SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
If you want to know more about
technology just come to worlds
technology arena on youtube (
https://youtube.com/@worldstechnology
arena178 on this link
STUDENT NAME:
COURSE:
COURSE CODE
YEAR OF STUDY:
SEMISTER:
INFORMATION TECHNOLOGY
CIT 101
1
1
AKATWIJUKA OSCAR
SECTION A
1. The term 1Gigabyte refers to.
A. 1024 Patabytes
B. 1024 Megabytes
C. 1024 Kilobytes
D. None of the above
2. In computer terminology which of the following best describes a Device Driver?
A. Software that allows the user to control the operating system.
B. Hardware that allows interaction between peripheral devices and Operating system.
C. Hardware that allows the user to control an operating system.
D. Software that allows interaction between peripheral Devices and Operating System.
3. The following option consists of only computer input devices.
A. Keyboard, mouse, Joystick, printer
B. Mouse, Monitor, Joystick, Keyboard
C. Joystick, Keyboard, Digitizer, Monitor
D. Joystick, Keyboard, Mouse, Digitizer
4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following
relates to the above statement.
A. Accuracy
B. Diligence
C. Reliability
D. Versatility
5. The following computers were invented in First Generation except.
E. UNIVAC,
F. IBM-701
G. TDC-316
H. IBM-650
6. Non Volatile Memory is referred to as .
B
D
D
B
G
C
A. RAM
B. Cache Memory
C. ROM
D. Video Memory
7. The following are characteristics of impact printers except.
A. They are noisy
B. There is physical contact with the paper to produce an image
C. Useful for bulk printing due to low cost
D. These printers print a complete page at a time
8. A part of the computer that reads information from a disk is called ___________.
A. Operating System
B. Motherboard
C.Hard Drive
D. Disk Drive
9. The main characteristic of fourth generation was.
A. VLSI
B. Transistor
C. Vacuum tubes
D. Integrated circuit
10.Ctrl + Shift + Esc are keyboard shortcut keys used to.
A. Restart the computer
B. Ctrl + Shift + Esc
C. Open Task Manager.
D. Switch keyboard layout.
11.The following type of memory module has 30 pins on the bottom of circuit board.
A. SIMM
B. DIMM
C. SIPP
D. DIP
12.South Bridge on Motherboard inter connects the following motherboard components (select all).
A. RAM
B. ROM
C. PCI Buss
C
C
A
C
A
C
D. AGP
13.Which of the following is referred to as a web protocol?
A. FTP
B. HTTP
C. IP
D. TCP
14.Convert 1011101two to Decimal.
A. 64ten
B. 80ten
C. 88ten
D. 93ten
15.A time-sharing operating system is also known as.
A. Batch processing OS
B. Distributed OS
C. Multitasking OS
D. Real-OS
16.Which of the following device cannot be shared in Network?
A. Printer
B. Hard Disk
C. CD drive
D. Mouse
17. Which one of the following is not a computer language?
A. BASIC
B. C
C. Fast
D. FORTRAN
18.The spine of a computer is called.
A. RAM
B. BIOS
C. Motherboard
C
D
C
D
C
B
D. CPU
19.Which of the following statements are true about computer virus (select all that apply).
A. Viruses have the ability to replicate themselves and infect computers
B. Strange graphics are displayed on your computer monitor when viruses are present
C. Putting a password on a computer prevents viruses from entering the system
D. A Macros is a type of virus commonly found Microsoft programs
20.The following are optical storage Devices Except.
A. Flash Disk
B. Compact Disk
C. Digital versatile disk
D. Blue Ray
21. Convert 223ten to Octal Base.
A. 330eight
B. 230eight
C. 230eight
D. 337eight
22. Chose the odd man out.
A. Firefox
B. Internet explore
C. Safari
D. Google
23. Traffic-control computer is an example of.
A. General purpose computer
B. Analog Computer
C. Special purpose computer
D. Hybrid computer
24. Which of these is a free operating system?
A. Windows 7
B. Windows XP
C. Mac OSX
A,B,D
A
D
D
A
D
D. Ubuntu
25. Data processing cycle takes on the following steps.
A. Input, processing, storage, output
B. Input, storage, processing, output
C. Input, output, processing, storage
D. Input, processing, output, storage
26. When you see no icons on the desktop, how can you open programs such as Microsoft
Word?.
A. Right-click to reveal all icons.
B. Restart the computer.
C. It is not possible to open the program if no icons are on the desktop.
D. Click the start button and select program from the menu.
27. Which of the following is an example of an e-mail address?
A. Www.google.com
B. Jeandoe.gmail.com
C. Bob Smith@gmail.com
D. Johndoe@cincinnatilibrary.org
28. "Desktop" is a computer term that refers to?
A. Something that is for the computer programmer only.
B. The part of your work area where the computer monitor sits.
C. The initial screen showing icons for folders, applications and files.
D. D.The desk that your computer is stationed on.
29. A Program which detects all necessary computer components during boot sequence is.
A. Bootstrap
B. POST
C. Loader
D. BIOS
30. Which key on the keyboard is used to capitalize letters?
A. Windows
B. Ctrl
C. Shift
A
D
D
C
D
C
D. Tab
31.Which of the following is not a pointing device?
A. Keyboard
B. Mouse
C. Joystick
D. Light pen
32.The background of the desktop is called...
A. Background
B. Screen saver
C. Wallpaper
D. None of these
33.Which of the following interfaces will you encounter when installing Networks?
A. NIC
B. AGP
C. PCI
D. SCSI
34.Speed of the processor is measured in .
A. Mbps
B. Hertz
C. MHz
D. Bytes
35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in
A. Memory Unit
B. Arithmetic Unit
C. Logic Unit
D. Control Unit
36.The Second ERA of computers is concerned with
Phones
A
C
B
B
C
37.The type of backup that only copies data that has been changed or created since the.
previous back up is called.
A. Full backup
B. Deferential backup
C. Incremental backup
D. Total backup
38.A Network of Networks is reffered to as.
A. Intranet
B. WWW
C. Internet
D. Extranet
39.Write the word COMPUTER in Full.
40.The Father of all computers is.
A. John Von Nueman
B. Charles Babbage
C. John Barden
D. Jack Kilby
Common Operating Machine Particularly Used for Technical Education and Research
C
C
B
SECTION B: 30 Marks
Attempt All Questions
Write answers in spaces provided
1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks)
Memory Volatile Non-Volatile
RAM ✓
CMOS ✓
ROM ✓
Punched Card ✓
Magnetic Tape ✓
1b. Identify five examples of adapter cards found in a system unit. (05 marks)
2(a).Give Examples of software under the following categories. (06 Marks)
i. System Utility
Examples
ii. Operating System
Examples
iii. Programming Languages
Examples
1.delete utility
2 diagnostic utility
1.linux
2. mac OS
1. FORTRAN
2. BASIC
1) Video cards
2) Multimedia cards
3) I/O cards
4) Communication cards
5) Network cards
2(b) List two advantages of Smartphone over a Laptop. (2Marks)
2(C) List 2 major Components of a computer System. (2Marks)
3(a) Write true or false against each statement from a to e in the table below (05 Marks)
NO STATEMET TRUE / FALSE
a) Image Viewer Utility Displays Contents of graphics when you
double click on it
True
b) Uninstaller Removes a word document file from False
c) Disk defragmenter compiles technical information about
hardware or software
False
d) Disk Scanner detects and corrects problems on the hard disk true
e) Antivirus utilities protect the physical access to the computer False
3(b) (a) Give the file extension, of any two of the following file types. (02 marks)
File type File extension
Executable file
Motion pictures
Ms Excel
(b) Give two examples of file attributes. (02 marks)
(c) State one function of a file in a computer system (01 mark)
1. It is a convenient way to keep others informed,
2 it is potable
.exe
.amv
.xls
1. Read only
2. Archive
To store organized data
1. software
2. hard ware
Section C: 30 marks
➢ Attempt any one question
➢ Use ms word to present your answers but for the case of QN3 you can answer
using your ball point and scan the answer sheet or u can use ms-word file
Qn1 (a)
With the help of pictures describe step by step how to perform a full backup of the computer.
Qn1 (b)
With the help of pictures describe step by step how to perform backup restore of the
computer.
Qn2
i. Differentiate between a virus and an anti-virus.
ii. Briefly explain six types of viruses.
iii. Explain six ways how viruses can be spread.
iv. List 5 antivirus software’s you know.
Qn3
A. Convert the following numbers to base ten.
i) 101112 ii) 101112 iii) 1000002
B. Convert the following numbers to base two.
i) 24510 ii) 11210 iii) 10210
2. Convert the following numbers to Decimal base.
i) 2348 ii) 1348 iii) 11128
C. Convert the following numbers to Hexadecimal.
i) 11111112 ii) 101111112 iii) 11100100002
D. Convert the following numbers to Binary Base.
i) A1816 ii) ABD16 iii) 891016
answers
qn 2
I. a virus is a malicious software that’s causes unusual effects on a
computer while antivirus is a kind of software used to prevent, scan, detect
and delete viruses from a computer
II. The following are some of the types of computer viruses
File-infecting Virus
A virus that attached itself to an executable program. It is also called a parasitic virus which
typically infects files with .exe or .com extensions. Some file infectors can overwrite host
files and others can damage your hard drive’s formatting.
Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These
viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus
because it redirects your browser to other malicious websites that you don’t have any
intention of visiting. This virus can pose other threats such as changing the default home
page of your browser.
Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code
on a website and insert links that can install malicious software on your device. Web
scripting viruses can steal your cookies and use the information to post on your behalf on
the infected website.
Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks.
Today, these viruses are found distributed in forms of physical media such as external
hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.
Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every
time an infected file is performed.
.
III
The following are some of the ways how computer viruses are
spread
-Downloads Free Software
When you are downloading a free software from internet and if the software or files are
infected with a virus then there has a chance that your computer also becomes infected
with the virus
-Download Suspicious E-mail Attachments
If you receive a suspicious email with an attachment file from unknown source, the
attachment file may contain virus or malicious script. In that case, if you download and
open the attachment file then virus will execute and infect to your computer.
-Click on Phishing Emails
Sometimes you will receive promotional emails (Phishing Email) in your inbox from
unknown source. These mails may include attachments or URL that contain viruses or
malicious files. If you click on that URL or opening the email attachment, then your
computer will be infected with the virus or malware to access your computer system.
-Use External Devices
A virus can enter your computer system by inserting external devices such as USB
devices, Mobile, external hard disk. For example, when you connected your mobile
devices to your computer and if the mobile has a virus then your computer could infect with
malware or virus.
-Click on Online Advertisements
If you click on Ads, then it can infect your computer by virus because the Ads may contain
malicious code. Cyber attackers insert malicious codes into ads and place the ads on
trusted websites in order to gain reputation.
-Click on Malicious File
Malicious software is dangerous to your computer. If you click on malicious executable file,
then the malware will spread on your computer. The most common form of malicious
software is viruses, worms, trojan horses, spyware, adware or rootkits.
IV The following are some the computer antivirus software
✓ Kaspersky
✓ Panda
✓ Norton
✓ Bit defender
✓ Bull guard

Más contenido relacionado

La actualidad más candente

Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
NSU-Biliran Campus
 
Computer Laboratory Rules
Computer Laboratory RulesComputer Laboratory Rules
Computer Laboratory Rules
LUZ PINGOL
 

La actualidad más candente (20)

Introduction to computer programming
Introduction to computer programmingIntroduction to computer programming
Introduction to computer programming
 
Programming Fundamental Presentation
Programming Fundamental PresentationProgramming Fundamental Presentation
Programming Fundamental Presentation
 
Eclipse - Installation and quick start guide
Eclipse - Installation and quick start guideEclipse - Installation and quick start guide
Eclipse - Installation and quick start guide
 
Computer Quiz MCQ's
Computer Quiz MCQ'sComputer Quiz MCQ's
Computer Quiz MCQ's
 
COMPUTER Bios
COMPUTER BiosCOMPUTER Bios
COMPUTER Bios
 
Computer Programming: Chapter 1
Computer Programming: Chapter 1Computer Programming: Chapter 1
Computer Programming: Chapter 1
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
How to reformat pc
How to reformat pcHow to reformat pc
How to reformat pc
 
Linux booting process
Linux booting processLinux booting process
Linux booting process
 
How to format a computer windows 7
How to format a computer windows 7How to format a computer windows 7
How to format a computer windows 7
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
ppt on cmd cammand
ppt on cmd cammandppt on cmd cammand
ppt on cmd cammand
 
ICT Model Questions
ICT Model Questions ICT Model Questions
ICT Model Questions
 
Computer Laboratory Rules
Computer Laboratory RulesComputer Laboratory Rules
Computer Laboratory Rules
 
Implementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded SystemImplementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded System
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
 
Data processing for SS 1-3
Data processing for SS 1-3Data processing for SS 1-3
Data processing for SS 1-3
 
1 basic computer course
1 basic computer course1 basic computer course
1 basic computer course
 
Bios
Bios Bios
Bios
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Similar a INTRODUCTION TO COMPUTING.pdf

Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Yazeed Khalid
 
Revision week
Revision weekRevision week
Revision week
fizahPhd
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
Kumar Nirmal Prasad
 

Similar a INTRODUCTION TO COMPUTING.pdf (20)

Bece 2012
Bece 2012Bece 2012
Bece 2012
 
COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
 
Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papers
 
test.docx
test.docxtest.docx
test.docx
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
 
Set3 ict-question
Set3 ict-questionSet3 ict-question
Set3 ict-question
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
 
Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdf
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
 
Revision week
Revision weekRevision week
Revision week
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
 
ICT EXAM.pdf
ICT EXAM.pdfICT EXAM.pdf
ICT EXAM.pdf
 
3
33
3
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

INTRODUCTION TO COMPUTING.pdf

  • 1. If you want to know more about technology just come to worlds technology arena on youtube ( https://youtube.com/@worldstechnology arena178 on this link STUDENT NAME: COURSE: COURSE CODE YEAR OF STUDY: SEMISTER: INFORMATION TECHNOLOGY CIT 101 1 1 AKATWIJUKA OSCAR
  • 2. SECTION A 1. The term 1Gigabyte refers to. A. 1024 Patabytes B. 1024 Megabytes C. 1024 Kilobytes D. None of the above 2. In computer terminology which of the following best describes a Device Driver? A. Software that allows the user to control the operating system. B. Hardware that allows interaction between peripheral devices and Operating system. C. Hardware that allows the user to control an operating system. D. Software that allows interaction between peripheral Devices and Operating System. 3. The following option consists of only computer input devices. A. Keyboard, mouse, Joystick, printer B. Mouse, Monitor, Joystick, Keyboard C. Joystick, Keyboard, Digitizer, Monitor D. Joystick, Keyboard, Mouse, Digitizer 4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following relates to the above statement. A. Accuracy B. Diligence C. Reliability D. Versatility 5. The following computers were invented in First Generation except. E. UNIVAC, F. IBM-701 G. TDC-316 H. IBM-650 6. Non Volatile Memory is referred to as . B D D B G C
  • 3. A. RAM B. Cache Memory C. ROM D. Video Memory 7. The following are characteristics of impact printers except. A. They are noisy B. There is physical contact with the paper to produce an image C. Useful for bulk printing due to low cost D. These printers print a complete page at a time 8. A part of the computer that reads information from a disk is called ___________. A. Operating System B. Motherboard C.Hard Drive D. Disk Drive 9. The main characteristic of fourth generation was. A. VLSI B. Transistor C. Vacuum tubes D. Integrated circuit 10.Ctrl + Shift + Esc are keyboard shortcut keys used to. A. Restart the computer B. Ctrl + Shift + Esc C. Open Task Manager. D. Switch keyboard layout. 11.The following type of memory module has 30 pins on the bottom of circuit board. A. SIMM B. DIMM C. SIPP D. DIP 12.South Bridge on Motherboard inter connects the following motherboard components (select all). A. RAM B. ROM C. PCI Buss C C A C A C
  • 4. D. AGP 13.Which of the following is referred to as a web protocol? A. FTP B. HTTP C. IP D. TCP 14.Convert 1011101two to Decimal. A. 64ten B. 80ten C. 88ten D. 93ten 15.A time-sharing operating system is also known as. A. Batch processing OS B. Distributed OS C. Multitasking OS D. Real-OS 16.Which of the following device cannot be shared in Network? A. Printer B. Hard Disk C. CD drive D. Mouse 17. Which one of the following is not a computer language? A. BASIC B. C C. Fast D. FORTRAN 18.The spine of a computer is called. A. RAM B. BIOS C. Motherboard C D C D C B
  • 5. D. CPU 19.Which of the following statements are true about computer virus (select all that apply). A. Viruses have the ability to replicate themselves and infect computers B. Strange graphics are displayed on your computer monitor when viruses are present C. Putting a password on a computer prevents viruses from entering the system D. A Macros is a type of virus commonly found Microsoft programs 20.The following are optical storage Devices Except. A. Flash Disk B. Compact Disk C. Digital versatile disk D. Blue Ray 21. Convert 223ten to Octal Base. A. 330eight B. 230eight C. 230eight D. 337eight 22. Chose the odd man out. A. Firefox B. Internet explore C. Safari D. Google 23. Traffic-control computer is an example of. A. General purpose computer B. Analog Computer C. Special purpose computer D. Hybrid computer 24. Which of these is a free operating system? A. Windows 7 B. Windows XP C. Mac OSX A,B,D A D D A D
  • 6. D. Ubuntu 25. Data processing cycle takes on the following steps. A. Input, processing, storage, output B. Input, storage, processing, output C. Input, output, processing, storage D. Input, processing, output, storage 26. When you see no icons on the desktop, how can you open programs such as Microsoft Word?. A. Right-click to reveal all icons. B. Restart the computer. C. It is not possible to open the program if no icons are on the desktop. D. Click the start button and select program from the menu. 27. Which of the following is an example of an e-mail address? A. Www.google.com B. Jeandoe.gmail.com C. Bob Smith@gmail.com D. Johndoe@cincinnatilibrary.org 28. "Desktop" is a computer term that refers to? A. Something that is for the computer programmer only. B. The part of your work area where the computer monitor sits. C. The initial screen showing icons for folders, applications and files. D. D.The desk that your computer is stationed on. 29. A Program which detects all necessary computer components during boot sequence is. A. Bootstrap B. POST C. Loader D. BIOS 30. Which key on the keyboard is used to capitalize letters? A. Windows B. Ctrl C. Shift A D D C D C
  • 7. D. Tab 31.Which of the following is not a pointing device? A. Keyboard B. Mouse C. Joystick D. Light pen 32.The background of the desktop is called... A. Background B. Screen saver C. Wallpaper D. None of these 33.Which of the following interfaces will you encounter when installing Networks? A. NIC B. AGP C. PCI D. SCSI 34.Speed of the processor is measured in . A. Mbps B. Hertz C. MHz D. Bytes 35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in A. Memory Unit B. Arithmetic Unit C. Logic Unit D. Control Unit 36.The Second ERA of computers is concerned with Phones A C B B C
  • 8. 37.The type of backup that only copies data that has been changed or created since the. previous back up is called. A. Full backup B. Deferential backup C. Incremental backup D. Total backup 38.A Network of Networks is reffered to as. A. Intranet B. WWW C. Internet D. Extranet 39.Write the word COMPUTER in Full. 40.The Father of all computers is. A. John Von Nueman B. Charles Babbage C. John Barden D. Jack Kilby Common Operating Machine Particularly Used for Technical Education and Research C C B
  • 9. SECTION B: 30 Marks Attempt All Questions Write answers in spaces provided 1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks) Memory Volatile Non-Volatile RAM ✓ CMOS ✓ ROM ✓ Punched Card ✓ Magnetic Tape ✓ 1b. Identify five examples of adapter cards found in a system unit. (05 marks) 2(a).Give Examples of software under the following categories. (06 Marks) i. System Utility Examples ii. Operating System Examples iii. Programming Languages Examples 1.delete utility 2 diagnostic utility 1.linux 2. mac OS 1. FORTRAN 2. BASIC 1) Video cards 2) Multimedia cards 3) I/O cards 4) Communication cards 5) Network cards
  • 10. 2(b) List two advantages of Smartphone over a Laptop. (2Marks) 2(C) List 2 major Components of a computer System. (2Marks) 3(a) Write true or false against each statement from a to e in the table below (05 Marks) NO STATEMET TRUE / FALSE a) Image Viewer Utility Displays Contents of graphics when you double click on it True b) Uninstaller Removes a word document file from False c) Disk defragmenter compiles technical information about hardware or software False d) Disk Scanner detects and corrects problems on the hard disk true e) Antivirus utilities protect the physical access to the computer False 3(b) (a) Give the file extension, of any two of the following file types. (02 marks) File type File extension Executable file Motion pictures Ms Excel (b) Give two examples of file attributes. (02 marks) (c) State one function of a file in a computer system (01 mark) 1. It is a convenient way to keep others informed, 2 it is potable .exe .amv .xls 1. Read only 2. Archive To store organized data 1. software 2. hard ware
  • 11. Section C: 30 marks ➢ Attempt any one question ➢ Use ms word to present your answers but for the case of QN3 you can answer using your ball point and scan the answer sheet or u can use ms-word file Qn1 (a) With the help of pictures describe step by step how to perform a full backup of the computer. Qn1 (b) With the help of pictures describe step by step how to perform backup restore of the computer. Qn2 i. Differentiate between a virus and an anti-virus. ii. Briefly explain six types of viruses. iii. Explain six ways how viruses can be spread. iv. List 5 antivirus software’s you know. Qn3 A. Convert the following numbers to base ten. i) 101112 ii) 101112 iii) 1000002 B. Convert the following numbers to base two. i) 24510 ii) 11210 iii) 10210 2. Convert the following numbers to Decimal base. i) 2348 ii) 1348 iii) 11128 C. Convert the following numbers to Hexadecimal. i) 11111112 ii) 101111112 iii) 11100100002 D. Convert the following numbers to Binary Base.
  • 12. i) A1816 ii) ABD16 iii) 891016 answers qn 2 I. a virus is a malicious software that’s causes unusual effects on a computer while antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer II. The following are some of the types of computer viruses File-infecting Virus A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting. Macro Virus This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments. Browser Hijacker This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser. Web Scripting Virus A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website. Boot Sector Virus These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer. Polymorphic Virus This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.
  • 13. . III The following are some of the ways how computer viruses are spread -Downloads Free Software When you are downloading a free software from internet and if the software or files are infected with a virus then there has a chance that your computer also becomes infected with the virus -Download Suspicious E-mail Attachments If you receive a suspicious email with an attachment file from unknown source, the attachment file may contain virus or malicious script. In that case, if you download and open the attachment file then virus will execute and infect to your computer. -Click on Phishing Emails Sometimes you will receive promotional emails (Phishing Email) in your inbox from unknown source. These mails may include attachments or URL that contain viruses or malicious files. If you click on that URL or opening the email attachment, then your computer will be infected with the virus or malware to access your computer system. -Use External Devices A virus can enter your computer system by inserting external devices such as USB devices, Mobile, external hard disk. For example, when you connected your mobile devices to your computer and if the mobile has a virus then your computer could infect with malware or virus. -Click on Online Advertisements If you click on Ads, then it can infect your computer by virus because the Ads may contain malicious code. Cyber attackers insert malicious codes into ads and place the ads on trusted websites in order to gain reputation. -Click on Malicious File Malicious software is dangerous to your computer. If you click on malicious executable file, then the malware will spread on your computer. The most common form of malicious software is viruses, worms, trojan horses, spyware, adware or rootkits. IV The following are some the computer antivirus software ✓ Kaspersky ✓ Panda
  • 14. ✓ Norton ✓ Bit defender ✓ Bull guard