You are on page 1of 8
CONFIDENTIAL CSIDEC 2015/C8C133/134 UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE COMPUTER AND INFORMATION PROCESSING COURSE CODE : CSC133/134 EXAMINATION DECEMBER 2015 TIME : 2HOURS INSTRUCTIONS TO CANDIDATES 1 This question paper consists of three (3) parts : PART A (30 Questions) PART B (7 Questions) PART C (2 Questions) 2 ‘Answer ALL questions from all three (3) parts. i) Answer PART A in the Objective Answer Sheet. ii) Answer PART B and PART C in the Answer Booklet. Start each answer on a new page. 3 Do not bring any material into the examination room unless permission is given by the invigilator. 4 Please check to make sure that this examination pack consists of: ’) the Question Paper ji) an Answer Booklet — provided by the Faculty il) an Objective Answer Sheet - provided by the Faculty 5 ‘Answer ALL questions in English DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of @ printed pages (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL CONFIDENTIAL 2 CSIDEC 2018/CSC133/134 PART A (60 MARKS) 1. tools enable groups of people to connect and exchange ideas. ‘A. Affective computing B. Social networking ©. Debugging D. Computer forensics 2. The gap between those who have easy access to the Internet and technology with those who do not is known as the divide. A. web B._ internet C. digital D. technology 3. All of the following are names for a flash drive EXCEPT drive. A. jump 8. USB C. thumb D. hard 4. All of the following are ways to avoid injuries when working on computers EXCEPT ‘A. placing a monitor at least 12" from the eyes B. purchasing an adjustable chair C. ensuring proper lighting D. taking breaks 5. Which of the following is a secondary storage device that uses laser technology and can store large quantities of data? A. Microfiche B. Magnetic tape C. Floppy disk D. Optical disk 6. In the URL http:/www.soccer.com/surface, the portion labeled ".com" is the A. domain name B. host C. top-level domain D. protocol (© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL 3 CSIDEC 2015/6SC133/134 7. Errors in computer software are called A. worms B. beetles C. bugs D. spiders 8. Which of the following is the name of a Microsoft Excel file? A. blessings.xisx B. blessings.wpd C. blessings.acedb D. blessings. pdf 9. You can use the Windows to check on a nonresponsive program. A. System Restore B. Backup utility ©. Error-checking D. Task Manager 10. You can send messages that include photos and videos between mobile devices using technology. short message service (SMS) multimedia message service (MMS) delivery multimedia service (DMS) multimedia delivery service (MDS) DOm> 11. Which of the following is NOT a virus category? A. Trojan Horse B. Logic bomb C. Macro D. Pharming 12. Which of the following statements about cookies is NOT true? ‘A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their website. D. Some companies sell the personal information found in cookies to other companies. 13. Which of the following is NOT a language used in developing websites? A. XML B. KML C. Javascript D. HTML ‘© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL, CONFIDENTIAL 4 CSIDEC 2015/6SC133/134 14. This device is used by the banks to read cheques. A. OMR B. MICR c. ATM D. OCR 15. One terabyte is approximately a bytes. billion million trillion thousand pom> 16 is a network that is used in a large geographical area. LAN WAN MAN PAN pomp 17. The conversion from analog signal to a digital signal is called ‘A. modulation B. demodulation C. analoging D. digitizing 18.4 is a system of hardware and software that connects an intranet to ‘external networks. It blocks unauthorized traffic from entering the intranet. A. firewall B. proxy server C. web server D. ethernet 19. The Operating System performs the following functions EXCEPT A. provide a user interface B. manage computer resources C. do the specific job or task D. run programs 20. Which of the following is not a GUI characteristics? A. Menu B. Icon C. Command D. Button (© Hak Cipta Universiti Teknologi MARA, CONFIDENTIAL CONFIDENTIAL 5 CSIDEC 2015/CSC133/134 21. A magnetic disk is an example of, storage medium. A. random access B. direct access C. sequential access D. AandB 22.To prevent data loss caused by system failure, computer users should have ‘A. Access controls B. Antivirus programs C. Computer ethics D. Backup procedures 23, refers to the use of computers to create an artificial environment that you ‘can experience such as an office or a home. ‘A. 3D animation B. Multimedia C. Virtual machine D. Virtual reality 24. In data can flow in either direction, but only in one direction at a time. A. Simplex transmission B. Half-duplex transmission C. Full-duplex transmission D. Asynchronous transmission 25. Which of the following is NOT true about computer viruses? ‘A. They are computer programs that can infect other software. B. They never give problems to the Internet users C. They can damage computer systems by destroying or corrupting data D. Macro viruses are common among Microsoft Word users. 26.A requires users to enter a word or series of characters that match an entry ina security file. Biometric device Password PIN Possessed object pop> (© Hak Cipta Universiti Teknolog! MARA, CONFIDENTIAL, CONFIDENTIAL 6 CSIDEC 2018/CSC133/134 27. What is meant by the term topology as it relates to Local Area Network (LAN)? ‘A. A direction of data transmission. B. The way the equipment is configured in a communications network. C. A communications network that covers a limited physical area. D. A set of rules and procedures for exchanging information between computers. 28. A terminal that consists of only a keyboard and a display screen to receive and display data from a computer to which it is connected is a ‘Smart terminal Dumb terminal Point-of-sale terminal Intelligent terminal pop> 29, technology increases overall processing capability by reducing the instructions to only those that are most frequently used. A. SCSI B. RISC cc. CISC D. MIDI 30. Utility programs include all of the following EXCEPT Vaccines Screen savers Language translators Defragmentation pom> (© Hak Cipta Universiti Teknolog! MARA CONFIDENTIAL CONFIDENTIAL 7 CSIDEC 2015/CSC133/134 PART B (20 MARKS) QUESTION 1 Differentiate hard copy and soft copy. (4 marks) QUESTION 2 a) Provide TWO (2) examples of nonimpact printers. b) What are the advantages and disadvantages of this type of printers? (Give one example for each advantage and disadvantage) (4 marks) QUESTION 3 Why is RAM called volatile memory? (2 marks) QUESTION 4 List THREE (3) examples of peripheral devices. (3 marks) QUESTION 5 List TWO (2) types of transmission media that use physical technology (do not use wireless technology). (2 marks) QUESTION 6 What is netiquette? Provide TWO (2) examples of the rule of netiquette. (3 marks) QUESTION 7 Give ONE (1) example of software from the following categories: a) Spreadsheet b) Presentation (2 marks) © Hak Cipta Universit Teknolog! MARA CONFIDENTIAL CONFIDENTIAL 8 CSIDEC 2015/CSC133/134 PART C (20 MARKS) QUESTION 1 Being computer literate means being familiar with the computer and understand its capabilities and limitations in order to use them safely and efficiently. Assume that you are now a Sports Officer at a sports complex in a university. Explain FIVE (8) ways how becoming computer literate may help you in your daily work. (10 marks) QUESTION 2 Nowadays, social networking services such as Facebook, Twitter, YouTube, and Instagram are widely used, especially among youngsters. Discuss THREE (3) advantages and TWO (2) disadvantages of these social networking services. (10 marks) END OF QUESTION PAPER (© Hak Cipta Universiti Teknolog! MARA, CONFIDENTIAL

You might also like