Final Exam - ICT 2018
50 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Name the FIVE (5) phases of the system development life cycle (SDLC).

  • Planning, Analysis, Design, Implementation and Maintenance. (correct)
  • Planning, Software, Design, Implementation and Maintenance.
  • Hardware, Analysis, Design, Implementation and Maintenance.
  • Planning, Analysis, Design, Procedures and Maintenance.
  • ________ is using a computer as a labor saving device to execute repetitive tasks quickly and efficiently.

    Automation

    Each of the following is a popular type of mobile device EXCEPT

  • mainframes. (correct)
  • smart phones.
  • personal digital assistants (PDAs).
  • handheld computers.
  • The actual physical network made up of wires, cables, and satellites that connects computers and resources throughout the world is the

    <p>internet. (A)</p> Signup and view all the answers

    Choose the computational thinking tool that best match the following daily life activity or problem: Cooking a gourmet meal.

    <p>Travelling salesman. (D)</p> Signup and view all the answers

    The use of microfilm and microfiche provides all of the following advantages EXCEPT

    <p>they can be read without a microfilm or microfiche reader. (B)</p> Signup and view all the answers

    This type of software works with end users, application software, and computer hardware to handle the majority of technical details.

    <p>System software. (D)</p> Signup and view all the answers

    Connectivity is a concept related to

    <p>using computer networks to link people and resources. (D)</p> Signup and view all the answers

    Choose the computational thinking tool that best match the following daily life activity or problem: School and grocery trip.

    <p>Travelling salesman. (C)</p> Signup and view all the answers

    Graphic programs widely used in the graphic arts profession include

    <p>desktop publishing programs, image editors and illustration programs. (C)</p> Signup and view all the answers

    A(n) _______ device is any hardware component that conveys information to one or more people.

    <p>output</p> Signup and view all the answers

    _______ is a collection of electronic drawings, photos, and other images that can be inserted into documents.

    <p>Clip art (C)</p> Signup and view all the answers

    Which one of the following is NOT what modern antivirus software can protect computers from?

    <p>Firmware (C)</p> Signup and view all the answers

    Choose the computational thinking tool that best match the following daily life activity or problem: Storing the LEGO pieces.

    <p>Hashing. (C)</p> Signup and view all the answers

    A ________ is a private combination of characters associated with a username that allows access to certain computer resources.

    <p>password</p> Signup and view all the answers

    Which one of the following is a characteristic of volatile memory?

    <p>The contents are lost when power is off. (B)</p> Signup and view all the answers

    A ________ is a collection of links, content, and services presented on a webpage and designed to guide users to information they likely are to find interesting for their particular job function.

    <p>portal</p> Signup and view all the answers

    _______ is a wireless network that provides Internet connections to mobile computers and other devices.

    <p>hot spot (B)</p> Signup and view all the answers

    _______ is any data or instructions sent to the computer.

    <p>Input (B)</p> Signup and view all the answers

    _______ is a mass available for use at no cost but usually with one or more restricted usage rights.

    <p>Freeware (B)</p> Signup and view all the answers

    When a company uses the ________ approach, many programs and users share the data in a database.

    <p>database</p> Signup and view all the answers

    Although a query language can be used for other purposes, most users only _______ data with a query language.

    <p>retrieve (D)</p> Signup and view all the answers

    Secondary storage is ________ which means it keeps its data after the power turned off.

    <p>non-volatile</p> Signup and view all the answers

    A magnetic tape streamer commonly used with microcomputers is

    <p>a long strip of tape coiled in a metal box. (B)</p> Signup and view all the answers

    Facts or observations about people, places, things, or events are stored as

    <p>data. (D)</p> Signup and view all the answers

    These types of ports send data one bit at a time and are very good for sending information over a long distance. Which port is referred to?

    <p>Serial (B)</p> Signup and view all the answers

    Open source software contains the following characteristics EXCEPT

    <p>can be sold for profit. (B)</p> Signup and view all the answers

    _______ is a real-time Internet communications service that allows wireless mobile devices to exchange messages with one or more mobile devices or online users.

    <p>Wireless instant messaging (A)</p> Signup and view all the answers

    In the world of computing, the essential element that controls how people use computers are

    <p>security requirements. (D)</p> Signup and view all the answers

    Which language is used to write the MOST open source packages?

    <p>Python (C)</p> Signup and view all the answers

    Operating system (OS) is an example of a system software that

    <p>manages computer hardware and software resources (D)</p> Signup and view all the answers

    In some database programs, a data file is referred to as a(n)

    <p>table. (C)</p> Signup and view all the answers

    Open source software is generally more _______ for its users.

    <p>cheaper (D)</p> Signup and view all the answers

    _______ high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals.

    <p>Satellite (C)</p> Signup and view all the answers

    Name the THREE (3) pillars of computational thinking.

    <p>Abstraction, Automation and Analysis. (D)</p> Signup and view all the answers

    A(n) _______ can be used to block access to specific sites.

    <p>web filter</p> Signup and view all the answers

    A _______ license is a legal agreement that allows multiple users to access software on a server simultaneously.

    <p>client</p> Signup and view all the answers

    The Internet service that provides a multimedia interface to available resources is called

    <p>World Wide Web. (D)</p> Signup and view all the answers

    An effective disaster recovery plan would include which of the following?

    <p>All of the above. (D)</p> Signup and view all the answers

    Computer users can help in protecting the environment by

    <p>conserving, recycling, and education. (C)</p> Signup and view all the answers

    The rules that people follow when using information systems are referred to as

    <p>procedures. (B)</p> Signup and view all the answers

    You will use the social networking site to share photographs with friends. How can you control the people that access your photographs?

    <p>By setting access rights. (D)</p> Signup and view all the answers

    A(n) _______ certificate is a notice that guarantees a user or website is legitimate.

    <p>digital</p> Signup and view all the answers

    An 'end user' is a

    <p>person. (D)</p> Signup and view all the answers

    A(n) _______ system is a collection of hardware, software, data, people and procedures that work together to produce quality information.

    <p>information</p> Signup and view all the answers

    System development should follow all of these general guidelines EXCEPT

    <p>repeat tasks intermittently. (B)</p> Signup and view all the answers

    Employees who create information are called

    <p>knowledge workers. (D)</p> Signup and view all the answers

    _______ information is available when the decision maker needs it.

    <p>Timely (A)</p> Signup and view all the answers

    A(n) ________ is any tangible item such as a chart, diagram, report, or program file.

    <p>deliverable</p> Signup and view all the answers

    Switching from the use of a present system to the operation of a new or improved system is a(n) _______ activity.

    <p>conversion</p> Signup and view all the answers

    Study Notes

    Final Examination - SKS1362

    • Date: January 2018
    • Duration: 2 hours
    • Course: Information and Communication Technology (ICT)
    • Exam Format: Answer all questions using provided OMR form (USIM-BA-101).
    • Instructions:
      • Complete your particulars in Borang H.
      • Do not open the question paper until instructed.
      • Question paper contains 14 pages (excluding cover).
    • System Development Life Cycle (SDLC):
      • Five phases: Planning, Analysis, Design, Implementation, and Maintenance.

    Question Specifics

    • Question 1: Name the five phases of the system development life cycle (SDLC).
    • Question 2: Automation is using a computer as a labor-saving device to execute repetitive tasks quickly and efficiently.
    • Question 3: Mobile device types excluded: mainframes.
    • Question 4: The actual physical network connecting computers worldwide: internet.
    • Question 5: Computational thinking tool for cooking a gourmet meal: Parallel processing.
    • Question 6: Disadvantage of microfilm/microfiche: not inexpensive.
    • Question 7: Type of software handling technical details of end users: system software.
    • Question 8: Connectivity: using computer networks to link people and resources, transmitting information by computer or phone.
    • Question 9: Computational thinking tool for a school and grocery trip: Travelling salesman.
    • Question 10: Graphic programs for graphic arts: desktop publishing programs, image editors, and illustration programs.
    • Question 11: A hardware component conveying information to people: terminal.
    • Question 12: Collection of electronic graphics for documents: Clip Art.
    • Question 13: Modern antivirus software does not protect against: Firmware.
    • Question 14: Computational thinking tool for storing LEGO pieces: Pre-fetching and caching.
    • Question 15: Private character combination for computer resource access: password.
    • Question 16: Characteristic of volatile memory: The contents are lost when power is off.
    • Question 17: Collection of links, content, and services for job-related information: portal.
    • Question 18: Wireless network for mobile devices: hot spot.
    • Question 19: Data or instructions sent to a computer: Input.
    • Question 20: Mass computing resource with usage restrictions: Freeware.
    • Question 21: Approach where many users share database information: database.
    • Question 22: Query language primary use: retrieving data.
    • Question 23: Storage keeping data after power-off: non-volatile.
    • Question 24: Magnetic tape streamer alternative to cassette tapes: specialized secondary storage.
    • Question 25: Facts, observations, things: data.
    • Question 26: Port for long-distance information transfer: Serial.
    • Question 27: Open-source software characteristic excluded: be sold for profit.
    • Question 28: Real-time Internet communication for mobile devices: Wireless instant messaging.
    • Question 29: Essential element controlling computer usage: ethics.
    • Question 30: Language used for frequent open-source packages: c++.
    • Question 31: Example of system software managing resources: Operating system.
    • Question 32: Data file reference in programs: record.
    • Question 33: Open-source software user advantage: cheaper.
    • Question 34: High-speed internet connectivity using antennas: fixed wireless.
    • Question 35: Three pillars of computational thinking: Abstraction, Automation, and Analysis.
    • Question 36: Used to block access to specific websites: web filter.
    • Question 37: Legal access agreement for multiple simultaneous users: license.
    • Question 38: Internet service for multimedia resource access: World Wide Web.
    • Question 39: Effective Disaster Recovery Plan consideration: a listing of hardware, software, and facilities.
    • Question 40: Computer user environmental protection: conserving, recycling, and education.
    • Question 41: Rules for information system use: procedures.
    • Question 42: Social networking photo control: Setting access rights.
    • Question 43: Website legitimacy guarantee: digital certificate.
    • Question 44: End user description: person.
    • Question 45: System assembling of quality information: information system.
    • Question 46: System development guideline exclusion: repeat tasks intermittently.
    • Question 47: Information creators: knowledge workers.
    • Question 48: Information availability characteristic: timely.
    • Question 49: Tangible item like a chart or report: deliverable.
    • Question 50: Switching to new systems: software development activity.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge in Information and Communication Technology through this final examination covering key concepts such as the System Development Life Cycle (SDLC) and various computing principles. Ensure you understand the five phases of SDLC and other crucial topics to excel in the quiz.

    More Like This

    Use Quizgecko on...
    Browser
    Browser