Cit202 Calculus Educational Consult 2020 - 1
Cit202 Calculus Educational Consult 2020 - 1
Cit202 Calculus Educational Consult 2020 - 1
___ were physically large and powerful systems capable of supporting hundreds of users
Mainframe computers
The term was introduced with the advent of single chip large scale integrated circuit computer
processors.
Microcomputer
__ is a computer with a microprocessor as its central processing unit
Microcomputer
__ is a personal computer (PC) in a form intended for regular use at a single location, as opposed to
a mobile laptop or portable computer.
desktop computer
PDA are also called __
Personal Digital Assistant
__ is a handheld computer, also known as small or palmtop computers.
Personal Digital Assistant
A subnotebook is also called___
ultraportable laptop or minilaptop computer
___ _ is a small and lightweight portable computer, with most of the features of a standard laptop
computer but smaller.
Subnotebook
__ Subnotebooks are smaller than laptops but larger than handheld computers and UMPCs
Subnotebook
Subnotebooks were seen as niche computing products and have rarely sold in large numbers until the 2007
introduction of the Asus Eee PC and the OLPC XO-1, known as__
ultra low-cost PC (ULPC or ULCPC)
___ _ _ is a small mobile computer, typically weighing 3 to 12 pounds (1.4 to 5.4 kg), although older
laptops may weigh more.
Laptop
___ is a largely obsolete term for a class of multi-user computers that lies in the middle range of the
computing spectrum, in between the largest multi-user systems (mainframe computers) and the smallest
single-user systems (microcomputers or personal computers)
Minicomputer
2020_1 First semester use only
__ was created to distinguish the traditional, large, institutional computer intended to service
multiple users from the smaller, single user machines.
Mainframe computer
A is so fast that it is measured in millions of tasks per milliseconds (MTM)
mainframe speed
__ are computers used mainly by large organizations for critical applications
Mainframe
__ usually refers to a computer that is dedicated to the task of storing and retrieving large amounts
of data
Server
a large computer dedicated to a database may be called___
database server
___ manage a large collection of computer files. "Web servers" process web pages and web applications
File servers
__ are computers that are intended to serve one user and may contain special hardware
enhancements not found on a personal computer
Workstations
__ run operating systems that are normally associated with mainframe computers, usually
one of the variants of the UNIX operating system
Workstations
___ are handheld devices that are used to record or capture data away from the mainframe computer that
they are linked to
Portable data entry terminals (more commonly known as PDET's)
__ are general purpose CPUs that are a part of a machine or device
Embedded computers
__ computer runs a program that is stored in read only memory (ROM) and is only intended to operate a
specific machine or device
Embedded
__ controls the computer and makes it do useful work
Software
__ refers to the physical components that make up a computer system.
Hardware
__ or thumb drives range from 512 Mb to 8 Gb in capacity.
Flash drives
The disadvantage of tape as a storage medium, is that tape is a ___
sequential storage medium
__are the computer hardware that accept data and instructions from a user
Input devices
2020_1 First semester use only
The ___is used to type information into the computer or input information.
Keyboard
____designed keyboards are designed to make typing easier
Ergonomically
The __is used as a pointing device and to select options from menus.
Mouse
___ is used for the same purposes as a mouse and is popular on laptop computers.
tracker ball
___can be used to point at a monitor, serving a similar function as a mouse.
Light Pen
____can scan a document and recognise characters
OCR(optical character recognition) device
___ is similar to OCR but this time the characters are not scanned optically
Magnetic Ink Character Recognition (MICR)
__ is used on cheques by banks, to encode bank account numbers.
Magnetic Ink Character Recognition (MICR)
__ are very popular input devices in supermarkets and stores.
Barcode Scanners
_____ are devices which scan an image (document, photograph) and produce a digital version
of the image i.e. the image is stored as a sequence of binary numbers.
Image Scanners
____is used to describe the application of this technique and it is becoming an important application in
insurance and banking organisations.
document image processing (DIP)
__ is perhaps the most exciting form of computer input.
Voice Input
__ return processed data that is information back to theuser.
Output devices
monitor shows information on the screen when you type. This is called ___
outputting information
Most desktop computers use a monitor with a __
cathode tube
most notebooks use a (LCD) monitor
liquid crystal display
___ takes the information on your screen and transfers it to paper or a hard copy
Printer
There are ________ types of printer
Three(dot matrix, inkjet, and laser)
2020_1 First semester use only
____ is a general term used to describe a collection of computer programs, procedures and documentation that
perform some tasks on a computer system.
Software
____consists of groups of binary values signifying processor instructions which change the state of the computer
from its preceding state
machinelanguage
____is an ordered sequence of instructions for changing the state of the computer hardware in a particular
sequence
Software
___ are compiled or interpreted into machine language object code
High-level languages
____usually provides tools to assist a programmer in writing computer programs, and software using different
programming languages in a more convenient way.
Programming software
___end users to accomplish one or more specific (non-computer related) tasks
Application software allows
___ are software developed by individuals and small companies that cannot afford to market their software
world wide or by companies that want to release demonstration versions of their commercial products.
Shareware
____includes the firmware, device drivers, an operating system, and typically a graphical user interface
Platform software
____are the most common way of interacting or controlling your software
Menus
___displays a list of the programs that are installed through Windows and available to use
Program or Dock
___displays system components, such as printers, control panel and taskbar.
Settings
__ is the software component of a computer system that is responsible for the management
and coordination of activities and the sharing of the resources of the computer. Operating system
__ acts as a host for application programs that arerun on the machine
operating system
____first appeared on the PDP-7 and later the PDP-11
UNIX
__is a line of proprietary, graphical operating systems developed, marketed, and sold by Apple Inc
Mac OS X
2020_1 First semester use only
A ___is a multitasking operating system intended for applications with fixed deadlines (real-time computing)
real-time operating system (RTOS)
____refers to the running of multiple independent computer programs on the same computer, giving the
appearance that it is performing the tasks at the same time
Multitasking
___is a specific type of computer software developed to allow interaction with hardware devices
device driver
___are commonly found on floppy discs,
FAT file systems
The functions of operating system are___
Providing User Interface, Managing the Hardware, Managing the File System, Supporting Programs
___is a collection of technologies which are designed to allow the computer to perform certain functions
operating system
___allow you to type your text in Bold, Italics or Underline
Word processors
___is a collection of information stored in a way that makes it easy to retrieve, modify and search
Database
There are two types of computer __________and _______
graphics,bitmapped and vector/structured
____are images that are mapped to the monitor or screen
Bitmapped graphics
The screen is made up of tiny dots called__
Pixels
___ use objects created from mathematical formulas to represent things like lines, curves, fills, line thickness,
etc., to create the image
Vector graphics
The three main bitmapped format graphics used on the Internet are __
.gif, .jpeg (.jpg) and .png
____is multimedia format that is attempting to create a standardization among the various formats
available.
Moving Picture Experts Group (MPEG) or .mpg
A is a series of separate images or frames that display one after the other to give the
impression of movement.
GIF animation
2020_1 First semester use only
__ uses both word processing and graphics to produce publications and presentations.
Desktop publishing (dtp)
A __is computer software designed for the purpose of managing databases based on a variety of data models.
database management system (DBMS)
__are complex set of software programs that control the organization, storage, management, and retrieval of data in
a database
DBMSs
___is the process of requesting attribute information from various perspectives and combinations of factors
Querying
SDLC is the
Software Development Life Cycle
B2C stands for:
Business to Consumer
An appropriate strategy to optimize for time and cost in the ordering process is
efficient replacement
For carrying out C2C e-Commerce the following infrastructure is essential
electronic Data Interchange standards
One critical success factor in conducting E-marketing is to create a(n) __________________ website.
Marketing
In computing business transaction network, a firewall is a
security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
For an existing organization, typical stages of e-commerce development include the following except
nternational conferences, collaboration, registrations, town hall meetings
Problem of penetration of e-business in Nigeria is due to the following except
Religious purpose
Which of the following is a feature of the micro-environment of an organisation?
Distribution channel factors.
for carrying out B2C e-Commerce the following infrastructure is essential
World Wide Web
Typically, an ATM is used for
withdrawing cash
A computer is a personal computer (PC) in a form intended for regular use at a single location, as
opposed to a mobile laptop or portable computer
Desktop
2020_1 First semester use only
case is used to covert from upper case to lower case and vice versa.
Toggle
If you need to change the typeface of a document in Microsoft office, which menu will you choose?
Format
Open software are created by generous programmers and released into the public domain for public use.
Source
are smaller than laptops but larger than handheld computers and UMPCs.
Subnotebooks
The term " " computer was coined at the time when most computers were cabinet sized like Mainframe
Computers
Mini
Desktop publishing (dtp) uses both word processing and to produce publications and
presentations
Graphics
Bar is at the top of the window and it displays the name of the application.
Title
A is made up of 8 bits.
Byte
2020_1 First semester use only
A is a collection of information stored in a way that makes it easy to retrieve, modify and search.
Database
Work done using computers, rather than through direct physical contact with the object of task, is often called
computer- work.
Mediated
Computer system and revolution are changing every area of our lives.
Technology
in a job is the degree of discretion individuals or groups have in planning, regulating, and controlling
their own work.
Autonomy
The tool used to move the entire page on the screen is called••••••• tool.
Hand
is the term used for the most powerful computer available at any time
Supercomputer
Clipart
are computers that are intended to serve one user and may contain special hardware enhancements
not found on a personal computer.
Workstations
Portable data entry terminals are devices that are used to record or capture data away from the
mainframe computer
Handheld
computers are general purpose CPUs that are a part of a machine or device
Embedded
A computer is focused on performing one task involving intense numerical calculations such as weather
forecasting and solving scientific problems.
Super
The computer power has been on the increase while has been on the decline
Size
2020_1 First semester use only
Other hardware parts of the computer system aside the central processing unit (CPU) are called
components or devices.
Peripheral
is the memory that the computer uses to temporarily store the information as it is being processed.
Random Access Memory
Which of the following is not a type of the interface provided by operating systems? Instruction line
interface
Which of the following statements is not true about Find and Replace in Excel? You can search
by rows or columns or sheets
Which of the following is a function of the Start Button or Apple menu? opens
documents
The Desktop offers many features that make using your computer easier. Which of the following is not part
of the features?
None of the options
A bookmark is an item or location in document that you identify as a name for future reference. Which of the
following task is accomplished by using bookmarks?
To quickly jump to specific location in document
A worksheet range is .
A group of cells
When working with numbers in a spreadsheet, we refer to the cell addresses when creating
.
mathematical formulas
Which of the following is not one of the main bitmap graphics format used on the Internet
.tif
To drag a selected range of data to another worksheet in the same workbook, use the ___
Ctrl key
Which of the following is not a method of opening documents and programs in Windows?
Use the Find command in the Sherlock program
2020_1 First semester use only
Which of the following graphics can be created and modified in a paint program?
Bitmap graphics
Which of the following graphics cannot be created and modified in a draw program? Bitmapped
graphics
is multimedia format that is attempting to create a standardization among the various formats available
.mpg
was heavily marketed by Microsoft as a multi-user alternative to its single user MS-DOS operating system
XENIX
's underlying operating system kernel was designed by the same team as Digital Equipment
Corporation's VMS.
Windows NT
Which of the following Unix variants is designed to run on multiple types of hardware?
Solaris
The reason why organizations are switching from traditional to e-business transaction is due to
Decreasing costs of transactions
A(n) site provide the hardware and software that enable Internet communication and
commerce
In Electronic cash payment
a customer buys several electronic coins which are digitally signed by coin issuing bank
A digital certificate
E-bay is a good example to define
C2C
__ is a software that locates web pages based on matching keywords
Search engine
Which products are people most likely to be more uncomfortable buying on the Internet?
Furniture
he two main types of Internet based B2B commerce are______
EDI and private industrial networks
In B2B e-Commerce, the following are correct except
It is essential to use internet
For carrying out B2B e-Commerce the following infrastructure is NOT really essential:
World Wide Web
A person to person payment system
Sends money using the web to individuals who are not setup to accept credit card payments
While maintaining an e-business web site what element is hard to maintain
Customer Relationship Management.
Ahashing function for digital signature
two different messages should not give the same hashed message
e-business requires accessibility the following except
People
The example of E-service which enhances original service is
Education
Security in e-Commerce involves the following except
Prevention of natural disasters that can lead to data loss
One of the major problems for e-business growth is
Lack of proper infrastructure
Electronic Data Interchange is necessary in
B2B e-Commerce
The following are the problems of e-Commerce implementation in Nigeria except
No legislation against Cybercrimes
2020_1 First semester use only
The computer power has been on the increase while size has been on the
Decline
Micro computers include
SFF
Supercomputers are more suited to
Intense numerical calculations
Embedded computers are found today in devices such as
Electric toothbrushes
Embedded computers only run programs stored in
ROM
Handheld devices used to capture data away from the mainframe that they are linked to include:
Graphics tablet
Computers dedicated to the task of storing and retrieving large amounts of data are called__
Servers
The earliest version of the mainframe refer to computers compatible with__
IBM system/360
Mainframes are often colloquially referred to as
Big Iron
Mainframe often refers to computers that utilize the architecture of the__
1960s
The computer power has been on the increase while size has been on the__
Decline
Micro computers include__
SFF
Supercomputers are more suited to__
Intense numerical calculations
Embedded computers are found today in devices such as__
Electric toothbrushes
Embedded computers only run programs stored in__
ROM
Handheld devices used to capture data away from the mainframe that they are linked to include:
Graphics tablet
Computers dedicated to the task of storing and retrieving large amounts of data are called
Servers
Supercomputers and mainframes both offer
Parallel processing
2020_1 First semester use only
A is a data communications network that covers a relatively broad geographic area (i.e. one city to
another and one country to another country) and that often uses transmission facilities provided by common
carriers, such as telephone companies
Wide area network(wan)
a is a model for supporting mobile communications across an arbitrary number of wireless LANs,
satellite coverage areas
global area network(global area network)
An is a set of interconnected networks, using the Internet Protocol and uses IP-based tools such as web
browsers and ftp tools, that is under the control of a single administrative entity
Intranet
An is a network or internetwork that is limited in scope to a single organization or entity but which also
has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations
or entities
Extranet
A ) is a piece of computer hardware designed to allow computers to communicate over a computer network
network card, network adapter or NIC (network interface card
A is an electronic device that receives a signal and retransmits it at a higher level or higher power, or
onto the other side of an obstruction, so that the signal can cover longer distances without degradation.
Repeater
A contains multiple ports
Hub
___ connects multiple network segments at the data link layer (layer 2) of the OSI model
network bridge
Bridges can be of main types
Three
___ Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting
link is slower than the end networks, largely have been replaced by routers Remote bridges
___Can be used to join LANs or connect remote stations to LANs.
Wireless bridges
___ is a device that performs switching. Specifically, it forwards and filters OSI layer 2 datagrams (chunk of data
communication) between ports (connected cables) based on the Mac- Addresses in the packets.
Switch
____are networking devices that forward data packets between networks using headers and forwarding
tables to determine the best path to forward the packets
Routers
2020_1 First semester use only
Arpanet means___
Advanced Research Project Agency Network
ICANN means____
Internet Corporation for Assigned Names and Numbers
____ is the authority that coordinates the assignment of unique identifiers on the Internet, including domain
names, Internet Protocol (IP) addresses, and protocol port and parameter numbers.
ICANN(Internet Corporation for Assigned Names and Numbers)
___is a huge set of interlinked documents, images and other resources, linked by hyperlinks and URLs
World Wide Web
VoIP stands for______
Voice over IP
____ is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or
vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software,
hardware, or something electronic
An exploit
____is the act of surreptitiously listening to a private conversation.
Eavesdropping
DDoS means___
Distributed denial of service
An attack is an attack launched by a third party computer.
Indirect
___ is a method of bypassing normal authentication, securing remote access to a computer, obtaining
access to plaintext, and so on, while attempting to remain undetected.
Backdoor
A state of computer "security" is the conceptual ideal, attained by the use of the ______________ processes
Three(Prevention, Detection and Response)
___ are designed to detect network attacks in progress and assist in post-attack forensics, while
audit trails and logs serve a similar function for individual systems.
Intrusion Detection Systems (IDS's)
__ defined by the assessed security requirements of an individual system and may cover the
range from simple upgrade of protections to notification of legal authorities, Response
A is a program designed by a computer programmer (malicious hacker) to do a certain unwanted
function.
Virus
___ type of virus infects the boot or master section of any disks that it comes in contact with
boot sector viruses
2020_1 First semester use only
___ infects other programs when the infected program is run or executed.
program virus
___ problems can occur when improper office equipment is used.
Musculoskeletal
___can be caused by staring at a fix object for extended periods of time (like a computer).
Eye strain
____is an integral part of the new technological workplace.
Ventilation
____ is the degree of discretion individuals or groups have in planning, regulating, and controlling their own
work. Power is the ability to get others to do things.
Autonomy
The range of different types of things people do at work is called___
task variety
____ is the size of the task relative to the overall purpose of the organization. Installing a single door lock on
an automobile assembly line is a task with minimal scope.
Task scope
Work done using computers, rather than through direct physical contact with the object of task, is often called
___
computer-mediated work
____is a related issue because computer-mediated work doesn’t involve direct physical contact with the
object of the task.
abstractness of work
____is an umbrella term that includes all technologies for the manipulation and communication of information
Ict
Limitations of PC-Internet based ICT are__
Bandwidth, Language, Text/Voice Disruptive Software, Participation, Security
A _______________ computer is a personal computer (PC) in a form intended for regular use at a single location, as
opposed to a mobile laptop or portable computer.
Desktop
______________ generally focus on problems which are limited by calculation speed while mainframes focus on
problems which are limited by input/output and reliability ("throughput computing") and on solving multiple business
problems concurrently (mixed workload).
Supercomputers
________________ systems are designed to operate a single machine or a single function of that machine and are
typically required to operate continuously without being reset or rebooted.
Embedded
The computer's processor, memory, monitor, keyboard, mouse, disk drive, printer are all examples of ___________
devices.
Hardware
________________ is a general term used to describe a collection of computer programs, procedures and
documentation that perform some tasks on a computer system.
Software
_______________ System is the software component of a computer system that is responsible for the management
and coordination of activities and the sharing of the resources of the computer.
Operating
The initial code executing on the computer is usually loaded from firmware, which is stored in read only memory
(ROM). This is sometimes called the ________ or boot ROM.
BIOS
____________ are central to operating systems as they allow the operating system to deal with the unexpected
activities of running programs and the world outside the computer.
Interrupts
______________ refers to the running of multiple independent computer programs on the same computer, giving the
appearance that it is performing the tasks at the same time.
Multitasking
A device _______________ is a specific type of computer software developed to allow interaction with hardware
devices.
Driver
Ctrl-_______ is used to copy selected text of the page and into a clipboard in most word processing programmes.
(single letter answer)
C
___________ programs or software consists of programs that perform specific tasks such as writing a letter, tracking
payroll information, producing a chart and so on.
Application
Ctrl-_______ is used to cut selected text of the page and into a clipboard in most word processing programmes. (single
letter answer)
X
Ctrl-_______ is used to paste text held in the clipboard into the document at the cursor in most word processing
programmes. (single letter answer)
V
The shortcut key to undo an unwanted action in most Windows programmes is Ctrl-__
Z
______________ is a collection of information stored in a way that makes it easy to retrieve, modify and search.
Database
In a spreadsheet program, where the ‘rows’ and ‘columns’ intersect is called a ________.
Cell
Formulas
__________ graphics are images that are mapped to the tiny dots of the monitor or screen called pixels.
Bitmapped
________________ graphics use objects created from mathematical formulas to represent things like lines, curves,
fills, line thickness, etc., to create the images.
Vector
__________ is the process of requesting from a database attribute information in various perspectives and
combinations of factors.
Querying
In the software development life cycle (SDLC), systems ___________ is the construction or the assembly of the
problem solution culminating in new environment based on the solution.
Implementation
An _______________ is a set of interconnected networks, using the Internet Protocol and uses IP-based tools such as
web browsers and ftp tools, that is under the control of a single administrative entity.
Intranet
An ___________ is a network or internetwork that is limited in scope to a single organization or entity but which also
has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or
entities
Extranet
A specific internetwork, consisting of a worldwide interconnection of governmental, academic, public, and private
networks based upon the Advanced Research Project Agency Network (ARPANET) developed by ARPA of the U.S.
Department of Defense – also home to the World Wide Web (WWW) and referred to as the ________________.
Internet
A ________ is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto
the other side of an obstruction, so that the signal can cover longer distances without degradation.
Repeater
A network ____________connects multiple network segments at the data link layer (layer 2) of the OSI model.
Bridge
A _____________ is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between
ports (connected cables) based on the MAC-Addresses in the packets.
Switch
_______________ are networking devices that forward data packets between networks using headers and forwarding
tables to determine the best path to forward the packets.
Routers
The network ________ determines how computers become part of the network and how they are recognized.
Protocol
In a computer system (or cryptosystem or algorithm), a __________ is a method of bypassing normal authentication,
securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain
undetected.
Backdoor
Eavesdropping
An _____________ is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug,
glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software,
hardware, or something electronic (usually computerized).
Exploit
________________ computers were physically large and powerful systems capable of supporting hundreds of users.
They are used mainly by large organizations for critical applications, typically bulk data processing such as census,
industry and consumer statistics, ERP, and financial transaction processing.
Mainframe
The ________________, is a board with series of electronic path ways and connections allowing the CPU to
communicate with the other components of the computer.
Motherboard
Computers are connected to printers by cables using plugs and sockets. The sockets are usually called _____________
or ports
Interfaces
There are two types of cable which may be used to connect a printer to a computer. One is called a serial cable and
the other a ______________ cable.
Parallel
Operating systems, device drivers, diagnostic tools, servers, windowing systems, utilities are all examples of
_______________ software.
System
Instructions may be performed sequentially, conditionally, or iteratively. ___________ instructions are those
operations that are performed one after another.
Sequential
Instructions may be performed sequentially, conditionally, or iteratively. ___________ instructions are performed
such that different sets of instructions execute depending on the value(s) of some data.
Conditional
Instructions may be performed sequentially, conditionally, or iteratively. ______________ instructions are performed
repetitively and may depend on some data value.
Terative
In Windows operating system, you hold down the __________key while deleting a file to bypass the Recycle Bin and
permanently delete files.
Shift
Applications access operating system services through application programming interfaces (APIs) or system
_____________.
2020_1 First semester use only
Calls
File systems may provide __________________, which provides safe recovery in the event of a system crash
Journaling
_______________ has opened up many opportunities, from finding out information, conducting communications
globally, e.g. through e- mail, voice mail, skype, e-commerce or generally just having fun through on line chats or
instant messaging
Internet
Which of the following options is NOT an input device for a typical computer system?
Printer
Which of the following options would you upgrade if you want to improve the performance of your PC?
Processor
Which keyboard key is commonly used to access the menu in combination with the arrow keys?
Alt key
The interconnection of computers for the purpose of information and resource sharing is called?
Networking
You are tasked to recommend a computer system to perform simple computations involving huge amounts of
external data for a large business corporation. Which of the following options would you choose?
Mainframe
Which of the following options is NOT typically a data portable data entry terminal
Keyboard terminal
The memory that the computer uses to temporarily store the information as it is being processed is called?
Random Access Memory
The following options are all examples of commercial database programs EXCEPT:
2020_1 First semester use only
IBM Impress
The following options are all examples of commercial spreadsheet programs EXCEPT:
IBM Impress
The following options are all examples of programs used to create graphics EXCEPT:
Corel Quattro Pro
The following options are examples of common desktop publishing programs EXCEPT:
Lotus 123
DBMSs are categorized according to their data structures or types. Which of the following options is not one of the
four most common categories according to the data model?
Distributed
Which of the following is NOT a benefit of the database management system (DBMS)?
Increased data redundancy and inconsistency
Features commonly offered by database management systems include all the following options EXCEPT:
Planning/Feasibility Definition
Typical phases in the software development life cycle (SDLC) include all the following EXCEPT:
Purchasing
The first step in the software development life cycle (SDLC) is normally _______?
Planning
The outcomes of the first step in the software development life cycle (SDLC) include all the following options EXCEPT:
Acquisition of software
The process of systems testing takes place at several levels. Which of the following options is NOT an example of these
level?
Testing of the computer operators
The following options are all classifications of computer networks according to their scale EXCEPT:
Wireless Network
The following options are all classifications of computer networks according to their connection method EXCEPT:
Client-server
The following options are all classifications of computer networks according to their functional relationship EXCEPT:
Local area networking
The following options are all classifications of computer networks according to the network topology EXCEPT:
Active network
There are at least three variants of internetwork, depending on who administers and who participates in them. Which
of the following options is NOT one of them?
Burnet
Which of the following component provide physical access to a networking medium and often provides a low-level
addressing system via MAC address?
2020_1 First semester use only
The following are all typical examples of resources that can be shared on a network EXCEPT:
Bios
The various types of "attacks" that can be made against computer systems (threats) can typically be classified into
seven categories. Which of the following options is NOT one of them
Hardware failure
A state of computer "security" is the conceptual ideal, attained by the use of the three processes. Which of the
following options is NOT one of these processes?
Exploits
Which prevention system works by shielding access to internal network services, and block certain kinds of attacks
through packet filtering?
Firewalls
In Windows operating system, which of the following options is NOT a method for opening documents and programs?
Use the Sherlock program
Which key is typically used to select multiple files sequentially in Windows operating system?
Shift
Which key is typically used to select multiple files non-sequentially in Windows operating system?
Ctrl
Data stored on disks using files is structured in specific ways for all the following reasons EXCEPT:
Reduce drive's available space
Which of the following options is NOT a typical file system supported in modern operating systems?
PLAN 9
Which of these options is NOT a system development life cycle (SDLC) model?
Rainfall
Which of the following options is the output of the system design stage in the software development life cycle (SDLC)?
Technical specification
In the software development life cycle (SDLC), the system implementation phases includes all the following EXCEPT:
Estimates of costs, benefits and timescales
In the software development life cycle (SDLC), the ‘full system’ test typically includes testing of all the following
2020_1 First semester use only
EXCEPT:
Data preparation and installation
Which of the following options is NOT a factor which causes stress at work?
Respect for personal rights
A back up store from which any random data can be accessed without reading all existing data is called
Direct Access
Devices that accepts data from outside computer and transfer into CPU are called
Input Devices
A typical __________ program creates some remote objects, makes references to these objects accessible and waits
for clients to invoke methods on these objects
Sever
Network topology in which you connect each node to network along a single piece of network cable is called
Bus Topology
Which of the following is not a named phase in the System Development Life Cycle
Assessment
User - Centered
A back up store from which any random data can be accessed without reading all existing data is called
Direct Access
Devices that accepts data from outside computer and transfer into CPU are called
Input Devices
A typical __________ program creates some remote objects, makes references to these objects accessible and waits
for clients to invoke methods on these objects
Sever
Network topology in which you connect each node to network along a single piece of network cable is called
Bus Topology
2020_1 First semester use only
Which of the following is not a named phase in the System Development Life Cycle
Assessment
The SUM, AVERAGE, MAX, MIN and COUNT are _______ Functions
Aggregate
There are no two distinct tuples that have the same values for the attributes in this set is called _______
super Key
There are basically _______kinds of keys which are sets of attributes of a relation functionally depending on one or
more attributes of the relation
FIVE
_______is a column
Foreign key
Sort/report generators
require more disk space than index/report generators
In SQL, which command is used to make permanent changes made by statements issue since the beginning of a
transaction?
commit
What is the language used by most of the DBMSs for helping their users to access data?
Query language
After you _____ a record, many data management the environments require you to issue a command to save the
changes you made
Update
DCL is used to
Give or remove access rights to both a database and the structures within
With SQL, how do you select all the columns from a table named "Persons"?
SELECT FROM Persons
SQL comprises__
DML and DDL
What-if analysis
_________ Technologically implemented medium for recording, storing, and disseminating information
information system
_________are distinct from regular information systems in that they are used to analyze other information systems
applied in operational activities in the organization
MIS
A typical server program creates some remote objects, makes references to these objects accessible and waits for
____________ to invoke methods on these objects
Clients
Networking refers to the interconnection of computers for the purpose of information and resource _____________
Sharing
The computer's processor, memory, monitor, keyboard, mouse, disk drive, printer are all examples of ------------
devices.
Hardware
________________ is a general term used to describe a collection of computer programs, procedures and
documentation that perform some tasks on a computer system.
Software
_______________ System is the software component of a computer system that is responsible for the management
and coordination of activities and the sharing of the resources of the computer.
Operating
______________ refers to the running of multiple independent computer programs on the same computer, giving the
appearance that it is performing the tasks at the same time.
Multitasking
A device _______________ is a specific type of computer software developed to allow interaction with hardware
devices.
Driver
2020_1 First semester use only
The ___ Access Memory is the sort of memory that the computer uses to temporarily store the information as it is
being processed.
Random
___________ programs or software consists of programs that perform specific tasks such as writing a letter, tracking
payroll information, producing a chart and so on.
Cutting
The is the shortcut command for ____ selected text of a page in most word processing programs
Application
_______ is used to text held in the clipboard into a document at the cursor in most word processing programs
V
______________ is a collection of information stored in a way that makes it easy to retrieve, modify and search.
Database
__________ graphics are images that are mapped to the tiny dots of the monitor or screen called pixels.
Bitmapped
________________ graphics use objects created from mathematical formulas to represent things like lines, curves,
fills, line thickness, etc., to create the images.
Vector
__________ is the process of requesting from a database attribute information in various perspectives and
combinations of factors from a database.
Querying
To protect a computer from virus, you should install __________on your computer
Anti-Virus
A ________ is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto
the other side of an obstruction, so that the signal can cover longer distances without degradation.
Repeater
2020_1 First semester use only
A network bridge connects multiple network segments at the __________ layer of the Open System Interconnected
(OSI) model.
data link
A _____________ is a device that forwards and filters OSI layer 2 datagrams between ports based on the MAC-
Addresses in the packets.
Switch
_______________ are networking devices that forward data packets between networks using headers and forwarding
tables to determine the best path to forward the packets.
Routers
The network ________ determines how computers become part of the network and how they are recognised.
Protocol
The altering of data so that it is not usable unless the changes are undone is called ____________
Encryption
An _____________ is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug,
glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software,
hardware, or something electronic
Exploit
________________ computers were physically large and powerful systems capable of supporting hundreds of users.
They are used mainly by large organizations for critical applications, typically bulk data processing such as census,
industry and consumer statistics, ERP, and financial transaction processing.
Mainframe
The ________________, is a board with series of electronic path ways and connections allowing the CPU to
communicate with the other components of the computer.
Motherboard
There are ____ types of cable which may be used to connect a printer to a computer.
Two
Operating systems, device drivers, diagnostic tools, servers, windowing systems, utilities are all examples of -------
software.
System
___________ instructions are those operations that are performed one after another.
Sequential
2020_1 First semester use only
___________ instructions are performed such that different sets of instructions execute depending on the value(s) of
some data.
Conditional
______________ instructions are performed repetitively and may depend on some data value.
Iterative
In Windows operating system, you hold down the __________key while deleting a file to bypass the Recycle Bin and
permanently delete files.
Shift
Applications access operating system services through application programming interfaces (APIs) or system
_____________.
Calls
Normally, planning is the ________ step in the software development life cycle.
First
Specialized program that allows user to utilize specific application is classified as ____________
Relative programs
The interconnection of computers for the purpose of information and resource sharing is called _____________
Telecommunicating
Which of the following options is NOT a typical ;portable; data entry terminal; ?
Barcode readers
The memory that the computer uses to temporarily store the information as it is being processed is called
_______________
Random Access Memory
The following options are all examples of commercial database programs EXCEPT ---------______
Corel Paradox
The following options are all examples of commercial spreadsheet programs EXCEPT _________
Lotus 123
Which of the following options would you upgrade if you want to improve the performance of your PC?
Printer
The following options are examples of common desktop publishing programs EXCEPT ____________
Microsoft Publisher
DBMSs are categorized according to their data structures or types. Which of the following options is not one of the
four most common categories according to the data model?
Hierarchical
Which of the following is NOT a benefit of the database management system (DBMS)?
Application-data independence
Features commonly offered by database management systems include all the following options EXCEPT
_________________
Backup and replication
Typical phases in the software development life cycle (SDLC) include all the following EXCEPT __________________
Analysis Design
The first step in the software development life cycle (SDLC) is normally _______
Analysis Design
The outcomes of the first step in the software development life cycle (SDLC) include all the following options EXCEPT
______________
Term of Reference (TOR)
The following options are all classifications of computer networks according to their scale EXCEPT _______________
Personal Area Network
The following options are all classifications of computer networks according to their connection method EXCEPT
___________
Wireless LAN
The following options are all classifications of computer networks according to their functional relationship EXCEPT ----
--------
Active networking
The following options are all classifications of computer networks according to the network topology EXCEPT
2020_1 First semester use only
________________
Active network
There are at least three variants of internetwork, depending on who administers and who participates in them. Which
of the following options is NOT one of them?
Burnet
Which of the following components provide physical access to a networking medium and often provides a low-level
addressing system via MAC address?
Network Interface Cards
The following are all typical examples of resources that can be shared on a network EXCEPT _______________
Peripheral Devices
The various types of "attacks" that can be made against computer systems (threats) can typically be classified into
seven categories. Which of the following options is NOT one of them
Hardware failure
A state of computer "security" is the conceptual ideal, attained by the use of three processes. Which of the following
options is NOT one of these processes?
Prevention
Which network attack prevention system works by shielding access to internal network services, and block certain
kinds of attacks through packet filtering?
User account access controls
In Windows operating system, which of the following options is NOT a method for opening documents and programs?
Double click on an icon in a Folder
Which key is typically used to select multiple files <strong>sequentially</strong> in Windows operating
system?
Ctrl
Which key is typically used to select multiple files in Windows operating system?
Ctrl
Data stored on disks using files is structured in specific ways for all the following reasons EXCEPT _______________
Easier indexing
Which of the following is not a serious limitation for PC-Internet based ICT
Language
Which of these options is NOT a system development life cycle (SDLC) model?
Waterfall
In the software development life cycle (SDLC), the system implementation phases includes all the following EXCEPT
______
Acquisition of software
A virus can be introduced into a computer system, through the infected ____________
file.
Which of the following is not a named phase in the System Development Life Cycle
Maintenance