Podcast
Questions and Answers
Microprocessor is
Microprocessor is
- an electronic device, operating under the control of instructions waiting to be executed stored in its own memory.
- a chip that contains a central processing unit and often called as processors for short. (correct)
- a collection of computers and devices connected wirelessly or via communications devices and transmission media.
- a term that refers to the large and complex data sources that defy easy management with the traditional data processing method.
__________ hold a thousand of pieces of information on hundred of millions of consumers worldwide.
__________ hold a thousand of pieces of information on hundred of millions of consumers worldwide.
- Data brokers (correct)
- Digital brokers
- Scammers
- Financial brokers
Which of the following is NOT a technique on how personal information is stolen?
Which of the following is NOT a technique on how personal information is stolen?
- Dumpster diving
- Stealing
- Phishing
- Adware (correct)
An attacker who pretends to be from a legitimate research firm asks for personal information is called
An attacker who pretends to be from a legitimate research firm asks for personal information is called
A hardware device that allows you to play video games, either single-player or multiplayer is called
A hardware device that allows you to play video games, either single-player or multiplayer is called
Identify the INCORRECT aspect of being a responsible digital citizenship.
Identify the INCORRECT aspect of being a responsible digital citizenship.
A code of acceptable behaviours the users should follow while on the Internet is known as
A code of acceptable behaviours the users should follow while on the Internet is known as
Organization can implement the following measures to reduce electrical waste EXCEPT
Organization can implement the following measures to reduce electrical waste EXCEPT
An alternative text is
An alternative text is
The following are various types of computers exist, EXCEPT
The following are various types of computers exist, EXCEPT
A printer that is small, lightweight, and built into or attached to a mobile device for mobile printing is known as
A printer that is small, lightweight, and built into or attached to a mobile device for mobile printing is known as
Which of the following is TRUE about touch screen gestures?
Which of the following is TRUE about touch screen gestures?
RFID reader is a technology that uses __________ to communicate with a tag placed in or attached to an object, an animal, or a person.
RFID reader is a technology that uses __________ to communicate with a tag placed in or attached to an object, an animal, or a person.
RAM, also called __________, consists of memory chips that can be read from and written to by the processor and other devices.
RAM, also called __________, consists of memory chips that can be read from and written to by the processor and other devices.
The quality of a display devices depends on the following EXCEPT
The quality of a display devices depends on the following EXCEPT
Which of the following is used to control the movements and actions of a player or object in computer games, simulations, and video games?
Which of the following is used to control the movements and actions of a player or object in computer games, simulations, and video games?
Shareware is
Shareware is
Which of the following is the INCORRECT match for mobile application?
Which of the following is the INCORRECT match for mobile application?
Artificial Intelligence (Al) is the technological use of logic and prior experience to __________ human intelligence.
Artificial Intelligence (Al) is the technological use of logic and prior experience to __________ human intelligence.
Identify the CORRECT example of Artificial Intelligence's digital assistant.
Identify the CORRECT example of Artificial Intelligence's digital assistant.
Troubleshooting is
Troubleshooting is
Most antivirus programs provide protections against viruses such as stated below EXCEPT
Most antivirus programs provide protections against viruses such as stated below EXCEPT
Pop-under ad is the Internet advertisement that is hidden __________ the browser window so that it will be viewed when users __________ close their browser windows.
Pop-under ad is the Internet advertisement that is hidden __________ the browser window so that it will be viewed when users __________ close their browser windows.
The following are examples of the desktop operating system EXCЕРТ
The following are examples of the desktop operating system EXCЕРТ
Linux operating system
Linux operating system
Which of the following is FALSE?
Which of the following is FALSE?
Adawiyah's laptop's battery is only 30%, and she has forgotten to bring her adapter. Suggest the BEST option in the operating system that allows her to save battery power while completing her tasks.
Adawiyah's laptop's battery is only 30%, and she has forgotten to bring her adapter. Suggest the BEST option in the operating system that allows her to save battery power while completing her tasks.
A file with format .jpg is a type of __________ file.
A file with format .jpg is a type of __________ file.
Which of the following is NOT the function of operating system?
Which of the following is NOT the function of operating system?
Which of the following has the function to assess and report information about various computer resources and devices?
Which of the following has the function to assess and report information about various computer resources and devices?
Bandwidth is
Bandwidth is
The two types of webpages are __________ and __________.
The two types of webpages are __________ and __________.
Which of the following is NOT an example of a browser?
Which of the following is NOT an example of a browser?
The portion of a URL that identifies one or more IP addresses is called
The portion of a URL that identifies one or more IP addresses is called
The following are TRUE about top-level domain (TLD) and its intended purpose, EXCEPT
The following are TRUE about top-level domain (TLD) and its intended purpose, EXCEPT
A protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person is called
A protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person is called
Which of the following is an example of close-distance network protocols?
Which of the following is an example of close-distance network protocols?
A device that is used to improve reception and the extend the range of wireless router is called the
A device that is used to improve reception and the extend the range of wireless router is called the
Which of the following enables an individual to access an organisation's network by using encryption and other technologies to secure the data transmitted along the path?
Which of the following enables an individual to access an organisation's network by using encryption and other technologies to secure the data transmitted along the path?
The following are the common network risks EXCЕРТ
The following are the common network risks EXCЕРТ
All of the following is true about Long Term Evolution (LTE) EXCEPT
All of the following is true about Long Term Evolution (LTE) EXCEPT
The practice of protection against digital threats, including unauthorised or illegal access of data is called
The practice of protection against digital threats, including unauthorised or illegal access of data is called
A cyber extortionist is a/an __________ who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network.
A cyber extortionist is a/an __________ who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network.
The following practices can help protecting your computer from viruses and other malware, EXCEPT
The following practices can help protecting your computer from viruses and other malware, EXCEPT
What strategies can an organisation implement to minimise the chance that a perpetrator intentionally accesses confidential information?
What strategies can an organisation implement to minimise the chance that a perpetrator intentionally accesses confidential information?
Copies only the files that have changed since the last full backup. Requires minimal storage space to back up. Fast backup method. The descriptions above refer to
Copies only the files that have changed since the last full backup. Requires minimal storage space to back up. Fast backup method. The descriptions above refer to
The following is an example of common biometrics used for authentication, EXCEPT
The following is an example of common biometrics used for authentication, EXCEPT
Is a private combination of words. Often containing mixed capitalisation and punctuation. Associated with a username. The description provided pertains to
Is a private combination of words. Often containing mixed capitalisation and punctuation. Associated with a username. The description provided pertains to
Which of the following helps the users create and store multiple strong passwords in a single user vault file?
Which of the following helps the users create and store multiple strong passwords in a single user vault file?
A program that hides within or looks like a legitimate program, but does not replicate itself, are is called
A program that hides within or looks like a legitimate program, but does not replicate itself, are is called
Which of the following is NOT the factor that motivates users to use cloud computing?
Which of the following is NOT the factor that motivates users to use cloud computing?
Cloud computing is
Cloud computing is
Platform as a Service (PaaS) provides
Platform as a Service (PaaS) provides
The following are disadvantages of cloud computing, EXCEPT
The following are disadvantages of cloud computing, EXCEPT
Which of the following is NOT type of cloud computing?
Which of the following is NOT type of cloud computing?
FinTech continues to growth due to the following factors, EXCEPT
FinTech continues to growth due to the following factors, EXCEPT
Which of these options represents an instance of automated financial advice known as roboadvice?
Which of these options represents an instance of automated financial advice known as roboadvice?
Identify the risk that may arise from using Big Data.
Identify the risk that may arise from using Big Data.
All of the following is an example of FinTech EXCEPT
All of the following is an example of FinTech EXCEPT
Blockchain is the __________ technology that underlies bitcoin.
Blockchain is the __________ technology that underlies bitcoin.
Flashcards
Microprocessor
Microprocessor
A chip that contains a central processing unit.
Data brokers
Data brokers
Companies that collect and sell personal information.
Dumpster diving
Dumpster diving
Searching trash for personal information.
Pretexting
Pretexting
Signup and view all the flashcards
Game console
Game console
Signup and view all the flashcards
Netiquette
Netiquette
Signup and view all the flashcards
Alternative text
Alternative text
Signup and view all the flashcards
Mobile printer
Mobile printer
Signup and view all the flashcards
Drag or slide
Drag or slide
Signup and view all the flashcards
RFID reader
RFID reader
Signup and view all the flashcards
RAM (Random Access Memory)
RAM (Random Access Memory)
Signup and view all the flashcards
Shareware
Shareware
Signup and view all the flashcards
Artificial Intelligence (AI)
Artificial Intelligence (AI)
Signup and view all the flashcards
Troubleshooting
Troubleshooting
Signup and view all the flashcards
Pop-under ad
Pop-under ad
Signup and view all the flashcards
Linux operating system
Linux operating system
Signup and view all the flashcards
Search
Search
Signup and view all the flashcards
Low-power mode
Low-power mode
Signup and view all the flashcards
.jpg
.jpg
Signup and view all the flashcards
Bandwidth
Bandwidth
Signup and view all the flashcards
Static, dynamic webpages
Static, dynamic webpages
Signup and view all the flashcards
Domain name
Domain name
Signup and view all the flashcards
.biz
.biz
Signup and view all the flashcards
RFID
RFID
Signup and view all the flashcards
NFC (Near Field Communication)
NFC (Near Field Communication)
Signup and view all the flashcards
Booster
Booster
Signup and view all the flashcards
VPN (Virtual Private Network)
VPN (Virtual Private Network)
Signup and view all the flashcards
Cybersecurity
Cybersecurity
Signup and view all the flashcards
Incremental backup
Incremental backup
Signup and view all the flashcards
Cloud computing
Cloud computing
Signup and view all the flashcards
Study Notes
- The final examination for Fundamentals of Information Technology (AIS160) is in July 2024 and lasts 3 hours.
- The exam paper has two parts: A (60 questions) and B (4 questions).
- All questions must be answered.
- Part A is to be answered in the Objective Answer Sheet.
- Part B is to be answered in the Answer Booklet.
Part A: Multiple Choice Questions
- A microprocessor is an electronic device that executes instructions from its memory.
- Data brokers hold vast amounts of information on consumers.
- Dumpster diving is NOT a technique for stealing personal information.
- Pretexting is when an attacker pretends to be from a legitimate research firm to get personal info.
- A game console is a hardware device for playing video games.
- Knowing how to copy and paste from one source to another is NOT an aspect of responsible digital citizenship.
- Netiquette is the code of acceptable behaviors users should follow on the internet.
- Avoiding sleep modes for computers and devices does NOT reduce electrical waste.
- Alternative text is descriptive text added to an object like a picture.
- Peripheral computer is NOT a type of computer.
- Mobile printer is a small, lightweight printer built into a mobile device for mobile printing.
- Touch screen gestures: Drag or slide involves pressing and holding one finger and moving it horizontally or vertically.
- An RFID reader communicates via radio signals with a tag on an object, animal, or person.
- RAM, also called main memory, consists of memory chips that the processor can read from and write to.
- Data pitch is NOT a factor determining the quality of a display device.
- Joysticks control movement in computer games, simulations, and video games.
- Shareware is copyrighted and provided free for a trial period.
- Device maintenance - Outlook is an incorrect match for mobile apps
- Artificial Intelligence (AI) uses logic and experience to simulate human intelligence.
- Apple's Siri is an example of a digital assistant using AI.
- Troubleshooting involves identifying and solving problems when programs malfunction.
- Most antivirus programs protect against worms, trojan horses, and spyware, but NOT spam.
- A pop-under ad is hidden behind the browser window and appears when users close their browser windows.
- Apple iOS is NOT an example of a desktop operating system.
- Linux is a popular, open-source, multitasking UNIX-based operating system.
- "File compression - Enlarges the size of a file" statement is false.
- Using Low-power mode is the best option for saving battery on a laptop.
- A file with the .jpg format is a graphic file.
- Keying in data is NOT a function of operating system.
- Maintenance assesses and reports information about computer resources.
- Bandwidth is the capacity of a communication channel.
- Static and dynamic are the 2 types of webpages.
- Microsoft Office is NOT a browser.
- The portion of a URL identifying one or more IP addresses is the server address.
- TLD .org's intended purpose is NOT for commercial organizations.
- RFID is a protocol for radio signals communicating with tags on objects.
- NFC is a close-distance network protocol.
- Booster extends the range of a wireless router.
- VPN enables access to an organization's network via encryption.
- Cookies is NOT a common network risk.
- LTE does NOT consist of one or more earth-based receivers.
- Cybersecurity is the practice of protecting against digital threats.
- A cyber extortionist may be an individual, group, company, or corporation.
- Keeping computer always connected to the internet doesn't protect it from malware.
- Implementing lock screen is a strategy to minimize intentional access to confidential information.
- Incremental backup only copies files changed since the last full backup.
- Breath is NOT a common biometric used for authentication.
- A passphrase is a private combination of words often with mixed capitalization and punctuation.
- Password manager helps users create and store strong passwords in a single user vault file.
- Trojan horse is a program that looks legitimate, but does not replicate itself.
- Server measurement doesn't motivate to use cloud computing.
- Cloud computing is a set of service-oriented architectures allowing access to resources.
- Platform as a Service (PaaS) provides services for application development, testing, deployment, management, and maintenance.
- Unlimited storage capacity is NOT a disadvantage of cloud computing.
- Commercial clouds is NOT a type of cloud computing.
- Strict law enforcement is NOT a reason for FinTech growth.
- Nutmeg represents automated financial advice known as roboadvice.
- User anonymity is a risk from using Big Data.
- Bank transfer isn't an example of FinTech.
- Cryptographic technology underlies Bitcoin.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
A study guide covering key topics for the AIS160 Fundamentals of Information Technology final exam in July 2024. It includes multiple-choice questions and broad concepts. The exam covers microprocessors, data security, hardware devices, and responsible digital citizenship.