You are on page 1of 21

ITE-6101-2013T(UGRD) Computing Fundamentals

 My courses

Started on Friday, 16
October 2020,
5:12 PM

State Finished

Completed on Friday, 16
October 2020,
6:48 PM

Time taken 1 hour 35 mins

Marks 44.00/50.00

Grade 88.00 out of


100.00

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Identify whether the said program is a System Software or an Application Software.
Select one:

a. Application Software

b. System Software
Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the correct word to complete the statement.
mobile operating system a software that allows smartphones, tablet PCs and other devices
to run applications and programs.
Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is the reason to Denormalize a Table?

Select one:

a. Performance

b. Prevent Data Anomalies

c. Remove redundant information

d. Add additional related tables


Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:

a. Objects
b. Normalization

c. Field Names

d. Record
Question 5
Complete

Mark 1.00 out of 1.00

Flag question

Question text
This are set of rules that governs a communication or the exchange of information.

Select one:

a. Standards

b. Protocol

c. Connectivity

d. Architecture
Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the correct word to complete the statement.

Windows XP Whistler is a personal computer operating system produced by Microsoft as


part of the Windows NT Family of operating system.
Question 7
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.
Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:

True

False
Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Computing has 4 steps, they are:

Select one:

a.
state hypothesis, collect data, test, and conclude

b.
input, process, output, store

c.
science, technology, engineering, math

d.

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.
Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and
accessible from a public cloud storage provider.
Select one:

True

False
Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following is not a result a result of Duplicate Data?

Select one:

a. It runs the risk of becoming inconsistent.

b. It slows down the system by taking up extra bandwidth across the network and extra
disk space on the server.

c. Difficult to maintain, requiring multiple reads and writes to update records and keep thing
in sync.

d. Your system will work well without any errors or bugs


Question 11
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a software package that automatically renders advertisements in order to generate
revenue for its authors.
Select one:

a. Ransomware

b. Adware

c. Patch

d. Driver
Question 12
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False

Raw data are the unprocessed facts including text, numbers, images and sounds.

Select one:

True

False
Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text
The term durability refers to

Select one:

a.

the speed of the device

b. The amount of data that you can transfer to your computer

c.
How easy that device can be damaged

d. How sparkling the unit is


Question 14
Complete

Mark 1.00 out of 1.00

Flag question
Question text
This is the most important program that runs on a computer

Select one:

a. Device Drivers

b. Operating System

c. None of the Choices

d. System Utility Software


Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Who among the following is the father of Computer science?

Select one:

a. Simur Cray

b. Charles Babbage

c. Allen Turing

d. Augusta Adaming
Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A collection of computers and network resources connected via a network over a
geographic area.
Select one:

a. Local Area Network

b. Wide Area Network


c. Home Network

d. Metropolitan Area Network


Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False

Information Technology is just a part of an Information System and Information Technology


is much more focus in the use of the said computer technology.
Select one:

True

False
Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text
When a file is saved for the first time

Select one:

a. A copy is printed out automatically

b. Don't need a tag


c. All you need is a name if it isn't

printed d. A name must be given to


Question 19
Complete

Mark 1.00 out of 1.00

Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:

a. Peer-to-Peer Model

b. Client-Server Model

c. TCP/IP

Model d. OSI
Question 20
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:

a. Entertainment Software

b. Content Access Software

c. Information Worker Software

d. Educational Software
Question 21
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the missing word to complete the sentence.

Transport Layer ensures that message are delivered error-free in sequence and with no
losses or duplications.
Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The process of physically organizing the content of the mass storage device into the
smallest number of contiguous regions (fragments).
Select one:

a. Backup

b. Disk Cleanup

c. Defragmentation

d. Software Updates
Question 23
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False

Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:

True

False
Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is the main program running on a computer. It manages the memory and processes of the
computer, and all of its software and hardware.

Select one:
a.
Application Software

b.
Software

c.
Hardware

d.
Operating System
Question 25
Complete

Mark 1.00 out of 1.00

Flag question

Question text
The term capacity refers to

Select one:

a. How easy that device can be damaged

b. The amount of data that you can transfer to your computer

c. How sparkling the unit is

d. the speed of the device


Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:

a. System Unit Component

b. Input and Output Component

Question 27
Complete

Mark 0.00 out of 1.00

Flag question

Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

One of the developer of the


ENIAC

: 1946

Question 28
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Presentation Layer formats the data to be presented to application layer. It can be viewed
as the translator for the network
Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text
What shape shows the representation of Table or Entity?

Select one:

a. Rectangle

b. Oval

c. Circle

d. Cylinder
Question 30
Complete

Mark 0.00 out of 1.00

Flag question

Question text
It is the data type used by Oracle

Databases. Select one:

a. Memo Data Type

b. Text Data Type

c. CLOB Data Type

d. String Data Type


Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a server that is used by IP Networks to dynamically distribute network configuration
parameters like IP address for interface and services.
Select one:

a. DNS Server

b. DHCP Server

c. Firewall

d. Router
Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False

Hardware are the equipment used to process the data and create useful information.

Select one:

True

False
Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is the smallest grouping among the Internet Technologies.

Select one:

a. Local Area Network

b. Metropolitan Area Network

c. Personal Area Network

d. Wide Area Network


Question 34
Complete

Mark 1.00 out of 1.00


Flag question

Question text
Fill in the Blanks: Write the missing word to complete the sentence.

Network Layer controls the operations of the subnet, deciding which physical path the data
takes.
Question 35
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A maintenance utility included in Microsoft Windows that is used to free up disk spaces on
the computer hard drive.
Select one:

a. Backup

b. Defragmentation

c. Software Updates

d. Disk Cleanup
Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a malicious codes that is attached to infected application programs or software which
will execute a different set of actions that will bring harm to your computer.
Select one:

a. Worms

b. Trojans

c. Key Loggers

d. Rootkits
Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it
to the attacker or the hacker.
Select one:

a. Pharming

b. Phishing

c. Spyware

d. Malware
Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a category of Application Software that provide common capabilities needed to support
enterprise software systems.
Select one:

a. Media Development Software

b. Simulation Software

c. Enterprise Infrastructure Software

d. Product Engineering Software


Question 39
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.
Laser Printers are printers that used the same technology as to photocopying machines. It
uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:

True

False
Question 40
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.
Select one:

a. Wide Area Network

b. Home Network

c. Metropolitan Area Network

d. Local Area Network


Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following are not included in the Database Development Life Cycle?

Select one:

a. Testing

b. Logical Design

c. Requirement Gathering

d. Planning
Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:

a. Data

b. Database

c. Information

d. Records
Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following statements is true?

Select one:

a.
The speeds of both of these machines cannot be compared to advanced speeds

b.
Minicomputer operates more efficiently than Microcomputer.

c.
Both computers have the same speed

d.

Question 44
Complete

Mark 1.00 out of 1.00


Flag question

Question text
One piece of information that you can use to identify exactly one record, with absolutel no
ambiguity.
Select one:

a. Natural Key

b. Foreign Key

c. Composite Key

d. Primary Key
Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and other
software that does malicious intent.
Select one:

a. Phishing

b. Malware

c. Spyware

d. Pharming
Question 46
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of these is used commonly to measure storage capacity

Select one:
a.
Mb/s

b.
hertz

c.
bytes

d.
the number of text documents you can store on it
Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.

Expansion Slots is a mechanical components that provides mechanical and electrical


connections between a microprocessor and a printed circuit board (PCB).
Select one:

True

False
Question 48
Complete

Mark 0.00 out of 1.00

Flag question

Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

This is the another version of ENIAC that


is commercially available for business and
government
1946:

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False

Software is a program that consists of step-by-step instructions that tells the computer how to
do its work.
Select one:

True

False
Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.

Control Unit performs two operations (arithmetic and logical).

Select one:

True

False

You might also like