You are on page 1of 21

  

ITE-6101-2013T(UGRD) Computing Fundamentals

 Home

 My courses

  UGRD-ITE6101-2013T

  Week 014: Final Exam

  Final Exam

Started on Friday, 16
October 2020,
5:12 PM

State Finished

Completed on Friday, 16
October 2020,
6:48 PM

Time taken 1 hour 35 mins

Marks 44.00/50.00

Grade 88.00 out of
100.00

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Identify whether the said program is a System Software or an Application Software.
Select one:

a. Application Software

b. System Software

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the correct word to complete the statement.
mobile operating system a software that allows smartphones, tablet PCs and other devices
to run applications and programs.
Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is the reason to Denormalize a Table?
Select one:

a. Performance

b. Prevent Data Anomalies

c. Remove redundant information

d. Add additional related tables

Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:

a. Objects
b. Normalization

c. Field Names

d. Record

Question 5
Complete

Mark 1.00 out of 1.00

Flag question

Question text
This are set of rules that governs a communication or the exchange of information.
Select one:

a. Standards

b. Protocol

c. Connectivity

d. Architecture

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the correct word to complete the statement.
 
Windows XP Whistler is a personal computer operating system produced by Microsoft as
part of the Windows NT Family of operating system.
Question 7
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False.
 
Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:

True

False

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Computing has 4 steps, they are:

Select one:

a.
state hypothesis, collect data, test, and conclude

b.
input, process, output, store

c.
science, technology, engineering, math

d.
prophase, metaphase, anaphase, telophase

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False.
 
Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and
accessible from a public cloud storage provider. 
Select one:

True

False

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a result a result of Duplicate Data?
Select one:

a. It runs the risk of becoming inconsistent.

b. It slows down the system by taking up extra bandwidth across the network and extra disk
space on the server.

c. Difficult to maintain, requiring multiple reads and writes to update records and keep thing in
sync.

d. Your system will work well without any errors or bugs

Question 11
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a software package that automatically renders advertisements in order to generate
revenue for its authors.
Select one:

a. Ransomware

b. Adware

c. Patch

d. Driver
Question 12
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False
 
Raw data are the unprocessed facts including text, numbers, images and sounds.
Select one:

True

False

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text
The term durability refers to

Select one:

a.

the speed of the device

b. The amount of data that you can transfer to your computer 

c.
How easy that device can be damaged

d. How sparkling the unit is 

Question 14
Complete

Mark 1.00 out of 1.00

Flag question
Question text
This is the most important program that runs on a computer
Select one:

a. Device Drivers

b. Operating System

c. None of the Choices

d. System Utility Software

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Who among the following is the father of Computer science?

Select one:

a. Simur Cray

b. Charles Babbage

c. Allen Turing

d. Augusta Adaming

Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A collection of computers and network resources connected via a network over a
geographic area.
Select one:

a. Local Area Network

b. Wide Area Network


c. Home Network

d. Metropolitan Area Network

Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True    if the Statement is True and False if the statement is False
 
Information Technology is just a part of an Information System and Information Technology
is much more focus in the use of the said computer technology. 
Select one:

True

False

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text
When a file is saved for the first time

Select one:

a. A copy is printed out automatically

b. Don't need a tag

c. All you need is a name if it isn't printed

d. A name must be given to identify it

Question 19
Complete

Mark 1.00 out of 1.00

Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:

a. Peer-to-Peer Model

b. Client-Server Model

c. TCP/IP Model

d. OSI Model

Question 20
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:

a. Entertainment Software

b. Content Access Software

c. Information Worker Software

d. Educational Software

Question 21
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the missing word to complete the sentence.
 
Transport Layer ensures that message are delivered error-free in sequence and with no
losses or duplications.
Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The process of physically organizing the content of the mass storage device into the
smallest number of contiguous regions (fragments).
Select one:

a. Backup

b. Disk Cleanup

c. Defragmentation

d. Software Updates

Question 23
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True    if the Statement is True and False if the statement is False
 
Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy. 
Select one:

True

False

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is the main program running on a computer. It manages the memory and processes of the
computer, and all of its software and hardware.

Select one:
a.
Application Software

b.
Software

c.
Hardware

d.
Operating System

Question 25
Complete

Mark 1.00 out of 1.00

Flag question

Question text
The term capacity refers to
Select one:

a. How easy that device can be damaged

b. The amount of data that you can transfer to your computer

c. How sparkling the unit is

d. the speed of the device

Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component,  Input and Output
Components or  Storage Components.
Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 27
Complete

Mark 0.00 out of 1.00

Flag question

Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

One of the developer of the


  ENIAC
 

 : 1946
Question 28

Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the missing word to complete the sentence.
 
Presentation Layer formats the data to be presented to application layer. It can be viewed
as the translator for the network
Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text
What shape shows the representation of Table or Entity?
Select one:

a. Rectangle

b. Oval

c. Circle

d. Cylinder

Question 30
Complete

Mark 0.00 out of 1.00

Flag question

Question text
It is the data type used by Oracle Databases.
Select one:

a. Memo Data Type

b. Text Data Type

c. CLOB Data Type

d. String Data Type

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a server that is used by IP Networks to dynamically distribute network configuration
parameters like IP address for interface and services.
Select one:

a. DNS Server

b. DHCP Server

c. Firewall

d. Router

Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False
 
Hardware are the equipment used to process the data and create useful information.
Select one:

True

False

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is the smallest grouping among the Internet Technologies.
Select one:

a. Local Area Network

b. Metropolitan Area Network

c. Personal Area Network

d. Wide Area Network

Question 34
Complete

Mark 1.00 out of 1.00


Flag question

Question text
Fill in the Blanks: Write the missing word to complete the sentence.
 
Network Layer controls the operations of the subnet, deciding which physical path the data
takes.
Question 35
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A maintenance utility included in Microsoft Windows that is used to free up disk spaces on
the computer hard drive.
Select one:

a. Backup

b. Defragmentation

c. Software Updates

d. Disk Cleanup

Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a malicious codes that is attached to infected application programs or software which
will execute a different set of actions that will bring harm to your computer.
Select one:

a. Worms

b. Trojans

c. Key Loggers

d. Rootkits
Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.
Select one:

a. Pharming

b. Phishing

c. Spyware

d. Malware

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a category of Application Software that provide common capabilities needed to support
enterprise software systems.
Select one:

a. Media Development Software

b. Simulation Software

c. Enterprise Infrastructure Software

d. Product Engineering Software

Question 39
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False.
 
Laser Printers are printers that used the same technology as to photocopying machines. It
uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:

True

False

Question 40
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.
Select one:

a. Wide Area Network

b. Home Network

c. Metropolitan Area Network

d. Local Area Network

Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are not included in the Database Development Life Cycle?
Select one:

a. Testing

b. Logical Design

c. Requirement Gathering

d. Planning
Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:

a. Data

b. Database

c. Information

d. Records

Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following statements is true?

Select one:

a.
The speeds of both of these machines cannot be compared to advanced speeds

b.
Minicomputer operates more efficiently than Microcomputer.

c.
Both computers have the same speed

d.
Microcomputer operate faster than minicomputer

Question 44
Complete

Mark 1.00 out of 1.00


Flag question

Question text
One piece of information that you can use to identify exactly one record, with absolutel no
ambiguity.
Select one:

a. Natural Key

b. Foreign Key

c. Composite Key

d. Primary Key

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and other
software that does malicious intent.
Select one:

a. Phishing

b. Malware

c. Spyware

d. Pharming

Question 46
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of these is used commonly to measure storage capacity

Select one:
a.
Mb/s

b.
hertz

c.
bytes

d.
the number of text documents you can store on it

Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False.
 
Expansion Slots is a mechanical components that provides mechanical and electrical
connections between a microprocessor and a printed circuit board (PCB). 
Select one:

True

False

Question 48
Complete

Mark 0.00 out of 1.00

Flag question

Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

This is the another version of ENIAC that


is commercially available for business and
  government
 
 
1946:

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False
 
Software is a program that consists of step-by-step instructions that tells the computer how
to do its work.
Select one:

True

False

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True  if the Statement is True and False if the statement is False.
 
Control Unit performs two operations (arithmetic and logical).
Select one:

True

False

You might also like