Cit202 Calculus Educational Consult 2020 - 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

2020_1 First semester use only

calculus educational consults


MOTTO: BRINGING KNOWLEDGE TO YOUR DOORSTEP
TEL: 07037507487, 09094642770,07037302585
MAINLAND LECTURE CENTER
CIT202:APPLICATIONS OF COMPUTER IN BUSINESS

___ were physically large and powerful systems capable of supporting hundreds of users
Mainframe computers
The term was introduced with the advent of single chip large scale integrated circuit computer
processors.
Microcomputer
__ is a computer with a microprocessor as its central processing unit
Microcomputer
__ is a personal computer (PC) in a form intended for regular use at a single location, as opposed to
a mobile laptop or portable computer.
desktop computer
PDA are also called __
Personal Digital Assistant
__ is a handheld computer, also known as small or palmtop computers.
Personal Digital Assistant
A subnotebook is also called___
ultraportable laptop or minilaptop computer
___ _ is a small and lightweight portable computer, with most of the features of a standard laptop
computer but smaller.
Subnotebook
__ Subnotebooks are smaller than laptops but larger than handheld computers and UMPCs
Subnotebook
Subnotebooks were seen as niche computing products and have rarely sold in large numbers until the 2007
introduction of the Asus Eee PC and the OLPC XO-1, known as__
ultra low-cost PC (ULPC or ULCPC)
___ _ _ is a small mobile computer, typically weighing 3 to 12 pounds (1.4 to 5.4 kg), although older
laptops may weigh more.
Laptop
___ is a largely obsolete term for a class of multi-user computers that lies in the middle range of the
computing spectrum, in between the largest multi-user systems (mainframe computers) and the smallest
single-user systems (microcomputers or personal computers)
Minicomputer
2020_1 First semester use only

__ was created to distinguish the traditional, large, institutional computer intended to service
multiple users from the smaller, single user machines.
Mainframe computer
A is so fast that it is measured in millions of tasks per milliseconds (MTM)
mainframe speed
__ are computers used mainly by large organizations for critical applications
Mainframe
__ usually refers to a computer that is dedicated to the task of storing and retrieving large amounts
of data
Server
a large computer dedicated to a database may be called___
database server
___ manage a large collection of computer files. "Web servers" process web pages and web applications
File servers
__ are computers that are intended to serve one user and may contain special hardware
enhancements not found on a personal computer
Workstations
__ run operating systems that are normally associated with mainframe computers, usually
one of the variants of the UNIX operating system
Workstations
___ are handheld devices that are used to record or capture data away from the mainframe computer that
they are linked to
Portable data entry terminals (more commonly known as PDET's)
__ are general purpose CPUs that are a part of a machine or device
Embedded computers
__ computer runs a program that is stored in read only memory (ROM) and is only intended to operate a
specific machine or device
Embedded
__ controls the computer and makes it do useful work
Software
__ refers to the physical components that make up a computer system.
Hardware
__ or thumb drives range from 512 Mb to 8 Gb in capacity.
Flash drives
The disadvantage of tape as a storage medium, is that tape is a ___
sequential storage medium
__are the computer hardware that accept data and instructions from a user
Input devices
2020_1 First semester use only

The ___is used to type information into the computer or input information.
Keyboard
____designed keyboards are designed to make typing easier
Ergonomically
The __is used as a pointing device and to select options from menus.
Mouse
___ is used for the same purposes as a mouse and is popular on laptop computers.
tracker ball
___can be used to point at a monitor, serving a similar function as a mouse.
Light Pen
____can scan a document and recognise characters
OCR(optical character recognition) device
___ is similar to OCR but this time the characters are not scanned optically
Magnetic Ink Character Recognition (MICR)
__ is used on cheques by banks, to encode bank account numbers.
Magnetic Ink Character Recognition (MICR)
__ are very popular input devices in supermarkets and stores.
Barcode Scanners
_____ are devices which scan an image (document, photograph) and produce a digital version
of the image i.e. the image is stored as a sequence of binary numbers.
Image Scanners
____is used to describe the application of this technique and it is becoming an important application in
insurance and banking organisations.
document image processing (DIP)
__ is perhaps the most exciting form of computer input.
Voice Input
__ return processed data that is information back to theuser.
Output devices
monitor shows information on the screen when you type. This is called ___
outputting information
Most desktop computers use a monitor with a __
cathode tube
most notebooks use a (LCD) monitor
liquid crystal display
___ takes the information on your screen and transfers it to paper or a hard copy
Printer
There are ________ types of printer
Three(dot matrix, inkjet, and laser)
2020_1 First semester use only

____is used to translate information transferred through telephone lines or cable


Modem
___ _ term stands for modulate and demodulate which changes the signal from digital, which
computers use, to analog, which telephones useand then back again.
Modem
Modems are measured by the speed that the information is transferred. The measuring tool is called the __
baud rate
The amount of information that can travel through a line is limited. This limit is called__
Bandwidth
____allow you to transfer pictures and photographs to your computer
Scanners
___allow you to take digital photographs. The images are stored on a memory chip or disk that can be transferred
to your computer.
Digital cameras
___ _allow computers to produce sound like music and voice
Sound Cards
___allow computers to produce colour (with a colour monitor of course).
Colour Cards
___ allow computers to display video and animation
Video Cards
___with a digital video camera allows computer users to produce live video
video card
___ allow computers to connect together to communicate with each other.
Network cards
__ is a board with series of electronic path ways and connections allowing the CPU to
communicate with the other components of the computer.
Motherboard
Computers are connected to printers by cables using plugs and sockets. The sockets are usually called ___
interfaces or ports.
The cable used to connect the printer to the computer is often called a __
line.
____refers to parts of the computer which do not have a material form, such as programs, data, protocols
Software
__ indicate that it falls into an uncertain area somewhere between hardware and
software.
Firmware
2020_1 First semester use only

____ is a general term used to describe a collection of computer programs, procedures and documentation that
perform some tasks on a computer system.
Software
____consists of groups of binary values signifying processor instructions which change the state of the computer
from its preceding state
machinelanguage
____is an ordered sequence of instructions for changing the state of the computer hardware in a particular
sequence
Software
___ are compiled or interpreted into machine language object code
High-level languages
____usually provides tools to assist a programmer in writing computer programs, and software using different
programming languages in a more convenient way.
Programming software
___end users to accomplish one or more specific (non-computer related) tasks
Application software allows
___ are software developed by individuals and small companies that cannot afford to market their software
world wide or by companies that want to release demonstration versions of their commercial products.
Shareware
____includes the firmware, device drivers, an operating system, and typically a graphical user interface
Platform software
____are the most common way of interacting or controlling your software
Menus
___displays a list of the programs that are installed through Windows and available to use
Program or Dock
___displays system components, such as printers, control panel and taskbar.
Settings
__ is the software component of a computer system that is responsible for the management
and coordination of activities and the sharing of the resources of the computer. Operating system
__ acts as a host for application programs that arerun on the machine
operating system
____first appeared on the PDP-7 and later the PDP-11
UNIX
__is a line of proprietary, graphical operating systems developed, marketed, and sold by Apple Inc
Mac OS X
2020_1 First semester use only

A ___is a multitasking operating system intended for applications with fixed deadlines (real-time computing)
real-time operating system (RTOS)
____refers to the running of multiple independent computer programs on the same computer, giving the
appearance that it is performing the tasks at the same time
Multitasking

___is a specific type of computer software developed to allow interaction with hardware devices
device driver
___are commonly found on floppy discs,
FAT file systems
The functions of operating system are___
Providing User Interface, Managing the Hardware, Managing the File System, Supporting Programs

___is a collection of technologies which are designed to allow the computer to perform certain functions
operating system
___allow you to type your text in Bold, Italics or Underline
Word processors
___is a collection of information stored in a way that makes it easy to retrieve, modify and search
Database
There are two types of computer __________and _______
graphics,bitmapped and vector/structured
____are images that are mapped to the monitor or screen
Bitmapped graphics
The screen is made up of tiny dots called__
Pixels
___ use objects created from mathematical formulas to represent things like lines, curves, fills, line thickness,
etc., to create the image
Vector graphics
The three main bitmapped format graphics used on the Internet are __
.gif, .jpeg (.jpg) and .png
____is multimedia format that is attempting to create a standardization among the various formats
available.
Moving Picture Experts Group (MPEG) or .mpg
A is a series of separate images or frames that display one after the other to give the
impression of movement.
GIF animation
2020_1 First semester use only

__ uses both word processing and graphics to produce publications and presentations.
Desktop publishing (dtp)
A __is computer software designed for the purpose of managing databases based on a variety of data models.
database management system (DBMS)
__are complex set of software programs that control the organization, storage, management, and retrieval of data in
a database
DBMSs
___is the process of requesting attribute information from various perspectives and combinations of factors
Querying
SDLC is the
Software Development Life Cycle
B2C stands for:
Business to Consumer
An appropriate strategy to optimize for time and cost in the ordering process is
efficient replacement
For carrying out C2C e-Commerce the following infrastructure is essential
electronic Data Interchange standards
One critical success factor in conducting E-marketing is to create a(n) __________________ website.
Marketing
In computing business transaction network, a firewall is a
security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

For an existing organization, typical stages of e-commerce development include the following except
nternational conferences, collaboration, registrations, town hall meetings
Problem of penetration of e-business in Nigeria is due to the following except
Religious purpose
Which of the following is a feature of the micro-environment of an organisation?
Distribution channel factors.
for carrying out B2C e-Commerce the following infrastructure is essential
World Wide Web
Typically, an ATM is used for
withdrawing cash

The horizontal bar at the bottom of the screen is called bar


Task

A computer is a personal computer (PC) in a form intended for regular use at a single location, as
opposed to a mobile laptop or portable computer
Desktop
2020_1 First semester use only

case is used to covert from upper case to lower case and vice versa.
Toggle

A character that is raised and smaller above the baseline is known as


Superscript

If you need to change the typeface of a document in Microsoft office, which menu will you choose?
Format

A digital computer did not score over an analog computer in terms of


Accuracy

In a typical 32-bit computer, number system is usually followed


Binary

Open software are created by generous programmers and released into the public domain for public use.
Source

are smaller than laptops but larger than handheld computers and UMPCs.
Subnotebooks

computer systems divide software systems into major classes.


Three

Special effects used to introduce slides in a presentation are called


Transitions

The term " " computer was coined at the time when most computers were cabinet sized like Mainframe
Computers
Mini

Desktop publishing (dtp) uses both word processing and to produce publications and
presentations
Graphics

A is used to translate information transferred through telephone lines or cable.


Modem

Bar is at the top of the window and it displays the name of the application.
Title

The tool is used to select any kind of object on the page.


Pointer

A is made up of 8 bits.
Byte
2020_1 First semester use only

The tool is used to change the magnification of the page view.


Zoom

A is a collection of information stored in a way that makes it easy to retrieve, modify and search.
Database

Work done using computers, rather than through direct physical contact with the object of task, is often called
computer- work.
Mediated

____moves the text inward from right and left margins.


Indent

Cut option is present in_____menu


Edit

A is a table consisting of rows and columns.


Worksheet

Computer system and revolution are changing every area of our lives.
Technology

in a job is the degree of discretion individuals or groups have in planning, regulating, and controlling
their own work.
Autonomy

_____tool is used to reduce or cut image area in Microsoft Word.


Crop

The tool used to move the entire page on the screen is called••••••• tool.
Hand

Microsoft PowerPoint is a program.


Presentation

is the term used for the most powerful computer available at any time
Supercomputer

An excel workbook is a collection of and charts


Worksheets

computers are the most common type of computers in existence today,


Micro

In Word, the mailing list is known as the source


Data
2020_1 First semester use only

is graphics solution for Word Processors.

Clipart

A Personal Digital Assistant (PDA) is a handheld computer, also known as computers


Small

A mainframe speed is so fast that it is measured in millions of tasks per .


Milliseconds

computers are often colloquially referred to as Big Iron


Mainframe

are computers that are intended to serve one user and may contain special hardware enhancements
not found on a personal computer.
Workstations

Portable data entry terminals are devices that are used to record or capture data away from the
mainframe computer
Handheld

computers are general purpose CPUs that are a part of a machine or device
Embedded

The act of retrieving existing data from memory is called .


Read-out

A paper printout of a document is known as output


Hardcopy

The computer code for the interchange of information between terminals is


ASCII

Embedded systems are typically required to operate continuously without being


Reset

A computer is focused on performing one task involving intense numerical calculations such as weather
forecasting and solving scientific problems.
Super

Data are organized in rows and in a spreadsheet.


Columns

The default page setup orientation for slides in PowerPoint is


Landscape

The computer power has been on the increase while has been on the decline
Size
2020_1 First semester use only

is another term for computer program


Software

Other hardware parts of the computer system aside the central processing unit (CPU) are called
components or devices.
Peripheral

is the memory that the computer uses to temporarily store the information as it is being processed.
Random Access Memory

Which of the following is not a type of the interface provided by operating systems? Instruction line
interface

Which of the following statements is not true about Find and Replace in Excel? You can search
by rows or columns or sheets

The key toggles between Insert and Typeover.


Insert

Which of the following is a function of the Start Button or Apple menu? opens
documents

The numeric data entered in the worksheet is____aligned by default.


Right

The Desktop offers many features that make using your computer easier. Which of the following is not part
of the features?
None of the options

A bookmark is an item or location in document that you identify as a name for future reference. Which of the
following task is accomplished by using bookmarks?
To quickly jump to specific location in document

programs compress and decompressed files for computer users.


shareware

Which of the following is not a valid data type in Excel?


Character

The most popular form of data compression is called .


stuffit

A worksheet range is .
A group of cells

Which of the following is not a commercial database program/software?


2020_1 First semester use only

None of the options

Which of the following system components is NOT displayed by Settings?


none of the options

allows you to start a program from a command line.


run

are used to work with financial information


Spreadsheets

Which of the following is the latest version of MS Word?


Word 2016

Windows displays icon menu of main options


Toolbar

Which of the following is not a word processing software?


None of the options

Which of the following is NOT a commercial spreadsheet?


PageMaker Sheets

By default, in Excel 2007, there are____worksheets in a workbook


3

To insert a chart in Excel worksheet, click on____tab.


Insert

When working with numbers in a spreadsheet, we refer to the cell addresses when creating
.
mathematical formulas

Which of the following is not a commercial graphics program?


None of the options

Which of the following is not one of the main bitmap graphics format used on the Internet
.tif

To drag a selected range of data to another worksheet in the same workbook, use the ___
Ctrl key

Which of the following is not a valid Zoom percentage in Excel?


500

Which of the following is not a method of opening documents and programs in Windows?
Use the Find command in the Sherlock program
2020_1 First semester use only

is not a structured format of graphics


.tga

Which of the following graphics can be created and modified in a paint program?
Bitmap graphics

Portrait and Landscape are types of


Page Orientation

Which of the following is not available on the Ruler of MS Word screen?


Center Indent

Which of the following is not a type of page margin?


Center

Which of the following method is used to select files non-sequentially?


click on the first file and hold CTRL key while clicking the rest

Which of the following graphics cannot be created and modified in a draw program? Bitmapped
graphics

is multimedia format that is attempting to create a standardization among the various formats available
.mpg

is not a common desktop publishing programs.


None of the options

are the most common way of interacting or controlling your software


Menus

was heavily marketed by Microsoft as a multi-user alternative to its single user MS-DOS operating system
XENIX

operating system supports only cooperative multitasking Windows


1.0

's underlying operating system kernel was designed by the same team as Digital Equipment
Corporation's VMS.
Windows NT

properly track resources allocated by processes at runtime. Windows


NT

did not have preemptive multitasking


MAC OS
2020_1 First semester use only

Which of the following Unix variants is designed to run on multiple types of hardware?

Solaris

interoperability was sought by establishing the POSIX standard


Unix

The initial code executing on the computer is usually loaded from .


firmware

Which of the following is not a function of operating systems? None of the


options

FAT file systems are commonly found on .


All of the options

With cooperative memory management it takes misbehaved program(s) to crash the


system
only one

The initial code executing on the computer is sometimes called .


BIOS

Two e-business models that currently exist are


B2C and B2B.
2020_1 First semester use only

The reason why organizations are switching from traditional to e-business transaction is due to
Decreasing costs of transactions
A(n) site provide the hardware and software that enable Internet communication and
commerce
In Electronic cash payment
a customer buys several electronic coins which are digitally signed by coin issuing bank
A digital certificate
E-bay is a good example to define
C2C
__ is a software that locates web pages based on matching keywords
Search engine
Which products are people most likely to be more uncomfortable buying on the Internet?
Furniture
he two main types of Internet based B2B commerce are______
EDI and private industrial networks
In B2B e-Commerce, the following are correct except
It is essential to use internet
For carrying out B2B e-Commerce the following infrastructure is NOT really essential:
World Wide Web
A person to person payment system
Sends money using the web to individuals who are not setup to accept credit card payments
While maintaining an e-business web site what element is hard to maintain
Customer Relationship Management.
Ahashing function for digital signature
two different messages should not give the same hashed message
e-business requires accessibility the following except
People
The example of E-service which enhances original service is
Education
Security in e-Commerce involves the following except
Prevention of natural disasters that can lead to data loss
One of the major problems for e-business growth is
Lack of proper infrastructure
Electronic Data Interchange is necessary in
B2B e-Commerce
The following are the problems of e-Commerce implementation in Nigeria except
No legislation against Cybercrimes
2020_1 First semester use only

The computer power has been on the increase while size has been on the
Decline
Micro computers include
SFF
Supercomputers are more suited to
Intense numerical calculations
Embedded computers are found today in devices such as
Electric toothbrushes
Embedded computers only run programs stored in
ROM
Handheld devices used to capture data away from the mainframe that they are linked to include:
Graphics tablet
Computers dedicated to the task of storing and retrieving large amounts of data are called__
Servers
The earliest version of the mainframe refer to computers compatible with__
IBM system/360
Mainframes are often colloquially referred to as
Big Iron
Mainframe often refers to computers that utilize the architecture of the__
1960s
The computer power has been on the increase while size has been on the__
Decline
Micro computers include__
SFF
Supercomputers are more suited to__
Intense numerical calculations
Embedded computers are found today in devices such as__
Electric toothbrushes
Embedded computers only run programs stored in__
ROM
Handheld devices used to capture data away from the mainframe that they are linked to include:
Graphics tablet
Computers dedicated to the task of storing and retrieving large amounts of data are called
Servers
Supercomputers and mainframes both offer
Parallel processing
2020_1 First semester use only

The earliest version of the mainframe refer to computers compatible with


IBM system/360
Laptops utilize this device for input
Trackpad
Mini computers were typified by the number of word sizes
8 to 16 bits
The first minicomputers generally only perform these number of tasks per time
One
The smallest of these computer systems is
UMPC
At the centre of the personal computer (PC) innovation is the
Microprocessors
Supercomputers are typically tailored for
Number crunching
The differences between the microcomputers and minicomputers is the use of
Software
Micro computers have RAM of
16Kb to 256Kb
The classes of computer include the following EXCEPT
Mini
Which of the following is not a characteristics of a computer?
None of the options
___ computer is tailored for very fast processing of number crunching applications
super
___ _ computers are the most common type of computers in existence today,
micro
___ computers focus on problems which are limited by input/output and reliability
mainframe
A is used to translate information transferred through telephone lines or cable
modem
People who use modern general purpose computers usually see layers of software
performing a variety of task
three
___ are the most common way of interacting or controlling your software
Menus
When a computer system is turned on, the first code executing on the computer is usually loaded from
_.
firmware
2020_1 First semester use only

There are basically types of computer graphics


two
___ software is not part of the software layers seen by people who use modern general purpose
computers to perform a variety of tasks
system
UNIVAC stands for _____
Universal Automatic Computer
___ is the basic operations performed by a computer.
All of the options
There are ____ major types of computer chips
two
Microprocessors as switching devicesare for generation of computers
Fourth
What is the main difference between a mainframe and a super computer?
Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to
execute as many programs concurrently

EBCDIC stands for _____


Extended Binary Coded Decimal Interchange Code
The brain of any computer system is _.
CPU
Storage capacity of magnetic disk depends on _.
All of the options
The two kinds of main memory are:
ROM and RAM
The storage area used in storing data to compensate for the difference in speed at which the different units
handle data is called ___.
Buffer
Most important advantage of an IC is _____.
Extremely high reliability
Integrated Circuits (ICs) areassociated with generation of computers
Third
CD-ROM is a _.
None of the options
A hybrid computer
Resembles both a digital and analogue computer
Which type of computers uses the EBCDIC code?
Mainframe computers
2020_1 First semester use only

The ALU of a computer responds to the commands coming from _.


Control section
EBCDIC is ____-bit code
8
A number which is stored and processed but not in the standard exponential form is called ____
number.
Fixed point
Which of the following network is a packet switching network?
EuroNET
The process of removing unwanted part of an image is called _.
Cropping
____is the study of the ongoing environment to identifying problem solving possibilities
Planning
__is the study of the problem environment and subsequent definition and prioritization of the requirements for
solving the problem.
Systems analysis
___is the evaluation of alternative problem solutions, and the detailed specification of the final system.
Systems design
___is the construction or the assembly of the problem solution culminating in new environment based on the
solution
Systems implementation
___consists of making sure that the system runs in operational use and continues to do so for as long as is
required.
Systems maintenance
A is a group of interconnected computers
computer network
__is a computer network used for communication among computer devices close to one person.
personal area network (PAN)
___ is network covering a small geographic area, like a home, office, or building.
Local area network
A network that connects two or more LANs but which is limited to a specific and contiguous geographical area
such as a college campus, industrial complex, or a military base is referred to as__
Campus area network
___is a network that connects two or more Local Area Networks or Campus Area Networks together but
does not extend beyond the boundaries of the immediate town/city.
A Metropolitan Area Network
2020_1 First semester use only

A is a data communications network that covers a relatively broad geographic area (i.e. one city to
another and one country to another country) and that often uses transmission facilities provided by common
carriers, such as telephone companies
Wide area network(wan)
a is a model for supporting mobile communications across an arbitrary number of wireless LANs,
satellite coverage areas
global area network(global area network)
An is a set of interconnected networks, using the Internet Protocol and uses IP-based tools such as web
browsers and ftp tools, that is under the control of a single administrative entity
Intranet
An is a network or internetwork that is limited in scope to a single organization or entity but which also
has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations
or entities
Extranet
A ) is a piece of computer hardware designed to allow computers to communicate over a computer network
network card, network adapter or NIC (network interface card
A is an electronic device that receives a signal and retransmits it at a higher level or higher power, or
onto the other side of an obstruction, so that the signal can cover longer distances without degradation.
Repeater
A contains multiple ports
Hub
___ connects multiple network segments at the data link layer (layer 2) of the OSI model
network bridge
Bridges can be of main types
Three
___ Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting
link is slower than the end networks, largely have been replaced by routers Remote bridges
___Can be used to join LANs or connect remote stations to LANs.
Wireless bridges
___ is a device that performs switching. Specifically, it forwards and filters OSI layer 2 datagrams (chunk of data
communication) between ports (connected cables) based on the Mac- Addresses in the packets.
Switch
____are networking devices that forward data packets between networks using headers and forwarding
tables to determine the best path to forward the packets
Routers
2020_1 First semester use only

Arpanet means___
Advanced Research Project Agency Network
ICANN means____
Internet Corporation for Assigned Names and Numbers
____ is the authority that coordinates the assignment of unique identifiers on the Internet, including domain
names, Internet Protocol (IP) addresses, and protocol port and parameter numbers.
ICANN(Internet Corporation for Assigned Names and Numbers)
___is a huge set of interlinked documents, images and other resources, linked by hyperlinks and URLs
World Wide Web
VoIP stands for______
Voice over IP
____ is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or
vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software,
hardware, or something electronic
An exploit
____is the act of surreptitiously listening to a private conversation.
Eavesdropping
DDoS means___
Distributed denial of service
An attack is an attack launched by a third party computer.
Indirect
___ is a method of bypassing normal authentication, securing remote access to a computer, obtaining
access to plaintext, and so on, while attempting to remain undetected.
Backdoor
A state of computer "security" is the conceptual ideal, attained by the use of the ______________ processes
Three(Prevention, Detection and Response)
___ are designed to detect network attacks in progress and assist in post-attack forensics, while
audit trails and logs serve a similar function for individual systems.
Intrusion Detection Systems (IDS's)
__ defined by the assessed security requirements of an individual system and may cover the
range from simple upgrade of protections to notification of legal authorities, Response
A is a program designed by a computer programmer (malicious hacker) to do a certain unwanted
function.
Virus
___ type of virus infects the boot or master section of any disks that it comes in contact with
boot sector viruses
2020_1 First semester use only

___ infects other programs when the infected program is run or executed.
program virus
___ problems can occur when improper office equipment is used.
Musculoskeletal
___can be caused by staring at a fix object for extended periods of time (like a computer).
Eye strain
____is an integral part of the new technological workplace.
Ventilation
____ is the degree of discretion individuals or groups have in planning, regulating, and controlling their own
work. Power is the ability to get others to do things.
Autonomy
The range of different types of things people do at work is called___
task variety
____ is the size of the task relative to the overall purpose of the organization. Installing a single door lock on
an automobile assembly line is a task with minimal scope.
Task scope
Work done using computers, rather than through direct physical contact with the object of task, is often called
___
computer-mediated work
____is a related issue because computer-mediated work doesn’t involve direct physical contact with the
object of the task.
abstractness of work
____is an umbrella term that includes all technologies for the manipulation and communication of information
Ict
Limitations of PC-Internet based ICT are__
Bandwidth, Language, Text/Voice Disruptive Software, Participation, Security

The standard keyboard typically has ____________ keys. (numeric answer)

A _______________ computer is a personal computer (PC) in a form intended for regular use at a single location, as
opposed to a mobile laptop or portable computer.
Desktop

______________ generally focus on problems which are limited by calculation speed while mainframes focus on
problems which are limited by input/output and reliability ("throughput computing") and on solving multiple business
problems concurrently (mixed workload).
Supercomputers

________________ systems are designed to operate a single machine or a single function of that machine and are
typically required to operate continuously without being reset or rebooted.
Embedded

The computer's processor, memory, monitor, keyboard, mouse, disk drive, printer are all examples of ___________
devices.
Hardware

The size of a file is measured in ____________. (the lowest unit)


Bytes
2020_1 First semester use only

________________ is a general term used to describe a collection of computer programs, procedures and
documentation that perform some tasks on a computer system.
Software

Keyboards, scanners, barcode readers are all examples of _________________ devices.


Input

_______________ System is the software component of a computer system that is responsible for the management
and coordination of activities and the sharing of the resources of the computer.
Operating

The initial code executing on the computer is usually loaded from firmware, which is stored in read only memory
(ROM). This is sometimes called the ________ or boot ROM.
BIOS

____________ are central to operating systems as they allow the operating system to deal with the unexpected
activities of running programs and the world outside the computer.
Interrupts

______________ refers to the running of multiple independent computer programs on the same computer, giving the
appearance that it is performing the tasks at the same time.
Multitasking

A device _______________ is a specific type of computer software developed to allow interaction with hardware
devices.
Driver

Ctrl-_______ is used to copy selected text of the page and into a clipboard in most word processing programmes.
(single letter answer)
C

___________ programs or software consists of programs that perform specific tasks such as writing a letter, tracking
payroll information, producing a chart and so on.
Application

Ctrl-_______ is used to cut selected text of the page and into a clipboard in most word processing programmes. (single
letter answer)
X

Ctrl-_______ is used to paste text held in the clipboard into the document at the cursor in most word processing
programmes. (single letter answer)
V

The shortcut key to undo an unwanted action in most Windows programmes is Ctrl-__
Z

______________ is a collection of information stored in a way that makes it easy to retrieve, modify and search.
Database

In a spreadsheet program, where the ‘rows’ and ‘columns’ intersect is called a ________.
Cell

Spreadsheets use _________ to create simple to complex mathematical equations.


2020_1 First semester use only

Formulas

__________ graphics are images that are mapped to the tiny dots of the monitor or screen called pixels.
Bitmapped

________________ graphics use objects created from mathematical formulas to represent things like lines, curves,
fills, line thickness, etc., to create the images.
Vector

__________ is the process of requesting from a database attribute information in various perspectives and
combinations of factors.
Querying

In the software development life cycle (SDLC), systems ___________ is the construction or the assembly of the
problem solution culminating in new environment based on the solution.
Implementation

An _______________ is a set of interconnected networks, using the Internet Protocol and uses IP-based tools such as
web browsers and ftp tools, that is under the control of a single administrative entity.
Intranet

An ___________ is a network or internetwork that is limited in scope to a single organization or entity but which also
has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or
entities
Extranet

A specific internetwork, consisting of a worldwide interconnection of governmental, academic, public, and private
networks based upon the Advanced Research Project Agency Network (ARPANET) developed by ARPA of the U.S.
Department of Defense – also home to the World Wide Web (WWW) and referred to as the ________________.
Internet

A ________ is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto
the other side of an obstruction, so that the signal can cover longer distances without degradation.
Repeater

A network ____________connects multiple network segments at the data link layer (layer 2) of the OSI model.
Bridge

A _____________ is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between
ports (connected cables) based on the MAC-Addresses in the packets.
Switch

_______________ are networking devices that forward data packets between networks using headers and forwarding
tables to determine the best path to forward the packets.
Routers

The network ________ determines how computers become part of the network and how they are recognized.
Protocol

In a computer system (or cryptosystem or algorithm), a __________ is a method of bypassing normal authentication,
securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain
undetected.
Backdoor

_________ is the act of surreptitiously listening to a private conversation on a computer systems.


2020_1 First semester use only

Eavesdropping

An _____________ is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug,
glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software,
hardware, or something electronic (usually computerized).
Exploit

A ______________ is a program designed by a computer programmer (malicious hacker) to do a certain unwanted


function.
Virus

________________ computers were physically large and powerful systems capable of supporting hundreds of users.
They are used mainly by large organizations for critical applications, typically bulk data processing such as census,
industry and consumer statistics, ERP, and financial transaction processing.
Mainframe

A _____________ is a computer with a microprocessor as its central processing unit.


Microcomputer

The ________________, is a board with series of electronic path ways and connections allowing the CPU to
communicate with the other components of the computer.
Motherboard

Computers are connected to printers by cables using plugs and sockets. The sockets are usually called _____________
or ports
Interfaces

There are two types of cable which may be used to connect a printer to a computer. One is called a serial cable and
the other a ______________ cable.
Parallel

Operating systems, device drivers, diagnostic tools, servers, windowing systems, utilities are all examples of
_______________ software.
System

Instructions may be performed sequentially, conditionally, or iteratively. ___________ instructions are those
operations that are performed one after another.
Sequential

Instructions may be performed sequentially, conditionally, or iteratively. ___________ instructions are performed
such that different sets of instructions execute depending on the value(s) of some data.
Conditional

Instructions may be performed sequentially, conditionally, or iteratively. ______________ instructions are performed
repetitively and may depend on some data value.
Terative

In Windows operating system, you hold down the __________key while deleting a file to bypass the Recycle Bin and
permanently delete files.
Shift

Applications access operating system services through application programming interfaces (APIs) or system
_____________.
2020_1 First semester use only

Calls

File systems may provide __________________, which provides safe recovery in the event of a system crash
Journaling

_______________ has opened up many opportunities, from finding out information, conducting communications
globally, e.g. through e- mail, voice mail, skype, e-commerce or generally just having fun through on line chats or
instant messaging
Internet

Which of the following options is NOT an input device for a typical computer system?
Printer

Which of the following options would you upgrade if you want to improve the performance of your PC?
Processor

Which keyboard key is commonly used to access the menu in combination with the arrow keys?
Alt key

The interconnection of computers for the purpose of information and resource sharing is called?
Networking

Which of the following is NOT characteristic of a typical computer?


The ability to create new output without human input.

You are tasked to recommend a computer system to perform simple computations involving huge amounts of
external data for a large business corporation. Which of the following options would you choose?
Mainframe

Which of the following options is NOT typically a data portable data entry terminal
Keyboard terminal

The memory that the computer uses to temporarily store the information as it is being processed is called?
Random Access Memory

The following are all optical storage devices EXCEPT:


HARD DISK

Which of the following devices is an input AND output device?


Modem

Which of the following is NOT an example of a typical operating system?


Apache

Platform software typical includes all the following options EXCEPT:


Compliers

Which of the following is NOT a function of operating systems?


Writing user program

The following options are all word processing programs EXCEPT:


Corel Quattro Pro

The following options are all examples of commercial database programs EXCEPT:
2020_1 First semester use only

IBM Impress

The following options are all examples of commercial spreadsheet programs EXCEPT:
IBM Impress

The following options are all examples of programs used to create graphics EXCEPT:
Corel Quattro Pro

The following options are examples of common desktop publishing programs EXCEPT:
Lotus 123

DBMSs are categorized according to their data structures or types. Which of the following options is not one of the
four most common categories according to the data model?
Distributed

Which of the following is NOT a benefit of the database management system (DBMS)?
Increased data redundancy and inconsistency

Features commonly offered by database management systems include all the following options EXCEPT:
Planning/Feasibility Definition

Typical phases in the software development life cycle (SDLC) include all the following EXCEPT:
Purchasing

The first step in the software development life cycle (SDLC) is normally _______?
Planning

The outcomes of the first step in the software development life cycle (SDLC) include all the following options EXCEPT:
Acquisition of software

The process of systems testing takes place at several levels. Which of the following options is NOT an example of these
level?
Testing of the computer operators

The following options are all classifications of computer networks according to their scale EXCEPT:
Wireless Network

The following options are all classifications of computer networks according to their connection method EXCEPT:
Client-server

The following options are all classifications of computer networks according to their functional relationship EXCEPT:
Local area networking

The following options are all classifications of computer networks according to the network topology EXCEPT:
Active network

There are at least three variants of internetwork, depending on who administers and who participates in them. Which
of the following options is NOT one of them?
Burnet

Which of the following component provide physical access to a networking medium and often provides a low-level
addressing system via MAC address?
2020_1 First semester use only

Network Interface Cards

To interconnect/network computers, the following option are all essential EXCEPT:


Network service provider

The following are all typical examples of resources that can be shared on a network EXCEPT:
Bios

Which of the following is NOT a common use for the Internet?


Systems Design

The various types of "attacks" that can be made against computer systems (threats) can typically be classified into
seven categories. Which of the following options is NOT one of them
Hardware failure

A state of computer "security" is the conceptual ideal, attained by the use of the three processes. Which of the
following options is NOT one of these processes?
Exploits

Which prevention system works by shielding access to internal network services, and block certain kinds of attacks
through packet filtering?
Firewalls

In Windows operating system, which of the following options is NOT a method for opening documents and programs?
Use the Sherlock program

Which key is typically used to select multiple files sequentially in Windows operating system?
Shift

Which key is typically used to select multiple files non-sequentially in Windows operating system?
Ctrl

Which of the following options is NOT a typical category of operating systems?


Database systems

Data stored on disks using files is structured in specific ways for all the following reasons EXCEPT:
Reduce drive's available space

Which of the following options is NOT a typical file system supported in modern operating systems?
PLAN 9

Which file systems is typically used by Compact Discs and DVDs.


UDF

Which of these options is NOT a system development life cycle (SDLC) model?
Rainfall

Which of the following options is the output of the system design stage in the software development life cycle (SDLC)?
Technical specification

In the software development life cycle (SDLC), the system implementation phases includes all the following EXCEPT:
Estimates of costs, benefits and timescales

In the software development life cycle (SDLC), the ‘full system’ test typically includes testing of all the following
2020_1 First semester use only

EXCEPT:
Data preparation and installation

Which of the following is NOT a characteristic of a health job?


Dependence

Which of the following options is NOT a factor which causes stress at work?
Respect for personal rights

A Microsoft Windows is a (n)


Operating Systemof Computer

You should save your computer from?


All of the options

A back up store from which any random data can be accessed without reading all existing data is called
Direct Access

Examples of System programs includes


All of the options

Specialized program that allows user to utlize inspecific application is classified as


Application programs

Central Processing Unit (CPU) consists of


All of the options

Devices that accepts data from outside computer and transfer into CPU are called
Input Devices

MiniComputers are also called


Midrange Computers

Smaller Computers became possible by use of technologies of


Transistors and Core Memory

A typical __________ program creates some remote objects, makes references to these objects accessible and waits
for clients to invoke methods on these objects
Sever

To join the internet, the computer has to be connected to a _______________


Internet Service provider

Network topology in which you connect each node to network along a single piece of network cable is called
Bus Topology

Combination of two or more networks are called ____________


Internetwork

Which of the following is not a named phase in the System Development Life Cycle
Assessment

Database is generally _____________


2020_1 First semester use only

User - Centered

DBMS manages the interaction between _______ and database


End User

A collection of related data is known as ___________


Database

What do you call a specific instruction designed to do a task


Command

Interpreter is used as a traslator for ___________


High Level Language

Which of the following is not a way of acquiring software?


Duplcating the software

A Microsoft Windows is a (n)


Operating Systemof Computer

You should save your computer from?


All of the options

A back up store from which any random data can be accessed without reading all existing data is called
Direct Access

Examples of System programs includes


All of the options

Specialized program that allows user to utlize inspecific application is classified as


Application programs

Central Processing Unit (CPU) consists of


All of the options

Devices that accepts data from outside computer and transfer into CPU are called
Input Devices

MiniComputers are also called


Midrange Computers

Smaller Computers became possible by use of technologies of


Transistors and Core Memory

A typical __________ program creates some remote objects, makes references to these objects accessible and waits
for clients to invoke methods on these objects
Sever

To join the internet, the computer has to be connected to a _______________


Internet Service provider

Network topology in which you connect each node to network along a single piece of network cable is called
Bus Topology
2020_1 First semester use only

Combination of two or more networks are called ____________


Internetwork

Which of the following is not a named phase in the System Development Life Cycle
Assessment

Database is generally _____________


User - Centered

DBMS manages the interaction between _______ and database


End User

A collection of related data is known as ___________


Database

What do you call a specific instruction designed to do a task


Command

Interpreter is used as a traslator for ___________


High Level Language

Which of the following is not a way of acquiring software?


Duplcating the software

_______is used for listing what services are available


UDDI

XML is used to_______the data


Tag

The SUM, AVERAGE, MAX, MIN and COUNT are _______ Functions
Aggregate

The _______is a procedural query language


relational algebra

Regexes use characters with a special meaning_______


Meta-characters

There are no two distinct tuples that have the same values for the attributes in this set is called _______
super Key

There are basically _______kinds of keys which are sets of attributes of a relation functionally depending on one or
more attributes of the relation
FIVE

_______is a column
Foreign key

Database _______can be defined over a schema


Constraints

In SQL, which command(s) is(are) used to enable/disable a database trigger?


alter trigger
2020_1 First semester use only

The data dictionary tells the DBMS


All of the above

Sort/report generators
require more disk space than index/report generators

Periodically adding, changing and deleting file records is called file


Updating

In SQL, which command is used to make permanent changes made by statements issue since the beginning of a
transaction?
commit

item characteristics that are important in data management include


width

What is the language used by most of the DBMSs for helping their users to access data?
Query language

After you _____ a record, many data management the environments require you to issue a command to save the
changes you made
Update

DCL is used to
Give or remove access rights to both a database and the structures within

With SQL, how do you select all the columns from a table named "Persons"?
SELECT FROM Persons

The single element is called the _______ Element


Root

Which SQL statement is used to insert new data in a database?


INSERT INTO

Which SQL statement is used to delete data from a database?


delete

Which SQL statement is used to update data in a database?


UPDATE

RDBMS stands for _________


Relational Database Management System

Which SQL statement is used to extract data from a database?


SELECT

SQL comprises__
DML and DDL

We use _________ to do Projection, selection and joining


SELECT statement

Expert system does not permit _________


2020_1 First semester use only

What-if analysis

_________ Technologically implemented medium for recording, storing, and disseminating information
information system

_________are distinct from regular information systems in that they are used to analyze other information systems
applied in operational activities in the organization
MIS

A typical server program creates some remote objects, makes references to these objects accessible and waits for
____________ to invoke methods on these objects
Clients

The compiler is a typical _________ program


System

A Microsoft Windows is a (n) ______________ system


Operating

Networking refers to the interconnection of computers for the purpose of information and resource _____________
Sharing

The computer's processor, memory, monitor, keyboard, mouse, disk drive, printer are all examples of ------------
devices.
Hardware

The size of a file is measured in ____________.


Bytes

________________ is a general term used to describe a collection of computer programs, procedures and
documentation that perform some tasks on a computer system.
Software

Keyboards, scanners, barcode readers are all examples of input _________________


Devices

_______________ System is the software component of a computer system that is responsible for the management
and coordination of activities and the sharing of the resources of the computer.
Operating

Interpreter is used as a translator for ___________ level languages


High

A collection of related data is known as a ___________


Database

______________ refers to the running of multiple independent computer programs on the same computer, giving the
appearance that it is performing the tasks at the same time.
Multitasking

A device _______________ is a specific type of computer software developed to allow interaction with hardware
devices.
Driver
2020_1 First semester use only

The ___ Access Memory is the sort of memory that the computer uses to temporarily store the information as it is
being processed.
Random

___________ programs or software consists of programs that perform specific tasks such as writing a letter, tracking
payroll information, producing a chart and so on.
Cutting

The is the shortcut command for ____ selected text of a page in most word processing programs
Application

_______ is used to text held in the clipboard into a document at the cursor in most word processing programs
V

The shortcut key to undo an unwanted action in most Windows programs is __


Z

______________ is a collection of information stored in a way that makes it easy to retrieve, modify and search.
Database

In a Spreadsheet program, the intersection of a row and a column is called a ___________


Cell

Spreadsheets use _________ to create simple to complex mathematical equations.


Formulas

__________ graphics are images that are mapped to the tiny dots of the monitor or screen called pixels.
Bitmapped

________________ graphics use objects created from mathematical formulas to represent things like lines, curves,
fills, line thickness, etc., to create the images.
Vector

__________ is the process of requesting from a database attribute information in various perspectives and
combinations of factors from a database.
Querying

An Internet server provider is required to connect a _____________ system to the internet


Computer

Database is generally _____________ centred


User

To protect a computer from virus, you should install __________on your computer
Anti-Virus

The DVD is an example of a ___________device


Storage

A ________ is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto
the other side of an obstruction, so that the signal can cover longer distances without degradation.
Repeater
2020_1 First semester use only

A network bridge connects multiple network segments at the __________ layer of the Open System Interconnected
(OSI) model.
data link

A _____________ is a device that forwards and filters OSI layer 2 datagrams between ports based on the MAC-
Addresses in the packets.
Switch

_______________ are networking devices that forward data packets between networks using headers and forwarding
tables to determine the best path to forward the packets.
Routers

The network ________ determines how computers become part of the network and how they are recognised.
Protocol

The altering of data so that it is not usable unless the changes are undone is called ____________
Encryption

_________ is the act of surreptitiously listening to a private conversation on a computer systems.


Eavesdropping

An _____________ is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug,
glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software,
hardware, or something electronic
Exploit

A ______________ is a program designed by a computer programmer to do a certain unwanted function.


Virus

________________ computers were physically large and powerful systems capable of supporting hundreds of users.
They are used mainly by large organizations for critical applications, typically bulk data processing such as census,
industry and consumer statistics, ERP, and financial transaction processing.
Mainframe

A _____________ is a computer with a microprocessor as its central processing unit.


microcomputer

The ________________, is a board with series of electronic path ways and connections allowing the CPU to
communicate with the other components of the computer.
Motherboard

Computers are connected to printers by cables using ___ and sockets.


Plugs

There are ____ types of cable which may be used to connect a printer to a computer.
Two

Operating systems, device drivers, diagnostic tools, servers, windowing systems, utilities are all examples of -------
software.
System

___________ instructions are those operations that are performed one after another.
Sequential
2020_1 First semester use only

___________ instructions are performed such that different sets of instructions execute depending on the value(s) of
some data.
Conditional

______________ instructions are performed repetitively and may depend on some data value.
Iterative

In Windows operating system, you hold down the __________key while deleting a file to bypass the Recycle Bin and
permanently delete files.
Shift

Applications access operating system services through application programming interfaces (APIs) or system
_____________.
Calls

Normally, planning is the ________ step in the software development life cycle.
First

Microsoft Publisher is a common ____ publishing program.


Desktop

Specialized program that allows user to utilize specific application is classified as ____________
Relative programs

System programs include ________________


Compiler

Which of the following is not a way of acquiring software?


Buying pre-written software

The interconnection of computers for the purpose of information and resource sharing is called _____________
Telecommunicating

Which of the following is NOT a characteristic of a typical computer?


The ability to use simple logical rules to make decisions.

Which of the following is an input device for a typical computer system?


Scanner

Which of the following options is NOT a typical ;portable; data entry terminal; ?
Barcode readers

The memory that the computer uses to temporarily store the information as it is being processed is called
_______________
Random Access Memory

The following are all optical storage devices EXCEPT ______


CD ROM

Which of the following devices is both an input AND output device?


Scanner

Which of the following is NOT an example of a typical operating system?


Windows
2020_1 First semester use only

Platform software includes all the following options EXCEPT ______________


Firmware

Which of the following is NOT a function of operating systems?


Providing the user interface

The following options are all word processing programs ______________


Microsoft Word

The following options are all examples of commercial database programs EXCEPT ---------______
Corel Paradox

The following options are all examples of commercial spreadsheet programs EXCEPT _________
Lotus 123

Which of the following options would you upgrade if you want to improve the performance of your PC?
Printer

The following options are examples of common desktop publishing programs EXCEPT ____________
Microsoft Publisher

DBMSs are categorized according to their data structures or types. Which of the following options is not one of the
four most common categories according to the data model?
Hierarchical

Which of the following is NOT a benefit of the database management system (DBMS)?
Application-data independence

Features commonly offered by database management systems include all the following options EXCEPT
_________________
Backup and replication

Typical phases in the software development life cycle (SDLC) include all the following EXCEPT __________________
Analysis Design

The first step in the software development life cycle (SDLC) is normally _______
Analysis Design

The outcomes of the first step in the software development life cycle (SDLC) include all the following options EXCEPT
______________
Term of Reference (TOR)

The following options are all classifications of computer networks according to their scale EXCEPT _______________
Personal Area Network

The following options are all classifications of computer networks according to their connection method EXCEPT
___________
Wireless LAN

The following options are all classifications of computer networks according to their functional relationship EXCEPT ----
--------
Active networking

The following options are all classifications of computer networks according to the network topology EXCEPT
2020_1 First semester use only

________________
Active network

There are at least three variants of internetwork, depending on who administers and who participates in them. Which
of the following options is NOT one of them?
Burnet

Which of the following components provide physical access to a networking medium and often provides a low-level
addressing system via MAC address?
Network Interface Cards

___ can protect messages in transit.


Firewalls

The following are all typical examples of resources that can be shared on a network EXCEPT _______________
Peripheral Devices

Which of the following is NOT a common use for the Internet?


Systems Design

The various types of "attacks" that can be made against computer systems (threats) can typically be classified into
seven categories. Which of the following options is NOT one of them
Hardware failure

A state of computer "security" is the conceptual ideal, attained by the use of three processes. Which of the following
options is NOT one of these processes?
Prevention

Which network attack prevention system works by shielding access to internal network services, and block certain
kinds of attacks through packet filtering?
User account access controls

In Windows operating system, which of the following options is NOT a method for opening documents and programs?
Double click on an icon in a Folder

Which key is typically used to select multiple files <strong>sequentially</strong> in Windows operating
system?
Ctrl

Which key is typically used to select multiple files in Windows operating system?
Ctrl

Which of the following options is NOT a typical category of operating systems?


Real-time operating systems

Data stored on disks using files is structured in specific ways for all the following reasons EXCEPT _______________
Easier indexing

Which of the following is not a serious limitation for PC-Internet based ICT
Language

Which of the following signifies a malicious software?


All of the options
2020_1 First semester use only

Which of these options is NOT a system development life cycle (SDLC) model?
Waterfall

___ is not a named phase in the System Development Life Cycle


Stratification

In the software development life cycle (SDLC), the system implementation phases includes all the following EXCEPT
______
Acquisition of software

A virus can be introduced into a computer system, through the infected ____________
file.

----- is NOT a characteristic of a health job.


Social relations

Which of the following is not a named phase in the System Development Life Cycle
Maintenance

You might also like