Fundamentals of Information Technology
60 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is digital literacy?

  • A large and complex information source.
  • Capability to understand computer language.
  • A person who is familiar with how to use technology. (correct)
  • Having current knowledge about computers.

Which of the following best describes all-in-one computer?

  • A chip that contains a central processing unit.
  • A type of computer that does not contain a tower. (correct)
  • A term that describes the trend of computers and devices with technologies that overlap.
  • A thin, lightweight mobile computer that has a touch screen.

A set of coded instructions that tell a computer or device what tasks to perform is referred to as the following EXCEPT

  • software
  • program
  • app
  • AUP (correct)

Which of the following is NOT a technique used to steal personal information?

<p>Texting (D)</p> Signup and view all the answers

_________ is a term that refers to the large and complex data sources that defy traditional data processing methods.

<p>Big data (D)</p> Signup and view all the answers

Which of the following are the examples of mobile devices? i. Tablet ii. Smartphone iii. e-reader iv. Desktop

<p>i, ii and iii (A)</p> Signup and view all the answers

The following are green computing efforts EXCEPT

<p>not shutting down the computer when not using it to avoid using excess electricity to turn it on. (C)</p> Signup and view all the answers

A server is _________

<p>a high-capacity computer the user accesses using the Internet or another network (B)</p> Signup and view all the answers

A _________ is a personal computer designed to be in a stationary location, where all of its components fit on or under a desk.

<p>desktop (C)</p> Signup and view all the answers

The examples of game controllers are _________ i. Plotter ii. Gamepad iii. Wheel iv. Joystick

<p>ii, iii and iv (B)</p> Signup and view all the answers

The following are computer outputs EXCEPT

<p>command (A)</p> Signup and view all the answers

MICR reader is a

<p>device that reads text printed with magnetised ink. (D)</p> Signup and view all the answers

Which of the following printer is suitable to print posters?

<p>Large-format printer (B)</p> Signup and view all the answers

"A key that will alternate views or turn a feature 'on' or 'off' each time you press it”. The statement refers to

<p>a toggle key (B)</p> Signup and view all the answers

Capacity is the number of _________ a storage medium can hold.

<p>bytes (A)</p> Signup and view all the answers

Computers and mobile devices contain two (2) types of memory. _________ memory does not lose its contents when the computer's power is turned off.

<p>Non-volatile (C)</p> Signup and view all the answers

_________ is copyrighted and distributed at no cost for a trial period.

<p>Shareware (A)</p> Signup and view all the answers

Choose the CORRECT match.

<p>Security - PC maintenance (A)</p> Signup and view all the answers

Firefox, Edge and Safari are the examples of

<p>web browsing app (B)</p> Signup and view all the answers

Which of the following is NOT a graphic format used on the Web?

<p>Multimedia. (D)</p> Signup and view all the answers

A digital graphic is

<p>an image people can see, store, and manipulate on a computer (D)</p> Signup and view all the answers

The app that allows you to track your workouts is

<p>fitness (B)</p> Signup and view all the answers

Columns and rows in a spreadsheet collectively are called a(n) _________

<p>worksheet (C)</p> Signup and view all the answers

The function of _________ is to monitor the battery usage.

<p>power management (D)</p> Signup and view all the answers

Siri is a feature of _________

<p>macOS (C)</p> Signup and view all the answers

Which of the following is FALSE?

<p>Text file - .asp, .xml (B)</p> Signup and view all the answers

Which of the following statement is CORRECT about Chrome OS?

<p>Linux-based operating system designed to work primarily with web apps. (D)</p> Signup and view all the answers

One of the operating systems functions is to _________

<p>establish Internet connection (B)</p> Signup and view all the answers

Dania was messaging her friend via WhatsApp on her laptop. Her friend asked her to check the group project sent to her on WhatsApp. Dania downloaded the Microsoft Word file and opened it to review. The Microsoft Word file is known as _________

<p>back end (B)</p> Signup and view all the answers

_________ is NOT a desktop operating system.

<p>Google Assistant (A)</p> Signup and view all the answers

Which of the following is a Web browser? i. Mozilla Firefox ii. Safari iii. Opera iv. Microsoft Edge

<p>All of the above (D)</p> Signup and view all the answers

Choose the appropriate TLDs for military organisations.

<p>.mil (C)</p> Signup and view all the answers

Which of the following best describes web server?

<p>A computer that delivers requested webpages to computer or mobile device. (A)</p> Signup and view all the answers

Which of the following statement is CORRECT about blog?

<p>A microblog allows users to publish short messages, usually less than 1000 characters. (C)</p> Signup and view all the answers

A hashtag (#) allows users to _________

<p>classify posts related to a particular topic (B)</p> Signup and view all the answers

When a computer or device connects to a _________ it is said to be online.

<p>network (C)</p> Signup and view all the answers

Long Term Evolution (LTE) is a network standard that defines _________

<p>how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications (C)</p> Signup and view all the answers

The following statements are true about communication systems components, EXCEPT

<p>Transmission media - Means by which data, instructions, or information travels (A)</p> Signup and view all the answers

Internet is classified as a _________

<p>WAN (C)</p> Signup and view all the answers

Debit card uses the _________ protocol to transmit data.

<p>NFC (C)</p> Signup and view all the answers

Choose the CORRECT Network Topology based on the picture above.

<p>Mesh network (A)</p> Signup and view all the answers

The following statements discuss on a backup method.

This method provides great flexibility. Users choose which folders and files to be included in a backup. The least manageable of all backup methods. Difficult to manage individual file backups.

Determine which backup method fits the descriptions above.

<p>Selective backup (C)</p> Signup and view all the answers

The descriptions above refer to _________

A program that hides in a computer or mobile devices. Secretly collects the user's information. Communicates the information collected to some outside source while the user is online.

<p>spyware (C)</p> Signup and view all the answers

A period of time during which an individual refrains from using technology is referred to as _________

<p>digital detox (C)</p> Signup and view all the answers

_________ are the moral guidelines that govern the use of computers, mobile devices, information systems and related technologies.

<p>Technology ethics (D)</p> Signup and view all the answers

Which of the following statements is INCORRECT about password?

<p>Avoid using multiple passwords to reduce the risk that you might forget the password. (B)</p> Signup and view all the answers

In the encryption process, the unencrypted, readable data is called _________

<p>plaintext (D)</p> Signup and view all the answers

A group of compromised computers or mobile devices connected to a network and are used to attack other networks, usually for nefarious purposes, are called a _________

<p>botnet (B)</p> Signup and view all the answers

The following statements related to information privacy are true EXCEPT

<p>Passphrase is a numeric password. (D)</p> Signup and view all the answers

Which of the following is NOT a biometric security?

<p>CAPTCHA (A)</p> Signup and view all the answers

Which of the following is NOT related to a value proposition of FinTech?

<p>Normal use of technology (A)</p> Signup and view all the answers

Which of the following is NOT the potential problem in Cloud Computing?

<p>Lower computer costs (B)</p> Signup and view all the answers

Editing documents or photos, sending email messages, and managing finances are common consumer tasks of _________ applications.

<p>SaaS (B)</p> Signup and view all the answers

All of the following are threats to cloud computing EXPECT

<p>truthfulness (D)</p> Signup and view all the answers

Which of the following is NOT the risk associated with FinTech?

<p>Cybercrime defense (A)</p> Signup and view all the answers

Trading in bitcoins gives the following benefits EXPECT

<p>opportunity for money laundering activities (D)</p> Signup and view all the answers

FinTech has a bright prospect because of the following reasons EXCEPT

<p>The baby boomer's generation is being phased out (D)</p> Signup and view all the answers

Which of these is not a major type of cloud computing usage?

<p>Hardware as a Service (A)</p> Signup and view all the answers

Which of the following statements are CORRECT regarding the advantages banks have over FinTech?

i) There are history and trust that exist between banks and their customers ii) Banks have large market capitalization iii) Banks are more susceptible to turbulence and market volatility iv) Banks have large sales forces and customer service infrastructure

<p>i, ii and iv (B)</p> Signup and view all the answers

The emergence of FinTech is attributed to following factors EXCEPT

<p>expensive financial services (D)</p> Signup and view all the answers

Flashcards

Digital Literacy

The capability to use technology effectively

All-in-one Computer

A computer that integrates all components into one device, without a tower.

Software/Program/App

A set of instructions telling a computer what to do.

Phishing

Dishonestly trying to obtain sensitive information by disguising as a trustworthy entity

Signup and view all the flashcards

Big Data

Large, complex data sources that are difficult to process using traditional methods.

Signup and view all the flashcards

Mobile Devices

Small, portable computing devices.

Signup and view all the flashcards

Green Computing

Efforts to reduce electricity and environmental waste when using computers.

Signup and view all the flashcards

Server

A high-capacity computer that provides services to other computers on a network.

Signup and view all the flashcards

Desktop Computer

Personal computer designed for stationary use on a desk.

Signup and view all the flashcards

Game Controllers

Devices used to interact with games.

Signup and view all the flashcards

Output

Text, graphics, video and other forms of data sent from a computer to a device.

Signup and view all the flashcards

MICR Reader

Device that reads text printed with magnetized ink.

Signup and view all the flashcards

Large-format Printer

Printer used for large prints such as posters and banners.

Signup and view all the flashcards

Toggle Key

A key that turns a feature on or off each time it is pressed.

Signup and view all the flashcards

Capacity

The amount of data a storage medium can hold.

Signup and view all the flashcards

Non-volatile Memory

Memory that does not lose its contents when the power is turned off.

Signup and view all the flashcards

Shareware

Software distributed free for a trial period, after which payment is required.

Signup and view all the flashcards

Web Browsers

Applications used to access and view websites.

Signup and view all the flashcards

Digital Graphic

Image that can be displayed, stored, and manipulated on a computer.

Signup and view all the flashcards

Fitness App

Application to monitor fitness activities.

Signup and view all the flashcards

Worksheet

Columns and rows in a spreadsheet.

Signup and view all the flashcards

Power Management

Function that monitors how the battery is being used.

Signup and view all the flashcards

Siri

Virtual assistant feature of macOS Systems

Signup and view all the flashcards

Chrome OS

A Linux-based operating system primarily designed to work web apps.

Signup and view all the flashcards

Foreground

A program that is actively running and visible on the screen.

Signup and view all the flashcards

Internet

The main global network connecting millions of computers.

Signup and view all the flashcards

Long Term Evolution (LTE)

A network standard for high-speed wireless communication, most often used in mobile communications.

Signup and view all the flashcards

WAN

Worldwide Area Network

Signup and view all the flashcards

NFC (Near Field Communication)

Short-range wireless technology used for contactless payment.

Signup and view all the flashcards

Mesh Network

Network topology where each computer is connected to every other computer.

Signup and view all the flashcards

Study Notes

  • The Fundamentals of Information Technology exam is in January 2024, and students have 3 hours to complete it.
  • The exam consists of two parts: Part A has 60 questions, and Part B has 4 questions.
  • All questions must be answered in English.
  • Digital literacy involves having current knowledge about computers and understanding computer language, as well as familiarity with technology.
  • An all-in-one computer does not contain a tower.
  • A set of coded instructions that tell a computer or device what tasks to perform is software, a program, or an app, but not an AUP.
  • Texting is not a technique used to steal personal information; dumpster diving, stealing, and phishing are.
  • "Big data" refers to large and complex data sources that defy traditional data processing methods.
  • Examples of mobile devices are tablets, smartphones, and e-readers; desktops are not mobile devices.
  • All the following are green computing efforts: donating computer equipment, using paperless communication, and using videoconferencing for meetings.
  • A server is a high-capacity computer the user accesses using the Internet or another network.
  • A desktop is a personal computer designed to be in a stationary location.
  • Game controllers include a gamepad, wheel, and joystick.
  • All the following are computer outputs: video, graphics, and text.
  • MICR reader is a device that reads text printed with magnetised ink.
  • A large-format printer is suitable for printing posters.
  • A toggle key alternates views or turns a feature "on" or "off" each time it is pressed.
  • Capacity is the number of bytes a storage medium can hold.
  • Computers and mobile devices contain non-volatile memory that does not lose its contents when the power is turned off.
  • Shareware is copyrighted and distributed at no cost for a trial period.

Software Categories

  • Productivity software is correctly matched with accounting software.
  • Firefox, Edge, and Safari are examples of web browsing apps.
  • Multimedia is not a graphic format used on the Web; JPEG, GIF, and TIFF are.
  • Digital graphic is an image people can see, store, and manipulate on a computer.
  • A fitness app allows you to track your workouts.
  • Columns and rows in a spreadsheet collectively are called a worksheet.
  • The function of power management is to monitor battery usage.
  • Siri is a feature of macOS.
  • The .asp and .xml file extensions are not associated with text files.
  • Chrome OS is a Linux-based operating system designed to work primarily with web apps.
  • One of the operating systems functions is establishing an internet connection.
  • A Microsoft Word file is known as the foreground.
  • Google Assistant is not a desktop operating system.
  • Mozilla Firefox, Safari, Opera, and Microsoft Edge are web browsers.
  • Military organizations use the ".mil" TLD.
  • A web server is a computer that delivers requested webpages to computers or mobile devices.
  • Microblogs allow users to publish short messages, typically less than 1000 characters.
  • A hashtag (#) allows users to classify posts related to a particular topic.
  • It is said to be online when a computer or device connects to a network.
  • Long Term Evolution (LTE) defines how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications.
  • All statements are true about communication systems components like sending and receiving devices.
  • Except Device, the means by which data, instructions, or information travels is not a type of purpose.
  • The Internet is classified as a WAN.
  • Debit cards use the NFC protocol to transmit data.
  • The network topology depicted is a Mesh network.
  • Selective backup fits the description of a backup method.
  • Spyware is a program that hides in a computer or mobile device, collects user information secretly, and communicates it to an outside source while they are online.
  • Digital detox refers to a period when an individual refrains from using technology.
  • Netiquette refers to the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
  • It is incorrect for a password to avoid using multiple passwords to reduce the risk of forgetting them.
  • The weakness of a password is not due to human memory.
  • Plaintext refers to the encryption process.
  • A botnet is a group of compromised computers or mobile devices connected to a network and is used to attack other networks, usually for nefarious purposes.
  • It's not true that passphrases are numeric passwords; this is not true about information privacy.
  • CAPTCHA isn't a biometric security measure.
  • Normal use of technology is not related to a value proposition of FinTech.
  • Lower computer costs is not a potential problem in Cloud Computing.
  • Editing documents or photos, sending email messages, and managing finances are common SaaS (Software as a Service) consumer tasks.
  • Truthfulness is not a threat to cloud computing.
  • Cybercrime defense is not a risk associated with FinTech.
  • Transparency is not a benefit of trading in bitcoins.
  • The baby boomer's generation is not being phased out, thus ensuring FinTech has a bright prospect.
  • Hardware as a Service is not a major type of cloud computing usage.
  • Advantages bank have over FinTech include; history, trust, large market capitalization, and large customer service infrastructure.
  • Expensive financial services is not a factor in the emergence of FinTech.

Part B Questions

  • Students must answer ALL questions in Part B in the answer booklet provided.
    • Identify two ways to protect a computer from viruses or other malware.
    • Determine three ways to reduce the risk of a mobile device being stolen or lost.
    • Explain three ways to protect personal and financial data.
    • List four types of scanners and reading devices.
    • Explain why many businesses use web filtering software to limit employees' web access.
    • Describe two methods to prevent others from using your computer without permission.
    • Describe two tips from the following questions that could help protect your privacy on social networks, considering online social networks can be a risky place to divulge personal information.
    • Discuss the following terms briefly: viral video, shortcut menu, and Android.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Information Technology exam review covering digital literacy, all-in-one computers, and the definition of software. It also covers methods of stealing personal information, what constitutes big data, and examples of mobile devices. Green computing efforts are also covered.

More Like This

The Impact of IT Application Tools in Business
5 questions
ICT Fundamentals
10 questions

ICT Fundamentals

EasedTensor avatar
EasedTensor
Information Technology Literacy Quiz
17 questions
AIS160 Fundamentals of IT Exam Guide
60 questions
Use Quizgecko on...
Browser
Browser