XzERKKjYDEPARTMENT_OF_COMPUTER_SCIENCES_CSC217.docx
Document Details
Uploaded by JubilantBasil
University of Benin
2017
Tags
Full Transcript
**DEPARTMENT OF COMPUTER SCIENCES** **FACULTY OF PHYSICAL SCIENCES** **UNIVERSITY OF BENIN, BENIN CITY** **[FIRST SEMESTER EXAMINATION (FULL TIME) FOR 2016/2017 SESSION ]** **Course code: CSC217 Time: 50mins** 1. The technology that merges computing with high speed communications links car...
**DEPARTMENT OF COMPUTER SCIENCES** **FACULTY OF PHYSICAL SCIENCES** **UNIVERSITY OF BENIN, BENIN CITY** **[FIRST SEMESTER EXAMINATION (FULL TIME) FOR 2016/2017 SESSION ]** **Course code: CSC217 Time: 50mins** 1. The technology that merges computing with high speed communications links carrying data, sound, and video is referred to as \_\_\_\_ (a) telecommunications technology (b) computer technology (c)multimedia technology (d) information technology (e) all of the above 2. What hardware category does magnetic tape fall into? (a) input (b) processing and memory (c) output (d) storage (e) communications 3. Which of the following n-bit coding systems is the minimum required to represent 108 different characters? (a) 4-bit (b) 5-bit (c) 6-bit (d) 7-bit (e) 8 -- bit 4. The ribbon is used in which of the following printer types? (a) laser (b) plotter (c) ink -- jet (d) dot -- matrix (e) all of the above 5. Joystick is used to \_\_\_\_? (a) move cursor on the screen (b) play computer games (c) move printer ribbon (d) a and b (e) no answer 6. What type of memory is volatile? (a) ROM (b) RAM (c) EPROM (d) Hard disk (e) no answer 7. Main memory is also known as \_\_\_\_\_? (a) auxiliary memory (b) primary memory (c) secondary memory (d) backing storage (e) no answer 8. The term CRM means\_\_\_\_\_\_? (a) customer relationship management (b) customer retention manager (c) customer's relative meet (d) channel root market (e) no answer 9. All of the following are some form of cybercrime except \_\_\_\_\_? (a) a computer sciences student cracking into a military web site (b) an IT students using cyberspace to threaten government (c) an IT student disseminating harmful computer programs or virus to a public computer (d) an IT university student transmitting a pornographic video to a JSS1 student (e) a systems administrator hacking into his web site 10. The transmission of data in discrete form over a telephone line will require one of the following devices (a) a printer (b) a flash drive (c) a monitor (d) a modem (e) no answer 11. A graphical representation of the flow of data through an information system is shown using \_\_\_\_\_\_? (a) grid chart (b) gantt chart (c) system flowchart 9d) data flow diagram (e) no answer 12. Which of the following describes the mehto of trying out a new system on a few users? (a) direct approach (b) parallel approach (c) phased approach (d) pilot approach (e) no answer 13. In which phase of the SDLC are case tools, Gantt charts and PERT charts used? (a) phase 1 (b) phase 2 (c) phase 3 (d) phase 4 (e) phase 5 14. All of the following tools except one is not used in analyzing data in phase 2 of the SDLC (a) data flow diagrams (b) system flowcharts (c) connectivity diagrams (d) grid charts (e) gantt charts 15. Costs and benefits analysis is usually done in phase \_\_\_\_\_ of SDLC (a) 1 (b) 2 (c) 3 (d) 4 (e) 5 16. Technology errors and omission insurances coverage may not be obtained by technology service companies for one of the following (a) data hosting (b) data breach (c) software programming (d) computer system anlaysis (e) staff accident 17. The acronym UETA means \_\_\_\_ (a) Uniform Electronic Transactions Act (b) Uniform Electronic Transmission Act (c) Uniform Electronic Translation Act (d) Uniform Electronic Trading Act (e) no answer 18. One of the following is not a unit of data storage capacity (a) petabyte () terabyte (c) Yottabyte (d) Zettabyt (e) Kentayte 19. A CPU fabricate on a silicon chip is called \_\_\_\_ (a) supercomputer (b) hybrid computer (c) microprocessor (d) microcomputer (e) central processing unit 20. The system software stored in a computer read -- only -- memory is called \_\_\_\_ (a) ROMware (b) ROM software (c) firmware (d) ROM operating system (e) group ware 21. A commonly used phrase for the entire internet protocol suite is \_\_\_\_\_ (a) TCP (b) Telnet (c) TCP/IP (d) TDMA (e) CDMA 22. Performing work at home while linked to the office by means of a telecommunications equipped computer system is known as \_\_\_ (a) telecommuting (b) telecontrolling (c) telemobile (d) teleconferencing (e) teleonline 23. Which of the following describes e-commerce? (a) doing business electronically (b) doing business (c) sale of goods (d) buying of goods and services (e) all of the above 24. Which of the following is among the four main types of e-commerce? (a) B2B (b) B2C (c) C2B (d) a, b, & c (e) no answer 25. Which segment do eBay and Amazon.com belong? (a) B2B (b) B2C (c) C2B (d) C2C (e) B2G 26. Which type of of e-commerce focuses on consumers dealing with each other? (a) B2B (b) B2C (c) C2B (d) C2C (e) no answer 27. Which type of e-commerce deals with auction. (a) B2B (b) B2C (c) C2B (d) C2C (e) NO answer 28. The solution for all business need is \_\_\_\_\_ (a) EDI (b) ERP (c) SCM (d) a, b & c (e) NO Answer 29. Most individuals are familiar with which form of e-commerce? (a) B2B (b) B2C (c) C2B (d) C2C (e) no answer 30. Which of the following is not related to security mechanism? (a) Encryption (b) Firewall (c) password (d) PIN (e) e-cash 31. What is an internet that is restricted to an organization and certain outsiders such as customers and suppliers called? (a) Client/server network (b) intranet (c) extranet (d) thin client (e) no answer 32. Which of the following is the primary characteristics of an intranet? (a) people outside the organization can access it (b) people inside the organization can't access it (c) people out the organization can't access it (d) a, b, & c (e) no answer 33. Which of the following will not harm computer resources? (a) firewall (b) viruses (c) Trojan horse (d) rats (e) dust 34. Copyright law applies to computer programs in much the same way as it applies to other intellectual property such as music, books, etc (a) false (b) true (c) partially true (d) partially false (e) no answer 35. Public domain software means \_\_\_\_ (a) software that is free only on trial basis (b) software that is free but copyrighted (c) software that is both free of charge and free of copyright (d) software that you can only download online (e) no answer 36. What is the purpose of the data protection act? (a) to give authority to organization to use any data for speed and efficiency (b) to protect the privacy of individuals (c) to prevent software piracy (d) to monitor anti-virus developers (e) no answer 37. Software whose rights are owned by an individual or business is termed \_\_\_\_\_ (a) property software (b) site licensed software (c) shareware licensed software (d) proprietary software (e) no answer 38. Tracks within the same radial distance in a disk pack is called \_\_\_\_\_ (a) sector (b) tracks (c) cylinder (d) group tracks (e) disk pack tracks 39. Taking care of diskettes include all of the following rules except one (a) cleaning the surfaces with cloth (b) don't touch disk surface (c) handle disk gently (d) avoid risky physical environment (e) don't leave the diskette in the drive 40. Which of the following optical technologies can be used with the full range of electronic, television, and computer hardware? (a) CD-Rom (b) CD-R (c) CDE (d) DVD (e) all of the above 41. Which of the following is considered a disadvantage of online storage? (a) price (b) safety (c) portability (d) slow speed (c) no answer 42. All diskettes must be -- before they can store data (a) named (b) saved (c) retrieved (d) formatted (e) no answer 43. Which of the following enables different computers on different networks to communicate with each other? (a) modem (b) internet service provider (c) TCP/IP software (d) FTP (e) All of the above 44. Which of the following would you use to search for and retrieve files stored on different computer? (a) FTP (b) Gopher (c) HTTP (d) HTML (e) no answer 45. Which of the following has the most potential to reduce paper handling? (a) EDI (b) Intranet (c) HTML (d) Veronica (e) no answer 46. Which of the following addresses would you use to connect to a nonprofit organization? (a) (b) (c) (d) (e) 47. The \_\_\_\_\_\_ is the most extensive network in the world (a) metropolitan network (b) wide area network (c) intranet (d) extranet (e) internet 48. The best products to sell in B2C e-commerce are \_\_\_\_\_ (a) small products (b) digital products (c) specialty products (d) fresh product (e) no answer 49. Which products are people most likely to be more uncomfortable buying on the internet? (a) books (b) furniture (c) PCs (d) CDs (e) No answer 50. NITDA Means \_\_\_\_\_ (a) National Information Technology Development Agency (b) Nigeria Information Technology Development Agency (c) National Information Technology Development & Agency (d) Nigeria Information Technology Developmental Agency (e) no answer