Podcast
Questions and Answers
Name the FIVE (5) phases of the system development life cycle (SDLC).
Name the FIVE (5) phases of the system development life cycle (SDLC).
________ is using a computer as a labor saving device to execute repetitive tasks quickly and efficiently.
________ is using a computer as a labor saving device to execute repetitive tasks quickly and efficiently.
Automation
Each of the following is a popular type of mobile device EXCEPT
Each of the following is a popular type of mobile device EXCEPT
The actual physical network made up of wires, cables, and satellites that connects computers and resources throughout the world is the
The actual physical network made up of wires, cables, and satellites that connects computers and resources throughout the world is the
Signup and view all the answers
Choose the computational thinking tool that best match the following daily life activity or problem: Cooking a gourmet meal.
Choose the computational thinking tool that best match the following daily life activity or problem: Cooking a gourmet meal.
Signup and view all the answers
The use of microfilm and microfiche provides all of the following advantages EXCEPT
The use of microfilm and microfiche provides all of the following advantages EXCEPT
Signup and view all the answers
This type of software works with end users, application software, and computer hardware to handle the majority of technical details.
This type of software works with end users, application software, and computer hardware to handle the majority of technical details.
Signup and view all the answers
Connectivity is a concept related to
Connectivity is a concept related to
Signup and view all the answers
Choose the computational thinking tool that best match the following daily life activity or problem: School and grocery trip.
Choose the computational thinking tool that best match the following daily life activity or problem: School and grocery trip.
Signup and view all the answers
Graphic programs widely used in the graphic arts profession include
Graphic programs widely used in the graphic arts profession include
Signup and view all the answers
A(n) _______ device is any hardware component that conveys information to one or more people.
A(n) _______ device is any hardware component that conveys information to one or more people.
Signup and view all the answers
_______ is a collection of electronic drawings, photos, and other images that can be inserted into documents.
_______ is a collection of electronic drawings, photos, and other images that can be inserted into documents.
Signup and view all the answers
Which one of the following is NOT what modern antivirus software can protect computers from?
Which one of the following is NOT what modern antivirus software can protect computers from?
Signup and view all the answers
Choose the computational thinking tool that best match the following daily life activity or problem: Storing the LEGO pieces.
Choose the computational thinking tool that best match the following daily life activity or problem: Storing the LEGO pieces.
Signup and view all the answers
A ________ is a private combination of characters associated with a username that allows access to certain computer resources.
A ________ is a private combination of characters associated with a username that allows access to certain computer resources.
Signup and view all the answers
Which one of the following is a characteristic of volatile memory?
Which one of the following is a characteristic of volatile memory?
Signup and view all the answers
A ________ is a collection of links, content, and services presented on a webpage and designed to guide users to information they likely are to find interesting for their particular job function.
A ________ is a collection of links, content, and services presented on a webpage and designed to guide users to information they likely are to find interesting for their particular job function.
Signup and view all the answers
_______ is a wireless network that provides Internet connections to mobile computers and other devices.
_______ is a wireless network that provides Internet connections to mobile computers and other devices.
Signup and view all the answers
_______ is any data or instructions sent to the computer.
_______ is any data or instructions sent to the computer.
Signup and view all the answers
_______ is a mass available for use at no cost but usually with one or more restricted usage rights.
_______ is a mass available for use at no cost but usually with one or more restricted usage rights.
Signup and view all the answers
When a company uses the ________ approach, many programs and users share the data in a database.
When a company uses the ________ approach, many programs and users share the data in a database.
Signup and view all the answers
Although a query language can be used for other purposes, most users only _______ data with a query language.
Although a query language can be used for other purposes, most users only _______ data with a query language.
Signup and view all the answers
Secondary storage is ________ which means it keeps its data after the power turned off.
Secondary storage is ________ which means it keeps its data after the power turned off.
Signup and view all the answers
A magnetic tape streamer commonly used with microcomputers is
A magnetic tape streamer commonly used with microcomputers is
Signup and view all the answers
Facts or observations about people, places, things, or events are stored as
Facts or observations about people, places, things, or events are stored as
Signup and view all the answers
These types of ports send data one bit at a time and are very good for sending information over a long distance. Which port is referred to?
These types of ports send data one bit at a time and are very good for sending information over a long distance. Which port is referred to?
Signup and view all the answers
Open source software contains the following characteristics EXCEPT
Open source software contains the following characteristics EXCEPT
Signup and view all the answers
_______ is a real-time Internet communications service that allows wireless mobile devices to exchange messages with one or more mobile devices or online users.
_______ is a real-time Internet communications service that allows wireless mobile devices to exchange messages with one or more mobile devices or online users.
Signup and view all the answers
In the world of computing, the essential element that controls how people use computers are
In the world of computing, the essential element that controls how people use computers are
Signup and view all the answers
Which language is used to write the MOST open source packages?
Which language is used to write the MOST open source packages?
Signup and view all the answers
Operating system (OS) is an example of a system software that
Operating system (OS) is an example of a system software that
Signup and view all the answers
In some database programs, a data file is referred to as a(n)
In some database programs, a data file is referred to as a(n)
Signup and view all the answers
Open source software is generally more _______ for its users.
Open source software is generally more _______ for its users.
Signup and view all the answers
_______ high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals.
_______ high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals.
Signup and view all the answers
Name the THREE (3) pillars of computational thinking.
Name the THREE (3) pillars of computational thinking.
Signup and view all the answers
A(n) _______ can be used to block access to specific sites.
A(n) _______ can be used to block access to specific sites.
Signup and view all the answers
A _______ license is a legal agreement that allows multiple users to access software on a server simultaneously.
A _______ license is a legal agreement that allows multiple users to access software on a server simultaneously.
Signup and view all the answers
The Internet service that provides a multimedia interface to available resources is called
The Internet service that provides a multimedia interface to available resources is called
Signup and view all the answers
An effective disaster recovery plan would include which of the following?
An effective disaster recovery plan would include which of the following?
Signup and view all the answers
Computer users can help in protecting the environment by
Computer users can help in protecting the environment by
Signup and view all the answers
The rules that people follow when using information systems are referred to as
The rules that people follow when using information systems are referred to as
Signup and view all the answers
You will use the social networking site to share photographs with friends. How can you control the people that access your photographs?
You will use the social networking site to share photographs with friends. How can you control the people that access your photographs?
Signup and view all the answers
A(n) _______ certificate is a notice that guarantees a user or website is legitimate.
A(n) _______ certificate is a notice that guarantees a user or website is legitimate.
Signup and view all the answers
An 'end user' is a
An 'end user' is a
Signup and view all the answers
A(n) _______ system is a collection of hardware, software, data, people and procedures that work together to produce quality information.
A(n) _______ system is a collection of hardware, software, data, people and procedures that work together to produce quality information.
Signup and view all the answers
System development should follow all of these general guidelines EXCEPT
System development should follow all of these general guidelines EXCEPT
Signup and view all the answers
Employees who create information are called
Employees who create information are called
Signup and view all the answers
_______ information is available when the decision maker needs it.
_______ information is available when the decision maker needs it.
Signup and view all the answers
A(n) ________ is any tangible item such as a chart, diagram, report, or program file.
A(n) ________ is any tangible item such as a chart, diagram, report, or program file.
Signup and view all the answers
Switching from the use of a present system to the operation of a new or improved system is a(n) _______ activity.
Switching from the use of a present system to the operation of a new or improved system is a(n) _______ activity.
Signup and view all the answers
Study Notes
Final Examination - SKS1362
- Date: January 2018
- Duration: 2 hours
- Course: Information and Communication Technology (ICT)
- Exam Format: Answer all questions using provided OMR form (USIM-BA-101).
-
Instructions:
- Complete your particulars in Borang H.
- Do not open the question paper until instructed.
- Question paper contains 14 pages (excluding cover).
-
System Development Life Cycle (SDLC):
- Five phases: Planning, Analysis, Design, Implementation, and Maintenance.
Question Specifics
- Question 1: Name the five phases of the system development life cycle (SDLC).
- Question 2: Automation is using a computer as a labor-saving device to execute repetitive tasks quickly and efficiently.
- Question 3: Mobile device types excluded: mainframes.
- Question 4: The actual physical network connecting computers worldwide: internet.
- Question 5: Computational thinking tool for cooking a gourmet meal: Parallel processing.
- Question 6: Disadvantage of microfilm/microfiche: not inexpensive.
- Question 7: Type of software handling technical details of end users: system software.
- Question 8: Connectivity: using computer networks to link people and resources, transmitting information by computer or phone.
- Question 9: Computational thinking tool for a school and grocery trip: Travelling salesman.
- Question 10: Graphic programs for graphic arts: desktop publishing programs, image editors, and illustration programs.
- Question 11: A hardware component conveying information to people: terminal.
- Question 12: Collection of electronic graphics for documents: Clip Art.
- Question 13: Modern antivirus software does not protect against: Firmware.
- Question 14: Computational thinking tool for storing LEGO pieces: Pre-fetching and caching.
- Question 15: Private character combination for computer resource access: password.
- Question 16: Characteristic of volatile memory: The contents are lost when power is off.
- Question 17: Collection of links, content, and services for job-related information: portal.
- Question 18: Wireless network for mobile devices: hot spot.
- Question 19: Data or instructions sent to a computer: Input.
- Question 20: Mass computing resource with usage restrictions: Freeware.
- Question 21: Approach where many users share database information: database.
- Question 22: Query language primary use: retrieving data.
- Question 23: Storage keeping data after power-off: non-volatile.
- Question 24: Magnetic tape streamer alternative to cassette tapes: specialized secondary storage.
- Question 25: Facts, observations, things: data.
- Question 26: Port for long-distance information transfer: Serial.
- Question 27: Open-source software characteristic excluded: be sold for profit.
- Question 28: Real-time Internet communication for mobile devices: Wireless instant messaging.
- Question 29: Essential element controlling computer usage: ethics.
- Question 30: Language used for frequent open-source packages: c++.
- Question 31: Example of system software managing resources: Operating system.
- Question 32: Data file reference in programs: record.
- Question 33: Open-source software user advantage: cheaper.
- Question 34: High-speed internet connectivity using antennas: fixed wireless.
- Question 35: Three pillars of computational thinking: Abstraction, Automation, and Analysis.
- Question 36: Used to block access to specific websites: web filter.
- Question 37: Legal access agreement for multiple simultaneous users: license.
- Question 38: Internet service for multimedia resource access: World Wide Web.
- Question 39: Effective Disaster Recovery Plan consideration: a listing of hardware, software, and facilities.
- Question 40: Computer user environmental protection: conserving, recycling, and education.
- Question 41: Rules for information system use: procedures.
- Question 42: Social networking photo control: Setting access rights.
- Question 43: Website legitimacy guarantee: digital certificate.
- Question 44: End user description: person.
- Question 45: System assembling of quality information: information system.
- Question 46: System development guideline exclusion: repeat tasks intermittently.
- Question 47: Information creators: knowledge workers.
- Question 48: Information availability characteristic: timely.
- Question 49: Tangible item like a chart or report: deliverable.
- Question 50: Switching to new systems: software development activity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge in Information and Communication Technology through this final examination covering key concepts such as the System Development Life Cycle (SDLC) and various computing principles. Ensure you understand the five phases of SDLC and other crucial topics to excel in the quiz.