Universiti Teknologi MARA Fundamentals of Information Technology Exam 2024 PDF
Document Details
![GleefulDivisionism](https://quizgecko.com/images/avatars/avatar-4.webp)
Uploaded by GleefulDivisionism
Universiti Teknologi MARA
2024
Tags
Summary
This is a past paper from Universiti Teknologi MARA (UiTM) for the Fundamentals of Information Technology (AIS160) exam from July 2024. It includes both multiple-choice questions and a section for short answers. Keywords: information technology, exam paper, UiTM.
Full Transcript
AC/JUL2024/AIS160 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE FUNDAMENTALS OF INFORMATION TECHNOLOGY COURSE CODE AIS16...
AC/JUL2024/AIS160 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE FUNDAMENTALS OF INFORMATION TECHNOLOGY COURSE CODE AIS160 EXAMINATION JULY 2024 TIME 3 HOURS INSTRUCTIONS TO CANDIDATES 1. This question paper consists of two (2) parts: PART A (60 Questions) PART B (4 Questions) 2. Answer ALL questions from all two (2) parts: i. Answer PART A in the Objective Answer Sheet, ii. Answer PART B in the Answer Booklet. 3. Do not bring any materials into the examination room unless permission is given by the invigilator. 4. Please check to make sure that this examination pack consists of: i. the Question Paper ii. two Objective Answer Sheet - provided by the Faculty iii. an Answer Booklet - provided by the Faculty 5. Answer ALL questions in English. DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of 13 printed pages © Hak Cipta Universiti Teknologi MARA 2 AC/JUL2024/AIS160 Part A This part consists of 60 multiple-choice questions. Choose the most suitable answer and shade the corresponding alphabet that representing the answer in the objective answer sheet provided. 1. Microprocessor is A. an electronic device, operating under the control of instructions waiting to be executed stored in its own memory. B. a term that refers to the large and complex data sources that defy easy management with the traditional data processing method. C. a collection of computers and devices connected wirelessly or via communications devices and transmission media. D. a chip that contains a central processing unit and often called as processors for short. 2. hold a thousand of pieces of information on hundred of millions of consumers worldwide. A. Digital brokers B. Data brokers C. Scammers D. Financial brokers 3. Which of the following is NOT a technique on how personal information is stolen? A. Dumpster fiving B. Phishing C. Stealing D. Ad ware 4. An attacker who pretends to be from a legitimate research firm asks for personal information is called A. phishing. B. dumpster diving. C. pretexting. D. data mining. 5. A hardware device that allows you to play video games, either single-player or multiplayer is called A. digital media player. B. game console. C. tablet. D. e-book reader. © Hak Cipta Universiti Teknologi MARA 3 AC/JUL2024/AIS160 6. Identify the INCORRECT aspect of being a responsible digital citizenship. A. Know how to copy and paste information from one source into another. B. Adhering to the relevant laws. C. Abiding by commonly accepted etiquette guidelines. D. Aware of your rights and the rights of others. 7. A code of acceptable behaviours the users should follow while on the Internet is known as A. digital citizen. B. netiquette. C. etiquette. D. digital etiquette. 8. Organization can implement the following measures to reduce electrical waste EXCEPT A. consolidating servers. B. purchasing high-efficiency equipment. C. avoid using sleep modes for computers and devices. D. buying computers with lower power consumption. 9. An alternative text is A. a descriptive text added to an object, such as a picture or drawing. B. a technology that uses audio output to describe the contents of the screen. C. a scrolling text for dialogue in a video. D. a technology that can change screen settings, such as the size of the text. 10. The following are various types of computers exist, EXCEPT A. desktop computer. B. all-in-one computer. C. laptop. D. peripheral computer. 11. A printer that is small, lightweight, and built into or attached to a mobile device for mobile printing is known as A. Ink-jet printer. B. All-in-one printer. C. Mobile printer. D. 3-D printer. © Hak Cipta Universiti Teknologi MARA 4 AC/JUL2024/AIS160 12. Which of the following is TRUE about touch screen gestures? A. Tap - quickly touch and release two fingers at one time. B. Press and hold - press and hold one finger on an object to cause an action to occur. C. Drag, or slide - press and hold one finger and then move the finger horizontally or vertically on the screen. D. Swipe - press and hold one finger on an object and then move the finger to the new location. 13. RFID reader is a technology that uses to communicate with a tag placed in or attached to an object, an animal, or a person. A. radio signal B. Wi-fi C. Bluetooth D. cellular 14. RAM, also called , consists of memory chips that can be read from and written to by the processor and other devices. A. memory card B. main memory C. memory cache D. memory chips 15. The quality of a display devices depends on the following EXCEPT A. resolution. B. response time. C. data pitch. D. contrast ratio. 16. Which of the following is used to control the movements and actions of a player or object in computer games, simulations, and video games? A. Headphone B. Joysticks C. Data projector D. Capture pad 17. Shareware is A. copyrighted and provided at no cost by an individual or a company that retains all rights. B. a programs and apps have no restrictions and redistributions; users can modify and sell their versions to others. C. distributed online for a monthly subscription or annual fee. D. copyrighted and distributed at no cost for a trial period. © Hak Cipta Universiti Teknologi MARA 5 AC/JUL 2024/AIS160 18. Which of the following is the INCORRECT match for mobile application? A. Banking and payment - PayPal B. Device maintenance - Outlook C. Location sharing - Google Maps D. Messaging - Telegram 19. Artificial Intelligence (Al) is the technological use of logic and prior experience to human intelligence. A. simulate B. train C. learn D. improve 20. Identify the CORRECT example of Artificial Intelligence's digital assistant. A. Robotic arm B. Antivirus C. GPS D. Apple's Siri 21. Troubleshooting is A. when the program or apps stop functioning correctly. B. the steps you take to identify and solve problem, such as a crash. C. able to allow you to restore your computer or software settings. D. for uninstalling and reinstalling the software. 22. Most antivirus programs provide protections against viruses such as stated below EXCEPT A. worms. B. trojan horses. C. spyware. D. spam. 23. Pop-under ad is the Internet advertisement that is hidden the browser window so that it will be viewed when users close their browser windows. A. under, open B. under, close C. behind, open D. behind, close © Hak Cipta Universiti Teknologi MARA 6 AC/JUL2024/AIS160 24. The following are examples of the desktop operating system EXCEPT A. Window. B. Crome OS. C. Apple iOS. D. UNIX. 25. Linux operating system A. is a popular, multitasking UNIX-based operating systems and an open-source software. B. was introduced by Google and it is designed to work primarily with the web apps. C. was developed by Microsoft and it incorporates innovative features and functions. D. includes the Siri virtual assistant, coordination with apple mobile devices. 26. Which of the following is FALSE? A Search Attempts to locate files based on specified criteria B Power management Monitors battery usage C File compression Enlarges the size of a file D Image viewer Displays, copies, and prints the contents of graphics file 27. Adawiyah's laptop's battery is only 30%, and she has forgotten to bring her adapter. Suggest the BEST option in the operating system that allows her to save battery power while completing her tasks. A. Sleep mode B. Hibernate mode C. Low-power mode D. Shut down mode 28. A file with format.jpg is a type of file. A. Microsoft Office B. text C. webpage D. graphic 29. Which of the following is NOT the function of operating system? A. Keyin data B. Managing programs C. Managing memory D. Coordinating tasks © Hak Cipta Universiti Teknologi MARA 7 AC/JUL 2024/AIS160 30. Which of the following has the function to assess and report information about various computer resources and devices? A. file management B. power management C. maintenance D. disk clean-up 31. Bandwidth is A. used to describe the capacity of a communication channel. B. used to describe the capability of a communication channel. C. used to describe the function of a communication channel. D. used to describe the flexibility of a communication channel. 32. The two types of webpages are and A. static, constant B. static, dynamic C. fluctuate, dynamic D. constant, dynamic 33. Which of the following is NOT an example of a browser? A. Apple Safari B. Google Chrome C. Microsoft Office D. Mozilla Firefox 34. The portion of a URL that identifies one or more IP addresses is called A. protocol. B. domain name. C. pathname. D. server address. 35. The following are TRUE about top-level domain (TLD) and its intended purpose, EXCEPT TLD Intended purpose A.biz Businesses B gov Government agencies C.name Individuals D.org Commercial organisations, businesses, and companies © Hak Cipta Universiti Teknologi MARA 8 AC/JUL2024/AIS160 36. A protocol that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person is called A. IrDA. B. UMB. C. Wi-Fi. D. RFID. 37. Which of the following is an example of close-distance network protocols? A. GPS B. NFC C. P2P D. WAN 38. A device that is used to improve reception and the extend the range of wireless router is called the A. router. B. booster. C. cable. D. modem. 39. Which of the following enables an individual to access an organisation's network by using encryption and other technologies to secure the data transmitted along the path? A. Intranet B. Extranet C. VPN D. AVN 40. The following are the common network risks EXCEPT A. adware. B. trojan. C. rootkit. D. cookies. 41. All of the following is true about Long Term Evolution (LTE) EXCEPT A. consists of one or more earth-based receivers. B. has a potential of 100 MBps downstream rate. C. has a potential of 30 MBps upstream rate. D. support data, messaging, voice, and video transmissions. © Hak Cipta Universiti Teknologi MARA 9 AC/JUL 2024/AIS160 42. The practice of protection against digital threats, including unauthorised or illegal access of data is called A. cybersecurity. B. cybercrime. C. digital security. D. digital crime. 43. A cyber extortionist is a/an who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network. A. individual B. group C. company D. corporation 44. The following practices can help protecting your computer from viruses and other malware, EXCEPT A. use virus protection software. B. use a firewall. C. be suspicious of all unsolicited email and text messages. D. keep your computer stay connected with the internet. 45. What strategies can an organisation implement to minimise the chance that a perpetrator intentionally accesses confidential information? A. audit trail B. access control C. lock screen D. backing up 46. Copies only the files that have changed since the last full backup. Requires minimal storage space to back up. Fast backup method The descriptions above refer to A. Full backup B. Differential backup C. Incremental backup D. Selective backup © Hak Cipta Universiti Teknologi MARA 10 AC/JUL2024/AIS160 47. The following is an example of common biometrics used for authentication, EXCEPT A. retina. B. voice. C. breath. D. face. 48. Is a private combination of words Often containing mixed capitalisation and punctuation Associated with a usemame The description provided pertains to A. passcode. B. passphrase. C. PIN. D. password. 49. Which of the following helps the users create and store multiple strong passwords in a single user vault file? A. PIN manager B. password manager C. passcode manager D. passphrase manager 50. A program that hides within or looks like a legitimate program, but does not replicate itself, are is called A. adware. B. rootkit. C. trojan horse. D. virus. 51. Which of the following is NOT the factor that motivates users to use cloud computing? A. Accessibility B. Cost saving C. Scalability D. Server measurement © Hak Cipta Universiti Teknologi MARA 11 AC/JUL2024/AIS160 52. Cloud computing is A. a set of service-oriented architectures, which allows users to access a number of resources. B. a set of product-oriented architectures, which allows users to access a number of resources. C. a set of service-oriented architectures, which allows users to access a certain number of resources. D. a set of product-oriented architectures, which allows users to access a certain number of resources. 53. Platform as a Service (PaaS) provides A. service in performing testing, deployment, management, and maintenance of application development. B. file management services such as storing files online, system backup, and archiving earlier versions of files. C. applications, management, and user interfaces provided online. D. virtual computing, flexible storage capacity over a network. 54. The following are disadvantages of cloud computing, EXCEPT A. internet connectivity. B. unlimited storage capacity. C. lower bandwidth. D. performance can vary. 55. Which of the following is NOT type of cloud computing? A. Public clouds B. Private clouds C. Commercial clouds D. Hybrid clouds 56. FinTech continues to growth due to the following factors, EXCEPT A. trends of mobile payment transactions. B. establishment of fintech company. C. strict law enforcement. D. increase funding in fintech company. 57. Which of these options represents an instance of automated financial advice known as roboadvice? A. Funding Circle B. Crowdfunder C. Bitcoin D. Nutmeg © Hak Cipta Universiti Teknologi MARA 12 AC/JUL 2024/AIS160 58. Identify the risk that may arise from using Big Data. A. User anonymity B. Financial inclusion C. Volatility D. Transparent transactions 59. All of the following is an example of FinTech EXCEPT A. PayPal. B. Wealthfront. C. Apple Pay. D. Bank transfer. 60. Blockchain is the technology that underlies bitcoin. A. Cybertronic B. Cryptographic C. Cyborg D. Cynophobic (Total: 60 Marks) © Hak Cipta Universiti Teknologi MARA 13 AC/JUL 2024/AIS160 PARTB Please answer ALL questions in the answer booklet provided. QUESTION 1 a) Identify the types of audit risks for the following situations. Strong passwords are crucial barriers that protect personal and sensitive information, guarding against cyber threats and data breaches. Identify TWO (2) ways to create a strong password. (4 marks) b) Determine THREE (3) advantages of using cloud computing. (6 marks) QUESTION 2 a) Green computing is important for reducing environmental impact by promoting energy efficiency, resource conservation, and sustainable practices in information technology. Explain THREE (3) ways to adopt green computing. (6 marks) b) Identify FOUR (4) examples of devices that utilize touch input. (4 marks) QUESTION 3 a) Explain ways in which small businesses can make use of spreadsheet applications. (6 marks) b) Identify TWO (2) benefits of using license operating system. (4 marks) QUESTION 4 a) Online communication tools facilitate real-time interaction and collaboration among individuals or groups over the internet, enhancing productivity and connectivity. Identify FOUR (4) types of online communication tools. (4 marks) b) Describe THREE (3) advantages of using mobile application. (6 marks) (Total: 40 marks) END OF QUESTION PAPER © Hak Cipta Universiti Teknologi MARA