Podcast Beta
Questions and Answers
Which of the following optical technologies can be used with the full range of electronic, television, and computer hardware?
What is generally considered a disadvantage of online storage?
Which of the following tools enables different computers on different networks to communicate with each other?
Which of the following has the most potential to reduce paper handling?
Signup and view all the answers
What does NITDA stand for?
Signup and view all the answers
What technology merges computing with high speed communications links carrying data, sound, and video?
Signup and view all the answers
Which hardware category does magnetic tape belong to?
Signup and view all the answers
What is the minimum n-bit coding system required to represent 108 different characters?
Signup and view all the answers
Which type of printer uses a ribbon?
Signup and view all the answers
What type of memory is considered volatile?
Signup and view all the answers
What does CRM stand for?
Signup and view all the answers
Which of the following is NOT a form of cybercrime?
Signup and view all the answers
What device is needed for the transmission of data in discrete form over a telephone line?
Signup and view all the answers
In which phase of the SDLC are case tools, Gantt charts, and PERT charts used?
Signup and view all the answers
Which tool is not used in analyzing data during phase 2 of the SDLC?
Signup and view all the answers
Costs and benefits analysis is usually done in which phase of the SDLC?
Signup and view all the answers
What does the acronym UETA stand for?
Signup and view all the answers
Which of the following is not considered a unit of data storage capacity?
Signup and view all the answers
A CPU fabricated on a silicon chip is called what?
Signup and view all the answers
What is the commonly used phrase for the entire internet protocol suite?
Signup and view all the answers
Which type of e-commerce focuses on consumers dealing with each other?
Signup and view all the answers
Which form of e-commerce is most commonly recognized by individuals?
Signup and view all the answers
Which option is not a security mechanism?
Signup and view all the answers
What describes an internet restricted to an organization along with selected outsiders?
Signup and view all the answers
What is the primary characteristic of an intranet?
Signup and view all the answers
Which of the following is an accurate statement regarding copyright law?
Signup and view all the answers
What does public domain software refer to?
Signup and view all the answers
What is the purpose of the data protection act?
Signup and view all the answers
What term is used for software rights owned by an individual or business?
Signup and view all the answers
Study Notes
Computer Science Fundamentals
- Telecommunications technology merges computing with high-speed communication links for data, sound, and video transmission.
- Magnetic tape is classified under storage hardware.
- A minimum of 7-bit coding system is required to represent 108 different characters.
Printers and Input Devices
- Ribbons are used in dot-matrix printers.
- Joysticks serve dual functions: moving the cursor on a screen and playing computer games.
Memory Types
- RAM is the volatile memory type, while ROM is non-volatile.
- Main memory is often referred to as primary memory.
Customer Relationship Management
- CRM stands for Customer Relationship Management, focusing on interactions with customers.
Cybercrime
- Examples of cybercrime include hacking, threatening, and spreading malware, whereas legitimate actions, such as site administration, do not qualify as cybercrime.
Data Transmission and Software Development
- Discrete data transmission over phone lines requires a modem.
- Data flow through information systems is represented using data flow diagrams.
- The pilot approach is a method of trialing a new system on a limited number of users.
Software Development Life Cycle (SDLC)
- Gantt charts, case tools, and PERT charts are commonly used in the analysis phase of SDLC.
- Costs and benefits analysis typically occurs in phase 1 of the SDLC.
Technology and Security
- Technology service companies may not obtain insurance coverage for errors arising from data breaches or software programming.
- UETA refers to the Uniform Electronic Transactions Act, facilitating electronic transactions.
Data Storage and Capacity
- Units of data storage capacity include petabyte, terabyte, yottabyte, and zettabyte, with Kentayte being invalid.
- A CPU fabricated on a silicon chip is known as a microprocessor.
Internet and E-commerce
- TCP/IP is a widely used internet protocol suite.
- Telecommuting is working remotely using telecommunications technology.
- E-commerce encompasses doing business electronically, with B2C, B2B, and C2C as primary types.
- eBay and Amazon.com are categorized as B2C e-commerce businesses.
Security Mechanisms and Intellectual Property
- Security mechanisms include encryption, firewalls, passwords, and PINs, while e-cash is not a security mechanism.
- Copyright law applies to software in a manner similar to other intellectual properties.
- Public domain software is both free of charge and free of copyright.
Data Protection and Software Rights
- The Data Protection Act aims to protect individuals' privacy.
- Proprietary software refers to software rights owned by an individual or business.
Disk Storage and Handling
- Tracks at the same radial distance in a disk pack are called cylinders.
- Proper care of diskettes includes avoiding contact with their surfaces and cleaning with a cloth.
Optical Technologies and Online Storage
- Technologies like CD-ROM, DVD, and CD-R can interface with various electronic devices.
- Disadvantages of online storage might include safety concerns and pricing.
Networking and Retrieval Systems
- Various methods like TCP/IP software and modems enable communication between different computers on different networks.
- FTP is utilized to search for and retrieve files across computers.
E-commerce Trends
- EDI is particularly effective for reducing paper handling in businesses.
- Consumers tend to be less comfortable purchasing items like furniture online.
- NITDA stands for National Information Technology Development Agency, pivotal for Nigeria’s technological growth.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge with the CSC217 Computer Science exam covering telecommunications, computing, and multimedia technologies. This quiz includes multiple-choice questions that evaluate your understanding of the course material. Prepare for your first semester examination with this comprehensive review.