AIS160 Fundamentals of IT Exam Guide
60 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Microprocessor is

  • an electronic device, operating under the control of instructions waiting to be executed stored in its own memory.
  • a chip that contains a central processing unit and often called as processors for short. (correct)
  • a collection of computers and devices connected wirelessly or via communications devices and transmission media.
  • a term that refers to the large and complex data sources that defy easy management with the traditional data processing method.

__________ hold a thousand of pieces of information on hundred of millions of consumers worldwide.

  • Data brokers (correct)
  • Digital brokers
  • Scammers
  • Financial brokers

Which of the following is NOT a technique on how personal information is stolen?

  • Dumpster diving
  • Stealing
  • Phishing
  • Adware (correct)

An attacker who pretends to be from a legitimate research firm asks for personal information is called

<p>pretexting. (A)</p> Signup and view all the answers

A hardware device that allows you to play video games, either single-player or multiplayer is called

<p>game console. (A)</p> Signup and view all the answers

Identify the INCORRECT aspect of being a responsible digital citizenship.

<p>Know how to copy and paste information from one source into another. (C)</p> Signup and view all the answers

A code of acceptable behaviours the users should follow while on the Internet is known as

<p>netiquette. (A)</p> Signup and view all the answers

Organization can implement the following measures to reduce electrical waste EXCEPT

<p>avoid using sleep modes for computers and devices. (B)</p> Signup and view all the answers

An alternative text is

<p>a descriptive text added to an object, such as a picture or drawing. (C)</p> Signup and view all the answers

The following are various types of computers exist, EXCEPT

<p>peripheral computer. (D)</p> Signup and view all the answers

A printer that is small, lightweight, and built into or attached to a mobile device for mobile printing is known as

<p>Mobile printer. (A)</p> Signup and view all the answers

Which of the following is TRUE about touch screen gestures?

<p>Drag, or slide - press and hold one finger and then move the finger horizontally or vertically on the screen. (B)</p> Signup and view all the answers

RFID reader is a technology that uses __________ to communicate with a tag placed in or attached to an object, an animal, or a person.

<p>radio signal (C)</p> Signup and view all the answers

RAM, also called __________, consists of memory chips that can be read from and written to by the processor and other devices.

<p>main memory (C)</p> Signup and view all the answers

The quality of a display devices depends on the following EXCEPT

<p>data pitch. (D)</p> Signup and view all the answers

Which of the following is used to control the movements and actions of a player or object in computer games, simulations, and video games?

<p>Joysticks (D)</p> Signup and view all the answers

Shareware is

<p>copyrighted and distributed at no cost for a trial period. (A)</p> Signup and view all the answers

Which of the following is the INCORRECT match for mobile application?

<p>Device maintenance - Outlook (C)</p> Signup and view all the answers

Artificial Intelligence (Al) is the technological use of logic and prior experience to __________ human intelligence.

<p>simulate (C)</p> Signup and view all the answers

Identify the CORRECT example of Artificial Intelligence's digital assistant.

<p>Apple's Siri (B)</p> Signup and view all the answers

Troubleshooting is

<p>the steps you take to identify and solve problem, such as a crash. (D)</p> Signup and view all the answers

Most antivirus programs provide protections against viruses such as stated below EXCEPT

<p>spam. (A)</p> Signup and view all the answers

Pop-under ad is the Internet advertisement that is hidden __________ the browser window so that it will be viewed when users __________ close their browser windows.

<p>behind, open (A)</p> Signup and view all the answers

The following are examples of the desktop operating system EXCЕРТ

<p>Apple iOS. (D)</p> Signup and view all the answers

Linux operating system

<p>is a popular, multitasking UNIX-based operating systems and an open-source software. (D)</p> Signup and view all the answers

Which of the following is FALSE?

<p>File compression - Enlarges the size of a file (C)</p> Signup and view all the answers

Adawiyah's laptop's battery is only 30%, and she has forgotten to bring her adapter. Suggest the BEST option in the operating system that allows her to save battery power while completing her tasks.

<p>Low-power mode (C)</p> Signup and view all the answers

A file with format .jpg is a type of __________ file.

<p>graphic (A)</p> Signup and view all the answers

Which of the following is NOT the function of operating system?

<p>Keyin data (B)</p> Signup and view all the answers

Which of the following has the function to assess and report information about various computer resources and devices?

<p>maintenance (C)</p> Signup and view all the answers

Bandwidth is

<p>used to describe the capacity of a communication channel. (A)</p> Signup and view all the answers

The two types of webpages are __________ and __________.

<p>static, dynamic (D)</p> Signup and view all the answers

Which of the following is NOT an example of a browser?

<p>Microsoft Office (C)</p> Signup and view all the answers

The portion of a URL that identifies one or more IP addresses is called

<p>server address. (A)</p> Signup and view all the answers

The following are TRUE about top-level domain (TLD) and its intended purpose, EXCEPT

<p>.org - Commercial organisations, businesses, and companies (D)</p> Signup and view all the answers

A protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person is called

<p>RFID. (C)</p> Signup and view all the answers

Which of the following is an example of close-distance network protocols?

<p>NFC (B)</p> Signup and view all the answers

A device that is used to improve reception and the extend the range of wireless router is called the

<p>booster. (B)</p> Signup and view all the answers

Which of the following enables an individual to access an organisation's network by using encryption and other technologies to secure the data transmitted along the path?

<p>VPN (C)</p> Signup and view all the answers

The following are the common network risks EXCЕРТ

<p>cookies. (D)</p> Signup and view all the answers

All of the following is true about Long Term Evolution (LTE) EXCEPT

<p>consists of one or more earth-based receivers. (B)</p> Signup and view all the answers

The practice of protection against digital threats, including unauthorised or illegal access of data is called

<p>cybersecurity. (D)</p> Signup and view all the answers

A cyber extortionist is a/an __________ who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network.

<p>individual (C)</p> Signup and view all the answers

The following practices can help protecting your computer from viruses and other malware, EXCEPT

<p>keep your computer stay connected with the internet. (C)</p> Signup and view all the answers

What strategies can an organisation implement to minimise the chance that a perpetrator intentionally accesses confidential information?

<p>access control (B)</p> Signup and view all the answers

Copies only the files that have changed since the last full backup. Requires minimal storage space to back up. Fast backup method. The descriptions above refer to

<p>Incremental backup (D)</p> Signup and view all the answers

The following is an example of common biometrics used for authentication, EXCEPT

<p>breath. (B)</p> Signup and view all the answers

Is a private combination of words. Often containing mixed capitalisation and punctuation. Associated with a username. The description provided pertains to

<p>passphrase. (B)</p> Signup and view all the answers

Which of the following helps the users create and store multiple strong passwords in a single user vault file?

<p>password manager (B)</p> Signup and view all the answers

A program that hides within or looks like a legitimate program, but does not replicate itself, are is called

<p>trojan horse. (D)</p> Signup and view all the answers

Which of the following is NOT the factor that motivates users to use cloud computing?

<p>Server measurement (C)</p> Signup and view all the answers

Cloud computing is

<p>a set of service-oriented architectures, which allows users to access a number of resources. (C)</p> Signup and view all the answers

Platform as a Service (PaaS) provides

<p>service in performing testing, deployment, management, and maintenance of application development. (B)</p> Signup and view all the answers

The following are disadvantages of cloud computing, EXCEPT

<p>unlimited storage capacity. (C)</p> Signup and view all the answers

Which of the following is NOT type of cloud computing?

<p>Commercial clouds (B)</p> Signup and view all the answers

FinTech continues to growth due to the following factors, EXCEPT

<p>strict law enforcement. (C)</p> Signup and view all the answers

Which of these options represents an instance of automated financial advice known as roboadvice?

<p>Nutmeg (B)</p> Signup and view all the answers

Identify the risk that may arise from using Big Data.

<p>User anonymity (B)</p> Signup and view all the answers

All of the following is an example of FinTech EXCEPT

<p>Bank transfer. (D)</p> Signup and view all the answers

Blockchain is the __________ technology that underlies bitcoin.

<p>Cryptographic (C)</p> Signup and view all the answers

Flashcards

Microprocessor

A chip that contains a central processing unit.

Data brokers

Companies that collect and sell personal information.

Dumpster diving

Searching trash for personal information.

Pretexting

Creating a false scenario to trick someone into giving information.

Signup and view all the flashcards

Game console

A hardware device for playing video games.

Signup and view all the flashcards

Netiquette

A code of acceptable behavior on the Internet.

Signup and view all the flashcards

Alternative text

Descriptive text for an image or object.

Signup and view all the flashcards

Mobile printer

A small printer built into a mobile device.

Signup and view all the flashcards

Drag or slide

Press and hold one finger and then move the finger horizontally or vertically on a screen.

Signup and view all the flashcards

RFID reader

Technology using radio signals to communicate with a tag.

Signup and view all the flashcards

RAM (Random Access Memory)

Memory chips that can be read from and written to by the processor; also called main memory.

Signup and view all the flashcards

Shareware

Copyrighted software distributed at no cost for a trial period.

Signup and view all the flashcards

Artificial Intelligence (AI)

Technological simulation of human intelligence.

Signup and view all the flashcards

Troubleshooting

Identifying and solving problems.

Signup and view all the flashcards

Pop-under ad

Advertisements that appear behind the active browser window.

Signup and view all the flashcards

Linux operating system

A popular, multitasking UNIX-based open-source operating system.

Signup and view all the flashcards

Search

Attempts to locate files based on specified criteria

Signup and view all the flashcards

Low-power mode

Temporary mode to save battery power.

Signup and view all the flashcards

.jpg

A file format for images.

Signup and view all the flashcards

Bandwidth

The capacity of a communication channel.

Signup and view all the flashcards

Static, dynamic webpages

Webpages that are fixed vs. those that change.

Signup and view all the flashcards

Domain name

Identifies IP addresses.

Signup and view all the flashcards

.biz

Businesses

Signup and view all the flashcards

RFID

Protocol using radio signals to communicate with a tag.

Signup and view all the flashcards

NFC (Near Field Communication)

Close-distance communication protocol.

Signup and view all the flashcards

Booster

Improves reception and extends range.

Signup and view all the flashcards

VPN (Virtual Private Network)

Secure access to an organization's network.

Signup and view all the flashcards

Cybersecurity

Protection against digital threats.

Signup and view all the flashcards

Incremental backup

Copies only the files that have changed since the last full backup

Signup and view all the flashcards

Cloud computing

Uses internet for computing resources

Signup and view all the flashcards

Study Notes

  • The final examination for Fundamentals of Information Technology (AIS160) is in July 2024 and lasts 3 hours.
  • The exam paper has two parts: A (60 questions) and B (4 questions).
  • All questions must be answered.
  • Part A is to be answered in the Objective Answer Sheet.
  • Part B is to be answered in the Answer Booklet.

Part A: Multiple Choice Questions

  • A microprocessor is an electronic device that executes instructions from its memory.
  • Data brokers hold vast amounts of information on consumers.
  • Dumpster diving is NOT a technique for stealing personal information.
  • Pretexting is when an attacker pretends to be from a legitimate research firm to get personal info.
  • A game console is a hardware device for playing video games.
  • Knowing how to copy and paste from one source to another is NOT an aspect of responsible digital citizenship.
  • Netiquette is the code of acceptable behaviors users should follow on the internet.
  • Avoiding sleep modes for computers and devices does NOT reduce electrical waste.
  • Alternative text is descriptive text added to an object like a picture.
  • Peripheral computer is NOT a type of computer.
  • Mobile printer is a small, lightweight printer built into a mobile device for mobile printing.
  • Touch screen gestures: Drag or slide involves pressing and holding one finger and moving it horizontally or vertically.
  • An RFID reader communicates via radio signals with a tag on an object, animal, or person.
  • RAM, also called main memory, consists of memory chips that the processor can read from and write to.
  • Data pitch is NOT a factor determining the quality of a display device.
  • Joysticks control movement in computer games, simulations, and video games.
  • Shareware is copyrighted and provided free for a trial period.
  • Device maintenance - Outlook is an incorrect match for mobile apps
  • Artificial Intelligence (AI) uses logic and experience to simulate human intelligence.
  • Apple's Siri is an example of a digital assistant using AI.
  • Troubleshooting involves identifying and solving problems when programs malfunction.
  • Most antivirus programs protect against worms, trojan horses, and spyware, but NOT spam.
  • A pop-under ad is hidden behind the browser window and appears when users close their browser windows.
  • Apple iOS is NOT an example of a desktop operating system.
  • Linux is a popular, open-source, multitasking UNIX-based operating system.
  • "File compression - Enlarges the size of a file" statement is false.
  • Using Low-power mode is the best option for saving battery on a laptop.
  • A file with the .jpg format is a graphic file.
  • Keying in data is NOT a function of operating system.
  • Maintenance assesses and reports information about computer resources.
  • Bandwidth is the capacity of a communication channel.
  • Static and dynamic are the 2 types of webpages.
  • Microsoft Office is NOT a browser.
  • The portion of a URL identifying one or more IP addresses is the server address.
  • TLD .org's intended purpose is NOT for commercial organizations.
  • RFID is a protocol for radio signals communicating with tags on objects.
  • NFC is a close-distance network protocol.
  • Booster extends the range of a wireless router.
  • VPN enables access to an organization's network via encryption.
  • Cookies is NOT a common network risk.
  • LTE does NOT consist of one or more earth-based receivers.
  • Cybersecurity is the practice of protecting against digital threats.
  • A cyber extortionist may be an individual, group, company, or corporation.
  • Keeping computer always connected to the internet doesn't protect it from malware.
  • Implementing lock screen is a strategy to minimize intentional access to confidential information.
  • Incremental backup only copies files changed since the last full backup.
  • Breath is NOT a common biometric used for authentication.
  • A passphrase is a private combination of words often with mixed capitalization and punctuation.
  • Password manager helps users create and store strong passwords in a single user vault file.
  • Trojan horse is a program that looks legitimate, but does not replicate itself.
  • Server measurement doesn't motivate to use cloud computing.
  • Cloud computing is a set of service-oriented architectures allowing access to resources.
  • Platform as a Service (PaaS) provides services for application development, testing, deployment, management, and maintenance.
  • Unlimited storage capacity is NOT a disadvantage of cloud computing.
  • Commercial clouds is NOT a type of cloud computing.
  • Strict law enforcement is NOT a reason for FinTech growth.
  • Nutmeg represents automated financial advice known as roboadvice.
  • User anonymity is a risk from using Big Data.
  • Bank transfer isn't an example of FinTech.
  • Cryptographic technology underlies Bitcoin.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

A study guide covering key topics for the AIS160 Fundamentals of Information Technology final exam in July 2024. It includes multiple-choice questions and broad concepts. The exam covers microprocessors, data security, hardware devices, and responsible digital citizenship.

More Like This

Definition of Digital vs. Analog
14 questions
Teknologi dan Sumber Digital
10 questions
Digital Signal Processing
19 questions
TIC et Informatique: Chapitre 1
47 questions

TIC et Informatique: Chapitre 1

RefreshedFantasticArt avatar
RefreshedFantasticArt
Use Quizgecko on...
Browser
Browser