. A communications channel is also
known
I. a communications link
II. a communications line
III. a communications medium
IV. a communications program
A. I, II, IV
B. I, II, III
C. I, III, IV
D. II, III, IV

6. The network interface card provides
connection between the computer and
____
A. the network’s server
B. the network’s software
C. the network’s security system
D. the network’s communications media
7. The network interface card functions as
_______to move data from the PC’s
system to the network medium and vice
versa.
A. a data reader device
B. a data storage device
C. a data channel device
D. a data conversion device

3. What is a communications channel?
A. The logical path by which a message
travels from a receiving device to a
sending device
B. The logical path by which a message
travels from a sending device to a
receiving device
C. The physical path by which a message
travels from a receiving device to a
sending device
D. The physical path by which a message
travels from a sending device to a
receiving device

8. Other hardware components that are
required for communications to work on a
network are networking devices, such as
A. the hub, switch, router and modem
B. the switch, hub, scanner and cables
C. the modem, mouse, keyboard and
printer
D. the router, hub, server and network
software

4. Which of the following are examples of
communications channels?
I. Wired connection
II. Text communication
III. Wireless connection
IV. Human communication
A. I and II
B. I and III
C. II and III
D. III and IV

9. Network software would be able to
provide basic functions, such as
I. connecting to other computers on the
network
II. configuring plug and play devices
III. sharing resources and files
IV. providing for network security for users
who are online
A. I, II, III
B. I, III, IV
C. II, III, IV
D. All the above

5. Some common types of network
communications channels are the_____
I. twisted-pair wire
II. coaxial cable

3
ICT WORKSHEET, FORM 4
10. Network software must be able to
handle networking ________and
connections within the network and with
other networks.

A. practices
B. principles
C. proposals
D. protocols

LESSON 69
NO
1

SCORE
STATEMENT

TRUE

FALSE

With e-banking, most of the transactions can be done at home
or from the office only during banking hours.

2

In e-learning, students at any location around the world can
participate in an online classroom, download tutorial questions
and submit their assignments.

3

Networks do not provide a very rapid method for sharing and
transferring files.

4

Besides monetary savings, sharing a program on a network
allows easier upgrading of the program.

5

People at various places in a network can communicate and
work together.

6

Internet connection is not needed before an online education
can take place.

Importance of Networks and
Communications

B. FALSE
1. Mobile communications today is based
on networking technology.
A. TRUE

2. Networking technology allows banking
to be done anywhere and at any time.

4
ICT WORKSHEET, FORM 4
A. TRUE
B. FALSE

A. TRUE
B. FALSE

3. Data in the network can be shared.
A. TRUE
B. FALSE

6. Network communications is important in
the area of e-business, e-banking, elearning and long distance
communications.
A. TRUE
B. FALSE

4. People on the network cannot share
information.
A. TRUE
B. FALSE

7. We cannot do a long distance
communication using a network.
A. TRUE
B. FALSE
8. Homemakers, students, teachers,
business people and almost anyone with
access to a networked computer can get
online and continue their path of lifelong
education anywhere, anytime.
A. TRUE

5. A network links two or more computers
together to enable data and resource
exchange.

B. FALSE

SCORE

LESSON 70
Types of Networks

5
ICT WORKSHEET, FORM 4
1. LAN is an acronym of Limited Area
Network
A. TRUE
B FALSE

5. LAN is generally limited to a
geographical area such as home,
school, or building.
A. TRUE
B. FALSE

2. WAN is a network connecting
computers within very large areas,
such as states,countries and the world.
A. TRUE
B. FALSE

6. LAN is an acronym for Leased Area
Network.
A. TRUE
B. FALSE

3. A clerk in Malacca exchanges files
with a clerk in Perak using LAN.
A. TRUE
B. FALSE

7. WAN is a network that covers a
limited geographical area.
A. TRUE
B. FALSE

4. LAN is a network that is confined to
a relatively small area.
A. TRUE
B. FALSE

8. It is considered a Local Area
Network if our school network can
access the Internet.
A. TRUE
B. FALSE
SCORE

LESSON 71
Local Area Network (LAN)

1. A lecturer in Penang exchanges files
with a student in Kuala Lumpur using LAN.
A. TRUE

B. FALSE

6
ICT WORKSHEET, FORM 4
2. We can share resources with a Local
Area Network.
A. TRUE
B. FALSE

7. LANs are capable of transmitting data at
a very high speed compared to normal
transmission using telephone lines.
A. TRUE
B. FALSE

3. Printers cannot be shared using a LAN.
A. TRUE
B. FALSE

8. If our school network can access the
internet, it is considered a Local area
Network.
A. TRUE
B. FALSE

4. LAN is a network that covers a limited
geographical area.
A. TRUE
B. FALSE

9. Local area Network is group of
computers and network device connected
together, usually within the same building.
A. TRUE
B. FALSE

5. Most LAN typically used coaxial, twisted
pair or fiber optic cables as a transmission
media.
A. TRUE
B. FALSE
6. The Internet is an example of a LAN.
A. TRUE
B. FALSE

LESSON 72
Metropolitan Area Network (MAN)

SCORE

1. MAN is an acronym for Metropolitan Area Network.
A. TRUE
B. FALSE
2. MAN allows communication activities and all the network services sharing in the
coverage region.
A. TRUE
B. FALSE
3. Coaxial cables are usually used to connect computers in MAN
A. TRUE
B. FALSE
4. MAN can be a combination of LANs.
A. TRUE
C. FALSE
5. MAN can only be connected using digital media.
A. TRUE
B. FALSE
6. MAN covers a bigger area than LAN.
A. TRUE
B. FALSE

7
ICT WORKSHEET, FORM 4
7. Home network is an example of a Metropolitan Area Network.
A. TRUE
B. FALSE
8. Metropolitan Area Network connects computers in a metropolitan area such as
campuses or links between office buildings in a city.
A. TRUE
B. FALSE

LESSON 73
Wide Area Network (WAN)

SCORE

8
ICT WORKSHEET, FORM 4
1. We can communicate with our friends
outside the country using the Internet.
A. TRUE
B. FALSE

A. TRUE
B. FALSE
6. Modems are the devices that WANs use to
connect all the smaller networks into a WAN.
A. TRUE
B. FALSE

2. The Internet is the largest WAN in the world.
A. TRUE
B. FALSE

7. WAN is used to connect computers in limited
areas such as a city.
A. TRUE
B. FALSE

3. WAN covers smaller geographical area than
LAN.
A. TRUE
B. FALSE

8. More hardware and maintenance costs will
incur in setting up a WAN.
A. TRUE
B. FALSE

4. To improve the network performance in the
school lab, the school should install a WAN.
A. TRUE
B. FALSE
5. WAN is part of the Metropolitan Area
Network.

SCORE

LESSON 74
Differences between Types of Network

• Smallest coverage area
• Normally used cables
• Generally used by small organisations such as schools and computer labs
• Coverage is bigger than LAN but limited to certain geographical area
• Usually used to connect networks in the cities
• Similar to WAN but offers a faster transmission speed
• Worldwide coverage
• It allows communication with friends outside the country
• Unlimited number of computers
1. Cost, coverage, speed and number of
computers involved increase from LAN, MAN to
WAN.

A. TRUE
B. FALSE

9
ICT WORKSHEET, FORM 4
2. MAN can have a large number of computers
connected compared with LAN but less than
WAN.
A. TRUE
B. FALSE

6. LAN normally uses a satellite as their
transmission media.
A. TRUE
B. FALSE
7. A WAN is a network that covers a large
geographic area using a communication
channel
that combines many types of transmission
media such as telephone lines, cables and
radio waves.
A. TRUE
B. FALSE

3. MAN may have more than two transmission
medias.
A. TRUE
B. FALSE
4. MAN is the best solution for those who want
a larger coverage area than LAN but faster
transmission speed than WAN.
A. TRUE
B. FALSE
5. The cost of establishing a MAN is cheaper
than LAN.
A. TRUE
B. FALSE

8. Computers in the school office and
computers in the faculty room can be
connected using LAN.
A. TRUE
B. FALSE

LESSON 75
Network Architecture

SCORE

10
ICT WORKSHEET, FORM 4
NO
1

STATEMENT
Network architecture is the overall design of a computer network that
describes how a computer network is configured and what strategies are
being used.

2

Network architecture mainly focuses on the cost of the networks.

3

Network architecture is also known as network model or network design.

4

There are three main network architectures.

5

A client/server network is a network where the shared files and
applications are stored in the server but network users (clients) can still
store files on their individual PCs.

6

A server is a computer that shares information and resources with other
computers on a network.

7

A client is a computer which requests services or files from a server
computer.

8

Peer-to-peer network is a network with all the nodes acting as both
servers and clients.

9

All computers in the peer-to-peer network have equal responsibilities and
capabilities to use the resources available on the network.

10

A server is needed in a peer-to-peer network.

11

Network architecture is mainly focused on the functions of the networks.

12

In client/server network, two powerful computers must be assigned as
the servers.

13

Peer-to-peer has no tendency to slow down even with heavy use.

14

In peer-to-peer network all computers in the network are considered
equal; all of them have the same responsibilities and capabilities to use
the resources available on the network.

15

In peer-to-peer network no server is needed.

16

There are three main network architectures: server network,client
network and peer-to-peer network.

17

The client computers will request services or files from the server in a
client/server network.

18

Network mode is another term for network architecture.

LESSON 76
Client/Server

TRUE

FALSE

SCORE

11
ICT WORKSHEET, FORM 4
1. A _____________________is also sometimes called a host computer.
2. A ________________is one or more computers that act as a server and the other
computers on the network request services from the server.
3. There are other computers and mobile devices on the network that rely on the server for
its resources, which we call_____________________
4. A_______________is used to store and manage files.
5. A _________________is used to manage network traffic.
6. A _________________is used to store and provide access to a database.
7. A ______________________is to manage printers and print jobs.
8. A company owns a server and more than 50client computers. The most suitable network
architecture for this company is the ________________network.
9. A_______________is used to control access to the hardware, software and other
resources on the network.
10. In banks, account information is stored in the bank’s ______________ A customer can
access his account via Internet banking.

LESSON 77
Peer-To-Peer

SCORE

12
ICT WORKSHEET, FORM 4
1. In a client/server network, a computer may have a different__________depending on its
functions.
2. In a peer-to-peer network, all computers have___________abilities.
3. More __________costs will have to be spent on a client/server network than a peer-topeer network.
4. Client/server network is used in both small and _____________networks.
5. Peer-to-peer is normally used in ___________networks with less than ten computers.
6. Client/server network is easier to manage than peer-to-peer network in terms of
_____________ and data accuracy.
7. Files need to be shared in the _____________of a client/server network while shared files
will need to be stored in individual PCs of a peer-to-peer network.
8. One __________computer is needed as the server in a client/server network while peerto-peer network needs no server.
1. Kamal has two computers. He wants to build
a simple network architecture in his house. The
best network architecture is a client/server
network.
True False

6. Hardy is given a job to construct a form of
networking in his aunt’s company. His aunt has
three computers; the most suitable network
architecture is peer-to-peer network.
True False

2. A computer in peer-to-peer network can
share a printer with other computers.
True False

7. Shamala is downloading an MP3 song from
the Internet. She wants to share the song with
her friend, Linda in Japan. Linda must use
Bearshare to download the MP3 song from
Shamala’s hard drive.
True False

3. Suzan can share her hard drive with Leela
who is staying in the USA by using Limewire
software.
True False

8. Kumar wants to share his assignment with
his course mate. He must give permission to
his course mate to access his hard drive before
his course mate can retrieve his assignment.
True False

4. Internet networking allows a group of
computer users with the same networking
program to connect with each other and
directly access files from each other’s hard
drives.
True False

9. In a peer-to-peer network, a computer
cannot share any devices attached to it such as
a printer or a scanner to any other computer.
True False

5. Rajoo found an interesting Web joke; he
wants to share this joke with his friends in
Korea. His friend used MS PowerPoint to
download the joke from his hard drive.
True False

10. Each computer in the peer-to-peer network
has equal responsibilities and capabilities like
sharing hardware (such as a printer), data or
information with other computers.
True False

LESSON 78
Network Topology

SCORE

13
ICT WORKSHEET, FORM 4
LESSON 79
Network Topology

SCORE

14
ICT WORKSHEET, FORM 4
1. A bus refers to the main physical
pathway or central cable where all other
devices are connected to it.
A. TRUE
B. FALSE

6. In a bus topology, troubleshooting is
difficult when one of the nodes fails.
A. TRUE
B. FALSE

2. If the backbone fails, the network can
still function.
A. TRUE
B. FALSE

7. A bus network must have a common
backbone (the central cable) to connect all
devices.
A. TRUE
B. FALSE

3. A bus topology consists of a double
central cable to which all computers and
other devices connect.
A. TRUE
B. FALSE

8. In communications technology, a bus
network is like as a common “highway” in
which data is transmitted.
A. TRUE
B. FALSE

4. One of the advantages of the bus
topology is new devices can be added to
the backbone or to the existing nodes.
A. TRUE
B. FALSE

9. Bus topology and bus network are two
different things.
A. TRUE
B. FALSE
10. In a bus topology, failure of a node will
affect the entire LAN.
A. TRUE
B. FALSE

5. Bus networks are very common in Wide
Area Networks (WAN).
A. TRUE
B. FALSE

LESSON 80
Ring Topology

SCORE

15
ICT WORKSHEET, FORM 4
1. A ring topology consists of a single
central cable to which all computers and
other devices connect.
A. TRUE
B. FALSE

6. If one of the nodes in a ring network
with backbone fails, the network will fail to
function.
A. TRUE
B. FALSE

2. A server may exist in a ring network,
but it will not connect to all the nodes in
the network.
A. TRUE
B. FALSE

7. If one of the nodes in a ring network
with backbone fails, the network can still
function as long as the backbone is
working.
A. TRUE
B. FALSE

3. A ring network can be found in Wide
Area Networks.
A. TRUE
B. FALSE

8. In a ring network, a failing node does
not affect the entire LAN.
A. TRUE
B. FALSE

4. A ring network does not have a common
backbone.
A. TRUE
B. FALSE

9. If a ring network has a ring-form
backbone, then all nodes will connect to
the backbone.
A. TRUE
B. FALSE

5. Ring topology is also known as ring
network.
A. TRUE
B. FALSE

10. In a ring network, troubleshooting is
difficult when one of the nodes fail.
A. TRUE
B. FALSE

LESSON 81

SCORE

16
ICT WORKSHEET, FORM 4
Star Topology

1. A star network is found in a ________________________setting.
2. In the early days of computer _______________,all computers were connected to a
centralised mainframe computer.
3. A star topology is also known as___________________
4. The idea of a ________________computer is where the basic concept of a star topology
comes from.
5. Network speed ____________________when the number of nodes increases.
6. If one of the nodes ________________ the star network can still function as long as the
host is working.
7. __________________is difficult when one of the nodes fails.
8. A star topology consists of a _______________which acts as the centre and all nodes
connect to the host.
9. In a star network, every ________________will not connect to the neighbouring nodes.
10. In star topology, a host must be installed to _______________the network.

LESSON 82
Differences of Network Topology

SCORE

17
ICT WORKSHEET, FORM 4
1. Each topology influences the capabilities of the hardware in order to manage the flow of
information.
True False
2. Ring topology has no limit to install as many numbers of nodes when extending a
network.
True False
3. Star topology has an average capacity in adding and removing nodes.
True False
4. Star topology has it own host.

True False

5. Ring topology does not have connection between each node.
True False
6. Bus topology has a central host and all nodes connect to it.

True False

7. In a ring topology, all computers and other devices are connected in a circle.
True False
8. Star topology limits installation of many numbers of nodes when extending a network.
True False
9. Bus network has no difficulties in troubleshooting.
True False
10. Bus topology can install many numbers of nodes when extending a network.
True False

SCORE

LESSON 83
18

ICT WORKSHEET, FORM 4
Introduction to Network Standards
1. The well-known standards adopted by the Institute of Electrical and Electronic Engineers
(IEEE) are the ___________________________
2. The______________ uses the 2.4GHz frequency band to transmit data up to 2Mbps.
3. _______________________is the standard specifications for a Broadband LAN.
4. Specifications for a fibre-optic LAN and MAN are given under the _________________
5. The IEEE develops and provides networking technology specifications for worldwide
usage which is called _____________________
6. The______________________ is the standard for an Ethernet LAN.
1. This 802.11 standard provides specifications for the design, installation and testing needed for
broadband transmissions.
True False
2. In 802.3, Ethernet refers to the physical cabling, while the way data is transmitted through the
cable is called Carrier Sense Multiple Access/ Collision Detection (CSMA/ CD).
True False
3. This 802.8 standard provides specifications for the design, installation and testing needed for
broadband transmissions.
True False
4. Network communications use a variety of standards to ensure that data travels correctly to its
destination.
True False
5. The 802.11 standard uses the 2.4GHz frequency band to transmit data up to 2Mbps.
True False
6. 802.7 standard gives the recommendations for the configuration and testing of fibre optic Local
Area Networks and Metropolitan Area Networks.
True False
7. The well-known standards adopted by the Institute of Electrical and Electronic Engineers (IEEE) are
the 800 standards.
True False
8. 802.11 standard defines communication between a wireless computer or client and an access
point, or between two wireless computers or clients.
True False
9. In 802.3 standard, broadband transmissions allow simultaneous multiple transmissions or signals
using different communications channels at the same time.
True False
10. 802.8 standard provides specifications for the design, installation and testing needed for
broadband transmissions.
True
False

SCORE
19
ICT WORKSHEET, FORM 4
LESSON 84
Protocols
1. _______________________provide the rules for how computers communicate.
2. _______________________is responsible for providing logical addressing called IP
address to route information between networks.
3. _______________________is used to access, send and receive Hypertext Markup
Language (HTML) files on the Internet.
4. _______________________is responsible for allowing files to be copied between
devices.
5. ________________________ensures the delivery of information packets across
networks.
1. Network standards are specifications set by organisations such as the IEEE to define how
networking devices communicate and access network media.

True

False
2. File Transfer Protocol (FTP) is used for transferring e-mail between computers.

True
False

3. Before protocols were developed, intercommunication between devices was possible.

True

False
4. Protocols are important as they define how devices, applications or computers communicate on a
network.
True
False
5. A protocol stack or a protocol suite works together as a group at different levels or layers. It
prepares and processes data for an exchange of information over a network.
True
False
6. Internet Packet Exchange (IPX) is one of the three main protocol suites that are used in internet
works.
True
False
7. Hypertext Transfer Protocol (HTTP) is responsible for allowing files to be copied between devices.
True
False
8. On a network between two computers, only one protocol will be at work defining the processes of
communication between the two computers during a single exchange of data or information.
True
False
9. Protocols define how devices intercommunicate in a network environment.

20
ICT WORKSHEET, FORM 4
True
False
10. Simple Mail Transfer Protocol (SMTP) is used for transferring e-mail between computers.

True

False

LESSON 85
Introduction to TCP/IP

SCORE

1. IP is the protocol that transfers data from node to _____________________.
2. TCP is responsible for breaking the data into_____________ before they are sent, and
assemble them when they reach a destination.
3. IP is responsible for sending the packets from sender to __________________.
4. Some refer TCP/IP as the ________________________.
5. TCP stands for _______________________
6. IP takes care of delivering data packets between two ___________________
7. TCP/IP is the internet communication_________________________

21
ICT WORKSHEET, FORM 4
8. IP stands for ____________________
9. TCP/IP is a _________________that sets the rules computers must follow in
communicating with each other on a network.
10. TCP establishes connection between two computers, protects against data loss and
_________________ corruption.

LESSON 86
The Way TCP and IP Work

SCORE

1. Each computer must have an __________________assigned by the network administrator to
access the Internet.
2. When you access a _____________for example the Yahoo main page, the TCP/IP will make the
communications work between your computer and the Yahoo’s server.
3. You have typed the ___________“www.yahoo.com” on the browser. Your TCP will send a request
for the web page to Yahoo’s server according to the address you typed in.
4. TCP will make the ______________between two computers (yours and Yahoo server) and it will
prepare the full-duplex communication.
5. The IP will begin sending the ________________from 192.168.0.1 to www.yahoo.com (or
209.131.36.158).
6. Internet is a huge collection of ______________. There are many routes from your computer to
the server.

22
ICT WORKSHEET, FORM 4
7. IP will send the ________________through these routes as fast as possible.
8. IP will constantly use several different ______________to deliver packets to their destination.
9. TCP will continue to maintain the link between two _______________________
10. TCP will close the ________________links once the web page has reached your computer.

LESSON 87
Private Computer Network Setting

SCORE

1. When you want to install a private network, you will need to install the _________________IP
address, subnet mask and default gateway.
2. Right click on the My Network Places on the desktop and click the_________________command.
3. In the Network Connections window, right click on the________________interface and click the
Properties command.
4. In the network interface’s properties dialog box, click the_____________entry and then click the
properties button.
5. In the Internet protocol Properties dialog box, select the use the
following_______________option.
6. Type in the ______________in the IP address text box.
7. Type in the subnet ______________in the subnet mask text box.
8. Enter a ______________with you server’s IP Address.
9. Make sure the obtain ____________server addresses automatically option is chosen.
10. Click OK in the ____________Protocol Properties dialog box.
1. When you want to install a private network, you will need to install only the network card.
False

True

2. Right click on the My Network Places on the desktop and click the Properties command.
False

True

3. In the My Network Places window, right click on the network interface and click the Properties
command.
True
False
4. In the network interface’s properties dialog box, click the Internet Protocol entry and then click the
properties button.
True
False
5. In the Internet Protocol Properties dialog box, select the Use the following IP address option.
True
False

23
ICT WORKSHEET, FORM 4
6. Type in the subnet mask in the IP address text box.

True
False

7. Type in the IP address in the subnet mask text box.

True
False

8. Enter a default gateway with you server’s IP Address.

False

True

9. Make sure the obtain DNS server addresses automatically option is chosen.
True
False
10. Click OK in the Internet Protocol Properties and the external interface’s properties dialog box.
True
False

LESSON 88
Types of Network Communication Technology

SCORE

1. An ________ __ can be viewed as part of a company's Intranet that is extended to users outside
the company.
Answer:
2. It has a Web server, supports multimedia Web pages coded in HTML and is accessible via a Web
browser such as Microsoft Internet Explorer or Netscape Navigator.
Answer:
3. It consists of millions of smaller business, academic, domestic and government networks, which
together carry various information and services, such as electronic mail, online chat. It also carries
interlinked Web pages and other documents of the World Wide Web.
Answer:
4. Package shipping companies, for example, allows customers to access their network to print air
bills, schedule pickups, and even track shipped packages as the packages travel to their destinations.
Answer:
5. Through the society has access to global information and instant communications
Answer:
6. Sometimes the term refers only to the most visible service, the internal website.
Answer:
7. It has a Web server, supports multimedia Web pages coded in HTML and is accessible via a Web
browser such as Microsoft Internet Explorer or Netscape Navigator.
Answer:

24
ICT WORKSHEET, FORM 4
1. In intranet, ______________and other Internet protocols are commonly used as well, especially
FTP and email.
2. The same concepts and technologies of the Internet such as clients and servers running on the
Internet protocol suite are used to build an __________________
3. Sometimes a company uses an ,________________which allows customers or suppliers to access
part of its network.
4. Contrary to some common usage, the Internet and the ________________are not synonymous.
5. Intranet has a Web server, supports multimedia Web pages coded in HTML and is accessible via a
_________________ such as Microsoft Internet Explorer or Netscape Navigator.
6. The Internet is a worldwide, publicly accessible system of interconnected computer networks that
transmit data by packet switching using the standard ___________________

LESSON 89
Internet

SCORE

1. Internet is a global network connecting
millions of computers.
A. TRUE
B. FALSE

B. FALSE
3. Some of the many usages of the Internet
are entertainment, commerce and education.
A. TRUE
B. FALSE

2. There is only one category of Internet
connection and this is called broadband.
A. TRUE

25
ICT WORKSHEET, FORM 4
4. Internet transmits data by using Internet
Protocol (IP).
A. TRUE
B. FALSE

A. TRUE
B. FALSE
8. Internet service can only be provided by a
telephone company.
A. TRUE
B. FALSE

5. Internet connection is divided into two
categories; dial-up and Streamyx.
A. TRUE
B. FALSE

9. Currently, Malaysia has four telephony
companies providing Internet services.
A. TRUE
B. FALSE

6. An ISP can either be a telecommunication
company or any other organization specialising
in providing access to Internet services.
A. TRUE
B. FALSE
7. The Internet is the world’s largest computer
network connecting millions of computers
worldwide.

SCORE

LESSON 90
Intranet

1. Intranet is an internal network within the
organisation.
True False

3. Intranet has its own firewall to protect from
intruders outside an organisation from
accessing the company information or data.
True False

2. Intranet can be accessed by other
computers outside an organisation with the use
of login names and passwords.
True False

4. Intranet can be accessed without the use of
user ID or login name and password..
True False

26
ICT WORKSHEET, FORM 4
5. Intranet can connect two branches of an
organisation even though they are located at
two different places.
True False

8. Intranets do not support groupware
applications.
True False

6. The Internet connects networks worldwide,
while intranet works within a particular
organisation.
True False

9. If Ali is in Jakarta on a business trip, he can
still access company information by going
through his company’s website, entering his
user ID or login name and password.
True False

7. Intranets include services like email,
company information, employee handbook,
company events and calendars as well as job
postings.
True False

10. With intranet, meetings and discussions
can be carried out without having to physically
meet at a meeting room.
True False

SCORE

LESSON 91
Extranet

1. Only __________ or authorised users can navigate or access an extranet.

27
ICT WORKSHEET, FORM 4
2. Through extranet, users can share product __________ exclusively with wholesalers or those "in
the trade”.
3. News of __________ interest can be shared privately with partner companies using extranet.
4. __________ with other companies on joint development efforts can be done via extranet.
5. __________ can access the Internet while extranet is only limited to defined sets of customers,
suppliers or partners.
6. Extranet is within a firewall while the __________ might be with or without a firewall.
7. __________ in the Internet often create problems such as hackers and viruses to users, while
extranet is more secured as only authorised users can access their system.

LESSON 92
Communication Devices:
Hardware Requirements

SCORE

1. An adapter card or PC card that enables the computer to access the network.
Answer:
2. A central communication device that allows computers and devices to transfer data wirelessly
between wireless devices or to transfer data wirelessly to a wired network.
Answer:
3. A communication device that connects multiple computers or other routers together and transmits
data to the correct destinations.
Answer:
4. A communication device that only works in stand alone computers. It is built into the computer to
connect to the Internet.
Answer:
5. A common connection point for devices in a network commonly used to connect segments of a
LAN.
Answer:
6. A communication device that is separate from the computer and is also mobile. It is used to
connect to the Internet.
Answer:
7. A network card that provides wireless data transmission.
Answer:
1. An adapter card or PC card that enables the
computer to access the network.
A. Modem
B. Wireless Access Point
C. Network Interface Card
D. Wireless Network Interface Card

2. A central communications device that allow
computers and devices to transfer data
wirelessly between wireless devices or to
transfer data wirelessly to a wired network.
A. Router

28
ICT WORKSHEET, FORM 4
B. Hub/Switch
C. Wireless Access Point
D. Wireless Network Interface Card

and transmits data to the correct destinations.
A. Router
B. Hub/Switch
C. Internal Modem
D. External Modem

3. A communications device that only works in
stand-alone computers. It is built into the
computer and enables the PC to connect to the
Internet.
A. Router
B. Hub/Switch
C. Internal Modem
D. External Modem

5. A network card that provides wireless data
transmission.
A. Hub/Switch
B. Wireless Access Point
C. Network Interface Card
D. Wireless Network Interface Card

4. A communications device that connects
multiple computers or other routers together

SCORE

LESSON 93
Functions of Communication Devices

1. A Wireless Network Interface Card is an essential component for wireless desktop
computers. This card uses an antenna to communicate through _______________________
2. A switch understands when two devices want to talk to each other, and gives them a
________________ connection.
3. A Network Interface Card is a piece of computer hardware designed to allow computers to
___________ over a computer network.
4. A hub connects all the devices on its ______________together.
5. The wireless access point usually connects to a _____________network, and can relay data
between wireless devices and wired devices.

29
ICT WORKSHEET, FORM 4
6. Several Wireless APs can link together to form a larger network that allows ________________
7. Wireless Network Interface Cards are designed around the IEEE 802.11 standard which sets out
___________________specifications on how all Wireless Networks operate.
8. A router acts as a ____________________between two or more networks to transfer data packets
among them.
9. A ______________is a communication device that enables a computer to transmit data over
telephone or cable lines.

SCORE
D. wireless and twisted-pair transmission
mediums

LESSON 94
Transmission Medium

7. Which of the following is an example of
physical transmission medium?
A. Air
B. Vacuum
C. Antenna
D. Twisted-pair

1. In network communications, it is common to
represent the interconnection between devices
as _______
A. Network clouds.
B. Routers interconnection.
C. Switches interconnection.
D. Routers and switches interconnections.
2. ______provides Internet access to users at
public places.
A. WiFi
B. Hotspots
C. Hand phone
D. Twisted-pair
3. Which of the following equipment uses
transmission medium?
A. TV
B. Printer
C. Radio
D. Radio, remote control and hand phone

8. Computers and other telecommunications
devices use in a form of wave or energy to
represent data which are transmitted through
transmission medium.
A. power
B. signals
C. medium
D. electricity

4. What kind of medium is wireless
transmission using?
A. Guided medium
B. Unguided medium
C. Unlimited medium
D. Guided and unguided medium

9. Which of the following is an example of a
wireless transmission medium?
A. Air
B. Coaxial
C. Fibre optic
D. Twisted-pair

5. A ______is a material substance which can
propagate waves or energy.
A. twisted-pair cable
B. transmission medium
C. short range transmission
D. transmission environment

10. Which of the following uses physical
transmission medium?
A. Using WiFi technology at a café.
B. Connecting two hand phones via Bluetooth.
C. Connecting to the Internet at a Hotspot
centre.
D. Connecting PC to printer using parallel port.

6. Two categories of transmission medium are
A. physical and guided transmission mediums
B. physical and wireless transmission mediums
C. wireless and unguided transmission
mediums

11. Which of the following is an example of
physical transmission medium?
A. Air
B. Vacuum

30
ICT WORKSHEET, FORM 4
C. Antenna
D. Twisted-pair

13. Which of the following is an example of
physical transmission medium?
A. Air
B. Hotspot
C. Antenna
D. Fibre optic

12. In physical transmission medium, waves
are along a solid transmission medium whereas
in wireless transmission medium, waves are
and
the transmission and receptions are by means
of antennas.
A. guided, unguided
B. unguided, guided
C. transmitted, guided
D. propagated, directed

SCORE

LESSON 95
Physical Transmission Media
A. Twisted-pair
B. Fibre optic

1. A twisted-pair cable without a metallic
shield.
A. UTP
B. STP

11. Suitable for longer distance of data
transmission.
A. Coaxial
B. Fibre optic

2. Cable made up of conducting outer metal
tube and insulated from a central conducting
core.
A. Coaxial
B. Fibre optic

12. The most susceptible to electrical noise and
interference.
A. UTP
B. STP

3. Cable that uses light as its data transmission
medium.
A. Twisted-pair
B. Fibre optic

13. Which is true regarding physical
transmission medium?
A. Air is a good example of a physical
transmission medium.
B. Any solid substances that can propagate
wave or energy.
C. Physical transmission medium is also known
as unguided transmission medium.
D. Rubber is a good example of a conductor
used in a physical transmission medium.

4. Connector for twisted-pair cable.
A. RJ-45
B. MT-RJ
5. Connector for coaxial cable.
A. BNC-T
B. MT-RJ
6. Connector for fibre optic.
A. BNC-T
B. MT-RJ

14. For twisted-pair cable, the purpose of
twisting two pairs of wires together is
________
A. to make it look tidy
B. there is no good reason
C. to reduce electromagnetic interference
D. to make it more stronger therefore difficult
to break

7. This cable gives the least signal attenuation.
A. Fibre optic
B. Coaxial
8. The cheapest transmission media.
A. UTP
B. STP

15. _______cable is a networking medium that
uses light for data transmission.
A. Coaxial
B. Fibre optic
C. Shielded Twisted-Pair
D. Unshielded Twisted-Pair

9. The most secured transmission media.
A. Coaxial
B. Fibre optic
10. The most expensive transmission media.

31
ICT WORKSHEET, FORM 4
16. Two types of twisted-pair cables are
___________.
A. shielded and coaxial
B. coaxial and fibre optic
C. unshielded and shielded
D. unshielded and protected
17. Which is not the correct type of cable in
networking?
A. Data Cable
B. Fibre Optic Cable
C. Shielded Twisted-Pair (STP)
D. Unshielded Twisted-Pair (UTP)
18. The following are advantages of fibre optic
cables as compared to twisted-pair and coaxial
cables except .
A. cheaper
B. light weight
C. more secure
D. higher bandwidth

SCORE

LESSON 96
Wireless Transmission Media
32
ICT WORKSHEET, FORM 4
A. 1 GHz to 2 GHz
B. 1 GHz to 200 GHz
C. 1 MHz to 400 MHz
D. 1 GHz to 300 GHz

1. _______networks are telephone or
computer networks that use radio frequencies
and infrared waves as their carrier.
A. Wired
B. Wireless
C. Protected
D. Unprotected

9. What is the frequency of Infrared signals?
A. 200 MHz to 500 MHz
B. 100 GHz to 200 GHz
C. 100 MHz to 400 MHz
D. 300 GHz to 400 THz

2. Wireless is a method of communication that
uses ________waves rather than wire
conductors to transmit data between devices.
A. digital
B. analog
C. microwave
D. electromagnetic

10. Radio waves transmitted by one antenna
are susceptible to interference by another
antenna that is sending signals of the
____frequency or band.
A. same
B. lower
C. higher
D. different

3. In a wireless media, signal transmission is .
A. guided
B. unguided
C. protected
D. unprotected

11. Infrared signals have ______frequencies
and cannot penetrate walls.
A. low
B. high
C. medium
D. moderate

4. Wireless transmission can be categorised
into three broad groups; .__________
A. radio waves, microwaves and infrared
B. radio waves, microwaves and Bluetooth
C. radio waves, electromagnetic waves and
Bluetooth
D. electromagnetic waves, microwares and
Infrared

12.______ is a method of communication that
uses electromagnetic waves to transmit data
between devices without using a physical
conductor.
A. Smoke
B. Wireless
C. Public Telephone
D. Guided transmission

5. Electromagnetic waves ranging in
frequencies between 3 Kilo Hertz and 1 Giga
Hertz are normally called ___________
A. microwave
B. radio waves
C. infrared waves
D. magnetic waves

13. A parabolic dish antenna is a(n)
____antenna.
A. horn
B. bidirectional
C. unidirectional
D. omnidirectional

6. Waves ranging in frequencies between 1 and
300 Giga Hertz are normally called_______.
A. microwaves
B. radio waves
C. infrared waves
D. magnetic waves

14. ____________ are normally
omnidirectional.
A. Microwave
B. Radio waves
C. Tidal waves
D. Electrical waves

7. The parabolic dish antenna receives ingoing
transmissions by reflecting the signal to a
common point called the ________
A. dot
B. peak
C. focus
D. centre

15. Using ________devices outside a building
is not recommended because the sun’s rays
can interfere with the communication.
A. satellite
B. infrared
C. microwave
D. radio wave

8. What is the range for the Electronic waves?

SCORE

LESSON 97
Server Software
33

ICT WORKSHEET, FORM 4
1. One of the popular network
operating systems is:
A. Windows XP
B. Windows NT

5. _________and Windows Server
2003 are the latest versions of
Windows NT.
A. Windows XP
B. Windows 2000

2. Since ______Red Hat has
discontinued the Red Hat Linux line in
favour of its new Red Hat Enterprise
Linux.
A. 2005
B. 2003

6. ______are designed primarily for
small to medium local area networks.
A. Client / server networks
B. Peer-to-peer networks
7. ________is the final release of the
Red Hat Linux software.
A. Red Hat Linux 9
B. Red Hat Linux 7

3. ____________operating systems
allow the network to centralise
functions and applications in one or
more dedicated file servers.
A. Client / server network
B. Peer-to-peer network

8. ________was released on February
17, 2000.
A. Windows NT
B. Windows 2000

4. It is part of the Microsoft Windows
NT line of operating systems.
A. Windows 2003
B. Windows 2000

9. _______do not have a file server or
a centralised management source.
A. Client / server networks
B. Peer-to-peer networks

1. __________________is the name of Microsoft's line of server operating systems
and is the successor to Windows 2000 Server.
2. ________________was one of the most popular Linux distributions, assembled
by Red Hat.
3._______________ is graphical and business-oriented operating system that was
designed to work with either uniprocessor or symmetric multi-processor (SMP) 32bit Intel x86 computers.
4. _______________is a family of operating systems produced by Microsoft, the
first version of which was released in July 1993.

SCORE

LESSON 98
Client Software
34

ICT WORKSHEET, FORM 4
1. A web browser is a software application that enables a user to display and interact
with _____________ documents hosted by web servers.
2. An email client or mail user agent is a computer program that is used to read and
send ___________
3. There are three types of client software, which are web browser, email client
and_______________
4. Although web browsers are typically used to access the World Wide Web, they can
also be used to access information provided by web servers in ______________
networks.
5. A web browser is a ______________that enables a user to display and interact
with HTML documents hosted by web servers or held in a file system.
6. A_______________ is a software application that enables a user to display and
interact with HTML documents hosted by web servers.
7. Although browsers are typically used to access the ______________ , they can
also be used to access information provided by web servers in private networks or
content in file systems.
8. There are three types of client software, which are ______________, email client
and file transfer protocol.
9. An ___________client is an example of client software.
10. Web browsers available for personal computers include ___________,Safari,
Netscape and Opera.
11. File Transfer Protocol is an example of ______________software.
12. File Transfer Protocol client is used to connect two computers over the
_____________so that the user of one computer can transfer files and perform file
commands on the other computer.
13. Web browsers allow a user to quickly and easily access information provided on
many __________at many websites by surfing these links.
14. An ______________is a computer program that is used to read and send email.

SCORE

LESSON 99
Setting Network Facilities
35

ICT WORKSHEET, FORM 4
1. Select an ISA (____) or PCI ( _____)
slot depending on the Network Interface
Card.
A. Black, White
B. White, Black
C. Brown, Black
D. Black, Yellow

A. checking your PC motherboard
B. examine your network card inside the
PC
C. checking the back of the PC for a
network socket
D. checking the "Hardware Profile" in
computer properties

2. Below are the steps on how to insert the
Network Interface Card:
I. Disconnect the PC from the power and
then remove the casing or side panel of
your machine
II. Select an ISA or PCI slot depending on
the Network Interface Card
III. Remove the back blanking plate from
behind the slot you have selected for the
Network Interface Card
IV. Check the back of your PC for a
network socket
A. II, IV, I, III
B. I, II, III, IV
C. IV,I,II,III
D. IV, II, I, III

6. A Network Interface Card (NIC) is easy
to install. The only considerations for
installation is that you should have _____
A. a PCI slot or ISA slot
B. a Network Interface Card
C. a personal computer
D. an available NIC slot
7. Before installing an NIC, please check
whether
A. you have a PCI slot
B. you have an ISA slot
C. you have an available slot
D. you have an available slot and slot type
8. Network Interface Card, or NIC, also
referred to as a " _______", is a piece of
computer hardware designed to allow
computers to communicate over a
computer network.
A. adapter
B. ethernet card
C. expansion card
D. network adapter

3. After successfully installing the card into
the slot, what should you do?
A. Remove the casing
B. Restart the computer
C. Secure the card in place using the nail
D. Secure the card in place using the
screw from the blanking plate
4. Why are we required to firmly press
down the Network Interface Card into the
slot?
A. To make sure it is safe
B. To make sure it is easy to use
C. To make sure it is properly seated
D. To make sure it is easy to replace

9. A Network Interface Card (NIC) is an
expansion card that allows the
transmission of data over a
________network.
A. WiFi
B. cable
C. satellite
D. wireless
10. Insert the card into the ____by
pressing down firmly on the Network
Interface Card.
A. slot
B. port
C. plate
D. socket

5. The easiest way to check whether the
PC has a Network Interface Card is
by______

SCORE
36
ICT WORKSHEET, FORM 4
LESSON 100
Installation of Network Interface Card

LESSON 101

SCORE
37
ICT WORKSHEET, FORM 4
Crimping Straight Cable
1. ________________ cable has four twisted pairs of wire for a total of eight
individually insulated wires.
2. ____________ is used to cut and strip cables.
3. A straight cable acts as an ________ enabling a device with a network interface
card
to be attached to a network.
4. The total length of wire segments between a PC and a hub or between two PCs
cannot exceed ________.
5. A common form of network media is the ___________ known as Unshielded
Twisted
Pair Category 5 cable.
6. ____________are used to cut the cable off at the reel and to fine tune the cable
ends during assembly.
NO
1

STATEMENT

TRUE

A wrench is used to cut and strip cable.

2

The total length of wire segments between a PC and a hub or
between two PCs can exceed more than 100 meters.

3

If the cable crimping process is done properly, an average
person will not be able to pull the plug off the cable with his or
her bare hands.

4

In the cable crimping process, you have to strip one end of the
cable with the pen-knife.

5

In trimming cable wires, it is very important that the unstripped
or untwisted end be slightly less than half-inch long.

6

Cable strippers are used to cut the cable off at the reel and to fine
tune the cable ends during assembly.

7

In RJ-45 modular plug, RJ means "Registered Jack".

8

A common form of network media is the UTP Cat 5 known as
Unshielded Twisted-Pair Category 5 cable.

9

In arranging the wires of the network cable, it is not necessary to
spread and arrange the pairs in order.

10

FALSE
SCORE

A straight cable acts as an extension enabling a device Network
Interface Card to be attached to a network.

38
ICT WORKSHEET, FORM 4
LESSON 102
Crimping Crossover Cable

NO
STATEMENT
1
Category 5 cable can have more than half of an inch (1.3
cm) at the end.
2

The tools for cable crimping are such as cables, pliers,
crimpers and scissors.

4

When you crimp the cable, be sure it is properly rated for
CAT 5.

5

To make the cable, start by stripping off about two inches (5
cm) of the plastic jacket off the end of the cable.

6

BJ-45 plug is used as a connector to CAT 5 cable in
crossover
cable crimping.

7

The crossover cable cannot be used to directly connect two
computers to each other without the use of a hub or switch.

8

In a cable crimping test, you should see that the copper
connectors at the end of the RJ-45 plug should not be
pressed down into the wires.

9

When you begin to crimp the cable, be sure to keep a good
grip on that RJ-45 plug and the cable.

10

FALSE

You need a pair of scissors that will allow you to cut a group
ofcables in a straight line.

3

TRUE

Toward the back of the RJ-45 plug (where the jacket meets
the RJ-45 plug) it should be crimped securely holding the
jacket or cable in the RJ-45 plug.

SCORE
39
ICT WORKSHEET, FORM 4
LESSON 103
Configuration of Network

LESSON 104

SCORE
40
ICT WORKSHEET, FORM 4
Testing of Network

1. To use ping, open the ___________________window.
2. If the problem persists, you have to check your network _____________or
protocol.
3. In this lesson, students will be taught on the processes of network
______________
4. The best utility to have a quick TCP/IP connection test is ________________
5. The ping utility then send and receive __________________of information.
6. If ping displays error messages such as Bad IP Address, Request Timed Out, or
Unknown Host or could not send and receive packets over the ______________,
you
should verify if the IP address is valid.
7. There are _______________steps for testing network.
8. Once you have installed the _______________ , cables and software, you can
test the new TCP/IP protocol.
9. If you have successfully sent and received packets, all is well with the
____________ connection.
10. Enter the name or ______________you want to test after the ping command.

41
ICT WORKSHEET, FORM 4
LESSON 105
Shared Folder

SCORE

1. A ______________is a named collection of related files that can be retrieved, moved and
otherwise manipulated as one entity.
2. Folders can be created _____________folders.
3. The files in a folder can be copied or moved to other ____________,computers and even to the
Internet.
4. If the file or folder you want to share is not located in My Documents or one of its subfolders, use
___________to find it.
5. In Windows, Macintosh and other operating systems, a folder is a named collection of related files
that can be retrieved, moved and _____________as one entity.
6. You can share the files and folders stored on your computer and on your _______________
7. To change the name of your folder on the network, in the ______________text box, type a new
name for your folder.
8. The ______________you choose depends on whom you want to share the files or folders with and
the computer used to access them.
9. Anyone who has user access to the network can read, copy or change files stored in that folder
when you __________ a drive or folder.
10. Folders can contain many different types of _________________, such as documents, music,
pictures, videos and programs.

42

SCORE
ICT WORKSHEET, FORM 4
LESSON 106
Wireless and Mobile
1. A wireless digital mobile telephone system used in Europe and other parts of the world.
Answer:
2. A packet-based wireless communication service that provides continuous connection to
the Internet for mobile phone and computer users.
Answer:
3. A faster version of the Global System for Mobile (GSM) wireless service.
Answer:
4. A broadband, packet-based system offering a consistent set of services to mobile
computer and phone users no matter where they are located in the world.
Answer:
5. A set of communication protocols to standardise the way wireless devices, such as cellular
telephones and radio transceivers, can be used for Internet access.
Answer:
6. The world's first "smart phone service" for Web browsing introduced in Japan;provides
colour and video over telephone sets.
Answer:
1. ______________________ is a digital mobile telephone system used in Europe and other parts of
the world, the accepted wireless telephone standard in Europe.
2. ______________________ is a packet-based wireless communication service that provides
continuous connection to the Internet for mobile phone and computer users.
3. ______________________ is a faster version of the Global System for Mobile (GSM) wireless
service.
4. ______________________ is a broadband, packet-based system offering a consistent set of
services to mobile computer and phone users no matter where they are located in the world.
5. ______________________ is a set of communication protocols to standardize the way wireless
devices, such as cellular telephones and radio transceivers, can be used for Internet access.
6. ______________ is the world's first "smart phone service" for Web browsing, first introduced in
Japan; provides colour and video over telephone sets.
7. ______________________ is the operation of wireless devices or systems in homes and offices,
and in particular, equipment connected to the Internet via specialised modems.
8. ______________________ is the use of wireless devices or systems aboard motorised, moving
vehicles.

43

SCORE
ICT WORKSHEET, FORM 4
LESSON 107
Mobile Computing
1. The IEEE 802.11 group of standards specifies the technologies for it.
Answer:
2. It uses cellular network technologies such as GPRS / CDMA2000 / GSM to transfer data.
Answer:
3. It is also known as IEEE 802.15.1.
Answer:
4. It defines physical specifications communications protocol standards for the short range
exchange of data over infrared light and for uses such as Personal Area Networks
(PANs).
Answer:
5. Various computers now have a cellular radio built in, which allows the user to send and
receive data.
Answer:
6. It is a radio standard and communications protocol primarily designed for low power
consumption, within a short range.
Answer:
7. Since it is line-of-sight light transmission, it is sensitive to fog and other atmospheric
conditions.
Answer:
1. _________ __ computing is the use of portable computing devices to access the Internet and data
on their home or work computers from anywhere in the world.
2. A ____________________ is a computer small enough to fit in one hand.
3. ____________________ are handheld devices that were originally designed as personal
organisers.
4. A _____________________ is any electronic handheld device that integrates the functionality of a
mobile phone, personal digital assistant or other information appliance.
5. A _______ ___ LAN is one in which a notebook user can connect to a Local Area Network through
a wireless (radio) connection.
6. The IEEE ________ __ group of standards specify the technologies for wireless LANs.
7. A _____________________ uses cellular network technologies such as GPRS /CDMA2000 / GSM
to transfer data.

44

SCORE
ICT WORKSHEET, FORM 4
LESSON 108
Internet Technology
1. Internet __________ is a broad range of technologies for web development, web
production, design, networking, telecommunication and e-commerce.
2. ________________ is one of the Internet technologies that allow users to make
telephone calls using a broadband Internet connection.
3. Voice over Internet Protocol is a method for taking analog audio signals and
turning
them into _______________ data that can be transmitted over the Internet.
4. There are three different VoIP services in common use today, which are ATA,
________________ and computer-to-computer.
5. The ________________ allows you to connect a standard phone to your
computer or your Internet connection for use with VoIP.
6. The simplest type of ATA has one or more _________________ jacks to plug a
telephone and/or a fax into a USB connector that plugs into the user's computer.
7. In an enterprise setting, an ATA usually has multiple telephone jacks and
_________________ connection to a 10/100BaseT Ethernet hub or switch, and is
used to connect to a Local Area Network.
8. Protocols used to carry voice signals over the IP network are commonly referred
to as _________________.
9. VoIP phone conversations can become distorted, garbled or lost because of
_________________ errors.
10. Devices needed to place a computer-to-computer Internet telephone call is the
software, a microphone, ____________________, a sound card and an Internet
connection.

45
ICT WORKSHEET, FORM 4
LESSON 109
Internet Services

SCORE

6. ________________ are special
websites on the Internet to find
information you need.
A. IRCs
B. Emails
C. WWWs
D. Search engines

1. _______________ consists of a
worldwide collection of electronic
documents.
A. IRC
B. Email
C. WWW
D. Search engine

7. _________________ is a real-time
conversation that takes place on a
computer.
A. IRC
B. Email
C. WWW
D. Search engine

2. _______________ is the
transmission of messages and files via
a computer network.
A. IRC
B. Email
C. WWW
D. Newsgroup
3. _________________ is a system for
chatting that involves a set of rules and
conventions and client/server software.
A. IRC
B. Email
C. WWW
D. Newsgroup

8. Each electronic document on the
Web is called a _________________
which can contain text, graphics, audio
and video.
A. web page
B. newsgroup
C. search engine
D. World Wide Web

4. _________________ is an online
area in which users have written
discussions about a
particular subject.
A. IRC
B. Email
C. WWW
D. Newsgroup

9. A user utilises a/an
______________ program to create,
send, receive, forward,store, print and
delete electronic messages.
A. email
B. newsgroup
C. search engine
D. World Wide Web

5. Different will serve different
purposes.
A. IRC
B. email
C. WWW
D. search engines

10. The entire collection of Internet
newsgroups is called
_______________, which contains
tens of thousands of newsgroups about
a multitude of topics.
A. User
B. Usenet
C. Usegroup
D. World Wide Web
46
ICT WORKSHEET, FORM 4
SCORE

LESSON 110
Internet Services
NO
STATEMENT
A Personal Area Network (PAN) is a computer network used for
1

TRUE

FALSE

communication among computer devices including PCs, laptops, printers,
telephones, digital cameras, mobile phones, video game consoles and
personal digital assistants.

2

The IEEE standard for Wireless LANs 802.13.

3

WiMAX would operate similar to WiFi but at higher speeds, over greater
distances and for a greater number of users.

4

VPN uses tunnelling mechanism to maintain privacy and security of the
data. Tunnelling means transmitting data packets across a public
network.

5

Personal area networks may only be wired with USB ports.

6

Wireless Local Area Network (WLAN) is a type of LAN that uses highfrequency radio waves to communicate between nodes.

7

VPN is often used by companies to provide access from their internal
network resources to their home or mobile workers.

8

Bluetooth is the popular wireless PAN used by most people, especially
the mobile phone technologies, and it applies the IEEE 802.11 standards.

1. _________________ improves user mobility, speed and scalability to move around within a broad
coverage area and still be connected to the network.
2. A _________________ is a computer network used for communication among computer devices
close to one person like PCs, laptops, printers, telephones, digital ameras, mobile phones, video game
consoles and personal digital assistants.
3. A _________________ is a network that uses a public telecommunication infrastructure, such as
the Internet, from remote offices or individuals with secure access to their organization's private
network
4. WiMAX would operate similar to _________________ but at higher speeds, over greater distances
and for a greater number of users.
5._______________by companies to provide access from their internal network resources to their
home or mobile workers.
6. Data or information in _________________ travels via tunnelling.
7. _________________ is generally done by encapsulating the private network data and protocol
information within the public network transmission units so that the private network protocol
information appears to the public network as data.

47
ICT WORKSHEET, FORM 4

Weitere ähnliche Inhalte

Was ist angesagt?

Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4cikgushaharizan
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to networkMiz Malinz
 
Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25cpashke
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)NILISSL
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Networking human area network
Networking human area networkNetworking human area network
Networking human area networkeSAT Journals
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesIOSR Journals
 
Computer Literacy Lesson 26
Computer Literacy Lesson 26Computer Literacy Lesson 26
Computer Literacy Lesson 26cpashke
 
Networking technology
Networking technologyNetworking technology
Networking technologySmritiGurung4
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29cpashke
 
Computer Worksheets Std 8
Computer Worksheets Std 8Computer Worksheets Std 8
Computer Worksheets Std 8Alithea Barbosa
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentalsImoh Etuk
 

Was ist angesagt? (20)

Set3 ict-question
Set3 ict-questionSet3 ict-question
Set3 ict-question
 
Synopsis
SynopsisSynopsis
Synopsis
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4Cd ict-worksheet-la2-form-4
Cd ict-worksheet-la2-form-4
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
Notacd01
Notacd01Notacd01
Notacd01
 
Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Networking human area network
Networking human area networkNetworking human area network
Networking human area network
 
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart PhonesPeer To Peer Content Sharing On Wi-Fi Network For Smart Phones
Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones
 
Computer Literacy Lesson 26
Computer Literacy Lesson 26Computer Literacy Lesson 26
Computer Literacy Lesson 26
 
Networking technology
Networking technologyNetworking technology
Networking technology
 
Computer Literacy Lesson 29
Computer Literacy Lesson 29Computer Literacy Lesson 29
Computer Literacy Lesson 29
 
computer Unit 9
computer Unit 9computer Unit 9
computer Unit 9
 
Computer Worksheets Std 8
Computer Worksheets Std 8Computer Worksheets Std 8
Computer Worksheets Std 8
 
Lesson 25
Lesson 25Lesson 25
Lesson 25
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 

Andere mochten auch

Computer hardware worksheet
Computer hardware worksheetComputer hardware worksheet
Computer hardware worksheetFaryal Zia
 
Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111girlfrida
 
Excel Chapter 01
Excel Chapter 01Excel Chapter 01
Excel Chapter 01patf719
 
Gl13 m6-c1-presentation
Gl13 m6-c1-presentationGl13 m6-c1-presentation
Gl13 m6-c1-presentationTracie King
 
Form5 cd4
Form5 cd4Form5 cd4
Form5 cd4smktsj2
 
Bidang pembelajaran 1.2 tingkatan 4
Bidang pembelajaran 1.2 tingkatan 4Bidang pembelajaran 1.2 tingkatan 4
Bidang pembelajaran 1.2 tingkatan 4MOE
 
Bidang pembelajaran 1.1 tingkatan 4
Bidang pembelajaran 1.1 tingkatan 4Bidang pembelajaran 1.1 tingkatan 4
Bidang pembelajaran 1.1 tingkatan 4MOE
 
Computer basics worksheet
Computer basics worksheetComputer basics worksheet
Computer basics worksheetDonna Rue
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Andere mochten auch (17)

Computer hardware worksheet
Computer hardware worksheetComputer hardware worksheet
Computer hardware worksheet
 
Worksheet complete set 180111
Worksheet complete set 180111Worksheet complete set 180111
Worksheet complete set 180111
 
Worksheet2
Worksheet2Worksheet2
Worksheet2
 
Inside The Computer
Inside The ComputerInside The Computer
Inside The Computer
 
Excel Chapter 01
Excel Chapter 01Excel Chapter 01
Excel Chapter 01
 
Gl13 m6-c1-presentation
Gl13 m6-c1-presentationGl13 m6-c1-presentation
Gl13 m6-c1-presentation
 
Computerparts
ComputerpartsComputerparts
Computerparts
 
Form5 cd4
Form5 cd4Form5 cd4
Form5 cd4
 
Bidang pembelajaran 1.2 tingkatan 4
Bidang pembelajaran 1.2 tingkatan 4Bidang pembelajaran 1.2 tingkatan 4
Bidang pembelajaran 1.2 tingkatan 4
 
Bidang pembelajaran 1.1 tingkatan 4
Bidang pembelajaran 1.1 tingkatan 4Bidang pembelajaran 1.1 tingkatan 4
Bidang pembelajaran 1.1 tingkatan 4
 
Computer basics worksheet
Computer basics worksheetComputer basics worksheet
Computer basics worksheet
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Ict ppt
Ict pptIct ppt
Ict ppt
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Ähnlich wie Cd ict-worksheet-la3-form-4

Module 1 introduction 20 to 20 network
Module  1   introduction 20 to 20 networkModule  1   introduction 20 to 20 network
Module 1 introduction 20 to 20 networkNick Racers
 
Module 1 Introduction to Network
Module 1 Introduction to NetworkModule 1 Introduction to Network
Module 1 Introduction to NetworkIra Raji
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
17._CS-12-Networking-1_Evolution_of_Network_1.docx
17._CS-12-Networking-1_Evolution_of_Network_1.docx17._CS-12-Networking-1_Evolution_of_Network_1.docx
17._CS-12-Networking-1_Evolution_of_Network_1.docxKAMI643381
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetMiz Malinz
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internetNik Ainy
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolTara Hardin
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsGorra Narsimhulu
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internetFatin Izzaty
 
Module Introduction
Module IntroductionModule Introduction
Module IntroductionIra Raji
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internetairiel hamka
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internetNick Racers
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksAzmiah Mahmud
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)IMRAN KHAN
 

Ähnlich wie Cd ict-worksheet-la3-form-4 (20)

Module 1 introduction 20 to 20 network
Module  1   introduction 20 to 20 networkModule  1   introduction 20 to 20 network
Module 1 introduction 20 to 20 network
 
Module 1 Introduction to Network
Module 1 Introduction to NetworkModule 1 Introduction to Network
Module 1 Introduction to Network
 
For demo.pptx
For demo.pptxFor demo.pptx
For demo.pptx
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
17._CS-12-Networking-1_Evolution_of_Network_1.docx
17._CS-12-Networking-1_Evolution_of_Network_1.docx17._CS-12-Networking-1_Evolution_of_Network_1.docx
17._CS-12-Networking-1_Evolution_of_Network_1.docx
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Data communication
Data communicationData communication
Data communication
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
COMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdfCOMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdf
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
 
Module 1 : Introduction to Internet
Module 1 : Introduction to Internet Module 1 : Introduction to Internet
Module 1 : Introduction to Internet
 
Module 1 intro internet
Module 1   intro internetModule 1   intro internet
Module 1 intro internet
 
Module Introduction
Module IntroductionModule Introduction
Module Introduction
 
Module 1 intro internet
Module 1 intro internetModule 1 intro internet
Module 1 intro internet
 
Module 201 intro 20 internet
Module 201 intro 20 internetModule 201 intro 20 internet
Module 201 intro 20 internet
 
Module Internet
Module Internet Module Internet
Module Internet
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)
 

Mehr von cikgushaharizan (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Acf
AcfAcf
Acf
 
La1 131209040938-phpapp02
La1 131209040938-phpapp02La1 131209040938-phpapp02
La1 131209040938-phpapp02
 
Privacy
PrivacyPrivacy
Privacy
 
Impact of-ict-on-society
Impact of-ict-on-societyImpact of-ict-on-society
Impact of-ict-on-society
 
Ict on-society
Ict on-societyIct on-society
Ict on-society
 
Ethics law
Ethics lawEthics law
Ethics law
 
Computer security
Computer securityComputer security
Computer security
 
Computerized and-non
Computerized and-nonComputerized and-non
Computerized and-non
 
Computer generation
Computer generationComputer generation
Computer generation
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
La2 templates
La2 templatesLa2 templates
La2 templates
 
La1 templates
La1 templatesLa1 templates
La1 templates
 
La3 templates
La3 templatesLa3 templates
La3 templates
 
New assessment-document
New assessment-documentNew assessment-document
New assessment-document
 
Bidang pembelajaran-6-3
Bidang pembelajaran-6-3Bidang pembelajaran-6-3
Bidang pembelajaran-6-3
 
Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2Bidang pembelajaran-6-2 2
Bidang pembelajaran-6-2 2
 
Bidang pembelajaran-6-2
Bidang pembelajaran-6-2Bidang pembelajaran-6-2
Bidang pembelajaran-6-2
 
Bidang pembelajaran-6-1
Bidang pembelajaran-6-1Bidang pembelajaran-6-1
Bidang pembelajaran-6-1
 
Bidang pembelajaran-5-3
Bidang pembelajaran-5-3Bidang pembelajaran-5-3
Bidang pembelajaran-5-3
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Cd ict-worksheet-la3-form-4

  • 1. LESSON 67 Introduction to Computer Networks and Communications SCORE 1. The actual connecting medium that carries the message between your sending computer devices and receiving computer devices. Answer: 2. Computers and peripheral devices that are connected together in order to exchange information (e.g. email, chat and web site) and share resources (e.g. printers). Answer: 3. This device converts digital signals into analog and back again into digital signals for information to move across the telephone line. Answer: 4. A set of defined rules of communications for exchange of information to be possible among computing devices in a network. Answer: 5. Network communications through the medium of the atmosphere using radio waves. Answer: 1. Using hardware and _______________ interconnected computing devices can communicate with each other through defined rules of data communications. 2. Communications is about the transfer of information from a ______________across a distance, to a receiver. 3. A computer network can be a _____________connection and a wireless connection. 4. Computers communicate with ________________signals. 5. Other forms of communications technology, such as the telephone, use _________ signals. 1 ICT WORKSHEET, FORM 4
  • 2. 1. For communications in a network to be possible, there must be I. a physical medium II. a set of speakers III. a set of rules called protocols IV. a system application for managing network information flow A. I, II, III B. II, III, IV C. I, III, IV D. All the above 6. The function of the modem is to ____ A. convert digital signals into text and vice versa B. convert digital signals into sound and vice versa C. convert digital signals into analog and vice versa D. convert digital signals into images and vice versa 7. In a network, information and data in the form of codes is transmitted through a physical medium such as wire, cable, or even the atmosphere using________ A. electricity and water B. electricity, radio waves or light C. radio waves and electromagnetic tape D. radio waves, light waves or magnetic signals 2. Information that is sent across a network can be text, voice, sound, video, graphics and images, or a combination of all these, which we call____________ A. multimedia B. information C. multitasking D. communications 3. In a ______computers can exchange and share information and resources. A. office B. network C. restaurant D. organization 8. The physical medium over which data signals travel can be____________ A. cables, modems or wires B. wires, cables or the atmosphere C. cables, wires or suitable software D. wires, the atmosphere or hardware 4. What happens if protocols between interconnected devices are not the same? A. Computers will be able to share resources B. Data transmission will not be understood between devices C. Communications will not be able to convert from analog to digital signals D. Network communications will use a special set of rules to connect devices 9. A computer network is a system of interconnected computers and peripheral devices. It may connect_________ A. computers, satellites and chairs B. computers, printers, scanners and cameras C. computers, cameras, motors and hardware tools D. computers, scanners, x-ray equipment and log books 5. Modem stands for_________ A. Motivator/ Demotivator B. Modelling/ Demodelling C. Modulator/ Demodulator D. Modes/ Demonstrations 10. The following device uses digital signals to send data ___________ A. Radio B. Television 2 ICT WORKSHEET, FORM 4
  • 3. C. Microwave oven D. Notebook computer LESSON 68 Components of Communications SCORE 1. Signals which carry information in a communications system travel through A. a vacuum B. a liquid medium C. a physical medium D. a software medium III. fibre-optic cable IV. wireless systems A. I and II B. I, II, III C. I, II, III and IV D. None of the above 2. A communications channel is also known I. a communications link II. a communications line III. a communications medium IV. a communications program A. I, II, IV B. I, II, III C. I, III, IV D. II, III, IV 6. The network interface card provides connection between the computer and ____ A. the network’s server B. the network’s software C. the network’s security system D. the network’s communications media 7. The network interface card functions as _______to move data from the PC’s system to the network medium and vice versa. A. a data reader device B. a data storage device C. a data channel device D. a data conversion device 3. What is a communications channel? A. The logical path by which a message travels from a receiving device to a sending device B. The logical path by which a message travels from a sending device to a receiving device C. The physical path by which a message travels from a receiving device to a sending device D. The physical path by which a message travels from a sending device to a receiving device 8. Other hardware components that are required for communications to work on a network are networking devices, such as A. the hub, switch, router and modem B. the switch, hub, scanner and cables C. the modem, mouse, keyboard and printer D. the router, hub, server and network software 4. Which of the following are examples of communications channels? I. Wired connection II. Text communication III. Wireless connection IV. Human communication A. I and II B. I and III C. II and III D. III and IV 9. Network software would be able to provide basic functions, such as I. connecting to other computers on the network II. configuring plug and play devices III. sharing resources and files IV. providing for network security for users who are online A. I, II, III B. I, III, IV C. II, III, IV D. All the above 5. Some common types of network communications channels are the_____ I. twisted-pair wire II. coaxial cable 3 ICT WORKSHEET, FORM 4
  • 4. 10. Network software must be able to handle networking ________and connections within the network and with other networks. A. practices B. principles C. proposals D. protocols LESSON 69 NO 1 SCORE STATEMENT TRUE FALSE With e-banking, most of the transactions can be done at home or from the office only during banking hours. 2 In e-learning, students at any location around the world can participate in an online classroom, download tutorial questions and submit their assignments. 3 Networks do not provide a very rapid method for sharing and transferring files. 4 Besides monetary savings, sharing a program on a network allows easier upgrading of the program. 5 People at various places in a network can communicate and work together. 6 Internet connection is not needed before an online education can take place. Importance of Networks and Communications B. FALSE 1. Mobile communications today is based on networking technology. A. TRUE 2. Networking technology allows banking to be done anywhere and at any time. 4 ICT WORKSHEET, FORM 4
  • 5. A. TRUE B. FALSE A. TRUE B. FALSE 3. Data in the network can be shared. A. TRUE B. FALSE 6. Network communications is important in the area of e-business, e-banking, elearning and long distance communications. A. TRUE B. FALSE 4. People on the network cannot share information. A. TRUE B. FALSE 7. We cannot do a long distance communication using a network. A. TRUE B. FALSE 8. Homemakers, students, teachers, business people and almost anyone with access to a networked computer can get online and continue their path of lifelong education anywhere, anytime. A. TRUE 5. A network links two or more computers together to enable data and resource exchange. B. FALSE SCORE LESSON 70 Types of Networks 5 ICT WORKSHEET, FORM 4
  • 6. 1. LAN is an acronym of Limited Area Network A. TRUE B FALSE 5. LAN is generally limited to a geographical area such as home, school, or building. A. TRUE B. FALSE 2. WAN is a network connecting computers within very large areas, such as states,countries and the world. A. TRUE B. FALSE 6. LAN is an acronym for Leased Area Network. A. TRUE B. FALSE 3. A clerk in Malacca exchanges files with a clerk in Perak using LAN. A. TRUE B. FALSE 7. WAN is a network that covers a limited geographical area. A. TRUE B. FALSE 4. LAN is a network that is confined to a relatively small area. A. TRUE B. FALSE 8. It is considered a Local Area Network if our school network can access the Internet. A. TRUE B. FALSE SCORE LESSON 71 Local Area Network (LAN) 1. A lecturer in Penang exchanges files with a student in Kuala Lumpur using LAN. A. TRUE B. FALSE 6 ICT WORKSHEET, FORM 4
  • 7. 2. We can share resources with a Local Area Network. A. TRUE B. FALSE 7. LANs are capable of transmitting data at a very high speed compared to normal transmission using telephone lines. A. TRUE B. FALSE 3. Printers cannot be shared using a LAN. A. TRUE B. FALSE 8. If our school network can access the internet, it is considered a Local area Network. A. TRUE B. FALSE 4. LAN is a network that covers a limited geographical area. A. TRUE B. FALSE 9. Local area Network is group of computers and network device connected together, usually within the same building. A. TRUE B. FALSE 5. Most LAN typically used coaxial, twisted pair or fiber optic cables as a transmission media. A. TRUE B. FALSE 6. The Internet is an example of a LAN. A. TRUE B. FALSE LESSON 72 Metropolitan Area Network (MAN) SCORE 1. MAN is an acronym for Metropolitan Area Network. A. TRUE B. FALSE 2. MAN allows communication activities and all the network services sharing in the coverage region. A. TRUE B. FALSE 3. Coaxial cables are usually used to connect computers in MAN A. TRUE B. FALSE 4. MAN can be a combination of LANs. A. TRUE C. FALSE 5. MAN can only be connected using digital media. A. TRUE B. FALSE 6. MAN covers a bigger area than LAN. A. TRUE B. FALSE 7 ICT WORKSHEET, FORM 4
  • 8. 7. Home network is an example of a Metropolitan Area Network. A. TRUE B. FALSE 8. Metropolitan Area Network connects computers in a metropolitan area such as campuses or links between office buildings in a city. A. TRUE B. FALSE LESSON 73 Wide Area Network (WAN) SCORE 8 ICT WORKSHEET, FORM 4
  • 9. 1. We can communicate with our friends outside the country using the Internet. A. TRUE B. FALSE A. TRUE B. FALSE 6. Modems are the devices that WANs use to connect all the smaller networks into a WAN. A. TRUE B. FALSE 2. The Internet is the largest WAN in the world. A. TRUE B. FALSE 7. WAN is used to connect computers in limited areas such as a city. A. TRUE B. FALSE 3. WAN covers smaller geographical area than LAN. A. TRUE B. FALSE 8. More hardware and maintenance costs will incur in setting up a WAN. A. TRUE B. FALSE 4. To improve the network performance in the school lab, the school should install a WAN. A. TRUE B. FALSE 5. WAN is part of the Metropolitan Area Network. SCORE LESSON 74 Differences between Types of Network • Smallest coverage area • Normally used cables • Generally used by small organisations such as schools and computer labs • Coverage is bigger than LAN but limited to certain geographical area • Usually used to connect networks in the cities • Similar to WAN but offers a faster transmission speed • Worldwide coverage • It allows communication with friends outside the country • Unlimited number of computers 1. Cost, coverage, speed and number of computers involved increase from LAN, MAN to WAN. A. TRUE B. FALSE 9 ICT WORKSHEET, FORM 4
  • 10. 2. MAN can have a large number of computers connected compared with LAN but less than WAN. A. TRUE B. FALSE 6. LAN normally uses a satellite as their transmission media. A. TRUE B. FALSE 7. A WAN is a network that covers a large geographic area using a communication channel that combines many types of transmission media such as telephone lines, cables and radio waves. A. TRUE B. FALSE 3. MAN may have more than two transmission medias. A. TRUE B. FALSE 4. MAN is the best solution for those who want a larger coverage area than LAN but faster transmission speed than WAN. A. TRUE B. FALSE 5. The cost of establishing a MAN is cheaper than LAN. A. TRUE B. FALSE 8. Computers in the school office and computers in the faculty room can be connected using LAN. A. TRUE B. FALSE LESSON 75 Network Architecture SCORE 10 ICT WORKSHEET, FORM 4
  • 11. NO 1 STATEMENT Network architecture is the overall design of a computer network that describes how a computer network is configured and what strategies are being used. 2 Network architecture mainly focuses on the cost of the networks. 3 Network architecture is also known as network model or network design. 4 There are three main network architectures. 5 A client/server network is a network where the shared files and applications are stored in the server but network users (clients) can still store files on their individual PCs. 6 A server is a computer that shares information and resources with other computers on a network. 7 A client is a computer which requests services or files from a server computer. 8 Peer-to-peer network is a network with all the nodes acting as both servers and clients. 9 All computers in the peer-to-peer network have equal responsibilities and capabilities to use the resources available on the network. 10 A server is needed in a peer-to-peer network. 11 Network architecture is mainly focused on the functions of the networks. 12 In client/server network, two powerful computers must be assigned as the servers. 13 Peer-to-peer has no tendency to slow down even with heavy use. 14 In peer-to-peer network all computers in the network are considered equal; all of them have the same responsibilities and capabilities to use the resources available on the network. 15 In peer-to-peer network no server is needed. 16 There are three main network architectures: server network,client network and peer-to-peer network. 17 The client computers will request services or files from the server in a client/server network. 18 Network mode is another term for network architecture. LESSON 76 Client/Server TRUE FALSE SCORE 11 ICT WORKSHEET, FORM 4
  • 12. 1. A _____________________is also sometimes called a host computer. 2. A ________________is one or more computers that act as a server and the other computers on the network request services from the server. 3. There are other computers and mobile devices on the network that rely on the server for its resources, which we call_____________________ 4. A_______________is used to store and manage files. 5. A _________________is used to manage network traffic. 6. A _________________is used to store and provide access to a database. 7. A ______________________is to manage printers and print jobs. 8. A company owns a server and more than 50client computers. The most suitable network architecture for this company is the ________________network. 9. A_______________is used to control access to the hardware, software and other resources on the network. 10. In banks, account information is stored in the bank’s ______________ A customer can access his account via Internet banking. LESSON 77 Peer-To-Peer SCORE 12 ICT WORKSHEET, FORM 4
  • 13. 1. In a client/server network, a computer may have a different__________depending on its functions. 2. In a peer-to-peer network, all computers have___________abilities. 3. More __________costs will have to be spent on a client/server network than a peer-topeer network. 4. Client/server network is used in both small and _____________networks. 5. Peer-to-peer is normally used in ___________networks with less than ten computers. 6. Client/server network is easier to manage than peer-to-peer network in terms of _____________ and data accuracy. 7. Files need to be shared in the _____________of a client/server network while shared files will need to be stored in individual PCs of a peer-to-peer network. 8. One __________computer is needed as the server in a client/server network while peerto-peer network needs no server. 1. Kamal has two computers. He wants to build a simple network architecture in his house. The best network architecture is a client/server network. True False 6. Hardy is given a job to construct a form of networking in his aunt’s company. His aunt has three computers; the most suitable network architecture is peer-to-peer network. True False 2. A computer in peer-to-peer network can share a printer with other computers. True False 7. Shamala is downloading an MP3 song from the Internet. She wants to share the song with her friend, Linda in Japan. Linda must use Bearshare to download the MP3 song from Shamala’s hard drive. True False 3. Suzan can share her hard drive with Leela who is staying in the USA by using Limewire software. True False 8. Kumar wants to share his assignment with his course mate. He must give permission to his course mate to access his hard drive before his course mate can retrieve his assignment. True False 4. Internet networking allows a group of computer users with the same networking program to connect with each other and directly access files from each other’s hard drives. True False 9. In a peer-to-peer network, a computer cannot share any devices attached to it such as a printer or a scanner to any other computer. True False 5. Rajoo found an interesting Web joke; he wants to share this joke with his friends in Korea. His friend used MS PowerPoint to download the joke from his hard drive. True False 10. Each computer in the peer-to-peer network has equal responsibilities and capabilities like sharing hardware (such as a printer), data or information with other computers. True False LESSON 78 Network Topology SCORE 13 ICT WORKSHEET, FORM 4
  • 15. 1. A bus refers to the main physical pathway or central cable where all other devices are connected to it. A. TRUE B. FALSE 6. In a bus topology, troubleshooting is difficult when one of the nodes fails. A. TRUE B. FALSE 2. If the backbone fails, the network can still function. A. TRUE B. FALSE 7. A bus network must have a common backbone (the central cable) to connect all devices. A. TRUE B. FALSE 3. A bus topology consists of a double central cable to which all computers and other devices connect. A. TRUE B. FALSE 8. In communications technology, a bus network is like as a common “highway” in which data is transmitted. A. TRUE B. FALSE 4. One of the advantages of the bus topology is new devices can be added to the backbone or to the existing nodes. A. TRUE B. FALSE 9. Bus topology and bus network are two different things. A. TRUE B. FALSE 10. In a bus topology, failure of a node will affect the entire LAN. A. TRUE B. FALSE 5. Bus networks are very common in Wide Area Networks (WAN). A. TRUE B. FALSE LESSON 80 Ring Topology SCORE 15 ICT WORKSHEET, FORM 4
  • 16. 1. A ring topology consists of a single central cable to which all computers and other devices connect. A. TRUE B. FALSE 6. If one of the nodes in a ring network with backbone fails, the network will fail to function. A. TRUE B. FALSE 2. A server may exist in a ring network, but it will not connect to all the nodes in the network. A. TRUE B. FALSE 7. If one of the nodes in a ring network with backbone fails, the network can still function as long as the backbone is working. A. TRUE B. FALSE 3. A ring network can be found in Wide Area Networks. A. TRUE B. FALSE 8. In a ring network, a failing node does not affect the entire LAN. A. TRUE B. FALSE 4. A ring network does not have a common backbone. A. TRUE B. FALSE 9. If a ring network has a ring-form backbone, then all nodes will connect to the backbone. A. TRUE B. FALSE 5. Ring topology is also known as ring network. A. TRUE B. FALSE 10. In a ring network, troubleshooting is difficult when one of the nodes fail. A. TRUE B. FALSE LESSON 81 SCORE 16 ICT WORKSHEET, FORM 4
  • 17. Star Topology 1. A star network is found in a ________________________setting. 2. In the early days of computer _______________,all computers were connected to a centralised mainframe computer. 3. A star topology is also known as___________________ 4. The idea of a ________________computer is where the basic concept of a star topology comes from. 5. Network speed ____________________when the number of nodes increases. 6. If one of the nodes ________________ the star network can still function as long as the host is working. 7. __________________is difficult when one of the nodes fails. 8. A star topology consists of a _______________which acts as the centre and all nodes connect to the host. 9. In a star network, every ________________will not connect to the neighbouring nodes. 10. In star topology, a host must be installed to _______________the network. LESSON 82 Differences of Network Topology SCORE 17 ICT WORKSHEET, FORM 4
  • 18. 1. Each topology influences the capabilities of the hardware in order to manage the flow of information. True False 2. Ring topology has no limit to install as many numbers of nodes when extending a network. True False 3. Star topology has an average capacity in adding and removing nodes. True False 4. Star topology has it own host. True False 5. Ring topology does not have connection between each node. True False 6. Bus topology has a central host and all nodes connect to it. True False 7. In a ring topology, all computers and other devices are connected in a circle. True False 8. Star topology limits installation of many numbers of nodes when extending a network. True False 9. Bus network has no difficulties in troubleshooting. True False 10. Bus topology can install many numbers of nodes when extending a network. True False SCORE LESSON 83 18 ICT WORKSHEET, FORM 4
  • 19. Introduction to Network Standards 1. The well-known standards adopted by the Institute of Electrical and Electronic Engineers (IEEE) are the ___________________________ 2. The______________ uses the 2.4GHz frequency band to transmit data up to 2Mbps. 3. _______________________is the standard specifications for a Broadband LAN. 4. Specifications for a fibre-optic LAN and MAN are given under the _________________ 5. The IEEE develops and provides networking technology specifications for worldwide usage which is called _____________________ 6. The______________________ is the standard for an Ethernet LAN. 1. This 802.11 standard provides specifications for the design, installation and testing needed for broadband transmissions. True False 2. In 802.3, Ethernet refers to the physical cabling, while the way data is transmitted through the cable is called Carrier Sense Multiple Access/ Collision Detection (CSMA/ CD). True False 3. This 802.8 standard provides specifications for the design, installation and testing needed for broadband transmissions. True False 4. Network communications use a variety of standards to ensure that data travels correctly to its destination. True False 5. The 802.11 standard uses the 2.4GHz frequency band to transmit data up to 2Mbps. True False 6. 802.7 standard gives the recommendations for the configuration and testing of fibre optic Local Area Networks and Metropolitan Area Networks. True False 7. The well-known standards adopted by the Institute of Electrical and Electronic Engineers (IEEE) are the 800 standards. True False 8. 802.11 standard defines communication between a wireless computer or client and an access point, or between two wireless computers or clients. True False 9. In 802.3 standard, broadband transmissions allow simultaneous multiple transmissions or signals using different communications channels at the same time. True False 10. 802.8 standard provides specifications for the design, installation and testing needed for broadband transmissions. True False SCORE 19 ICT WORKSHEET, FORM 4
  • 20. LESSON 84 Protocols 1. _______________________provide the rules for how computers communicate. 2. _______________________is responsible for providing logical addressing called IP address to route information between networks. 3. _______________________is used to access, send and receive Hypertext Markup Language (HTML) files on the Internet. 4. _______________________is responsible for allowing files to be copied between devices. 5. ________________________ensures the delivery of information packets across networks. 1. Network standards are specifications set by organisations such as the IEEE to define how networking devices communicate and access network media. True False 2. File Transfer Protocol (FTP) is used for transferring e-mail between computers. True False 3. Before protocols were developed, intercommunication between devices was possible. True False 4. Protocols are important as they define how devices, applications or computers communicate on a network. True False 5. A protocol stack or a protocol suite works together as a group at different levels or layers. It prepares and processes data for an exchange of information over a network. True False 6. Internet Packet Exchange (IPX) is one of the three main protocol suites that are used in internet works. True False 7. Hypertext Transfer Protocol (HTTP) is responsible for allowing files to be copied between devices. True False 8. On a network between two computers, only one protocol will be at work defining the processes of communication between the two computers during a single exchange of data or information. True False 9. Protocols define how devices intercommunicate in a network environment. 20 ICT WORKSHEET, FORM 4
  • 21. True False 10. Simple Mail Transfer Protocol (SMTP) is used for transferring e-mail between computers. True False LESSON 85 Introduction to TCP/IP SCORE 1. IP is the protocol that transfers data from node to _____________________. 2. TCP is responsible for breaking the data into_____________ before they are sent, and assemble them when they reach a destination. 3. IP is responsible for sending the packets from sender to __________________. 4. Some refer TCP/IP as the ________________________. 5. TCP stands for _______________________ 6. IP takes care of delivering data packets between two ___________________ 7. TCP/IP is the internet communication_________________________ 21 ICT WORKSHEET, FORM 4
  • 22. 8. IP stands for ____________________ 9. TCP/IP is a _________________that sets the rules computers must follow in communicating with each other on a network. 10. TCP establishes connection between two computers, protects against data loss and _________________ corruption. LESSON 86 The Way TCP and IP Work SCORE 1. Each computer must have an __________________assigned by the network administrator to access the Internet. 2. When you access a _____________for example the Yahoo main page, the TCP/IP will make the communications work between your computer and the Yahoo’s server. 3. You have typed the ___________“www.yahoo.com” on the browser. Your TCP will send a request for the web page to Yahoo’s server according to the address you typed in. 4. TCP will make the ______________between two computers (yours and Yahoo server) and it will prepare the full-duplex communication. 5. The IP will begin sending the ________________from 192.168.0.1 to www.yahoo.com (or 209.131.36.158). 6. Internet is a huge collection of ______________. There are many routes from your computer to the server. 22 ICT WORKSHEET, FORM 4
  • 23. 7. IP will send the ________________through these routes as fast as possible. 8. IP will constantly use several different ______________to deliver packets to their destination. 9. TCP will continue to maintain the link between two _______________________ 10. TCP will close the ________________links once the web page has reached your computer. LESSON 87 Private Computer Network Setting SCORE 1. When you want to install a private network, you will need to install the _________________IP address, subnet mask and default gateway. 2. Right click on the My Network Places on the desktop and click the_________________command. 3. In the Network Connections window, right click on the________________interface and click the Properties command. 4. In the network interface’s properties dialog box, click the_____________entry and then click the properties button. 5. In the Internet protocol Properties dialog box, select the use the following_______________option. 6. Type in the ______________in the IP address text box. 7. Type in the subnet ______________in the subnet mask text box. 8. Enter a ______________with you server’s IP Address. 9. Make sure the obtain ____________server addresses automatically option is chosen. 10. Click OK in the ____________Protocol Properties dialog box. 1. When you want to install a private network, you will need to install only the network card. False True 2. Right click on the My Network Places on the desktop and click the Properties command. False True 3. In the My Network Places window, right click on the network interface and click the Properties command. True False 4. In the network interface’s properties dialog box, click the Internet Protocol entry and then click the properties button. True False 5. In the Internet Protocol Properties dialog box, select the Use the following IP address option. True False 23 ICT WORKSHEET, FORM 4
  • 24. 6. Type in the subnet mask in the IP address text box. True False 7. Type in the IP address in the subnet mask text box. True False 8. Enter a default gateway with you server’s IP Address. False True 9. Make sure the obtain DNS server addresses automatically option is chosen. True False 10. Click OK in the Internet Protocol Properties and the external interface’s properties dialog box. True False LESSON 88 Types of Network Communication Technology SCORE 1. An ________ __ can be viewed as part of a company's Intranet that is extended to users outside the company. Answer: 2. It has a Web server, supports multimedia Web pages coded in HTML and is accessible via a Web browser such as Microsoft Internet Explorer or Netscape Navigator. Answer: 3. It consists of millions of smaller business, academic, domestic and government networks, which together carry various information and services, such as electronic mail, online chat. It also carries interlinked Web pages and other documents of the World Wide Web. Answer: 4. Package shipping companies, for example, allows customers to access their network to print air bills, schedule pickups, and even track shipped packages as the packages travel to their destinations. Answer: 5. Through the society has access to global information and instant communications Answer: 6. Sometimes the term refers only to the most visible service, the internal website. Answer: 7. It has a Web server, supports multimedia Web pages coded in HTML and is accessible via a Web browser such as Microsoft Internet Explorer or Netscape Navigator. Answer: 24 ICT WORKSHEET, FORM 4
  • 25. 1. In intranet, ______________and other Internet protocols are commonly used as well, especially FTP and email. 2. The same concepts and technologies of the Internet such as clients and servers running on the Internet protocol suite are used to build an __________________ 3. Sometimes a company uses an ,________________which allows customers or suppliers to access part of its network. 4. Contrary to some common usage, the Internet and the ________________are not synonymous. 5. Intranet has a Web server, supports multimedia Web pages coded in HTML and is accessible via a _________________ such as Microsoft Internet Explorer or Netscape Navigator. 6. The Internet is a worldwide, publicly accessible system of interconnected computer networks that transmit data by packet switching using the standard ___________________ LESSON 89 Internet SCORE 1. Internet is a global network connecting millions of computers. A. TRUE B. FALSE B. FALSE 3. Some of the many usages of the Internet are entertainment, commerce and education. A. TRUE B. FALSE 2. There is only one category of Internet connection and this is called broadband. A. TRUE 25 ICT WORKSHEET, FORM 4
  • 26. 4. Internet transmits data by using Internet Protocol (IP). A. TRUE B. FALSE A. TRUE B. FALSE 8. Internet service can only be provided by a telephone company. A. TRUE B. FALSE 5. Internet connection is divided into two categories; dial-up and Streamyx. A. TRUE B. FALSE 9. Currently, Malaysia has four telephony companies providing Internet services. A. TRUE B. FALSE 6. An ISP can either be a telecommunication company or any other organization specialising in providing access to Internet services. A. TRUE B. FALSE 7. The Internet is the world’s largest computer network connecting millions of computers worldwide. SCORE LESSON 90 Intranet 1. Intranet is an internal network within the organisation. True False 3. Intranet has its own firewall to protect from intruders outside an organisation from accessing the company information or data. True False 2. Intranet can be accessed by other computers outside an organisation with the use of login names and passwords. True False 4. Intranet can be accessed without the use of user ID or login name and password.. True False 26 ICT WORKSHEET, FORM 4
  • 27. 5. Intranet can connect two branches of an organisation even though they are located at two different places. True False 8. Intranets do not support groupware applications. True False 6. The Internet connects networks worldwide, while intranet works within a particular organisation. True False 9. If Ali is in Jakarta on a business trip, he can still access company information by going through his company’s website, entering his user ID or login name and password. True False 7. Intranets include services like email, company information, employee handbook, company events and calendars as well as job postings. True False 10. With intranet, meetings and discussions can be carried out without having to physically meet at a meeting room. True False SCORE LESSON 91 Extranet 1. Only __________ or authorised users can navigate or access an extranet. 27 ICT WORKSHEET, FORM 4
  • 28. 2. Through extranet, users can share product __________ exclusively with wholesalers or those "in the trade”. 3. News of __________ interest can be shared privately with partner companies using extranet. 4. __________ with other companies on joint development efforts can be done via extranet. 5. __________ can access the Internet while extranet is only limited to defined sets of customers, suppliers or partners. 6. Extranet is within a firewall while the __________ might be with or without a firewall. 7. __________ in the Internet often create problems such as hackers and viruses to users, while extranet is more secured as only authorised users can access their system. LESSON 92 Communication Devices: Hardware Requirements SCORE 1. An adapter card or PC card that enables the computer to access the network. Answer: 2. A central communication device that allows computers and devices to transfer data wirelessly between wireless devices or to transfer data wirelessly to a wired network. Answer: 3. A communication device that connects multiple computers or other routers together and transmits data to the correct destinations. Answer: 4. A communication device that only works in stand alone computers. It is built into the computer to connect to the Internet. Answer: 5. A common connection point for devices in a network commonly used to connect segments of a LAN. Answer: 6. A communication device that is separate from the computer and is also mobile. It is used to connect to the Internet. Answer: 7. A network card that provides wireless data transmission. Answer: 1. An adapter card or PC card that enables the computer to access the network. A. Modem B. Wireless Access Point C. Network Interface Card D. Wireless Network Interface Card 2. A central communications device that allow computers and devices to transfer data wirelessly between wireless devices or to transfer data wirelessly to a wired network. A. Router 28 ICT WORKSHEET, FORM 4
  • 29. B. Hub/Switch C. Wireless Access Point D. Wireless Network Interface Card and transmits data to the correct destinations. A. Router B. Hub/Switch C. Internal Modem D. External Modem 3. A communications device that only works in stand-alone computers. It is built into the computer and enables the PC to connect to the Internet. A. Router B. Hub/Switch C. Internal Modem D. External Modem 5. A network card that provides wireless data transmission. A. Hub/Switch B. Wireless Access Point C. Network Interface Card D. Wireless Network Interface Card 4. A communications device that connects multiple computers or other routers together SCORE LESSON 93 Functions of Communication Devices 1. A Wireless Network Interface Card is an essential component for wireless desktop computers. This card uses an antenna to communicate through _______________________ 2. A switch understands when two devices want to talk to each other, and gives them a ________________ connection. 3. A Network Interface Card is a piece of computer hardware designed to allow computers to ___________ over a computer network. 4. A hub connects all the devices on its ______________together. 5. The wireless access point usually connects to a _____________network, and can relay data between wireless devices and wired devices. 29 ICT WORKSHEET, FORM 4
  • 30. 6. Several Wireless APs can link together to form a larger network that allows ________________ 7. Wireless Network Interface Cards are designed around the IEEE 802.11 standard which sets out ___________________specifications on how all Wireless Networks operate. 8. A router acts as a ____________________between two or more networks to transfer data packets among them. 9. A ______________is a communication device that enables a computer to transmit data over telephone or cable lines. SCORE D. wireless and twisted-pair transmission mediums LESSON 94 Transmission Medium 7. Which of the following is an example of physical transmission medium? A. Air B. Vacuum C. Antenna D. Twisted-pair 1. In network communications, it is common to represent the interconnection between devices as _______ A. Network clouds. B. Routers interconnection. C. Switches interconnection. D. Routers and switches interconnections. 2. ______provides Internet access to users at public places. A. WiFi B. Hotspots C. Hand phone D. Twisted-pair 3. Which of the following equipment uses transmission medium? A. TV B. Printer C. Radio D. Radio, remote control and hand phone 8. Computers and other telecommunications devices use in a form of wave or energy to represent data which are transmitted through transmission medium. A. power B. signals C. medium D. electricity 4. What kind of medium is wireless transmission using? A. Guided medium B. Unguided medium C. Unlimited medium D. Guided and unguided medium 9. Which of the following is an example of a wireless transmission medium? A. Air B. Coaxial C. Fibre optic D. Twisted-pair 5. A ______is a material substance which can propagate waves or energy. A. twisted-pair cable B. transmission medium C. short range transmission D. transmission environment 10. Which of the following uses physical transmission medium? A. Using WiFi technology at a café. B. Connecting two hand phones via Bluetooth. C. Connecting to the Internet at a Hotspot centre. D. Connecting PC to printer using parallel port. 6. Two categories of transmission medium are A. physical and guided transmission mediums B. physical and wireless transmission mediums C. wireless and unguided transmission mediums 11. Which of the following is an example of physical transmission medium? A. Air B. Vacuum 30 ICT WORKSHEET, FORM 4
  • 31. C. Antenna D. Twisted-pair 13. Which of the following is an example of physical transmission medium? A. Air B. Hotspot C. Antenna D. Fibre optic 12. In physical transmission medium, waves are along a solid transmission medium whereas in wireless transmission medium, waves are and the transmission and receptions are by means of antennas. A. guided, unguided B. unguided, guided C. transmitted, guided D. propagated, directed SCORE LESSON 95 Physical Transmission Media A. Twisted-pair B. Fibre optic 1. A twisted-pair cable without a metallic shield. A. UTP B. STP 11. Suitable for longer distance of data transmission. A. Coaxial B. Fibre optic 2. Cable made up of conducting outer metal tube and insulated from a central conducting core. A. Coaxial B. Fibre optic 12. The most susceptible to electrical noise and interference. A. UTP B. STP 3. Cable that uses light as its data transmission medium. A. Twisted-pair B. Fibre optic 13. Which is true regarding physical transmission medium? A. Air is a good example of a physical transmission medium. B. Any solid substances that can propagate wave or energy. C. Physical transmission medium is also known as unguided transmission medium. D. Rubber is a good example of a conductor used in a physical transmission medium. 4. Connector for twisted-pair cable. A. RJ-45 B. MT-RJ 5. Connector for coaxial cable. A. BNC-T B. MT-RJ 6. Connector for fibre optic. A. BNC-T B. MT-RJ 14. For twisted-pair cable, the purpose of twisting two pairs of wires together is ________ A. to make it look tidy B. there is no good reason C. to reduce electromagnetic interference D. to make it more stronger therefore difficult to break 7. This cable gives the least signal attenuation. A. Fibre optic B. Coaxial 8. The cheapest transmission media. A. UTP B. STP 15. _______cable is a networking medium that uses light for data transmission. A. Coaxial B. Fibre optic C. Shielded Twisted-Pair D. Unshielded Twisted-Pair 9. The most secured transmission media. A. Coaxial B. Fibre optic 10. The most expensive transmission media. 31 ICT WORKSHEET, FORM 4
  • 32. 16. Two types of twisted-pair cables are ___________. A. shielded and coaxial B. coaxial and fibre optic C. unshielded and shielded D. unshielded and protected 17. Which is not the correct type of cable in networking? A. Data Cable B. Fibre Optic Cable C. Shielded Twisted-Pair (STP) D. Unshielded Twisted-Pair (UTP) 18. The following are advantages of fibre optic cables as compared to twisted-pair and coaxial cables except . A. cheaper B. light weight C. more secure D. higher bandwidth SCORE LESSON 96 Wireless Transmission Media 32 ICT WORKSHEET, FORM 4
  • 33. A. 1 GHz to 2 GHz B. 1 GHz to 200 GHz C. 1 MHz to 400 MHz D. 1 GHz to 300 GHz 1. _______networks are telephone or computer networks that use radio frequencies and infrared waves as their carrier. A. Wired B. Wireless C. Protected D. Unprotected 9. What is the frequency of Infrared signals? A. 200 MHz to 500 MHz B. 100 GHz to 200 GHz C. 100 MHz to 400 MHz D. 300 GHz to 400 THz 2. Wireless is a method of communication that uses ________waves rather than wire conductors to transmit data between devices. A. digital B. analog C. microwave D. electromagnetic 10. Radio waves transmitted by one antenna are susceptible to interference by another antenna that is sending signals of the ____frequency or band. A. same B. lower C. higher D. different 3. In a wireless media, signal transmission is . A. guided B. unguided C. protected D. unprotected 11. Infrared signals have ______frequencies and cannot penetrate walls. A. low B. high C. medium D. moderate 4. Wireless transmission can be categorised into three broad groups; .__________ A. radio waves, microwaves and infrared B. radio waves, microwaves and Bluetooth C. radio waves, electromagnetic waves and Bluetooth D. electromagnetic waves, microwares and Infrared 12.______ is a method of communication that uses electromagnetic waves to transmit data between devices without using a physical conductor. A. Smoke B. Wireless C. Public Telephone D. Guided transmission 5. Electromagnetic waves ranging in frequencies between 3 Kilo Hertz and 1 Giga Hertz are normally called ___________ A. microwave B. radio waves C. infrared waves D. magnetic waves 13. A parabolic dish antenna is a(n) ____antenna. A. horn B. bidirectional C. unidirectional D. omnidirectional 6. Waves ranging in frequencies between 1 and 300 Giga Hertz are normally called_______. A. microwaves B. radio waves C. infrared waves D. magnetic waves 14. ____________ are normally omnidirectional. A. Microwave B. Radio waves C. Tidal waves D. Electrical waves 7. The parabolic dish antenna receives ingoing transmissions by reflecting the signal to a common point called the ________ A. dot B. peak C. focus D. centre 15. Using ________devices outside a building is not recommended because the sun’s rays can interfere with the communication. A. satellite B. infrared C. microwave D. radio wave 8. What is the range for the Electronic waves? SCORE LESSON 97 Server Software 33 ICT WORKSHEET, FORM 4
  • 34. 1. One of the popular network operating systems is: A. Windows XP B. Windows NT 5. _________and Windows Server 2003 are the latest versions of Windows NT. A. Windows XP B. Windows 2000 2. Since ______Red Hat has discontinued the Red Hat Linux line in favour of its new Red Hat Enterprise Linux. A. 2005 B. 2003 6. ______are designed primarily for small to medium local area networks. A. Client / server networks B. Peer-to-peer networks 7. ________is the final release of the Red Hat Linux software. A. Red Hat Linux 9 B. Red Hat Linux 7 3. ____________operating systems allow the network to centralise functions and applications in one or more dedicated file servers. A. Client / server network B. Peer-to-peer network 8. ________was released on February 17, 2000. A. Windows NT B. Windows 2000 4. It is part of the Microsoft Windows NT line of operating systems. A. Windows 2003 B. Windows 2000 9. _______do not have a file server or a centralised management source. A. Client / server networks B. Peer-to-peer networks 1. __________________is the name of Microsoft's line of server operating systems and is the successor to Windows 2000 Server. 2. ________________was one of the most popular Linux distributions, assembled by Red Hat. 3._______________ is graphical and business-oriented operating system that was designed to work with either uniprocessor or symmetric multi-processor (SMP) 32bit Intel x86 computers. 4. _______________is a family of operating systems produced by Microsoft, the first version of which was released in July 1993. SCORE LESSON 98 Client Software 34 ICT WORKSHEET, FORM 4
  • 35. 1. A web browser is a software application that enables a user to display and interact with _____________ documents hosted by web servers. 2. An email client or mail user agent is a computer program that is used to read and send ___________ 3. There are three types of client software, which are web browser, email client and_______________ 4. Although web browsers are typically used to access the World Wide Web, they can also be used to access information provided by web servers in ______________ networks. 5. A web browser is a ______________that enables a user to display and interact with HTML documents hosted by web servers or held in a file system. 6. A_______________ is a software application that enables a user to display and interact with HTML documents hosted by web servers. 7. Although browsers are typically used to access the ______________ , they can also be used to access information provided by web servers in private networks or content in file systems. 8. There are three types of client software, which are ______________, email client and file transfer protocol. 9. An ___________client is an example of client software. 10. Web browsers available for personal computers include ___________,Safari, Netscape and Opera. 11. File Transfer Protocol is an example of ______________software. 12. File Transfer Protocol client is used to connect two computers over the _____________so that the user of one computer can transfer files and perform file commands on the other computer. 13. Web browsers allow a user to quickly and easily access information provided on many __________at many websites by surfing these links. 14. An ______________is a computer program that is used to read and send email. SCORE LESSON 99 Setting Network Facilities 35 ICT WORKSHEET, FORM 4
  • 36. 1. Select an ISA (____) or PCI ( _____) slot depending on the Network Interface Card. A. Black, White B. White, Black C. Brown, Black D. Black, Yellow A. checking your PC motherboard B. examine your network card inside the PC C. checking the back of the PC for a network socket D. checking the "Hardware Profile" in computer properties 2. Below are the steps on how to insert the Network Interface Card: I. Disconnect the PC from the power and then remove the casing or side panel of your machine II. Select an ISA or PCI slot depending on the Network Interface Card III. Remove the back blanking plate from behind the slot you have selected for the Network Interface Card IV. Check the back of your PC for a network socket A. II, IV, I, III B. I, II, III, IV C. IV,I,II,III D. IV, II, I, III 6. A Network Interface Card (NIC) is easy to install. The only considerations for installation is that you should have _____ A. a PCI slot or ISA slot B. a Network Interface Card C. a personal computer D. an available NIC slot 7. Before installing an NIC, please check whether A. you have a PCI slot B. you have an ISA slot C. you have an available slot D. you have an available slot and slot type 8. Network Interface Card, or NIC, also referred to as a " _______", is a piece of computer hardware designed to allow computers to communicate over a computer network. A. adapter B. ethernet card C. expansion card D. network adapter 3. After successfully installing the card into the slot, what should you do? A. Remove the casing B. Restart the computer C. Secure the card in place using the nail D. Secure the card in place using the screw from the blanking plate 4. Why are we required to firmly press down the Network Interface Card into the slot? A. To make sure it is safe B. To make sure it is easy to use C. To make sure it is properly seated D. To make sure it is easy to replace 9. A Network Interface Card (NIC) is an expansion card that allows the transmission of data over a ________network. A. WiFi B. cable C. satellite D. wireless 10. Insert the card into the ____by pressing down firmly on the Network Interface Card. A. slot B. port C. plate D. socket 5. The easiest way to check whether the PC has a Network Interface Card is by______ SCORE 36 ICT WORKSHEET, FORM 4
  • 37. LESSON 100 Installation of Network Interface Card LESSON 101 SCORE 37 ICT WORKSHEET, FORM 4
  • 38. Crimping Straight Cable 1. ________________ cable has four twisted pairs of wire for a total of eight individually insulated wires. 2. ____________ is used to cut and strip cables. 3. A straight cable acts as an ________ enabling a device with a network interface card to be attached to a network. 4. The total length of wire segments between a PC and a hub or between two PCs cannot exceed ________. 5. A common form of network media is the ___________ known as Unshielded Twisted Pair Category 5 cable. 6. ____________are used to cut the cable off at the reel and to fine tune the cable ends during assembly. NO 1 STATEMENT TRUE A wrench is used to cut and strip cable. 2 The total length of wire segments between a PC and a hub or between two PCs can exceed more than 100 meters. 3 If the cable crimping process is done properly, an average person will not be able to pull the plug off the cable with his or her bare hands. 4 In the cable crimping process, you have to strip one end of the cable with the pen-knife. 5 In trimming cable wires, it is very important that the unstripped or untwisted end be slightly less than half-inch long. 6 Cable strippers are used to cut the cable off at the reel and to fine tune the cable ends during assembly. 7 In RJ-45 modular plug, RJ means "Registered Jack". 8 A common form of network media is the UTP Cat 5 known as Unshielded Twisted-Pair Category 5 cable. 9 In arranging the wires of the network cable, it is not necessary to spread and arrange the pairs in order. 10 FALSE SCORE A straight cable acts as an extension enabling a device Network Interface Card to be attached to a network. 38 ICT WORKSHEET, FORM 4
  • 39. LESSON 102 Crimping Crossover Cable NO STATEMENT 1 Category 5 cable can have more than half of an inch (1.3 cm) at the end. 2 The tools for cable crimping are such as cables, pliers, crimpers and scissors. 4 When you crimp the cable, be sure it is properly rated for CAT 5. 5 To make the cable, start by stripping off about two inches (5 cm) of the plastic jacket off the end of the cable. 6 BJ-45 plug is used as a connector to CAT 5 cable in crossover cable crimping. 7 The crossover cable cannot be used to directly connect two computers to each other without the use of a hub or switch. 8 In a cable crimping test, you should see that the copper connectors at the end of the RJ-45 plug should not be pressed down into the wires. 9 When you begin to crimp the cable, be sure to keep a good grip on that RJ-45 plug and the cable. 10 FALSE You need a pair of scissors that will allow you to cut a group ofcables in a straight line. 3 TRUE Toward the back of the RJ-45 plug (where the jacket meets the RJ-45 plug) it should be crimped securely holding the jacket or cable in the RJ-45 plug. SCORE 39 ICT WORKSHEET, FORM 4
  • 40. LESSON 103 Configuration of Network LESSON 104 SCORE 40 ICT WORKSHEET, FORM 4
  • 41. Testing of Network 1. To use ping, open the ___________________window. 2. If the problem persists, you have to check your network _____________or protocol. 3. In this lesson, students will be taught on the processes of network ______________ 4. The best utility to have a quick TCP/IP connection test is ________________ 5. The ping utility then send and receive __________________of information. 6. If ping displays error messages such as Bad IP Address, Request Timed Out, or Unknown Host or could not send and receive packets over the ______________, you should verify if the IP address is valid. 7. There are _______________steps for testing network. 8. Once you have installed the _______________ , cables and software, you can test the new TCP/IP protocol. 9. If you have successfully sent and received packets, all is well with the ____________ connection. 10. Enter the name or ______________you want to test after the ping command. 41 ICT WORKSHEET, FORM 4
  • 42. LESSON 105 Shared Folder SCORE 1. A ______________is a named collection of related files that can be retrieved, moved and otherwise manipulated as one entity. 2. Folders can be created _____________folders. 3. The files in a folder can be copied or moved to other ____________,computers and even to the Internet. 4. If the file or folder you want to share is not located in My Documents or one of its subfolders, use ___________to find it. 5. In Windows, Macintosh and other operating systems, a folder is a named collection of related files that can be retrieved, moved and _____________as one entity. 6. You can share the files and folders stored on your computer and on your _______________ 7. To change the name of your folder on the network, in the ______________text box, type a new name for your folder. 8. The ______________you choose depends on whom you want to share the files or folders with and the computer used to access them. 9. Anyone who has user access to the network can read, copy or change files stored in that folder when you __________ a drive or folder. 10. Folders can contain many different types of _________________, such as documents, music, pictures, videos and programs. 42 SCORE ICT WORKSHEET, FORM 4
  • 43. LESSON 106 Wireless and Mobile 1. A wireless digital mobile telephone system used in Europe and other parts of the world. Answer: 2. A packet-based wireless communication service that provides continuous connection to the Internet for mobile phone and computer users. Answer: 3. A faster version of the Global System for Mobile (GSM) wireless service. Answer: 4. A broadband, packet-based system offering a consistent set of services to mobile computer and phone users no matter where they are located in the world. Answer: 5. A set of communication protocols to standardise the way wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access. Answer: 6. The world's first "smart phone service" for Web browsing introduced in Japan;provides colour and video over telephone sets. Answer: 1. ______________________ is a digital mobile telephone system used in Europe and other parts of the world, the accepted wireless telephone standard in Europe. 2. ______________________ is a packet-based wireless communication service that provides continuous connection to the Internet for mobile phone and computer users. 3. ______________________ is a faster version of the Global System for Mobile (GSM) wireless service. 4. ______________________ is a broadband, packet-based system offering a consistent set of services to mobile computer and phone users no matter where they are located in the world. 5. ______________________ is a set of communication protocols to standardize the way wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access. 6. ______________ is the world's first "smart phone service" for Web browsing, first introduced in Japan; provides colour and video over telephone sets. 7. ______________________ is the operation of wireless devices or systems in homes and offices, and in particular, equipment connected to the Internet via specialised modems. 8. ______________________ is the use of wireless devices or systems aboard motorised, moving vehicles. 43 SCORE ICT WORKSHEET, FORM 4
  • 44. LESSON 107 Mobile Computing 1. The IEEE 802.11 group of standards specifies the technologies for it. Answer: 2. It uses cellular network technologies such as GPRS / CDMA2000 / GSM to transfer data. Answer: 3. It is also known as IEEE 802.15.1. Answer: 4. It defines physical specifications communications protocol standards for the short range exchange of data over infrared light and for uses such as Personal Area Networks (PANs). Answer: 5. Various computers now have a cellular radio built in, which allows the user to send and receive data. Answer: 6. It is a radio standard and communications protocol primarily designed for low power consumption, within a short range. Answer: 7. Since it is line-of-sight light transmission, it is sensitive to fog and other atmospheric conditions. Answer: 1. _________ __ computing is the use of portable computing devices to access the Internet and data on their home or work computers from anywhere in the world. 2. A ____________________ is a computer small enough to fit in one hand. 3. ____________________ are handheld devices that were originally designed as personal organisers. 4. A _____________________ is any electronic handheld device that integrates the functionality of a mobile phone, personal digital assistant or other information appliance. 5. A _______ ___ LAN is one in which a notebook user can connect to a Local Area Network through a wireless (radio) connection. 6. The IEEE ________ __ group of standards specify the technologies for wireless LANs. 7. A _____________________ uses cellular network technologies such as GPRS /CDMA2000 / GSM to transfer data. 44 SCORE ICT WORKSHEET, FORM 4
  • 45. LESSON 108 Internet Technology 1. Internet __________ is a broad range of technologies for web development, web production, design, networking, telecommunication and e-commerce. 2. ________________ is one of the Internet technologies that allow users to make telephone calls using a broadband Internet connection. 3. Voice over Internet Protocol is a method for taking analog audio signals and turning them into _______________ data that can be transmitted over the Internet. 4. There are three different VoIP services in common use today, which are ATA, ________________ and computer-to-computer. 5. The ________________ allows you to connect a standard phone to your computer or your Internet connection for use with VoIP. 6. The simplest type of ATA has one or more _________________ jacks to plug a telephone and/or a fax into a USB connector that plugs into the user's computer. 7. In an enterprise setting, an ATA usually has multiple telephone jacks and _________________ connection to a 10/100BaseT Ethernet hub or switch, and is used to connect to a Local Area Network. 8. Protocols used to carry voice signals over the IP network are commonly referred to as _________________. 9. VoIP phone conversations can become distorted, garbled or lost because of _________________ errors. 10. Devices needed to place a computer-to-computer Internet telephone call is the software, a microphone, ____________________, a sound card and an Internet connection. 45 ICT WORKSHEET, FORM 4
  • 46. LESSON 109 Internet Services SCORE 6. ________________ are special websites on the Internet to find information you need. A. IRCs B. Emails C. WWWs D. Search engines 1. _______________ consists of a worldwide collection of electronic documents. A. IRC B. Email C. WWW D. Search engine 7. _________________ is a real-time conversation that takes place on a computer. A. IRC B. Email C. WWW D. Search engine 2. _______________ is the transmission of messages and files via a computer network. A. IRC B. Email C. WWW D. Newsgroup 3. _________________ is a system for chatting that involves a set of rules and conventions and client/server software. A. IRC B. Email C. WWW D. Newsgroup 8. Each electronic document on the Web is called a _________________ which can contain text, graphics, audio and video. A. web page B. newsgroup C. search engine D. World Wide Web 4. _________________ is an online area in which users have written discussions about a particular subject. A. IRC B. Email C. WWW D. Newsgroup 9. A user utilises a/an ______________ program to create, send, receive, forward,store, print and delete electronic messages. A. email B. newsgroup C. search engine D. World Wide Web 5. Different will serve different purposes. A. IRC B. email C. WWW D. search engines 10. The entire collection of Internet newsgroups is called _______________, which contains tens of thousands of newsgroups about a multitude of topics. A. User B. Usenet C. Usegroup D. World Wide Web 46 ICT WORKSHEET, FORM 4
  • 47. SCORE LESSON 110 Internet Services NO STATEMENT A Personal Area Network (PAN) is a computer network used for 1 TRUE FALSE communication among computer devices including PCs, laptops, printers, telephones, digital cameras, mobile phones, video game consoles and personal digital assistants. 2 The IEEE standard for Wireless LANs 802.13. 3 WiMAX would operate similar to WiFi but at higher speeds, over greater distances and for a greater number of users. 4 VPN uses tunnelling mechanism to maintain privacy and security of the data. Tunnelling means transmitting data packets across a public network. 5 Personal area networks may only be wired with USB ports. 6 Wireless Local Area Network (WLAN) is a type of LAN that uses highfrequency radio waves to communicate between nodes. 7 VPN is often used by companies to provide access from their internal network resources to their home or mobile workers. 8 Bluetooth is the popular wireless PAN used by most people, especially the mobile phone technologies, and it applies the IEEE 802.11 standards. 1. _________________ improves user mobility, speed and scalability to move around within a broad coverage area and still be connected to the network. 2. A _________________ is a computer network used for communication among computer devices close to one person like PCs, laptops, printers, telephones, digital ameras, mobile phones, video game consoles and personal digital assistants. 3. A _________________ is a network that uses a public telecommunication infrastructure, such as the Internet, from remote offices or individuals with secure access to their organization's private network 4. WiMAX would operate similar to _________________ but at higher speeds, over greater distances and for a greater number of users. 5._______________by companies to provide access from their internal network resources to their home or mobile workers. 6. Data or information in _________________ travels via tunnelling. 7. _________________ is generally done by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data. 47 ICT WORKSHEET, FORM 4