Tata AIG General Insurance Company - Insurer Innovation Award 2024
Â
Everything you need to know about technology on YouTube
1. If you want to know more about
technology just come to worlds
technology arena on youtube (
https://youtube.com/@worldstechnology
arena178 on this link
STUDENT NAME:
COURSE:
COURSE CODE
YEAR OF STUDY:
SEMISTER:
INFORMATION TECHNOLOGY
CIT 101
1
1
AKATWIJUKA OSCAR
2. SECTION A
1. The term 1Gigabyte refers to.
A. 1024 Patabytes
B. 1024 Megabytes
C. 1024 Kilobytes
D. None of the above
2. In computer terminology which of the following best describes a Device Driver?
A. Software that allows the user to control the operating system.
B. Hardware that allows interaction between peripheral devices and Operating system.
C. Hardware that allows the user to control an operating system.
D. Software that allows interaction between peripheral Devices and Operating System.
3. The following option consists of only computer input devices.
A. Keyboard, mouse, Joystick, printer
B. Mouse, Monitor, Joystick, Keyboard
C. Joystick, Keyboard, Digitizer, Monitor
D. Joystick, Keyboard, Mouse, Digitizer
4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following
relates to the above statement.
A. Accuracy
B. Diligence
C. Reliability
D. Versatility
5. The following computers were invented in First Generation except.
E. UNIVAC,
F. IBM-701
G. TDC-316
H. IBM-650
6. Non Volatile Memory is referred to as .
B
D
D
B
G
C
3. A. RAM
B. Cache Memory
C. ROM
D. Video Memory
7. The following are characteristics of impact printers except.
A. They are noisy
B. There is physical contact with the paper to produce an image
C. Useful for bulk printing due to low cost
D. These printers print a complete page at a time
8. A part of the computer that reads information from a disk is called ___________.
A. Operating System
B. Motherboard
C.Hard Drive
D. Disk Drive
9. The main characteristic of fourth generation was.
A. VLSI
B. Transistor
C. Vacuum tubes
D. Integrated circuit
10.Ctrl + Shift + Esc are keyboard shortcut keys used to.
A. Restart the computer
B. Ctrl + Shift + Esc
C. Open Task Manager.
D. Switch keyboard layout.
11.The following type of memory module has 30 pins on the bottom of circuit board.
A. SIMM
B. DIMM
C. SIPP
D. DIP
12.South Bridge on Motherboard inter connects the following motherboard components (select all).
A. RAM
B. ROM
C. PCI Buss
C
C
A
C
A
C
4. D. AGP
13.Which of the following is referred to as a web protocol?
A. FTP
B. HTTP
C. IP
D. TCP
14.Convert 1011101two to Decimal.
A. 64ten
B. 80ten
C. 88ten
D. 93ten
15.A time-sharing operating system is also known as.
A. Batch processing OS
B. Distributed OS
C. Multitasking OS
D. Real-OS
16.Which of the following device cannot be shared in Network?
A. Printer
B. Hard Disk
C. CD drive
D. Mouse
17. Which one of the following is not a computer language?
A. BASIC
B. C
C. Fast
D. FORTRAN
18.The spine of a computer is called.
A. RAM
B. BIOS
C. Motherboard
C
D
C
D
C
B
5. D. CPU
19.Which of the following statements are true about computer virus (select all that apply).
A. Viruses have the ability to replicate themselves and infect computers
B. Strange graphics are displayed on your computer monitor when viruses are present
C. Putting a password on a computer prevents viruses from entering the system
D. A Macros is a type of virus commonly found Microsoft programs
20.The following are optical storage Devices Except.
A. Flash Disk
B. Compact Disk
C. Digital versatile disk
D. Blue Ray
21. Convert 223ten to Octal Base.
A. 330eight
B. 230eight
C. 230eight
D. 337eight
22. Chose the odd man out.
A. Firefox
B. Internet explore
C. Safari
D. Google
23. Traffic-control computer is an example of.
A. General purpose computer
B. Analog Computer
C. Special purpose computer
D. Hybrid computer
24. Which of these is a free operating system?
A. Windows 7
B. Windows XP
C. Mac OSX
A,B,D
A
D
D
A
D
6. D. Ubuntu
25. Data processing cycle takes on the following steps.
A. Input, processing, storage, output
B. Input, storage, processing, output
C. Input, output, processing, storage
D. Input, processing, output, storage
26. When you see no icons on the desktop, how can you open programs such as Microsoft
Word?.
A. Right-click to reveal all icons.
B. Restart the computer.
C. It is not possible to open the program if no icons are on the desktop.
D. Click the start button and select program from the menu.
27. Which of the following is an example of an e-mail address?
A. Www.google.com
B. Jeandoe.gmail.com
C. Bob Smith@gmail.com
D. Johndoe@cincinnatilibrary.org
28. "Desktop" is a computer term that refers to?
A. Something that is for the computer programmer only.
B. The part of your work area where the computer monitor sits.
C. The initial screen showing icons for folders, applications and files.
D. D.The desk that your computer is stationed on.
29. A Program which detects all necessary computer components during boot sequence is.
A. Bootstrap
B. POST
C. Loader
D. BIOS
30. Which key on the keyboard is used to capitalize letters?
A. Windows
B. Ctrl
C. Shift
A
D
D
C
D
C
7. D. Tab
31.Which of the following is not a pointing device?
A. Keyboard
B. Mouse
C. Joystick
D. Light pen
32.The background of the desktop is called...
A. Background
B. Screen saver
C. Wallpaper
D. None of these
33.Which of the following interfaces will you encounter when installing Networks?
A. NIC
B. AGP
C. PCI
D. SCSI
34.Speed of the processor is measured in .
A. Mbps
B. Hertz
C. MHz
D. Bytes
35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in
A. Memory Unit
B. Arithmetic Unit
C. Logic Unit
D. Control Unit
36.The Second ERA of computers is concerned with
Phones
A
C
B
B
C
8. 37.The type of backup that only copies data that has been changed or created since the.
previous back up is called.
A. Full backup
B. Deferential backup
C. Incremental backup
D. Total backup
38.A Network of Networks is reffered to as.
A. Intranet
B. WWW
C. Internet
D. Extranet
39.Write the word COMPUTER in Full.
40.The Father of all computers is.
A. John Von Nueman
B. Charles Babbage
C. John Barden
D. Jack Kilby
Common Operating Machine Particularly Used for Technical Education and Research
C
C
B
9. SECTION B: 30 Marks
Attempt All Questions
Write answers in spaces provided
1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks)
Memory Volatile Non-Volatile
RAM âś“
CMOS âś“
ROM âś“
Punched Card âś“
Magnetic Tape âś“
1b. Identify five examples of adapter cards found in a system unit. (05 marks)
2(a).Give Examples of software under the following categories. (06 Marks)
i. System Utility
Examples
ii. Operating System
Examples
iii. Programming Languages
Examples
1.delete utility
2 diagnostic utility
1.linux
2. mac OS
1. FORTRAN
2. BASIC
1) Video cards
2) Multimedia cards
3) I/O cards
4) Communication cards
5) Network cards
10. 2(b) List two advantages of Smartphone over a Laptop. (2Marks)
2(C) List 2 major Components of a computer System. (2Marks)
3(a) Write true or false against each statement from a to e in the table below (05 Marks)
NO STATEMET TRUE / FALSE
a) Image Viewer Utility Displays Contents of graphics when you
double click on it
True
b) Uninstaller Removes a word document file from False
c) Disk defragmenter compiles technical information about
hardware or software
False
d) Disk Scanner detects and corrects problems on the hard disk true
e) Antivirus utilities protect the physical access to the computer False
3(b) (a) Give the file extension, of any two of the following file types. (02 marks)
File type File extension
Executable file
Motion pictures
Ms Excel
(b) Give two examples of file attributes. (02 marks)
(c) State one function of a file in a computer system (01 mark)
1. It is a convenient way to keep others informed,
2 it is potable
.exe
.amv
.xls
1. Read only
2. Archive
To store organized data
1. software
2. hard ware
11. Section C: 30 marks
➢ Attempt any one question
➢ Use ms word to present your answers but for the case of QN3 you can answer
using your ball point and scan the answer sheet or u can use ms-word file
Qn1 (a)
With the help of pictures describe step by step how to perform a full backup of the computer.
Qn1 (b)
With the help of pictures describe step by step how to perform backup restore of the
computer.
Qn2
i. Differentiate between a virus and an anti-virus.
ii. Briefly explain six types of viruses.
iii. Explain six ways how viruses can be spread.
iv. List 5 antivirus software’s you know.
Qn3
A. Convert the following numbers to base ten.
i) 101112 ii) 101112 iii) 1000002
B. Convert the following numbers to base two.
i) 24510 ii) 11210 iii) 10210
2. Convert the following numbers to Decimal base.
i) 2348 ii) 1348 iii) 11128
C. Convert the following numbers to Hexadecimal.
i) 11111112 ii) 101111112 iii) 11100100002
D. Convert the following numbers to Binary Base.
12. i) A1816 ii) ABD16 iii) 891016
answers
qn 2
I. a virus is a malicious software that’s causes unusual effects on a
computer while antivirus is a kind of software used to prevent, scan, detect
and delete viruses from a computer
II. The following are some of the types of computer viruses
File-infecting Virus
A virus that attached itself to an executable program. It is also called a parasitic virus which
typically infects files with .exe or .com extensions. Some file infectors can overwrite host
files and others can damage your hard drive’s formatting.
Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These
viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus
because it redirects your browser to other malicious websites that you don’t have any
intention of visiting. This virus can pose other threats such as changing the default home
page of your browser.
Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code
on a website and insert links that can install malicious software on your device. Web
scripting viruses can steal your cookies and use the information to post on your behalf on
the infected website.
Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks.
Today, these viruses are found distributed in forms of physical media such as external
hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.
Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every
time an infected file is performed.
13. .
III
The following are some of the ways how computer viruses are
spread
-Downloads Free Software
When you are downloading a free software from internet and if the software or files are
infected with a virus then there has a chance that your computer also becomes infected
with the virus
-Download Suspicious E-mail Attachments
If you receive a suspicious email with an attachment file from unknown source, the
attachment file may contain virus or malicious script. In that case, if you download and
open the attachment file then virus will execute and infect to your computer.
-Click on Phishing Emails
Sometimes you will receive promotional emails (Phishing Email) in your inbox from
unknown source. These mails may include attachments or URL that contain viruses or
malicious files. If you click on that URL or opening the email attachment, then your
computer will be infected with the virus or malware to access your computer system.
-Use External Devices
A virus can enter your computer system by inserting external devices such as USB
devices, Mobile, external hard disk. For example, when you connected your mobile
devices to your computer and if the mobile has a virus then your computer could infect with
malware or virus.
-Click on Online Advertisements
If you click on Ads, then it can infect your computer by virus because the Ads may contain
malicious code. Cyber attackers insert malicious codes into ads and place the ads on
trusted websites in order to gain reputation.
-Click on Malicious File
Malicious software is dangerous to your computer. If you click on malicious executable file,
then the malware will spread on your computer. The most common form of malicious
software is viruses, worms, trojan horses, spyware, adware or rootkits.
IV The following are some the computer antivirus software
âś“ Kaspersky
âś“ Panda