SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
If you want to know more about
technology just come to worlds
technology arena on youtube (
https://youtube.com/@worldstechnology
arena178 on this link
STUDENT NAME:
COURSE:
COURSE CODE
YEAR OF STUDY:
SEMISTER:
INFORMATION TECHNOLOGY
CIT 101
1
1
AKATWIJUKA OSCAR
SECTION A
1. The term 1Gigabyte refers to.
A. 1024 Patabytes
B. 1024 Megabytes
C. 1024 Kilobytes
D. None of the above
2. In computer terminology which of the following best describes a Device Driver?
A. Software that allows the user to control the operating system.
B. Hardware that allows interaction between peripheral devices and Operating system.
C. Hardware that allows the user to control an operating system.
D. Software that allows interaction between peripheral Devices and Operating System.
3. The following option consists of only computer input devices.
A. Keyboard, mouse, Joystick, printer
B. Mouse, Monitor, Joystick, Keyboard
C. Joystick, Keyboard, Digitizer, Monitor
D. Joystick, Keyboard, Mouse, Digitizer
4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following
relates to the above statement.
A. Accuracy
B. Diligence
C. Reliability
D. Versatility
5. The following computers were invented in First Generation except.
E. UNIVAC,
F. IBM-701
G. TDC-316
H. IBM-650
6. Non Volatile Memory is referred to as .
B
D
D
B
G
C
A. RAM
B. Cache Memory
C. ROM
D. Video Memory
7. The following are characteristics of impact printers except.
A. They are noisy
B. There is physical contact with the paper to produce an image
C. Useful for bulk printing due to low cost
D. These printers print a complete page at a time
8. A part of the computer that reads information from a disk is called ___________.
A. Operating System
B. Motherboard
C.Hard Drive
D. Disk Drive
9. The main characteristic of fourth generation was.
A. VLSI
B. Transistor
C. Vacuum tubes
D. Integrated circuit
10.Ctrl + Shift + Esc are keyboard shortcut keys used to.
A. Restart the computer
B. Ctrl + Shift + Esc
C. Open Task Manager.
D. Switch keyboard layout.
11.The following type of memory module has 30 pins on the bottom of circuit board.
A. SIMM
B. DIMM
C. SIPP
D. DIP
12.South Bridge on Motherboard inter connects the following motherboard components (select all).
A. RAM
B. ROM
C. PCI Buss
C
C
A
C
A
C
D. AGP
13.Which of the following is referred to as a web protocol?
A. FTP
B. HTTP
C. IP
D. TCP
14.Convert 1011101two to Decimal.
A. 64ten
B. 80ten
C. 88ten
D. 93ten
15.A time-sharing operating system is also known as.
A. Batch processing OS
B. Distributed OS
C. Multitasking OS
D. Real-OS
16.Which of the following device cannot be shared in Network?
A. Printer
B. Hard Disk
C. CD drive
D. Mouse
17. Which one of the following is not a computer language?
A. BASIC
B. C
C. Fast
D. FORTRAN
18.The spine of a computer is called.
A. RAM
B. BIOS
C. Motherboard
C
D
C
D
C
B
D. CPU
19.Which of the following statements are true about computer virus (select all that apply).
A. Viruses have the ability to replicate themselves and infect computers
B. Strange graphics are displayed on your computer monitor when viruses are present
C. Putting a password on a computer prevents viruses from entering the system
D. A Macros is a type of virus commonly found Microsoft programs
20.The following are optical storage Devices Except.
A. Flash Disk
B. Compact Disk
C. Digital versatile disk
D. Blue Ray
21. Convert 223ten to Octal Base.
A. 330eight
B. 230eight
C. 230eight
D. 337eight
22. Chose the odd man out.
A. Firefox
B. Internet explore
C. Safari
D. Google
23. Traffic-control computer is an example of.
A. General purpose computer
B. Analog Computer
C. Special purpose computer
D. Hybrid computer
24. Which of these is a free operating system?
A. Windows 7
B. Windows XP
C. Mac OSX
A,B,D
A
D
D
A
D
D. Ubuntu
25. Data processing cycle takes on the following steps.
A. Input, processing, storage, output
B. Input, storage, processing, output
C. Input, output, processing, storage
D. Input, processing, output, storage
26. When you see no icons on the desktop, how can you open programs such as Microsoft
Word?.
A. Right-click to reveal all icons.
B. Restart the computer.
C. It is not possible to open the program if no icons are on the desktop.
D. Click the start button and select program from the menu.
27. Which of the following is an example of an e-mail address?
A. Www.google.com
B. Jeandoe.gmail.com
C. Bob Smith@gmail.com
D. Johndoe@cincinnatilibrary.org
28. "Desktop" is a computer term that refers to?
A. Something that is for the computer programmer only.
B. The part of your work area where the computer monitor sits.
C. The initial screen showing icons for folders, applications and files.
D. D.The desk that your computer is stationed on.
29. A Program which detects all necessary computer components during boot sequence is.
A. Bootstrap
B. POST
C. Loader
D. BIOS
30. Which key on the keyboard is used to capitalize letters?
A. Windows
B. Ctrl
C. Shift
A
D
D
C
D
C
D. Tab
31.Which of the following is not a pointing device?
A. Keyboard
B. Mouse
C. Joystick
D. Light pen
32.The background of the desktop is called...
A. Background
B. Screen saver
C. Wallpaper
D. None of these
33.Which of the following interfaces will you encounter when installing Networks?
A. NIC
B. AGP
C. PCI
D. SCSI
34.Speed of the processor is measured in .
A. Mbps
B. Hertz
C. MHz
D. Bytes
35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in
A. Memory Unit
B. Arithmetic Unit
C. Logic Unit
D. Control Unit
36.The Second ERA of computers is concerned with
Phones
A
C
B
B
C
37.The type of backup that only copies data that has been changed or created since the.
previous back up is called.
A. Full backup
B. Deferential backup
C. Incremental backup
D. Total backup
38.A Network of Networks is reffered to as.
A. Intranet
B. WWW
C. Internet
D. Extranet
39.Write the word COMPUTER in Full.
40.The Father of all computers is.
A. John Von Nueman
B. Charles Babbage
C. John Barden
D. Jack Kilby
Common Operating Machine Particularly Used for Technical Education and Research
C
C
B
SECTION B: 30 Marks
Attempt All Questions
Write answers in spaces provided
1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks)
Memory Volatile Non-Volatile
RAM âś“
CMOS âś“
ROM âś“
Punched Card âś“
Magnetic Tape âś“
1b. Identify five examples of adapter cards found in a system unit. (05 marks)
2(a).Give Examples of software under the following categories. (06 Marks)
i. System Utility
Examples
ii. Operating System
Examples
iii. Programming Languages
Examples
1.delete utility
2 diagnostic utility
1.linux
2. mac OS
1. FORTRAN
2. BASIC
1) Video cards
2) Multimedia cards
3) I/O cards
4) Communication cards
5) Network cards
2(b) List two advantages of Smartphone over a Laptop. (2Marks)
2(C) List 2 major Components of a computer System. (2Marks)
3(a) Write true or false against each statement from a to e in the table below (05 Marks)
NO STATEMET TRUE / FALSE
a) Image Viewer Utility Displays Contents of graphics when you
double click on it
True
b) Uninstaller Removes a word document file from False
c) Disk defragmenter compiles technical information about
hardware or software
False
d) Disk Scanner detects and corrects problems on the hard disk true
e) Antivirus utilities protect the physical access to the computer False
3(b) (a) Give the file extension, of any two of the following file types. (02 marks)
File type File extension
Executable file
Motion pictures
Ms Excel
(b) Give two examples of file attributes. (02 marks)
(c) State one function of a file in a computer system (01 mark)
1. It is a convenient way to keep others informed,
2 it is potable
.exe
.amv
.xls
1. Read only
2. Archive
To store organized data
1. software
2. hard ware
Section C: 30 marks
➢ Attempt any one question
➢ Use ms word to present your answers but for the case of QN3 you can answer
using your ball point and scan the answer sheet or u can use ms-word file
Qn1 (a)
With the help of pictures describe step by step how to perform a full backup of the computer.
Qn1 (b)
With the help of pictures describe step by step how to perform backup restore of the
computer.
Qn2
i. Differentiate between a virus and an anti-virus.
ii. Briefly explain six types of viruses.
iii. Explain six ways how viruses can be spread.
iv. List 5 antivirus software’s you know.
Qn3
A. Convert the following numbers to base ten.
i) 101112 ii) 101112 iii) 1000002
B. Convert the following numbers to base two.
i) 24510 ii) 11210 iii) 10210
2. Convert the following numbers to Decimal base.
i) 2348 ii) 1348 iii) 11128
C. Convert the following numbers to Hexadecimal.
i) 11111112 ii) 101111112 iii) 11100100002
D. Convert the following numbers to Binary Base.
i) A1816 ii) ABD16 iii) 891016
answers
qn 2
I. a virus is a malicious software that’s causes unusual effects on a
computer while antivirus is a kind of software used to prevent, scan, detect
and delete viruses from a computer
II. The following are some of the types of computer viruses
File-infecting Virus
A virus that attached itself to an executable program. It is also called a parasitic virus which
typically infects files with .exe or .com extensions. Some file infectors can overwrite host
files and others can damage your hard drive’s formatting.
Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These
viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus
because it redirects your browser to other malicious websites that you don’t have any
intention of visiting. This virus can pose other threats such as changing the default home
page of your browser.
Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code
on a website and insert links that can install malicious software on your device. Web
scripting viruses can steal your cookies and use the information to post on your behalf on
the infected website.
Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks.
Today, these viruses are found distributed in forms of physical media such as external
hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.
Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every
time an infected file is performed.
.
III
The following are some of the ways how computer viruses are
spread
-Downloads Free Software
When you are downloading a free software from internet and if the software or files are
infected with a virus then there has a chance that your computer also becomes infected
with the virus
-Download Suspicious E-mail Attachments
If you receive a suspicious email with an attachment file from unknown source, the
attachment file may contain virus or malicious script. In that case, if you download and
open the attachment file then virus will execute and infect to your computer.
-Click on Phishing Emails
Sometimes you will receive promotional emails (Phishing Email) in your inbox from
unknown source. These mails may include attachments or URL that contain viruses or
malicious files. If you click on that URL or opening the email attachment, then your
computer will be infected with the virus or malware to access your computer system.
-Use External Devices
A virus can enter your computer system by inserting external devices such as USB
devices, Mobile, external hard disk. For example, when you connected your mobile
devices to your computer and if the mobile has a virus then your computer could infect with
malware or virus.
-Click on Online Advertisements
If you click on Ads, then it can infect your computer by virus because the Ads may contain
malicious code. Cyber attackers insert malicious codes into ads and place the ads on
trusted websites in order to gain reputation.
-Click on Malicious File
Malicious software is dangerous to your computer. If you click on malicious executable file,
then the malware will spread on your computer. The most common form of malicious
software is viruses, worms, trojan horses, spyware, adware or rootkits.
IV The following are some the computer antivirus software
âś“ Kaspersky
âś“ Panda
âś“ Norton
âś“ Bit defender
âś“ Bull guard

Weitere ähnliche Inhalte

Was ist angesagt?

Formatting and printing workshets
Formatting and printing workshetsFormatting and printing workshets
Formatting and printing workshetsbharath7352
 
Basic Computer Application Skills
Basic Computer Application SkillsBasic Computer Application Skills
Basic Computer Application Skills'nyere Favour
 
Basic computer troubleshooting
Basic computer troubleshootingBasic computer troubleshooting
Basic computer troubleshootingdan0530
 
Cpu and its functions
Cpu and its functionsCpu and its functions
Cpu and its functionsmyrajendra
 
Technology impact on learning
Technology impact on learning Technology impact on learning
Technology impact on learning Dushyant Singh
 
Program Logic and Design
Program Logic and DesignProgram Logic and Design
Program Logic and DesignFroilan Cantillo
 
Windows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentationWindows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentationdgdotson
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer ProgrammingProf. Erwin Globio
 
computer-studies-grade-8-lesson-plans (1).pdf
computer-studies-grade-8-lesson-plans (1).pdfcomputer-studies-grade-8-lesson-plans (1).pdf
computer-studies-grade-8-lesson-plans (1).pdfmaureenchanda
 
Basics of Computer for Students
Basics of Computer for StudentsBasics of Computer for Students
Basics of Computer for Studentsvethics
 
Basic Troubleshooting
Basic TroubleshootingBasic Troubleshooting
Basic TroubleshootingAaron Abraham
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyBeing Aabis
 
Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Habib Ullah Qamar
 
Computer Lab Rules
Computer Lab  RulesComputer Lab  Rules
Computer Lab Rulesguest5431f2
 

Was ist angesagt? (20)

Formatting and printing workshets
Formatting and printing workshetsFormatting and printing workshets
Formatting and printing workshets
 
Basic Computer Application Skills
Basic Computer Application SkillsBasic Computer Application Skills
Basic Computer Application Skills
 
Basic computer troubleshooting
Basic computer troubleshootingBasic computer troubleshooting
Basic computer troubleshooting
 
Cpu and its functions
Cpu and its functionsCpu and its functions
Cpu and its functions
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Technology impact on learning
Technology impact on learning Technology impact on learning
Technology impact on learning
 
Program Logic and Design
Program Logic and DesignProgram Logic and Design
Program Logic and Design
 
Fundamental of computer
Fundamental of computer Fundamental of computer
Fundamental of computer
 
Windows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentationWindows 10 module 1 ppt presentation
Windows 10 module 1 ppt presentation
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer Programming
 
computer-studies-grade-8-lesson-plans (1).pdf
computer-studies-grade-8-lesson-plans (1).pdfcomputer-studies-grade-8-lesson-plans (1).pdf
computer-studies-grade-8-lesson-plans (1).pdf
 
Basics of Computer for Students
Basics of Computer for StudentsBasics of Computer for Students
Basics of Computer for Students
 
Computer
ComputerComputer
Computer
 
Basic Troubleshooting
Basic TroubleshootingBasic Troubleshooting
Basic Troubleshooting
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...
 
Computer Quiz MCQ's
Computer Quiz MCQ'sComputer Quiz MCQ's
Computer Quiz MCQ's
 
Basic Computer Training
Basic Computer TrainingBasic Computer Training
Basic Computer Training
 
Computer Lab Rules
Computer Lab  RulesComputer Lab  Rules
Computer Lab Rules
 

Ă„hnlich wie Everything you need to know about technology on YouTube

COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4kefyalew013
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.Qasuk Mdkkw
 
Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020bricious mulimbi
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Yazeed Khalid
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papersneha rawat
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2Ejiro Ndifereke
 
Set3 ict-question
Set3 ict-questionSet3 ict-question
Set3 ict-questionAzmiah Mahmud
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSsddppml
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Germaneas
 
Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...Thesuccesspath
 
100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdfFAWAD KHAN
 
Basic computer question
Basic computer questionBasic computer question
Basic computer questionABHISHEK KUMAR
 
Revision week
Revision weekRevision week
Revision weekfizahPhd
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008Kumar Nirmal Prasad
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008Kumar Nirmal Prasad
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-Alberto Vargas
 

Ă„hnlich wie Everything you need to know about technology on YouTube (20)

Bece 2012
Bece 2012Bece 2012
Bece 2012
 
COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
 
Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papers
 
test.docx
test.docxtest.docx
test.docx
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
 
Set3 ict-question
Set3 ict-questionSet3 ict-question
Set3 ict-question
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
 
Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...
 
100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdf
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
 
Revision week
Revision weekRevision week
Revision week
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
 
ICT EXAM.pdf
ICT EXAM.pdfICT EXAM.pdf
ICT EXAM.pdf
 
3
33
3
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-
 

KĂĽrzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

KĂĽrzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Everything you need to know about technology on YouTube

  • 1. If you want to know more about technology just come to worlds technology arena on youtube ( https://youtube.com/@worldstechnology arena178 on this link STUDENT NAME: COURSE: COURSE CODE YEAR OF STUDY: SEMISTER: INFORMATION TECHNOLOGY CIT 101 1 1 AKATWIJUKA OSCAR
  • 2. SECTION A 1. The term 1Gigabyte refers to. A. 1024 Patabytes B. 1024 Megabytes C. 1024 Kilobytes D. None of the above 2. In computer terminology which of the following best describes a Device Driver? A. Software that allows the user to control the operating system. B. Hardware that allows interaction between peripheral devices and Operating system. C. Hardware that allows the user to control an operating system. D. Software that allows interaction between peripheral Devices and Operating System. 3. The following option consists of only computer input devices. A. Keyboard, mouse, Joystick, printer B. Mouse, Monitor, Joystick, Keyboard C. Joystick, Keyboard, Digitizer, Monitor D. Joystick, Keyboard, Mouse, Digitizer 4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following relates to the above statement. A. Accuracy B. Diligence C. Reliability D. Versatility 5. The following computers were invented in First Generation except. E. UNIVAC, F. IBM-701 G. TDC-316 H. IBM-650 6. Non Volatile Memory is referred to as . B D D B G C
  • 3. A. RAM B. Cache Memory C. ROM D. Video Memory 7. The following are characteristics of impact printers except. A. They are noisy B. There is physical contact with the paper to produce an image C. Useful for bulk printing due to low cost D. These printers print a complete page at a time 8. A part of the computer that reads information from a disk is called ___________. A. Operating System B. Motherboard C.Hard Drive D. Disk Drive 9. The main characteristic of fourth generation was. A. VLSI B. Transistor C. Vacuum tubes D. Integrated circuit 10.Ctrl + Shift + Esc are keyboard shortcut keys used to. A. Restart the computer B. Ctrl + Shift + Esc C. Open Task Manager. D. Switch keyboard layout. 11.The following type of memory module has 30 pins on the bottom of circuit board. A. SIMM B. DIMM C. SIPP D. DIP 12.South Bridge on Motherboard inter connects the following motherboard components (select all). A. RAM B. ROM C. PCI Buss C C A C A C
  • 4. D. AGP 13.Which of the following is referred to as a web protocol? A. FTP B. HTTP C. IP D. TCP 14.Convert 1011101two to Decimal. A. 64ten B. 80ten C. 88ten D. 93ten 15.A time-sharing operating system is also known as. A. Batch processing OS B. Distributed OS C. Multitasking OS D. Real-OS 16.Which of the following device cannot be shared in Network? A. Printer B. Hard Disk C. CD drive D. Mouse 17. Which one of the following is not a computer language? A. BASIC B. C C. Fast D. FORTRAN 18.The spine of a computer is called. A. RAM B. BIOS C. Motherboard C D C D C B
  • 5. D. CPU 19.Which of the following statements are true about computer virus (select all that apply). A. Viruses have the ability to replicate themselves and infect computers B. Strange graphics are displayed on your computer monitor when viruses are present C. Putting a password on a computer prevents viruses from entering the system D. A Macros is a type of virus commonly found Microsoft programs 20.The following are optical storage Devices Except. A. Flash Disk B. Compact Disk C. Digital versatile disk D. Blue Ray 21. Convert 223ten to Octal Base. A. 330eight B. 230eight C. 230eight D. 337eight 22. Chose the odd man out. A. Firefox B. Internet explore C. Safari D. Google 23. Traffic-control computer is an example of. A. General purpose computer B. Analog Computer C. Special purpose computer D. Hybrid computer 24. Which of these is a free operating system? A. Windows 7 B. Windows XP C. Mac OSX A,B,D A D D A D
  • 6. D. Ubuntu 25. Data processing cycle takes on the following steps. A. Input, processing, storage, output B. Input, storage, processing, output C. Input, output, processing, storage D. Input, processing, output, storage 26. When you see no icons on the desktop, how can you open programs such as Microsoft Word?. A. Right-click to reveal all icons. B. Restart the computer. C. It is not possible to open the program if no icons are on the desktop. D. Click the start button and select program from the menu. 27. Which of the following is an example of an e-mail address? A. Www.google.com B. Jeandoe.gmail.com C. Bob Smith@gmail.com D. Johndoe@cincinnatilibrary.org 28. "Desktop" is a computer term that refers to? A. Something that is for the computer programmer only. B. The part of your work area where the computer monitor sits. C. The initial screen showing icons for folders, applications and files. D. D.The desk that your computer is stationed on. 29. A Program which detects all necessary computer components during boot sequence is. A. Bootstrap B. POST C. Loader D. BIOS 30. Which key on the keyboard is used to capitalize letters? A. Windows B. Ctrl C. Shift A D D C D C
  • 7. D. Tab 31.Which of the following is not a pointing device? A. Keyboard B. Mouse C. Joystick D. Light pen 32.The background of the desktop is called... A. Background B. Screen saver C. Wallpaper D. None of these 33.Which of the following interfaces will you encounter when installing Networks? A. NIC B. AGP C. PCI D. SCSI 34.Speed of the processor is measured in . A. Mbps B. Hertz C. MHz D. Bytes 35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in A. Memory Unit B. Arithmetic Unit C. Logic Unit D. Control Unit 36.The Second ERA of computers is concerned with Phones A C B B C
  • 8. 37.The type of backup that only copies data that has been changed or created since the. previous back up is called. A. Full backup B. Deferential backup C. Incremental backup D. Total backup 38.A Network of Networks is reffered to as. A. Intranet B. WWW C. Internet D. Extranet 39.Write the word COMPUTER in Full. 40.The Father of all computers is. A. John Von Nueman B. Charles Babbage C. John Barden D. Jack Kilby Common Operating Machine Particularly Used for Technical Education and Research C C B
  • 9. SECTION B: 30 Marks Attempt All Questions Write answers in spaces provided 1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks) Memory Volatile Non-Volatile RAM âś“ CMOS âś“ ROM âś“ Punched Card âś“ Magnetic Tape âś“ 1b. Identify five examples of adapter cards found in a system unit. (05 marks) 2(a).Give Examples of software under the following categories. (06 Marks) i. System Utility Examples ii. Operating System Examples iii. Programming Languages Examples 1.delete utility 2 diagnostic utility 1.linux 2. mac OS 1. FORTRAN 2. BASIC 1) Video cards 2) Multimedia cards 3) I/O cards 4) Communication cards 5) Network cards
  • 10. 2(b) List two advantages of Smartphone over a Laptop. (2Marks) 2(C) List 2 major Components of a computer System. (2Marks) 3(a) Write true or false against each statement from a to e in the table below (05 Marks) NO STATEMET TRUE / FALSE a) Image Viewer Utility Displays Contents of graphics when you double click on it True b) Uninstaller Removes a word document file from False c) Disk defragmenter compiles technical information about hardware or software False d) Disk Scanner detects and corrects problems on the hard disk true e) Antivirus utilities protect the physical access to the computer False 3(b) (a) Give the file extension, of any two of the following file types. (02 marks) File type File extension Executable file Motion pictures Ms Excel (b) Give two examples of file attributes. (02 marks) (c) State one function of a file in a computer system (01 mark) 1. It is a convenient way to keep others informed, 2 it is potable .exe .amv .xls 1. Read only 2. Archive To store organized data 1. software 2. hard ware
  • 11. Section C: 30 marks ➢ Attempt any one question ➢ Use ms word to present your answers but for the case of QN3 you can answer using your ball point and scan the answer sheet or u can use ms-word file Qn1 (a) With the help of pictures describe step by step how to perform a full backup of the computer. Qn1 (b) With the help of pictures describe step by step how to perform backup restore of the computer. Qn2 i. Differentiate between a virus and an anti-virus. ii. Briefly explain six types of viruses. iii. Explain six ways how viruses can be spread. iv. List 5 antivirus software’s you know. Qn3 A. Convert the following numbers to base ten. i) 101112 ii) 101112 iii) 1000002 B. Convert the following numbers to base two. i) 24510 ii) 11210 iii) 10210 2. Convert the following numbers to Decimal base. i) 2348 ii) 1348 iii) 11128 C. Convert the following numbers to Hexadecimal. i) 11111112 ii) 101111112 iii) 11100100002 D. Convert the following numbers to Binary Base.
  • 12. i) A1816 ii) ABD16 iii) 891016 answers qn 2 I. a virus is a malicious software that’s causes unusual effects on a computer while antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer II. The following are some of the types of computer viruses File-infecting Virus A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting. Macro Virus This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments. Browser Hijacker This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser. Web Scripting Virus A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website. Boot Sector Virus These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer. Polymorphic Virus This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.
  • 13. . III The following are some of the ways how computer viruses are spread -Downloads Free Software When you are downloading a free software from internet and if the software or files are infected with a virus then there has a chance that your computer also becomes infected with the virus -Download Suspicious E-mail Attachments If you receive a suspicious email with an attachment file from unknown source, the attachment file may contain virus or malicious script. In that case, if you download and open the attachment file then virus will execute and infect to your computer. -Click on Phishing Emails Sometimes you will receive promotional emails (Phishing Email) in your inbox from unknown source. These mails may include attachments or URL that contain viruses or malicious files. If you click on that URL or opening the email attachment, then your computer will be infected with the virus or malware to access your computer system. -Use External Devices A virus can enter your computer system by inserting external devices such as USB devices, Mobile, external hard disk. For example, when you connected your mobile devices to your computer and if the mobile has a virus then your computer could infect with malware or virus. -Click on Online Advertisements If you click on Ads, then it can infect your computer by virus because the Ads may contain malicious code. Cyber attackers insert malicious codes into ads and place the ads on trusted websites in order to gain reputation. -Click on Malicious File Malicious software is dangerous to your computer. If you click on malicious executable file, then the malware will spread on your computer. The most common form of malicious software is viruses, worms, trojan horses, spyware, adware or rootkits. IV The following are some the computer antivirus software âś“ Kaspersky âś“ Panda
  • 14. âś“ Norton âś“ Bit defender âś“ Bull guard