You are on page 1of 8

BSc.(Hons) Business Information Systems & BSc.

(Hons) Software
Engineering & BSc.(Hons) Computer Science with Network Security
BSc.(Hons) Information Technology Enabled Services
Cohort BIS/05 FT - BSE/05 FT - BSE/05 PT - BCNS/05 FT - ITES/05 FT-
ITES/05 PT

Diploma in Human Resource Management & Diploma in Public Sector


Financial Management & Diploma in Purchasing & Supply Management
Cohort DHRM/05 PT - DPSFM/05 PT - DPSM/05 PT

BSc.(Hons) in Public Administration & Management


BPAM/05 PT

BSc. (Hons) Banking and International Finance &


BSc. (Hons) Tourism & Hospitality Management
Cohort BBIF/05 FT - BBIF/05 PT - BTHM/05 FT - BTHM/05 PT

Examinations for 2005 - 2006 / Semester 1

MODULE: COMPUTER FUNDAMENTALS


MODULE CODE: ITE101/ BISE010/ BISE017/ BISE012/ BISE016/ BISE013/ BISE015/ BISE011/ BISE014
Duration: 2 Hours
Instructions to Candidates:

1. This questionnaire contains 100 multiple choice questions and 24 fill in the blanks
questions.
2. Answer all questions on the Answer Sheet provided.
3. Each multiple choice question is 1 mark.
4. Each Fill in the blank is 2 marks.
5. Total marks to be scored are 150
This question paper contains Section A and Section B and 8 pages.

Page 1 of 8
SECTION A: ENCIRCLE THE MOST APPROPRIATE ANSWER ON THE ANSWER SHEET
1. The most important part of an information system is: 10. Memory stores:
A. People A. the operating system
B. Hardware B. application programs
C. Software C. the data being processed by the application
D. Data programs
D. all of the above
2. Which of the following are microcomputers?
A. Notebook, Handheld devices, IBM AS 400 11. The processor’s ______________ controls the timing
B. PDA, Laptops, Desktop PC
of all the computer operations.
C. Desktop PC, PDA, Packard Bell PB 250
D. Notebook, Packard Bell 250 A. system clock
B. register
3. Which type of computer is Cray T90? C. machine cycle
A. Minicomputer D. arithmetic logic unit (ALU)
B. Microcomputer
C. Supercomputer 12. The number of bits the processor can transmit at a
D. Mainframe given time is called:
A. Bus width
4. An example of an Optical Storage device is: B. Word size
A. Magnetic Tapes C. Access time
B. USB Disk D. Channel speed
C. Floppy Disk
D. DVD 13. A _____________ is a blank ROM that can be
programmed once only.
5. Which of the following is an example of an Operating
System? A. EPROM
A. MS DOS B. EEPROM
B. MS Access C. Flash ROM
C. Spreadsheets D. PROM
D. Photoshop
14. A ______________ port connects a device to the
6. Which of the following is part of the system unit?
system unit by transferring data 1 bit at a time
A. Monitor
B. Motherboard A. Parallel
C. Keyboard B. Serial
D. None of the above C. USB
D. FireWire
7. The four common types of files are documents files,
15. Bit is short for:
presentation files, worksheet files and:
A. Binary system
A. Program files
B. Digital byte
B. Database files
C. binary unit
C. System files
D. binary digit
D. Digital files
9 16. The ______________ interprets each instruction
8. What unit of storage is used to represent 10 bytes?
A. Kilobyte issued by a program and then initiates the
B. Terabyte
appropriate action to carry out the instruction.
C. Megabyte
D. Gigabyte A. arithmetic logic unit (ALU)
B. control unit
9. Mail Merge is used to: C. system unit
A. Merge two files together to create one D. memory
B. Generate several copies of a document with
varying fields 17. Computer processor chips are sometimes referred to
C. All of the above
as:
D. None of the above
a. Fourth Generation A. sockets
B. heat sinks
C. bits
D. microprocessor

Page 2 of 8
18. To be able to open several applications or to allow 27. The screen size of a CRT is measured.
large programs to run in a system with limited A. Vertically
B. Horizontally
memory, ________________ is used.
C. Vertically and Horizontally
A. Cache memory D. Diagonally
B. Virtual memory
C. Flash memory 28. Voice recognition is also called:
D. All of the above
A. Optical character recognition
B. Speech recognition
19. The number of bits that can be processed at one
C. Sound recognition
time is a: D. Continuous speech
A. byte
29. Using a (n) ___________________ reduces the risk
B. cycle
C. register of wrist and hand injuries.
D. word
A. Ergonomic keyboard
B. Cordless keyboard
20. The most widely used local bus is:
C. QWERTY keyboard
A. PCI D. Portable keyboard
B. ISA
C. MCA 30. Blind users can work with _____________ instead of
D. PCMCIA
using a monitor?
21. The type of bus that consists of a group of 16 lines A. Text output
B. Graphics output
and it is bidirectional is:
C. Video output
A. Address bus D. Audio output
B. Control bus
C. Message bus 31. The light-sensing input device that reads printed text
D. Data bus and graphics and then translates the results into a
form the computer can process is called a(n):
22. During I-time, the ALU: A. Optical reader
B. Bar code scanner
A. Examines instructions
C. Optical scanner
B. Executes instructions
D. Data collection device
C. Wait for instructions
D. Sends output
32. Mobile computers have _______________ displays.
23. The program counter: A. CRT
B. Gas plasma
A. holds the current instruction to be executed
C. HDTV
B. holds the address of the current data
D. LCD
C. holds data waiting to be processed, and
results of processing
33. Input may be in the following forms:
D. holds the location in memory of the next
instruction/data A. OCR, MICR and CPU
B. OMR, VGA and OCR
24. The indentations on CDs and DVDs are called: C. OCR, MICR and OMR
D. VGA, SVGA and XVGA
A. lands
B. pits
34. Which of the following printer prints one character at
C. clusters
D. tracks a time?
A. Line printer
25. Which of the following statements is true?
B. Inkjet printer
A. The digitizing tablet is an input device C. Alphabetic printer
B. The light pen is not an input device D. Dot matrix printer
C. The mouse is an output device
D. The monitor is not an output device. 35. Mass produced, copyrighted software that meets the
needs of a variety of users is called:
26. Which printer prints by spraying ink at the paper?
A. Custom software
A. Laser printer
B. Ready made software
B. Dot matrix printer
C. Freeware
C. Ink Jet printer
D. Shareware
D. Line printer
Page 3 of 8
44. Transmission of data can be:
36. The columns in a database are called:
A. Analogue
A. cells B. Digital
B. fields C. Synchronous
C. records D. All of the above
D. queries
45. A modem does the following:
37. The type of education in which students learn by
A. Convert digital data to analogue before
using and completing exercises with instructional sending data
B. Convert digital data to analogue when
software is called:
receiving data
A. Computer based training (CBT) C. Convert analogue data to digital before
B. Distance learning sending data
C. Web based training (WBT) D. All of the above
D. Computer aided graphics
46. Which media makes use of light for data
38. You must instruct the ____________________ to
transmission?
start the application software.
A. Twisted Pair
A. utility program B. Coaxial
B. memory C. Fibre optics
C. operating system D. All of the above
D. processor
47. Data travel in only one direction through the nodes in
39. Symbian OS is an example of an operating system
a:
that is used in:
A. Ring network
A. Mainframes B. Star network
B. Supercomputers C. Bus network
C. Handheld computers D. None of the above
D. Desktop computers
48. A node can be:
40. A ________________ is part of a program in
A. a server
execution. B. a workstation
C. a printer
A. process
D. all of the above
B. data
C. source code
49. Which of the following is true?
D. utility
A. Fibre optics is less reliable than twisted pair
41. A graphical user interface (GUI): cable
B. Fibre optics has less reliable than coaxial
A. is character-based and does not use any
cable
graphics.
C. Fibre optics is immune to electrical noise
B. gives the ability to create other software.
D. All of the above
C. allows users to interact with the computer
using graphic images.
50. Which of the following lists the different type of
D. all of the above
networks in ascending geographical area?
42. MS Word 2002 can be considered as:
A. LAN, WAN, MAN
A. An operating system B. WAN, LAN, MAN
B. A web based software C. MAN, LAN, WAN
C. An education software D. LAN, MAN, WAN
D. A productivity software
51. Protocols:
43. Which of the following is true?
A. define techniques for encoding and
A. The bootstrap loader resides in the RAM decoding data
B. The bootstrap loader locate and execute the B. can define mechanism for detecting and
kernel recovering from transmission errors
C. The bootstrap is executed when the system C. are set of rules defining format of data for
is shut down communication
D. The bootstrap is a virus that attacks the D. All of the above
operating system

Page 4 of 8
52. The Internet uses the following protocol: 60. Circuit switching:
A. TCP/IP A. creates a direct physical circuit between 2
B. IPX/SPX switches
C. UDP/IP B. creates a direct physical connection
D. TCP/UDP between 2 devices
C. creates a direct physical switch between 2
53. Internet users connect to the _____________ of the circuits
D. creates a direct physical connection
desired ISP.
between a circuit and a switch
A. hard disk
B. gateway 61. In packet switched network, the data units are called:
C. RAM
A. block
D. ROM
B. bit
C. packets
54. With _____________, standard telephone line is
D. switches
used to connect to the Internet.
62. In a peer to peer network:
A. VDSL
B. Dial-up access A. all computers have different services
C. ISDN B. all computers have equal rights
D. Cable television Internet services C. computers have different operating systems
D. user authentication is done remotely
55. The jargon for navigating on the Internet is called:
63. A client server architecture can be:
A. clicking
B. selecting A. centralised
C. surfing B. decentralised
D. analysing C. distributed
D. all of the above
56. Electrical interferences that can distort data during
64. Banking system with a single server is an example
transmission are called:
of:
A. virus
B. trojan A. centralized network
C. noise B. decentralized network
D. modulation C. distributed network
D. peer to peer network
57. The process of a computer receiving information
65. A server program:
from a server on the Internet is known as:
A. should run all the time
A. downloading
B. should run only when needed
B. pulling
C. both A and B above
C. transferring
D. none of the above
D. uploading
66. A ____________________ is a mechanism which
58. In order to view pages on a web site, the user needs
will look for information on different web sites and
to enter the site address called:
databases distributed all over the Internet.
A. Uniform resource locator
B. Email address A. web server
C. Postal address B. browser
D. MAC address C. trojan
D. search engine
59. The most popular Web browsers for personal
67. A browser:
computers are Microsoft Internet Explorer, Netscape,
A. software to browse a source code
and _____________.
B. antivirus software
A. Opera C. software that enables internet users to view
B. Dreamweaver web pages
C. QuickTime player D. security software
D. Real Player

Page 5 of 8
68. The most common graphics formats on the Web are 77. What is the HTML tag for listing items in a list?
GIF and _____________. A. <OL></OL>
B. <UL></UL>
A. BMP
C. <LIST></LIST>
B. JPEG
D. <LI>
C. TIFF
D. PNG
78. Which statement is false about the benefits of EDI
69. HTML stands for: trading?
A. Hyper Text Make up Language A. It provides faster trading cycle
B. Hyper Terminal Mark up Language B. It reduces security and accuracy
C. Hyper Text Mark up Language C. It reduces delivery times for overseas trade
D. Higher Text Mark up Language D. It reduces cost of paper, postage and
manpower.
70. An HTML file has which type of extension?
79. A knowledge-based system that simulates human
A. xml
B. html reasoning is known as:
C. txt
A. computer system
D. htl
B. database system
C. expert system
71. Which of the following is not true about an HTML
D. IntelSat system
file?
80. A 4GL is a tool used to:
A. It can be written in a text editor
B. It is supported by Internet Explorer A. build software application
C. It is supported by Netscape Navigator B. repair computer failures
D. The tags are case sensitive C. learn software programs
D. retrieve back loss data

72. Which of the following is not a valid HTML tag? 81. PC packages can be dynamically linked by what is
A. <P> called:
B. </H1>
A. OCR
C. <Z>
B. ODE
D. </A>
C. OLE
D. OMR
73. What character entity code need to be used in the
HTML source to display a less than (<) sign on the 82. A textual image is converted into editable text using
browser? an:
A. &gt; A. OCR
B. &less; B. ODE
C. &lt; C. OLE
D. &amp; D. OMR

74. What tag is needed to create link in HTML? 83. An application of voice and vision technology is in:
A. Anchor tag A. Database system
B. Navigation tag B. Photoshop
C. Linkage tag C. Video conferencing
D. Move tag D. none of the above

75. Which of the following is true? 84. Which of the following refers to the transmission and
A. Frames are independent of each other receipt of regular documentation such as invoices,
B. Frames depends heavily on each other
purchase orders and credit?
C. Frames are used to convert web pages to
PDF A. CBT
D. Frames cannot contain HTML documents B. EDI
C. ICT
76. What is the correct HTML for inserting an image? D. ACCPAC
A. <img href=”image.png”>
B. <img load=”image.png”>
C. <img src=“image.png”>
D. <img content=”image.png”/>

Page 6 of 8
85. In order to protect computer systems from viruses we 93. ____________________ is an encryption algorithm
use _______________ software. that encrypts and decrypts e-mail and files over the
A. antivirus Internet.
B. antiworm
A. PGP
C. application
B. NAT
D. firewall
C. DMZ
D. SET
86. A _____________ is a type of virus that neither
replicates nor copies itself to anything. 94. Mc Afee is an example of common
A. Shell ___________________ software.
B. Trojan
A. coffee
C. Worm
B. firewall
D. None of the above
C. antivirus
D. none of the above
87. ________________ methods are also used to
protect data and password privacy. 95. Feasibility study is conducted to
A. Encryption A. check the viability of the project
B. Firewall B. identify the user’s requirements
C. NAT C. support computerization of the project
D. DMZ D. respond to user queries

88. Which of the following is not a choice on the content 96. The following is NOT a stage of the SDLC
advisor’s list of configurable options? A. system testing
B. feasibility study
A. Language
C. sustaining study
B. Brutality
D. system design
C. Nudity
D. Violence
97. System testing is usually done
89. Which of the following represents a category of A. during design
B. during analysis
viruses?
C. during coding
A. File Infectors D. after coding
B. Boot record infectors
C. Macro viruses 98. The FS report refers to
D. All of the above
A. financial support
B. feasibility specification
90. PGP stands for:
C. functional specification
A. Private Good Privacy D. none of the above
B. Public Gone Private
C. Pretty Good Privacy 99. Monitoring the use of hardware, software and
D. Process Gone Private
personnel resources in the IS dept is known as
91. Which of the following is a malicious threat? A. operating system
B. operation management
A. Hackers trying to flood a mail server with
C. management information system
emails to freeze the service
D. all of the above
B. Injection of queries in login text box to
retrieve user password
100. Software development life cycle is
C. Cracking of database passwords
D. All of the above A. the life-time of a software
B. stages of software development
92. Which of the following is not true about a firewall? C. when a software is removed
D. none of the above
A. A firewall can be both hardware and
software
B. A firewall protects only against external
threats
C. An antivirus software can be part of a
firewall
D. A firewall protects only against internal
threats

Page 7 of 8
SECTION B: FILL IN THE BLANKS WITH THE MOST APPROPRIATE WORD(S) IN THE ANSWER

1. A _________________ is a set of electronic


13. A ___________________ depicts the physical
instructions that tells the computer how to perform
layouts of a network.
certain tasks.

14. ___________________ converts web pages into


2. One way to speed up a computer is to increase the
format for mobile services.
amount of _____________.

15. In packet switched network, packets contain data, a


3. When you turn your computer on, it first loads the
header, control information, source and
_______________ program.
___________________.

4. The memory installed between the CPU and RAM to


16. The ___________________ tag creates breaks
improve performance is called the ______________
within the structure of the text.
memory.

17. The web page which is first displayed when a user is


5. The two types of microprocessor design are
connected to a website is the
_________________ and _______________.
___________________.

6. ___________________ contains instructions for


18. ___________________ refers to packages for
booting up the computer and it is non-volatile.
advanced text manipulation.

7. ___________________ produces excellent graphics


19. ________________ can be used to diagnose
and good quality output but is slower than laser
people.
printer.

20. Telephone, equipped with cameras, enables images


8. The rate at which a CRT refreshes is known as the
to be transmitted thereby enabling
___________________ rate.
________________________.

9. The ___________________ is an input device that


21. ___________________ is a device that translates IP
can be used to read characters made of magnetic
addresses used within one network into different IP
particles.
addresses known to another network.

10. MS DOS is a ___________________ operating


22. ___________________ resides in the memory of the
system, since it cannot execute several jobs
systems that they infect and repeatedly replicate
simultaneously.
themselves.

11. The act of taking control of the operating system


23. ___________________ refers to additional computer
from one task and giving it to another task is called
system infrastructure provided in a different location
___________________.
for resuming business activities in case of natural
catastrophe.
12. ___________________ is the range of frequencies
that a communication media can carry.
24. Implementation/coding and ___________________
normally go in parallel.

Page 8 of 8

You might also like