Anda di halaman 1dari 27

Chapter 1: Information Technology and Computers 1. Which of the following mostly describe what IT is about?

(a) Hardware and software (b) Computers, communication devices and networks (c) Application and System Software (d) Different types of computers (e) Software only 2. Computers are (a) Special devices that store information (b) Able to accept input data that need to be processed (c) Process data to output desired information (d) Of different sizes and processing power (e) All of the above 3. _________ are instructions that tell the computer what to do. (a) Documents (b) Guidelines (c) Software (d) Information (e) Procedures 4. _________ is the most powerful type of computer (a) Mainframe (b) Mini computer (c) Micro computer (d) Super computer (e) Laptop 5. Which of the following is NOT an example of a micro computer? (a) PDA (b) Laptop (c) PC (d) Bank server (e) Point of sale terminal 6. A _________ connects many computers together to allow sharing of information and resources. (a) Link (b) Network (c) Communication software only (d) Cable (e) Communication hardware only 7. Firefox is an example of a (a) E-mail program (b) Chat system (c) Web page (d) Voice mail (e) Browser 8. The___________ is the largest network in the world

1/27

(a) Internet (b) Web (c) WWW (d) World wide web (e) All of the above 9. Protocols refer to (a) Contracts between computer manufacturers and suppliers (b) Set of rules for communication purpose (c) Special type of network (d) Software used in networks (e) Agreements between different network providers 10. Cyber crimes are crimes (a) Committed in cyber cafes (b) That involve the use of computers (c) Caused only by computer professionals (d) Only committed by computer professionals (e) That occur only in large organizations

1. Using examples of your own, explain what IT is all about. 2. In your own words, explain how IT has changed the living standard of the common people today. 3. Describe different types of computers stating specific situations where they are used. 4. IT is said to consist of both computers and networking facility. Explain this statement by providing suitable examples. 5. Any new technology brings about threats. How far does this statement apply to IT? 6. What are hardware and software giving examples in each case? 7. The Internet is an example of a very large network. Explain this statement. 8. A server is a special type of computer that is used to provide services to other computers. In which type of computer, does a server fall into? Suggest some examples of servers. 9. List some major drawbacks IT and computers have brought about. 10. What are the trends that affect IT today?

2/27

Chapter 2: Stepping into the computer 1. How many bits are there in 1 Kilobyte? (a) 8 bits (b) 1000 bits (c) 1024 bits (d) 8192 bits (e) 1048576 bits 2. Which of the following is not a type of RAM? (a) DDR RAM (b) SD RAM (c) DDR2 RAM (d) EDO RAM (e) AMD RAM 3. A processor is connected to the motherboard through a (a) Socket (b) Port (c) Bus (d) PCI slot (e) Memory slot 4. Which of the following is NOT TRUE? (a) USB cables can be used to connect printers and cameras to a computer (b) A network port allows computers to be connected to a network (c) Parallel ports allow monitors to be connected to a computer (d) PS/2 ports allow keyboard and mouse to be connected to the computer (e) FireWire can be used to connect camcoders and hard disks to the computer

5. How would you represent the decimal value 26 in Hexadecimal? (a) 26 (b) 1A (c) 11010 (d) 10 (e) A1 6. Which of the following is NOT TRUE about cache? (a) L2 cache is faster than L1 cache (b) A cache miss indicates that the information we are looking for is not in the cache (c) RAM can be thought of as a cache for the Hard Disk (d) L2 cache is bigger than L1 cache (e) The size of L2 cache is approximately between 512 KB and 2 MB 7. AGP 8x looks likely to be replaced by _______________ ports in the near future. (a) PCI (b) PCI Express (c) AGP 16x (d) ISA (e) SATA connectors

3/27

8. Which type of ROM is commonly used in modern PCs? (a) PROM (b) EPROM (c) EAPROM (d) EEPROM (e) None of the above 9. Which of the following gives a list of memory in ascending order of speed access? (a) RAM, Hard Disk, L1 Cache, L2 Cache (b) L1 Cache, RAM, Hard Disk, L2 Cache (c) L1 Cache, L2 Cache, RAM, Hard Disk (d) L2 Cache, L1 Cache, RAM, Hard Disk (e) Hard Disk, RAM, L2 Cache, L1 Cache 10. Which of the following is NOT a type of Personal Computer? (a) Desktop computers (b) Laptops/notebooks (c) PDAs (d) Minicomputer (e) None of the above 1. Describe the importance of cache in a computer. 2. Compare and contrast the features of the latest Intel Processor and the AMD Processor. 3. Compare and contrast among the PCI, AGP and PCI Express slots. 4. How can the BIOS on a computer be upgraded? 5. Identify the different ports on a computer and give an example of a use for each of them. 6. What components would be most important in building a PC that would allow you to play the latest games? Discuss (Note: games are very greedy in terms of graphics resources) 7. Why is heat bad for the computer? What can be done to cool down the computer and the processor? 8. Suppose you want to assemble a PC to allow you to play the latest 3D games. What minimal configuration would be required for such a computer? 9. What is the Front Side Bus? How can it be used to overclock a computer? 10. What expansion card would you require for each of the following? (a) Allow you to watch TV on the computer (b) Allow you to connect to the Internet (c) Allow you connect to a network

4/27

Chapter 3: Input and Output Devices 1. A device that allows one to enter data into the computer in the form of text is: (a) keyboard (b) mouse (c) printer (d) modem (e) scanner 2. A device used for producing multi-colour, high quality drawings such as architectural plans, charts and maps is: (a) laser printer (b) plotter (c) lightpen (d) digitizing tablet (e) touchscreen 3. In situations where carbon copies are needed and the quality is not too important, such as invoice sheets, we use: (a) fast plotter (b) laser printer (c) dot matrix printer (d) inkjet printer (e) photocopy machine 4. Resolution is not a relevant criterion for a: (a) monitor (b) digitiser (c) printer (d) scanner (e) microphone 5. One advantage of the dot matrix printer over the laser printer is : (a) Dot matrix printer produces higher quality output. (b) Dot matrix printer prints more pages per minute. (c) Dot matrix printer can print carbon copies. (d) Dot matrix printer is portable. (e) Dot matrix printer has higher running cost. 6. A device used for 3-D positional information in virtual reality systems is the: (a) optical mouse (b) split keyboard (c) trackball (d) data glove (e) touchscreen 7. The choice of input device for an application such as tourism or public information system is: (a) digitising tablet (b) touchpad (c) touchscreen (d) keyboard (e) mouse 8. Which of the following is not a true characteristic of LCDs?

5/27

(a) LCD screens are perfectly flat. (b) LCDs have wide viewing angle. (c) LCDs are light and take up less space. (d) LCDs have low power consumption (e) LCDs do not produce electromagnetic waves. 9. The number of colours that a video card can display is determined by (a) dot pitch (b) pixel density (c) refresh rate (d) power consumption (e) bit depth 10. Which of the following device is least prone to input errors: (a) keyboard (b) touchscreen (c) lightpen (d) mouse (e) touchpad

1. Describe the characteristics of CRT monitor and the factors that affect its quality. 2. Differentiate between an impact printer and a non-impact printer. 3. Explain how a flatbed scanner works. 4. State two applications where touchscreen interface is used and outline the advantages of using touchscreen. 5. Discuss the advantages and disadvantages of LCD and CRT monitors. 6. What are the factors you would consider before buying a printer? 7. Explain the importance and functionality of mechanical, optical and cordless mouse types. 8. Outline the merits and limitations of using touchpad and light-pen. 9. What is the difference between a plotter and a printer? 10. Discuss input and output systems that can assist physically challenged people

6/27

Chapter 4: Secondary Storage 1. Which of the following is not a secondary storage device? (a) Pen-drive (b) Internal hard disk (c) Magnetic reels (d) Floppy disk (e) Random Access Memory (RAM) 2. Which criteria help to differentiate between different storage devices? (a) Portability (b) Price (c) Technology used (d) Size (e) All of the above 3. Data is stored on ________ in a hard disk (a) Disk (b) Tracks (c) Metal platters (d) Magnetic spots (e) Stacks 4. ________ is more appropriate to store a 600MB file that needs frequent updating. (a) CD-RW (b) CD-R (c) CD-ROM (d) DVD ROM (e) Floppy disk 5. Which one of the following lists the components in increasing storage capacity? (a) ZIP disk, floppy, CD-ROM, Hard disk (b) Floppy, hard disk, CD-R, Magnetic tape (c) Magnetic tape, hard disk, floppy, CD-R (d) ZIP disk, Hard disk, floppy, DVD (e) Floppy, CD-R, DVD, Hard disk. 6. Which of the following is true for CDs and DVDs? (a) CDs store more data than DVDs (b) CDs store less data than DVDs (c) CDs cannot be read by DVD drives (d) They use the same technology based on magnetic fields. (e) DVDs can be read by CD drives 7. The unit that is used to specify hard disk capacity is (a) Bite (b) Kg (c) 1.44MB (d) 42X (e) GB 8. Secondary storage devices store data

7/27

(a) Temporarily when power is not available (b) Permanently as long as power is available (c) Permanently even if power is not available (d) Temporarily as long as power is available. (e) None of the above 9. Which of the following does an Optical disk use to read and write data? (a) Magnetic read/write head (b) Laser beam (c) Magnetic spots (d) Sectors (e) Tracks 10. USB, pen drives and flash drives (a) Have similar storage capacity like a floppy (b) Can store less data than a standard floppy (c) All mean the same device that can store lesser data than a standard floppy (d) All mean the same device that can store more data than a standard floppy (e) Are different storage devices that can store more data than a standard floppy

1. Distinguish between primary storage and secondary storage devices. 2. List and describe the most commonly used secondary storage devices in a personal computer. 3. Why would a floppy disk not be appropriate to store a movie file? Explain your answer and propose an alternative storage device. 4. Discuss the different types of hard disks. 5. What are the most common optical disks available on the market? Give a short description for each of them 6. Explain the acronyms R and RW in CR-R and CD-RW. 7. Explain the concept behind magnetic storage and optical storage. 8. List some rules for taking care of a floppy disk and an optical disk. 9. Where would a magnetic tape drive be suitable to use? 10. What is a flash drive and compare it with other storage devices like hard disks, floppy disks and optical disks.

8/27

Chapter 5: Programming
1. Which one of the following steps of software development process involves keying statements into a computer? (a) program specification (b) program design (c) program code (d) program test (e) program documentation 2. In which step of the programming process a solution is created using programming techniques such as pseudocode and flowchart. (a) program specification (b) program design (c) program code (d) program test (e) program documentation 3. Program specification is also called _________________. (a) program definition (b) program charting (c) program coding (d) program design (e) program modeling 4. The omission of a semicolon at the end of a statement in C++ is an example of a ___________ error. (a) loop (b) direct (c) calculation (d) design (e) syntax 5. Which one of the following is carried out throughout all the programming steps? (a) Coding (b) Design (c) Beta testing (d) Documentation (e) Desk checking 6. How are languages that can run on more than one kind of computer called? (a) machine languages (b) portable languages (c) assembly languages (d) problem-oriented languages (e) query languages 7. The structured programming technique that graphically presents the detailed steps needed to solve a problem is known as: (a) object-oriented programming (b) pseudocode (c) flowchart (d) syntax (e) desk checking

9/27

8. Which one of the following statements best explains beta testing? (a) Testing tools are used by the programmer to identify logic errors. (b) The programmer sits at a desk and checks a printout of the program. (c) Both correct and incorrect data are run through the program manually by the programmer, to test for processing results. (d) The programmer uses sample data to test the correct execution of each program statement. (e) Potential users try out the program and provide feedback. 9. In which step of the programming process are the objectives, outputs, inputs, and processing requirements determined? (a) program specification (b) program design (c) program code (d) program test (e) program maintenance 10. What is the purpose of the program maintenance step in the programming process? (a) To code the program, that is, to express the solution in a programming language. (b) To write descriptions and procedures about a program. (c) To ensure that a program is free of errors and is operating efficiently, and effectively. (d) To determine the objectives, the outputs, and the inputs of the program. (e) To plan a solution to the computer problem using structured programming techniques. 1. What are the six steps of programming? What part does coding play in program development? 2. Describe CASE tools and OOP. How does CASE assist programmers? 3. What is meant by generation in reference to programming languages? What is the difference between low-level and high-level languages? 4. What is the difference between a compiler and an interpreter? What role would these tools have in programming with natural languages? 5. Explain what occurs during the program specification step of program development. 6. Differentiate using appropriate examples between syntax and logic errors. 7. Several methods have been devised for finding and removing both syntax and logic errors. List and explain three such methods. 8. Discuss the importance of having appropriate documentation for a program. Who will be using the documentation and for what purpose? 9. Explain, using appropriate examples, the difference between assembly languages and high-level procedural languages. 10. Suppose you have to write a program to output the electricity bill for a consumer. (a) List the output data. (b) List the input data required. (c) Identify and explain the processes involved for producing the electricity bill.

10/27

Chapter 6: Systems Software

1. Which of the following is NOT part of Systems Software? (a) Operating Systems (b) BIOS (c) Compiler (d) Microsoft Word (e) Drivers 2. Which of the following is NOT an example of an Operating System? (a) Suse Linux (b) BSD UNIX (c) Windows 95 (d) AVG Antivirus (e) MS-DOS 3. Which type of Operating System allows several users to work at the same time and also allows each user to have many applications open at the same time? (a) Single user single tasking (b) Single user multi tasking (c) Multi user multi tasking (d) All of the Above (e) None of the above 4. When several people are launching printouts at the same time and a single printer is available, a technique known as _________________ is used. (a) Spooling (b) Communication (c) Buffering (d) Single tasking (e) Scheduling 5. Which function of the Operating System ensures that someone is not illegally manipulating a file not belonging to him? (a) Memory Management (b) Disk Management (c) I/O Management (d) Communications Management (e) Processor Management 6. How is part of the Hard Disk that is reserved for Virtual Memory called in Linux? (a) Boot partition (b) Virtual Hard Disk (c) RAM (d) Swap space (e) MBR 7. Norton Utilities is an example of: (a) Drivers (b) Translators (c) Utilities

11/27

(d) Operating Systems (e) None of the above 8. The BIOS of the computer is stored in (a) RAM (b) ROM (c) Hard Disk (d) CD (e) Floppy disk 9. The process of starting up a computer is known as (a) POST Testing (b) Translating (c) Booting (d) Loading (e) Creating 10. A compiler translates a source program to: (a) An object code (b) An executable (c) English (d) A compressed file (e) A linker 1. What is the job of the BIOS in a computer? 2. The Linux Operating System is available under a lot of distributions. Name at least 10 different distributions. 3. Give five examples of utilities used in a computer. 4. Describe how processes are managed in an Operating System. 5. Give an example of an Operating System for each of the following: a. Single user single tasking b. Single user multi tasking c. Multi user multi tasking 6. Describe the booting up process. 7. How do interpreters differ from compilers? 8. Explain the concept of Virtual Memory. 9. Compare and contrast the following Operating Systems: a. Windows XP b. Linux c. MAC OS X 10. Give some examples of compilers and interpreters.

12/27

Chapter 7: Applications Software 1. Which of the following formats will draw a line through selected text? (a) Subscript (b) Underline (c) Outline (d) Strikethrough (e) Superscript 2. To create an Outline style numbered list, which of the following dialog boxes would you use? (a) The Numbering dialog box (b) The Outline Numbered dialog box (c) The Bullets and Numbering dialog box (d) The format dialog box (e) You do not use a dialog box to create an Outline style numbered list, you would use a Toolbar button 3. When a word is to be inserted into the middle of an existing paragraph, the user has to I. Click to position the cursor of the insertion point where you would like to type the word II. Select the paragraph that you would like to insert a word into III. Do nothing, Word will automatically insert the word where you want it (a) I only (b) II only (c) III only (d) I & II (e) I, II & III 4. In order to modify a page number, you must activate which of the following areas of your document? (a) The Header or Footer Area (b) The Page Number Area (c) The Editing Area (d) The Text box Area (e) The Rectangle Area 5. Which of the following page orientations are you able to set a document to use? (a) Landscape and Horizon (b) Horizon and Portrait (c) Portrait and Vertical (d) Landscape and Portrait (e) Horizon and Vertical 6. The term given to the words entered on a spreadsheet, which usually name a column: (a) Value (b) Cell (c) Label (d) Graph (e) Cell Address 7. In a spreadsheet, a function is (a) a built in computation which summarizes values in specified cells (b) a term for a number in a spreadsheet (c) an intersection of a row and column

13/27

(d) a vertical division in a spreadsheet (e) a horizontal division in a spreadsheet 8. Which of the following CANNOT be used to access a webpage using a browser? (a) Type the URL into the address bar (b) Type an address into the status bar (c) Click on a link found in Favorites or Bookmarks (d) Click on a link found in History (e) Click on a link on another webpage 9. Which of the following is an email application? (a) Microsoft Outlook (b) Windows (c) Unix (d) Microsoft Word (e) Microsoft Excel 10. Which of the following is NOT an option when sending an email (a) To (b) From (c) Cc (d) Bcc (e) C

1. Differentiate between general purpose and special purpose Applications Software. 2. List and briefly explain the main features of word-processing software packages. 3. What are the benefits of using presentation graphics software during a talk or presentation? 4. For what reasons users may wish to add narration to their slide show? 5. Name a few types of graphs which may be generated by a spreadsheet. 6. One important feature of a spreadsheet is the use of formulae. What are they? 7. Discuss the components of a DBMS. 8. What is the purpose of a browser? 9. One feature of email software is the address book. What is an address book and what is its use? 10. What is an email signature in an email message?

14/27

Chapter 8: Systems Development 1. An arrangement of people, data, processes, communications, and information technology is (a) A system (b) An information system (c) A boundary (d) An environment (e) A structure 2. The task or activity that a system performs is its (a) Component (b) Structure (c) Function (d) Objective (e) Operation 3. Which one of the following is not a task carried out in preliminary investigation? (a) Identify problems of the current system (b) Identify functions to be performed (c) Identify the data which needs to be stored (d) Identify objectives of the new system (e) Identify constraints placed on the project 4. Information Gathering is an activity of: (a) Preliminary Investigation (b) Design (c) Data Analysis (d) Detailed Investigation (e) Implementation 5. Which Information Gathering technique is a good way of confirming information gathered through other techniques? (a) Interviews (b) Questionnaires (c) Performance Indicators (d) Observation (e) Study of Existing Documents 6. A useful tool during analysis is the (a) Data flow (b) Database (c) Data store (d) Data capture (e) Data flow diagram 7. Which phase of the SDLC focuses mostly on input, output and processing? (a) Analysis (b) Design (c) Implementation (d) Testing (e) Maintenance 8. Which of these tasks is not performed in System Development?

15/27

(a) Purchasing of personal computers (b) Writing code (c) Building the database (d) Training of users (e) Testing the software 9. Bugs in the system are discovered during: (a) Testing (b) Training (c) Systems Audit (d) Post Implementation Review (e) Installation 10. If the implementation of the new system has brought about a reduction in the amount of resources used, then, the new system is said to be more (a) Productive (b) Efficient (c) Costly (d) Reliable (e) Accurate 1. In terms of components, structure, function and objective, define the following systems: (a) An educational system (b) The human body (c) A football game 2. Give an example of each of the following which would lead to the systems analysis and design of a company involved in the production of shoes: (a) Problem (b) Opportunity (c) Directive 3. What is the System Development Life Cycle (SDLC)? List the main phases of the SDLC. 4. At the end of Preliminary Investigation, the system analyst writes a report to management. After discussing over this report, management will decide either to proceed with or give up the project. Briefly describe the contents of this report. 5. List the techniques of information gathering. For each of the following, identify which technique should be used: (a) To examine recorded operating procedures (b) To collect quantitative information (c) To collect qualitative information (d) To solidify hazy understanding regarding the system 6. What is the purpose of a Data Flow Diagram? Briefly describe each of the components making up a DFD. 7. Describe the main tasks performed in Systems Design. 8. In software development, programming tools are used to generate code and high level programming languages are used for coding. Give some examples of each. 9. Differentiate between Systems Audit and Post Implementation Review. 10. List and explain the 3 different types of maintenance?

16/27

Chapter 9: Computer Networks 1. In which of the following network cable is data (signals) transmitted as pulses of light? (a) Unshielded Twisted Pair (b) Fibre Optic (c) Coaxial (d) Network Interface Card (NIC) (e) None of the above 2. Which of the following network type is relatively error-prone? (a) WAN (b) LAN (c) Star topology (d) Client/server architecture (e) Peer-to-peer architecture 3. A ___________ is a common set of rules that specify how computers on a network communicate. (a) Server (b) Client (c) Topology (d) Protocol (e) Medium 4. Which type of network server holds and distributes files in a network? (a) Mail server (b) Proxy server (c) Web server (d) File server (e) Print server 5. In which of the following network topology does the entire network go out of operation if there is a break in the main cable? (a) Star topology (b) Full mesh topology (c) Bus topology (d) Partial mesh topology (e) Peer-to-peer network 6. UTP cable has four pairs of wires inside its jacket. Why is each pair twisted with a different number of twists per inch? (a) To help eliminate interference from adjacent pairs and other electrical devices (b) To make each pair of wire stronger (c) Because signals are carried quicker in twisted wires (d) So that a pair can be easily distinguished from the other (e) None of the above 7. Which one of the following mediums the wireless networks use to transmit data? (a) copper wires (b) optical fibre (c) water (d) air (e) earth

17/27

8. Which type of wireless network would be more appropriate for a small university campus? (a) Wireless Personal Area Network (b) Wireless Metropolitan Area Network (c) Wireless Local Area Network (d) Wireless Metropolitan Area Networks (e) Wireless Wide Area Networks 9. What is an Access Point? (a) a wireless network interface card (b) a central transmitter and receiver of WLAN radio signals (c) a Bluetooth module (d) a mobile entertainment system (e) a wired connection 10. What is the approximate range supported by the Bluetooth technology? (a) 10 meters (b) 100 meters (c) 1000 meters (d) 10000 meters (e) 100000 meters

1. Consider the setting up of network using a full mesh topology. Suppose that there are m stations (computers) and that on the average each link (connection) will use n metres of cable. Derive a formula in terms of m and n for: (a) The number of links (connections) and the cable length that will be required. (b) The amount of cable length that will be required. 2. A laboratory has ten computers. The IT Manager is on the way of implementing a corporate network using a bus topology. Coaxial cable will be used. Explain fully the risks such an option might entail. 3. In a WAN, data may be transmitted along public carriers. Explain what you understand by public carriers and provide one example of such a carrier. 4. What are the fundamental differences between a Local Area Network (LAN) and Wide Area Network (WAN)? 5. Your advice has been sought for the selection of the transmission media (network cabling) to be used to connect two LANs in two separate buildings. The available options are: coaxial, fiber optic (10BaseF) or UTP cable. The distance between the two buildings is 1850 metres. Video, audio and multimedia files will travel along the link, once it has been established. Justify, giving reasons, the transmission media which would best suit the above connection. 6. What card should be inserted in the expansion slot of computer for it to gain access to a network? What characteristic of such cards make them different from other similar cards? 7. Discuss the advantages of wireless networks over traditional wired networks. 8. Discuss the components and application of a Wireless LAN. 9. Differentiate between the Bluetooth and HomeRF wireless technologies. Give an example of the application of each. 10. Discuss the advantages of mobile commerce. Give two examples of mobile commerce.

18/27

Chapter 10: The Internet 1. Which of the following is NOT required when connecting to the Internet? (a) A pc (b) A web browser (c) A telephone line (d) A modem (e) A printer 2. What does a URL do? (a) Stores video clips (b) Identifies the location of an electronic file (c) Prevents viruses from spreading (d) Transmits live web cam pictures (e) Creates backup of data 3. What is a hyperlink? (a) A type of error message (b) A video game (c) A very fast internet connection (d) Words or pictures that when clicked on redirect you to another page (e) A type of network connection 4. Which of the following is NOT a possible error message when accessing a website? (a) The page does not exist (b) The URL typed is wrong (c) You do not have authorization to view such a page (d) The site is having technical problems (e) Your modem cannot be detected 5. Spam is (a) Sending unsolicited messages (b) Sending emails to friends (c) Deleting an email on reception (d) A web browser (e) A web server 6. Mozilla Firefox is an example of: (a) A web browser (b) A web server (c) A software to listen to music (d) A software to watch video (e) A word-processing software 7. A Blog is (a) A personal web site where other people can leave comments (b) A special kind search engine (c) A web browser (d) A web server (e) A website that can be edited by anyone 8. A wiki is

19/27

(a) A personal web site where other people can leave comments (b) A web browser (c) A web server (d) A website that can be edited by anyone (e) A router 9. A protocol is (a) A mode of transmission on the web (b) A set of rules that communicating bodies follow to communicate (c) A special kind of search engine (d) A website that can be edited by anyone (e) A kind of network 10. A web server is (a) A computer which contains server software and which hosts web pages on the web (b) A special software that is used to access web pages on the web (c) A special software that is used to read emails on the web (d) A kind of virus that spreads when a user requests a web page (e) Another name for a web browser

1. What are the main differences between the Internet and the WWW? 2. How would you subscribe to a mailing list? 3. What does a user need to start using the Internet at home? 4. What is the purpose of a search engine? 5. What are blogs and wikis? 6. What are protocols? Why are they needed on the Internet? 7. What is the difference between a newsgroup and a forum? 8. What is an IP address? Why are computers assigned IP addresses on the web? 9. Explain the term Domain name and its importance on the web. 10. When do you need to install a plug-in and why?

20/27

Chapter 11: Computer Security 1. Protecting data being transferred from exposure to third party is referred as (a) denial of service (b) integrity (c) authentication (d) unavailability (e) confidentiality 2. When the attacker is capable of sending data with the illusion that it is coming from a different source, this is called : (a) fraud (b) spoofing (c) redirecting (d) sabotage (e) spamming 3. Which of the following is not considered good practise for password security? (a) Changing the password on a regular basis (b) Using a combination of upper- and lower-case characters, a number, and a special character in the password (c) Avoiding inclusion of dictionary words (d) Not writing the password down (e) Using less than eight characters long 4. A combination of hardware components and appropriate software that controls or filters access between two networks is called: (a) an antivirus (b) a firewall (c) a port (d) a trojan (e) a network card 5. A piece of code which looks like a useful application while performing malicious activity in the background is: (a) a trojan (b) a worm (c) a cypher (d) a patch (e) a bug 6. The act of manipulating legitimate users to obtain confidential information is called: (a) masquerading (b) Intruding (c) social engineering (d) fraud (e) malware 7. Which of the following is not a carrier file for boot sector viruses? (a) .EXE file (b) .COM file (c) .XLS file (d) .BAT file (e) .SYS file

21/27

8. Which legislation has been specifically enacted to protect the society from criminal activities perpetrated through computer systems? (a) The Electronic Transaction Act 2000 (b) The Copyright Act 1997 (c) Data Protection Bill (d) Computer Misuse and Cybercrime Act 2003 (e) Criminal Code Act 9. The method used for converting a message into an uninteligible form to avoid being seen during transmission is: (a) filtering (b) shielding (c) encryption (d) protection (e) integrity 10. What are the three main goals of computer security? (a) Control, intelligence, action (b) Central intelligence agency (c) Confidentiality, integrity, availability (d) Confidence, integrity, action (e) Confidentiality, intelligence, availability 1. What are the three main objectives of computer security? 2. Explain why social engineering is such a successful form of attack? 3. Describe the function of firewall in computer security? 4. Explain how encryption can provide secure email transmission? Use Caesars cipher with key value 4 to encrypt the message I came I saw and I conquered. 5. Distinguish between strong and weak passwords, and outline the characteristics that make a password difficult to guess. 6. Describe the types of attacks that e-commerce web sites frequently experience. 7. Write a brief essay outlining the steps required to minimize the possibility of an attack on a computer system. 8. Define the term computer worm, and distinguish it from computer virus. 9. Describe some of the user security responsibilities that you feel are most important for users to remember. 10. In an environment familiar to you (the university or where you work, for example) determine what computer security measures are employed. Discuss whether you think they are sufficient.

22/27

Chapter 12: Software Utilities 1. Which of the following statements are true with respect to freeware: I. The author defines the terms of usage and distribution of the software. II. It can be used for commercial purpose. III. The user is legally bound to abide by the terms of usage set by the author. IV. Support is provided by the author if there are errors in the software. (a) I & II Only (b) II & III Only (c) III & IV Only (d) I & III Only (e) II & IV Only

2. Which of the following statements are true with respect to shareware: I. They are released by the author for the users to try it before making a decision on the purchasing the software. II. They are copyrighted. III. They continue to function after the expiry of the trial period. (a) I Only (b) II Only (c) III Only (d) I, II & III (e) None 3. Shareware softwares where some features are limited till the user registers the software are termed as ______________. (a) Crippleware (b) Nagware (c) Spyware (d) Adware (e) Malware 4. ________________ is a type of program which gets installed on the users computer without the users knowledge and transmits the users information to a third party. (a) Postcardware (b) Crippleware (c) Nagware (d) Adware (e) Malware 5. ________________ Utility takes care of arranging all the portions of the file in a manner that they are all in contiguous locations. (a) Disk Cleanup (b) Disk Backup (c) Data Compression (d) Multimedia (e) Disk Defragmenter 6. Which of the following statements are true with respect to Data Compression Utility: I. Makes use of mathematical algorithms to search for repeating patterns and replace them with smaller codes which reduce the overall size of the file. II. Enables transfer of large files from one location to another by compressing the size of the file. III. For every Data Compression Utility there exists a corresponding Decompression Utility. IV. Data Compression Utility does not allow the creation of self extracting compressed files.

23/27

(a) I, II & III Only (b) I, III & IV Only (c) II, III & IV Only (d) I , III & IV Only (e) I, II & IV Only 7. Which of the following statements are true with respect to Disk Cleanup Utility: I. It is used to compress all large files into smaller files. II. Scans the hard drive for the files that can be safely deleted. III. Deletes the temporary files and other files that are not needed. (a) I & II Only (b) II & III Only (c) I & III Only (d) I only (e) III Only 8. Which of the following statements are true with respect to download utility? I. Allows the user to pause the download of a file. II. Allows the user to download several files simultaneously from a site. III. Allows the user to compress the file at the site and download it to their computer (a) I Only (b) II Only (c) III Only (d) I & II Only (e) II & III Only 9. Which of the following statements are true with respect to Antivirus software? I. Takes care of performing automatic scans of the computer II. Cleaning the infected file on detection III. Quarantines an infected file IV. Preventing infected programs from getting installed on the computer. (a) I,II & III (b) II, III & IV (c) I , III & IV (d) I, II & IV (e) None 10. Which one of the following is not a CD burning utility? (a) Real One Player (b) Nero 6 Ultra Edition (c) Quick Time Player (d) Roxio Digital Media SE (e) Windows Media Player

1. Compare the various categories of softwares that exist. 2. Illustrate how a Disk Fragmentation Utility can enhance the performance of a system. 3. Describe the methods of taking backup of data and restoring it in the eventuality of a system failure. 4. What do you understand by data compression? Explain briefly. 5. Explain how compression and decompression of data takes place. 6. Briefly explain the need for Download Utilities? Briefly outline the advantages provided by Download Utilities when

24/27

compared to the traditional method of downloading data files. 7. List the various types of Download Utilities that exist. 8. Briefly outline the purpose of antivirus software? 9. Explain the importance of installing anti-spyware utility on the system. 10. Briefly outline the various multimedia utilities that exist.

25/27

Chapter 13: Issues and Trends in IT 1. Carpal tunnel syndrome is an example of (a) Health hazard resulting from wrist malformation (b) RSI involving repetitive strain imposed on wrist (c) Eye strain (d) Back pain (e) Torso pain 2. Which devices are most likely to cause health problems to a computer user? (a) Chair, monitor, table and mouse. (b) Chair, monitor, table and keyboard. (c) Chair, mouse, table and keyboard (d) Table, mouse, monitor and keyboard (e) Table, scanner and printer 3. Which of the following is not a good practice when working on a computer? (a) Taking frequent short breaks (b) Set the keyboard at a height that allows your arm to remain comfortable. (c) Work in brightly lit room (d) Having the monitor much above eye sight level. (e) Using an ergonomic keyboard 4.________ is concerned with finding ways to adapt a task to an individual rather than forcing the person to adapt to the task. (a) Social engineering (b) Ergonomics (c) Health monitors (d) Human resource department. (e) Workflow management 5. Data Protection Bill 2004 of Mauritius sets out (a) Regulations for safe transactions among consumers and suppliers over networks (b) Rules that govern the capture, transmitting, manipulating, recording and storage of data relating to individuals (c) Specific legislation for penalties involving cyber crimes (d) provide the appropriate legal framework for the protection of intellectual property rights (e) None of the above 6. __________ deals with electronic signature recognition. (a) Computer misuse and cyber crime Act 2003 (b) Electronic Transaction Act 2000 (c) Copyright Act 1997 (d) E commerce Act 2001 (e) Data Protection Bill 2004 7. Which of the following will prevent someone from using materials you published over the Internet without your permission? (a) Patent (b) Trademarks (c) Copyright (d) Plagiarism (e) None of the above

26/27

8. Ethics in general (a) Is a segment of the law to protect computer users (b) Cannot be applied without law (c) Complements the law by specifying good moral conduct (d) Concerns only computer specialists (e) Does not concern any of the above 9. _________ is a professional organization that sets out ethical guidelines for its members (a) ACN (b) BCC (c) IIEE (d) BCS (e) ACC 10. Which of the following is an ethical behavior? (a) Copying the power point assignment of your friend without his consent (b) Copying the power point assignment of your friend with his consent (c) Not using a computer that is running a simulation for a final year project in the university computer lab. (d) Randomly deleting files on a university computer lab. (e) Downloading and saving illicit materials on university computer labs.

1. Computer use is associated with various health hazards. List and describe some of them. 2. Explain what ergonomics is and provide for recommendations related to a healthy and productive environment for using computers. 3. What is the importance of taking short breaks when working for long periods on computers? 4. List and describe some common misuses of IT. 5. Explain the need for a legal framework in relation to IT use. List and describe some common IT laws that exist in Mauritius. 6. What is copyright? 7. Describe what ethics relate to. Provide short examples of ethical behavior regarding computer use. 8. If IT laws do exist, why is there a need for ethical guidelines? 9. Explain the term wearable technology. List and describe a few examples of wearable technology. 10. IP television is a new trend in IT. Explain the term IPTV.

27/27

Anda mungkin juga menyukai