Escolar Documentos
Profissional Documentos
Cultura Documentos
CS/APR 2011/CSC133/134/434
COMPUTER AND INFORMATION PROCESSING / COMPUTER ESSENTIALS AND APPLICATIONS CSC133/134/434 APRIL 2011 2 HOURS
INSTRUCTIONS TO CANDIDATES 1. This question paper consists of three (3) parts PART A (40 Questions) PART B (7 Questions) PART C (3 Questions)
2.
Answer ALL questions from PART A, PART B and TWO (2) questions from PART C: i) ii) Answer PART A in the Objective Answer Sheet. Answer PART B and PART C in the Answer Booklet. Start each answer on a new page.
3. 4.
Do not bring any material into the examination room unless permission is given by the invigilator. Please check to make sure that this examination pack consists of: i) ii) iii) the Question Paper an Answer Booklet - provided by the Faculty an Objective Answer Sheet - provided by the Faculty
CONFIDENTIAL
CS/APR 2011/CSC133/134/434
1.
consists of electronic components that store temporary instructions to be executed by the processor, data needed by those instructions, and the results of processing the data(information). A. B. C. D. memory bus bit port .
2.
Below are the types of buses, EXCEPT A. B. C. D. digital bus backside bus system bus expansion bus
3.
A case that contains electronic components of the computer that are used to process data is referred as . A. B. C. D. processor memory CPU system unit .
4.
Below are the types of adapter cards EXCEPT A. B. C. D. Digital MIDI Network Modem
5.
A(n) is an opening inside the system unit in which you can install additional component. A. B. C. D. bay bus port slot
6.
An electronic component in the system unit that used to process data is referred as
A. B. C. D.
CONFIDENTIAL
CONFIDENTIAL
CS/APR 2011/CSC133/134/434
7.
A(n) is someone who develops software or writes the instructions that direct the computer to process data into information. A. B. C. D. system analyst programmer designer manager is a socket on the motherboard that can hold an adapter card.
8.
9.
A small piece of semiconducting material, usually silicon, on which integrated circuits are fixed also known as . A. B. C. D. chip memory bus motherboard
10.
Which of the following is NOT a storage media? A. B. C. D. hard disks memory cards keyboard optical Discs
11.
The benefits from using computers are possible because computers have the advantages of the followings EXCEPT . A. B. C. D. speed consistency storage health risk
12.
A special type of notebook computer that allows you to write or draw on the screen using a digital pen is also known as . A. B. C. D. tablet PCs smart phones netbook handheld computer
CONFIDENTIAL
CONFIDENTIAL 13.
CS/APR 2011/CSC133/134/434
Which of the following is NOT an example of graphic software? A. B. C. D. Adobe Photoshop Microsoft Visio AutoCAD Microsoft Excel
14.
A is a widely used type of application software that relates to communications. It allows users with an Internet connection to access Web pages. A. B. C. D. Web browser word processing software database software spreadsheet software .
15.
tabbed browsing where the top of browser display a tab a built-in connection to another related web page or part of a web page activity of using link to explore the web search engine that allows user to find web sites, web pages, web images and other information. .
16.
is provided for use, modification, and redistribution has no restrictions from the copyright holder usually can be downloaded from the Web at no cost All of the above
17.
To safely and remove a program from your computer, you might want to use what type of utility? A. B. C. D. Backup program File compression program Troubleshooting program Uninstall program restricts access to specified Web sites. pop-up blocker spyware remover anti-spam program Web filter for future use.
18.
A A. B. C. D.
19.
CONFIDENTIAL
CS/APR 2011/CSC133/134/434
A(n) is a portable storage device that has much greater storage capabilities than a floppy disk, but is small and lightweight enough to be transported on a keychain or in a pocket. A. B. C. D. zip disk hard disk USB flash drive DVD stores data on a thin microprocessor embedded in the card. A. B. C. D. Magnetic stripe card Smart card Tape Microfilm .
22.
23.
If a read/write head touches the surface of a hard disk, it causes A. B. C. D. a hard-disk controller crash the disk is demagnetized the data on the disk is scrambled a head crash
24.
measures the amount of time it takes by a storage device to locate an item on a storage medium. A. B. C. D. Latency Tracking Access time Resolution is the phrase that refers to the activity of using links to explore the Web. A. B. C. D. Strolling the Web Weaving the Web Surfing the Web Wandering the Web
25.
CONFIDENTIAL
CONFIDENTIAL
26.
The steps in web publishing are: A. B. C. D. Planning and maintaining the Web site Analyzing and designing the Web site Creating and deploying the Web site All of the above
27.
The following are types of web sites EXCEPT: A. B. C. D. Portal Advocacy Wiki Multimedia
28.
The transmission media on which the data, instructions, or information travel is called as a . A. B. C. D. sending device receiving device communications Chanel Copper wire
29.
A(n) provides functions such as an electronic appointment calendar, address book, and a notepad. A. B. C. D. ATM PIM WAP P2P specification to transmit data
30.
Some computers and devices use the wirelessly to each other via infrared light waves. A. B. C. D. WAP IrDA RFID Wi-Fi
31.
Physical transmission media used in communications include A. B. C. D. twisted-pair fiber-optic coaxial all of the above
cable.
CONFIDENTIAL
CONFIDENTIAL
CS/APR 2011/CSC133/134/434
32.
is a type of network that is simple, inexpensive and typically connect fewer than 10 computers. A. B. C. D. Peer-to-Peer Client/server Bus network Token ring
33.
Communication software consist of program that: A. B. C. D. Help user establish a connection to other computer or network. Manage transmission of data, instructions, and information. Provide an interface for users to communicate with one another. All of the above.
34.
is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. A. B. C. D. Cracker worm Trojan horse Virus
35.
An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called . A. B. C. D. Spyware adware Spam Cookies .
36.
A virus hoax often is in the form of a(n) A. B. C. D. photo attachment newsletter advertisement chain letter
37.
In its simplest form, a(n) decrypt cipher text. A. B. C. D. Plaintext encryption key firewall digital signature
CONFIDENTIAL
CONFIDENTIAL 38.
CS/APR 2011/CSC133/134/434
A person breaking into a computer laboratory and smashing computers is an example of . A. B. C. D. piracy hardware vandalism software theft information theft
39.
A(n) is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network. A. B. C. D. Safeguard worm Encryption Virus
40.
In order to access controls to digital resources, we need to have a user name and password, a possessed object, and . A. B. C. D. a memory card a license agreement a biometric device an adapter card
CONFIDENTIAL
CS/APR 2011/CSC133/134/434
QUESTION 1 Define the following : a) b) c) d) e) f) Touch screen. Memory. Digital literacy Packaged software Custom software Global positioning device (GPS) (12 marks) QUESTION 2 Briefly describe the following game controllers: a) b) c) gamepads light guns dance pad (6 marks) QUESTION 3 Define any THREE (3) ways for the proper care of an optical disc. (3 marks) QUESTION 4 List THREE (3) types of Operating System. (3 marks) QUESTION 5 Briefly explain the differences between Local Area Network (LAN), Metropolitan Area Network (MAN) and Wide Area Network (WAN). (6 marks) QUESTION 6 Define what hard disk is and list any TWO (2) characteristics of hard disk. (4 marks) QUESTION 7 There are thirteen types of Website. Briefly explain any THREE(3) types of web sites. (6 marks)
CONFIDENTIAL
10
CS/APR 2011/CSC133/134/434
Choose only TWO (2) questions and answer in the answer booklet provided.
QUESTION 1 Faris has considered himself as a victim of unauthorized access and use of computer and devices. When he arrived to work one day, he noticed that his keyboard and mouse have been moved from the location he left in the previous day. Besides, his computer Web browser's history had shown that its listing sites are the sites that he never visited before. Therefore, he suspected that someone has used his computer while he is out of the office. Suggest FIVE (5) safeguard or precautions which he can apply to prevent the situation from happening again. (10 marks)
QUESTION 2 Application software is a computer software designed to help user to perform singular or multiple related specific tasks. It helps user to solve problems in the real world. Describe any FIVE (5) applications software that suits your need as a university student. (10 marks)
QUESTION 3 People uses computer mostly on their daily basis life. A computer allows them to accomplish many tasks needed. Briefly explain the following categories of users: a home user, a small office/home office user, a mobile user, a power user, and an enterprise user. (10 marks)
CONFIDENTIAL