cse1010e - exam paper - june 2009

19
Intro to Information Technology Past Exam Question CSE1010e CSE1010e Exam Introduction to Information Technology Duration: 2 Hour Total Marks: 100 Section A: Multiple Choice Questions 1. Networks require the setting up of strict for communication to take place. A. Cables B. Software C. Protocols D. Hardware E. None of the above 2. Internet Explorer is an example of a A. E-mail program B. Chat system C. Web page D. Voice mail E. Browser 3. Arrange the following data representation in increasing order A. Terabyte, Gigabyte, Megabyte, Kilobyte B. Byte, Kilobyte, TeraByte, Megabyte C. Byte, Kilobyte ,Gigabyte, Megabyte, D. Gigabyte, Megabyte, Kilobyte, Terabyte E. Kilobyte, Megabyte, Gigabyte, Terabyte

Upload: alegriadopovo

Post on 21-Jan-2016

179 views

Category:

Documents


0 download

DESCRIPTION

very important stuff for students

TRANSCRIPT

Page 1: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

CSE1010e Exam

Introduction to Information Technology

Duration: 2 Hour

Total Marks: 100

Section A: Multiple Choice Questions

1. Networks require the setting up of strict for communication to take place.

A. Cables

B. Software

C. Protocols

D. Hardware

E. None of the above

2. Internet Explorer is an example of a

A. E-mail program

B. Chat system

C. Web page

D. Voice mail

E. Browser

3. Arrange the following data representation in increasing order

A. Terabyte, Gigabyte, Megabyte, Kilobyte

B. Byte, Kilobyte, TeraByte, Megabyte

C. Byte, Kilobyte ,Gigabyte, Megabyte,

D. Gigabyte, Megabyte, Kilobyte, Terabyte

E. Kilobyte, Megabyte, Gigabyte, Terabyte

Page 2: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

4. The acronym ALU stands for

A. Arithmetic and Logic Unit

B. Algorithmic Logic Unit

C. Algorithms and Logic Unit

D. Arithmetic Local Unit

E. All of the above

5. A physically has two processors into one packing for a processor.

A. Hard disk

B. 64-Bit processors

C. Dual Core

D. Hyperthreading

E. None of the above

6. Which of the following is NOT an output device?

A. Barcode Reader

B. Printers

C. Projector

D. Speaker

E. Plotter

Page 3: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

7. Which one of the following is NOT a solid state storage device?

A. USB disk

B. Optical disk

C. Pen Drives

D. Flash disks

E. None of the above

8. Diskettes and hard disks that can store data permanently are referred to as:

A. Primary storage devices

B. Secondary storage devices

C. Tertiary storage devices

D. Virtual memory devices

E. None of the above

9. The structured programming technique that graphically presents the detailed steps needed

to solve a problem is known as:

A. Object Oriented programming

B. Logic

C. Pseudocode

D. Flow chart

E. Use case

Page 4: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

10. In which version order did the Windows desktop operating system evolved?

A. 3.1 95 98 2000 Millenium XP Vista

B. 95 98 Millenium 2000 XP Vista 3.1

C. 3.1 95 98 2000 XP Vista Millenium

D. 3.1 95 98 Millenium 2000 XP Vista

E. 3.1 95 98 Millenium 2000 Vista XP

11. Student details are best stored by making use of

A. Database software

B. Word processing package

C. Authoring package

D. Presentation graphics

E. Software utilities

12. To add two numbers together in cells A1 and A2, you use the following formula

A. =A1 + A2

B. =Add(A1, A2)

C. =Add(A1 + A2)

D. =Together(A1:A2)

E. A1 plus A2

Page 5: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

13. _________________ is an ongoing phase in System Development Life Cycle, where the

system is periodically evaluated and updated as desired.

A. System maintenance

B. Data analysis

C. Information gathering

D. Proper user training

E. None of the above

14. Which of the following technique is used to gather information during system analysis?

A. Interview

B. Questionnaire

C. Observation

D. Source document Analysis

E. All of the above

15. Which of the following is an example of Network Operating System?

A. Windows XP

B. Symbian

C. Microsoft

D. Windows Server 2003

E. Cisco

Page 6: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

16. Which of the following description best fits a LAN?

A. Always contains more than 5 PCs

B. Connects PCs to telephones

C. Connects PCs and other computer devices within a small geographic area

D. Always contains a server which houses centralized files

E. Uses cables only as media.

17. Which protocol is used by a web server to hold and deliver web pages and other web

content?

A. File Transfer Protocol

B. Mail Transfer Protocol

C. Dynamic Web Pages Protocol

D. Active Server Pages

E. Hyper Text Transfer Protocol

18. Which of the following is an example of a search engine?

A. Google

B. Facebook

C. Last.Fm

D. Flickr

E. Hotmail

Page 7: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

19. Which of the following can be used as a hyperlink to other web pages?

i Some text ii An image iii A video

A. i only

B. i and iii only

C. ii and iii only

D. None of the above

E. All of the above

20. Which of the following is NOT required to access the Internet or the WWW?

A. A modem

B. A telephone line or wireless device

C. An ISP

D. A special software

E. A Printer

Page 8: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

21. Which of the following is used for authentication purposes, to track users, to keep

information on user preferences and information on users when they are shopping online.

A. Cookies

B. Plug-ins

C. Wikis

D. Blogs

E. All of the above

22. A ___________ acts as a security buffer between a company’s private network and all

external networks.

A. firewall

B. password

C. disaster recovery plan

D. virus checker

E. All of the above

23. Programs that come into a computer system disguised as something else are called

A. spoofers

B. loggers

C. defacers

D. Trojan horses

E. None of the above

Page 9: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

24. An attempt to slow down or stop a computer system or network by flooding the system

with requests for information is called a

A. virus

B. worm

C. denial-of-service attack

D. Trojan horse

E. All of the above

25. Which of the following is a computer program designed to increase the speed of reading the

file and the amount of usable space by rearranging the files and unused space.

A. Disk Defragmenter

B. Malware

C. WinRAR

D. Nagware

E. Download Manager

26. Which of the following is NOT a compressed file extension?

A. .ppt

B. .tar

C. .sit

D. .zip

E. .rar

Page 10: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

27. Ergonomics will provide specifications related to

A. chair

B. table

C. computer screen

D. seating arrangement

E. All of the above

28. Which of the following is an example of IT misuse?

A. Illegal copying and distribution of software such as Microsoft office suite.

B. Intrusion into organizations’ computers to steal confidential information such as

customer profiles.

C. Sending of unsolicited emails (spam) to potential buyers.

D. Sending of infected files/viruses over networks.

E. All of the above

29. Which of the following is NOT an example of a wearable technology?

A. MIThril

B. Charme Badge

C. Musical Jacket

D. PerfectDisk

E. None of the above

Page 11: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

30. Which of the following is true about IP Television?

A. Allows the sending of information over a secure, tightly managed network.

B. Gives the viewer access not just to an event but to the information related to it.

C. Allows the viewer the ability to look up player-specific information right on the TV while

watching a game

D. Enables the viewer to send photos or home movies from the computer right onto the

television.

E. All of the above

31. All of the following are examples of real security and privacy risks EXCEPT:

A. Hackers.

B. Viruses.

C. Spam.

D. Identity Theft.

E. Eavesdroppers

32. The _____________ language consists of just two digits: 0 and 1.

A. Application

B. Binary

C. Base 10

D. Data processing

E. Hexadecimal

Page 12: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

33. _____________ binary digits (or bits) combine to create one byte.

A. Ten

B. Sixteen

C. Eight

D. Two

E. four

34. Facebook, MySpace, and Hi5 are considered:

A. Phishing Web sites.

B. E-commerce Web sites.

C. Business-to-business Web sites.

D. Social networking Web sites.

E. Search engines

35. Illegally copying an application onto another computer is called:

A. Hacking.

B. File sharing.

C. Phishing.

D. Software piracy.

E. Upgrading

Page 13: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

36. Which transmission media is able to transmit data the fastest?

A. Twisted pair cable

B. Coaxial cable

C. Fiber optic cable

D. Wireless

E. Power-line cable.

37. Which of the following is NOT a guideline for creating password?

A. Keep your password a secret.

B. Keep you password written down, and put it in your wallet.

C. Change your password frequently.

D. Create hard-to-guess passwords, with a combination of letters and numbers.

E. None of the above

38. After a picture has been taken with a digital camera and processed appropriately, the actual

print of the picture is considered as:

A. Data.

B. Output.

C. Input.

D. process.

E. Memory

Page 14: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

39. The type of monitor that looks like a traditional television set is called a ____________

monitor.

A. Display

B. Cathode-ray tube (CRT)

C. Liquid crystal display (LCD)

D. Flat-panel

E. Digital tablet

40. Flash drives plug into a(n):

A. USB port.

B. Serial port.

C. Expansion slot.

D. Drive bay.

E. Parallel port

Page 15: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

Section B: Structured Questions

Question 1 (20 Marks)

(a) Fill in the Blanks. Choose from the following list:

[Pneumonia, Optical, URL, RAM, Ring, Application Suite, Hard Disk Pack, Mechanical,

Perfective Maintenance, Software Documentation, CPU, Adaptive Maintenance, Monitor,

Internal Hard Disk, Microsoft Office, Star, Backing Storage, IP Address, Repetitive Strain

Injury, Programming]

1. A computer is made up of four components namely input, process, output and ____________

2. A ______________mouse has a rubber or metal ball on its underside. When the ball rolls in

a certain direction, electronic circuits in the mouse translate the movement into signals that are sent to the computer.

3. A hard disk may contain several platters forming ___________ that increase the capacity of

data that can be stored by the device.

4. _______________ is the art of making a computer do what you want it to do. 5. For programs to be executed, they must first be loaded into the _____________ 6. Multiple applications bundled together as a package are referred to as ___________

7. ___________________ is a type of maintenance where a system is changed to meet new

requirements.

8. A _____________ topology is an architecture that consists of a series of devices connected

to one another by unidirectional transmission links to form a single closed loop 9. An address consisting of 4 numbers, each separated by a dot that uniquely identifies a

computer on the Internet is known as ________.

Page 16: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

10. ______________ is the name given to a number of injuries that occurs especially in people who are involved in heavy repetitive work such that additional strain is imposed on their neck, fingers, hands, wrists and arms resulting in serious pains to different body parts that need medical care.

[10 Marks]

(b) Convert the decimal 296

i) To binary ii) To Hexadecimal

[1+2 Marks]

(c) Convert the Hexadecimal A5F7

i) To decimal

[2 Marks] (d) List the five functions of an operating system.

[5 Marks]

Page 17: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

Question 2 (20 Marks)

(a) Consider the following screenshot of a webpage.

i What is a URL? What is the URL of the above webpage? [1 + 1 mark]

ii What is a hyperlink?

[2 mark] iii How do you recognize hyperlinks on the above web page? Give 2 examples of hyperlinks

found on the page. [1 + 2 mark]

iv What kind of software is used to view a web page? Give the name of the software used

in the above case. [1 + 1 mark]

Page 18: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

v The above figure is a screenshot of Google.com. What kind of website is Google? What is the purpose of these kind of websites?

[1 + 2 marks]

(b) What are the differences between LANs and WANs? (c) List two differences between a compiler and an interpreter.

[4 Marks]

Question 3 (20 Marks)

(a) Computer systems can be affected by viruses.

i What is a virus?

[1 Mark]

ii How is a worm different from a virus?

[1 Mark]

iii State two effects of a computer virus.

[2 Marks]

iv State two ways of protecting computers against viruses.

[2 Marks]

v Why would backing up data not guard against the effect of a virus?

[2 Marks]

Page 19: CSE1010e - Exam Paper - June 2009

Intro to Information Technology Past Exam Question

CSE1010e

(b) A new printer model VENUS has been introduced in the local market this year. Some students purchased this model and tried to install it on their PCs. The printer successfully installs on a Windows 7 as it is immediately recognised by the operating system.

i What is the name of this feature?

[1 Marks]

ii The printer did not install on a Windows XP PC. Explain why and what should be done to be able to use this printer.

[3 Marks]

(c) The following flowchart shows how sensors (which can be analogue or digital) and a computer are used to control the temperature of a greenhouse for plants. Complete the flowchart using the items from the list below.

[1x8 Marks]

12

3

10

STOP

START

Yes

List of statements 1. compare input

temperature with set temperature

2. is input temperature = set temperature

3. is input temperature < set temperature

4. is input temperature > set temperature

5. is input signal analogue 6. output error 7. read set is temperature

from file 8. switch on cooler 9. switch on heater 10. system fault 11. use ADC to convert signal 12. read temperature from

sensor

11

Yes

No

No

No

No Y

es

Yes