Podcast
Questions and Answers
What is digital literacy?
What is digital literacy?
- A large and complex information source.
- Capability to understand computer language.
- A person who is familiar with how to use technology. (correct)
- Having current knowledge about computers.
Which of the following best describes all-in-one computer?
Which of the following best describes all-in-one computer?
- A chip that contains a central processing unit.
- A type of computer that does not contain a tower. (correct)
- A term that describes the trend of computers and devices with technologies that overlap.
- A thin, lightweight mobile computer that has a touch screen.
A set of coded instructions that tell a computer or device what tasks to perform is referred to as the following EXCEPT
A set of coded instructions that tell a computer or device what tasks to perform is referred to as the following EXCEPT
- software
- program
- app
- AUP (correct)
Which of the following is NOT a technique used to steal personal information?
Which of the following is NOT a technique used to steal personal information?
_________ is a term that refers to the large and complex data sources that defy traditional data processing methods.
_________ is a term that refers to the large and complex data sources that defy traditional data processing methods.
Which of the following are the examples of mobile devices?
i. Tablet
ii. Smartphone
iii. e-reader
iv. Desktop
Which of the following are the examples of mobile devices? i. Tablet ii. Smartphone iii. e-reader iv. Desktop
The following are green computing efforts EXCEPT
The following are green computing efforts EXCEPT
A server is _________
A server is _________
A _________ is a personal computer designed to be in a stationary location, where all of its components fit on or under a desk.
A _________ is a personal computer designed to be in a stationary location, where all of its components fit on or under a desk.
The examples of game controllers are _________
i. Plotter
ii. Gamepad
iii. Wheel
iv. Joystick
The examples of game controllers are _________ i. Plotter ii. Gamepad iii. Wheel iv. Joystick
The following are computer outputs EXCEPT
The following are computer outputs EXCEPT
MICR reader is a
MICR reader is a
Which of the following printer is suitable to print posters?
Which of the following printer is suitable to print posters?
"A key that will alternate views or turn a feature 'on' or 'off' each time you press it”. The statement refers to
"A key that will alternate views or turn a feature 'on' or 'off' each time you press it”. The statement refers to
Capacity is the number of _________ a storage medium can hold.
Capacity is the number of _________ a storage medium can hold.
Computers and mobile devices contain two (2) types of memory. _________ memory does not lose its contents when the computer's power is turned off.
Computers and mobile devices contain two (2) types of memory. _________ memory does not lose its contents when the computer's power is turned off.
_________ is copyrighted and distributed at no cost for a trial period.
_________ is copyrighted and distributed at no cost for a trial period.
Choose the CORRECT match.
Choose the CORRECT match.
Firefox, Edge and Safari are the examples of
Firefox, Edge and Safari are the examples of
Which of the following is NOT a graphic format used on the Web?
Which of the following is NOT a graphic format used on the Web?
A digital graphic is
A digital graphic is
The app that allows you to track your workouts is
The app that allows you to track your workouts is
Columns and rows in a spreadsheet collectively are called a(n) _________
Columns and rows in a spreadsheet collectively are called a(n) _________
The function of _________ is to monitor the battery usage.
The function of _________ is to monitor the battery usage.
Siri is a feature of _________
Siri is a feature of _________
Which of the following is FALSE?
Which of the following is FALSE?
Which of the following statement is CORRECT about Chrome OS?
Which of the following statement is CORRECT about Chrome OS?
One of the operating systems functions is to _________
One of the operating systems functions is to _________
Dania was messaging her friend via WhatsApp on her laptop. Her friend asked her to check the group project sent to her on WhatsApp. Dania downloaded the Microsoft Word file and opened it to review. The Microsoft Word file is known as _________
Dania was messaging her friend via WhatsApp on her laptop. Her friend asked her to check the group project sent to her on WhatsApp. Dania downloaded the Microsoft Word file and opened it to review. The Microsoft Word file is known as _________
_________ is NOT a desktop operating system.
_________ is NOT a desktop operating system.
Which of the following is a Web browser?
i. Mozilla Firefox
ii. Safari
iii. Opera
iv. Microsoft Edge
Which of the following is a Web browser? i. Mozilla Firefox ii. Safari iii. Opera iv. Microsoft Edge
Choose the appropriate TLDs for military organisations.
Choose the appropriate TLDs for military organisations.
Which of the following best describes web server?
Which of the following best describes web server?
Which of the following statement is CORRECT about blog?
Which of the following statement is CORRECT about blog?
A hashtag (#) allows users to _________
A hashtag (#) allows users to _________
When a computer or device connects to a _________ it is said to be online.
When a computer or device connects to a _________ it is said to be online.
Long Term Evolution (LTE) is a network standard that defines _________
Long Term Evolution (LTE) is a network standard that defines _________
The following statements are true about communication systems components, EXCEPT
The following statements are true about communication systems components, EXCEPT
Internet is classified as a _________
Internet is classified as a _________
Debit card uses the _________ protocol to transmit data.
Debit card uses the _________ protocol to transmit data.
Choose the CORRECT Network Topology based on the picture above.
Choose the CORRECT Network Topology based on the picture above.
The following statements discuss on a backup method.
This method provides great flexibility.
Users choose which folders and files to be included in a backup.
The least manageable of all backup methods.
Difficult to manage individual file backups.
Determine which backup method fits the descriptions above.
The following statements discuss on a backup method.
This method provides great flexibility. Users choose which folders and files to be included in a backup. The least manageable of all backup methods. Difficult to manage individual file backups.
Determine which backup method fits the descriptions above.
The descriptions above refer to _________
A program that hides in a computer or mobile devices.
Secretly collects the user's information.
Communicates the information collected to some outside source while the user
is online.
The descriptions above refer to _________
A program that hides in a computer or mobile devices. Secretly collects the user's information. Communicates the information collected to some outside source while the user is online.
A period of time during which an individual refrains from using technology is referred to as _________
A period of time during which an individual refrains from using technology is referred to as _________
_________ are the moral guidelines that govern the use of computers, mobile devices, information systems and related technologies.
_________ are the moral guidelines that govern the use of computers, mobile devices, information systems and related technologies.
Which of the following statements is INCORRECT about password?
Which of the following statements is INCORRECT about password?
In the encryption process, the unencrypted, readable data is called _________
In the encryption process, the unencrypted, readable data is called _________
A group of compromised computers or mobile devices connected to a network and are used to attack other networks, usually for nefarious purposes, are called a _________
A group of compromised computers or mobile devices connected to a network and are used to attack other networks, usually for nefarious purposes, are called a _________
The following statements related to information privacy are true EXCEPT
The following statements related to information privacy are true EXCEPT
Which of the following is NOT a biometric security?
Which of the following is NOT a biometric security?
Which of the following is NOT related to a value proposition of FinTech?
Which of the following is NOT related to a value proposition of FinTech?
Which of the following is NOT the potential problem in Cloud Computing?
Which of the following is NOT the potential problem in Cloud Computing?
Editing documents or photos, sending email messages, and managing finances are common consumer tasks of _________ applications.
Editing documents or photos, sending email messages, and managing finances are common consumer tasks of _________ applications.
All of the following are threats to cloud computing EXPECT
All of the following are threats to cloud computing EXPECT
Which of the following is NOT the risk associated with FinTech?
Which of the following is NOT the risk associated with FinTech?
Trading in bitcoins gives the following benefits EXPECT
Trading in bitcoins gives the following benefits EXPECT
FinTech has a bright prospect because of the following reasons EXCEPT
FinTech has a bright prospect because of the following reasons EXCEPT
Which of these is not a major type of cloud computing usage?
Which of these is not a major type of cloud computing usage?
Which of the following statements are CORRECT regarding the advantages banks have over FinTech?
i) There are history and trust that exist between banks and their customers
ii) Banks have large market capitalization
iii) Banks are more susceptible to turbulence and market volatility
iv) Banks have large sales forces and customer service infrastructure
Which of the following statements are CORRECT regarding the advantages banks have over FinTech?
i) There are history and trust that exist between banks and their customers ii) Banks have large market capitalization iii) Banks are more susceptible to turbulence and market volatility iv) Banks have large sales forces and customer service infrastructure
The emergence of FinTech is attributed to following factors EXCEPT
The emergence of FinTech is attributed to following factors EXCEPT
Flashcards
Digital Literacy
Digital Literacy
The capability to use technology effectively
All-in-one Computer
All-in-one Computer
A computer that integrates all components into one device, without a tower.
Software/Program/App
Software/Program/App
A set of instructions telling a computer what to do.
Phishing
Phishing
Signup and view all the flashcards
Big Data
Big Data
Signup and view all the flashcards
Mobile Devices
Mobile Devices
Signup and view all the flashcards
Green Computing
Green Computing
Signup and view all the flashcards
Server
Server
Signup and view all the flashcards
Desktop Computer
Desktop Computer
Signup and view all the flashcards
Game Controllers
Game Controllers
Signup and view all the flashcards
Output
Output
Signup and view all the flashcards
MICR Reader
MICR Reader
Signup and view all the flashcards
Large-format Printer
Large-format Printer
Signup and view all the flashcards
Toggle Key
Toggle Key
Signup and view all the flashcards
Capacity
Capacity
Signup and view all the flashcards
Non-volatile Memory
Non-volatile Memory
Signup and view all the flashcards
Shareware
Shareware
Signup and view all the flashcards
Web Browsers
Web Browsers
Signup and view all the flashcards
Digital Graphic
Digital Graphic
Signup and view all the flashcards
Fitness App
Fitness App
Signup and view all the flashcards
Worksheet
Worksheet
Signup and view all the flashcards
Power Management
Power Management
Signup and view all the flashcards
Siri
Siri
Signup and view all the flashcards
Chrome OS
Chrome OS
Signup and view all the flashcards
Foreground
Foreground
Signup and view all the flashcards
Internet
Internet
Signup and view all the flashcards
Long Term Evolution (LTE)
Long Term Evolution (LTE)
Signup and view all the flashcards
WAN
WAN
Signup and view all the flashcards
NFC (Near Field Communication)
NFC (Near Field Communication)
Signup and view all the flashcards
Mesh Network
Mesh Network
Signup and view all the flashcards
Study Notes
- The Fundamentals of Information Technology exam is in January 2024, and students have 3 hours to complete it.
- The exam consists of two parts: Part A has 60 questions, and Part B has 4 questions.
- All questions must be answered in English.
- Digital literacy involves having current knowledge about computers and understanding computer language, as well as familiarity with technology.
- An all-in-one computer does not contain a tower.
- A set of coded instructions that tell a computer or device what tasks to perform is software, a program, or an app, but not an AUP.
- Texting is not a technique used to steal personal information; dumpster diving, stealing, and phishing are.
- "Big data" refers to large and complex data sources that defy traditional data processing methods.
- Examples of mobile devices are tablets, smartphones, and e-readers; desktops are not mobile devices.
- All the following are green computing efforts: donating computer equipment, using paperless communication, and using videoconferencing for meetings.
- A server is a high-capacity computer the user accesses using the Internet or another network.
- A desktop is a personal computer designed to be in a stationary location.
- Game controllers include a gamepad, wheel, and joystick.
- All the following are computer outputs: video, graphics, and text.
- MICR reader is a device that reads text printed with magnetised ink.
- A large-format printer is suitable for printing posters.
- A toggle key alternates views or turns a feature "on" or "off" each time it is pressed.
- Capacity is the number of bytes a storage medium can hold.
- Computers and mobile devices contain non-volatile memory that does not lose its contents when the power is turned off.
- Shareware is copyrighted and distributed at no cost for a trial period.
Software Categories
- Productivity software is correctly matched with accounting software.
- Firefox, Edge, and Safari are examples of web browsing apps.
- Multimedia is not a graphic format used on the Web; JPEG, GIF, and TIFF are.
- Digital graphic is an image people can see, store, and manipulate on a computer.
- A fitness app allows you to track your workouts.
- Columns and rows in a spreadsheet collectively are called a worksheet.
- The function of power management is to monitor battery usage.
- Siri is a feature of macOS.
- The .asp and .xml file extensions are not associated with text files.
- Chrome OS is a Linux-based operating system designed to work primarily with web apps.
- One of the operating systems functions is establishing an internet connection.
- A Microsoft Word file is known as the foreground.
- Google Assistant is not a desktop operating system.
- Mozilla Firefox, Safari, Opera, and Microsoft Edge are web browsers.
- Military organizations use the ".mil" TLD.
- A web server is a computer that delivers requested webpages to computers or mobile devices.
- Microblogs allow users to publish short messages, typically less than 1000 characters.
- A hashtag (#) allows users to classify posts related to a particular topic.
- It is said to be online when a computer or device connects to a network.
- Long Term Evolution (LTE) defines how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications.
- All statements are true about communication systems components like sending and receiving devices.
- Except Device, the means by which data, instructions, or information travels is not a type of purpose.
- The Internet is classified as a WAN.
- Debit cards use the NFC protocol to transmit data.
- The network topology depicted is a Mesh network.
- Selective backup fits the description of a backup method.
- Spyware is a program that hides in a computer or mobile device, collects user information secretly, and communicates it to an outside source while they are online.
- Digital detox refers to a period when an individual refrains from using technology.
- Netiquette refers to the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
- It is incorrect for a password to avoid using multiple passwords to reduce the risk of forgetting them.
- The weakness of a password is not due to human memory.
- Plaintext refers to the encryption process.
- A botnet is a group of compromised computers or mobile devices connected to a network and is used to attack other networks, usually for nefarious purposes.
- It's not true that passphrases are numeric passwords; this is not true about information privacy.
- CAPTCHA isn't a biometric security measure.
- Normal use of technology is not related to a value proposition of FinTech.
- Lower computer costs is not a potential problem in Cloud Computing.
- Editing documents or photos, sending email messages, and managing finances are common SaaS (Software as a Service) consumer tasks.
- Truthfulness is not a threat to cloud computing.
- Cybercrime defense is not a risk associated with FinTech.
- Transparency is not a benefit of trading in bitcoins.
- The baby boomer's generation is not being phased out, thus ensuring FinTech has a bright prospect.
- Hardware as a Service is not a major type of cloud computing usage.
- Advantages bank have over FinTech include; history, trust, large market capitalization, and large customer service infrastructure.
- Expensive financial services is not a factor in the emergence of FinTech.
Part B Questions
- Students must answer ALL questions in Part B in the answer booklet provided.
- Identify two ways to protect a computer from viruses or other malware.
- Determine three ways to reduce the risk of a mobile device being stolen or lost.
- Explain three ways to protect personal and financial data.
- List four types of scanners and reading devices.
- Explain why many businesses use web filtering software to limit employees' web access.
- Describe two methods to prevent others from using your computer without permission.
- Describe two tips from the following questions that could help protect your privacy on social networks, considering online social networks can be a risky place to divulge personal information.
- Discuss the following terms briefly: viral video, shortcut menu, and Android.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Information Technology exam review covering digital literacy, all-in-one computers, and the definition of software. It also covers methods of stealing personal information, what constitutes big data, and examples of mobile devices. Green computing efforts are also covered.