ITE6100 Computing Fundamentals / Introduction to Computing
Computing
has 4 steps, they are: |
input, process, output, store |
Who
among the following is the father of Computer science? |
Allen Turing |
Information
Technology involves the development, maintenance and use of computer systems,
software and networks for the processing and distribution of data. |
True |
When a file is saved for the first time |
A name must be given to identify
it |
Using
the picture and the clue given, Guess the Proper Year it is appropriated to,
Based on the lecture of Lesson 1. |
1975 |
Which
of these governs the interaction process between the user and the operating
system? |
User interface |
Using
the picture and the clue given, Guess the Proper Year it is appropriated to,
Based on the lecture of Lesson 1. It
is used by the first IBM personal computer as the Operating System |
1981 |
Graphical
User Interface ( GUI) has made computers easier to use because: |
they used icons instead of
commands |
Using
the picture and the clue given, Guess the Proper Year it is appropriated to,
Based on the lecture of Lesson 1. Build
the first computer that does simultaneous solving of equations |
1911 |
It
is a combination of hardware and software, which enables information sharing
between computer devices. |
network |
It
is use to programmed the first computers |
machine language |
Which
device is required to connect to internet? |
Modem |
Which
of the following statements is true? |
Minicomputer operates more
efficiently than Microcomputer. |
Information
is the result of processing a raw data. |
True |
What
type of computers in a client-server system are client computers (most of the
time). |
Microcomputer |
Hardware
are the equipment used to process the data and create useful information. |
True |
Software
is a program that consists of step-by-step instructions that tells the
computer how to do its work. |
True |
What
is hardware? |
Is any computer part that has a
physical structure |
Information
System is an integrated set of components for collecting, storing, and
processing data and for delivering information, knowledge and digital
products. |
True |
It is the metal and plastic box which contains
the computer's main components including the motherboard, central processing
unit ( CPU), and power supply |
Computer Case |
One
of the developer of the ENIAC |
1943 |
What
is Information Technology? |
Technology allowing information
to be used in the production of products & services |
What is software? |
any collection of instructions
telling the hardware what to do |
This port can be used to network and to connect
to the Internet. |
Ethernet Port |
Software
and Hardware manufacturer provides procedure manuals for their products and
it can be in printed or electronic copy. |
True |
English
Mathematician and Father of Computing |
1800 |
It
is the main program running on a computer. It manages the memory and
processes of the computer, and all of its software and hardware |
Operating System |
These
can be used for connecting almost any computer type including mice,
keyboards, printers, and digital cameras. |
USB Port |
Which
of the following stores output from a computer: |
Flash Drive |
Security
software is designed to protect computers from the variety of viruses and
unwanted intrusions |
True |
This
is the another version of ENIAC that is commercially available for business
and government |
1946 |
Desktop
Computer is a personal computer which can be moved easily and used in a
variety of locations. |
True |
People
are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive. |
True |
Grace Hopper develops the first computer language |
1953 |
This
is the another version of ENIAC that is commercially available for business
and government |
1946 |
Designs
the Punch Card System |
1890 |
Which
of the following stores output from a computer: |
Flash Drive |
Which
of these governs the interaction process between the user and the operating
system? |
User interface |
It
is used by the first IBM personal computer as the Operating System |
1981 |
Which
of the following statements is true? |
Minicomputer operates more
efficiently than Microcomputer. |
People
are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive. |
True |
Shugart
leads the creation of this external storage |
1971 |
This
port can be used to network and to connect to the Internet. |
Ethernet Port |
Which
device is required to connect to internet? |
Modem |
Software
and Hardware manufacturer provides procedure manuals for their products and
it can be in printed or electronic copy. |
True |
Hardware
are the equipment used to process the data and create useful information. |
True |
It
is use to programmed the first computers |
machine language |
Raw
data are the unprocessed facts including text, numbers, images and sounds. |
False |
What
type of computers in a client-server system are client computers (most of the
time). |
Microcomputer |
What is Information Technology? |
Technology allowing information
to be used in the production of products & services |
It
is a combination of hardware and software, which enables information sharing
between computer devices. |
network |
One
of the developer of the ENIAC |
1943 |
|
|
What
is hardware? |
Is any computer part that has a
physical structure. |
Information
Technology involves the development, maintenance and use of computer systems,
software and networks for the processing and distribution of data. |
True |
Build
the first computer that does simultaneous solving of equations |
1911 |
Who among the following is the father of
Computer science? |
Allen Turing |
To
increase the performance of my computer, I should add _______________. |
add more RAM |
The
First commercially available portable computer by IBM |
1975 |
Procedure
is the guidelines for people to follow when using the software, hardware and
data |
True |
How
do you explain the CPU (Central Processing Unit) inside a computer? |
The brain of the computer |
Computing
has 4 steps, they are: |
input, process, output, store |
Security software is designed to protect
computers from the variety of viruses and unwanted intrusions |
True |
Software
is a program that consists of step-by-step instructions that tells the
computer how to do its work. |
True |
It
is the first DRAM chip of the Intel Company |
1970 |
When
a file is saved for the first time |
A name must be given to identify it |
Information
is the result of processing a raw data. |
True |
It
is the metal and plastic box which contains the computer's main components
including the motherboard, central processing unit ( CPU), and power supply |
Computer Case |
Graphical
User Interface ( GUI) has made computers easier to use because: |
they used icons instead of commands |
These
can be used for connecting almost any computer type including mice,
keyboards, printers, and digital cameras. |
USB Port |
Desktop
Computer is a personal computer which can be moved easily and used in a
variety of locations. |
True |
It
is the main program running on a computer. It manages the memory and
processes of the computer, and all of its software and hardware. |
Operating System |
Which of these is used commonly to measure
storage capacity |
bytes |
Personal
Cloud storage is the combination of public and private cloud storage where
some critical data resides in the enterprise’s private cloud while other data
is stored and accessible from a public cloud storage provider. |
False |
What happens if there isn't enough RAM
available? |
Your computer slows down, as everything has to be
loaded from the hard drive |
Serial
Advanced Technology Attachment (SATA) Hard Disk is a standard electronic
interface used between a computer motherboard’s data paths or bus and the
computer’s disk storage devices. |
False |
The tem 'read/write time' refer to what? |
How long it takes to read or write data to your
computer |
What
is Random Access Memory (RAM) |
All of the given |
Why is it that computers use binary to read
memory data? |
Computers are made up of electronic switches |
Co-Processor is a special set of circuits in a
micro-processor chip that is designed to manipulate numbers or perform some
other specialized function more quickly than the basic microprocessor
circuits. |
True |
The
term durability refers to |
How easy that device can be damaged |
Read-Only
Memory is a memory chip that stores information or data in it and usually
data written to or programmed to a ROM by the manufacturer or the computer
engineer. |
True |
The
term portability refers to |
How easy to carry / transport
your computer |
The
term capacity refers to |
The amount of data that you can transfer to your
computer |
Blu-ray
Disc is the next generation optical disc that can hold high-definition video
due to its high capacity |
True |
Which
three components are most important in Gaming computer when it comes to
performance? |
CPU, RAM, Graphics Card |
What happens to the Main Memory / RAM data when
we turn off the power? |
All data is lost |
It
is a category of Application Software that are originally offered for general
productivity and information retrieval including email, calendar, contacts,
stock market and weather information |
Mobile Applications |
A
___ mobile operating s is a software that allows smartphones, tablet PCs and
other devices to run applications and programs |
mobile operating system |
It
is a category of Application Software that run applications for amusement,
leisure, or as a diversion |
Entertainment Software |
It
is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast
to enterprise management. |
Information Worker Software |
It is a category of Application Software that
provide common capabilities needed to support enterprise software systems. |
Enterprise Infrastructure Software |
This type of software includes a variety of PC
utilities for managing and optimizing your computer systems |
System Utility Software |
The
use of UNIX spread around the country and initially____ gave it away free. |
Bell Labs |
Windows XP (codename:_____) is a personal
computer operating system produced by Microsoft as part of the Windows NT
Family of operating system. |
Whistler |
It is a category of Application Software that
generates print and electronic media for other to consume, most often in a
commercial or educational settings. |
Media Development Software |
It
is a category of Application Software that is related to content access
software but has the content and/or features adapted for use in by educators
or students. |
Educational Software |
It
is a category of Application Software that simulates physical or abstract
system for research, training or entertainment purposes |
Simulation Software |
It is a type of software that operates and
controls a particular type of device that is attached to a computer |
Device Drivers |
Massachusetts
Institute of Technology in 1960’s had a time sharing operating system they
called_____. |
MULTICS |
It is a category of Application Software that
is used in developing hardware and software products. |
Product Engineering Software |
Windows 7 (codename: ________) is a personal
computer operating system and was released to manufacturing on July 22, 2009. |
Blackcomb |
_____
Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs. |
60 |
Windows
8.1 (codename:____) is an upgrade for Windows 8, a version of Windows NT, a
computer operating system released by Microsoft. |
Blue |
It
is a category of Application Software that is used primarily to access a
content without editing but may include software that allows for content
editing. |
Content Access Software |
This
is the most important program that runs on a computer |
Operating System |
Fedora
is a____ based operating system developed and supported by the Fedora Project
as a partnership with Red Hat and volunteer contributors. |
Linux |
It is the way to arrange or configure a
network. |
Network Topology |
It
is a category of Application Software that are originally offered for general
productivity and information retrieval including email, calendar, contacts,
stock market and weather information |
Mobile Applications |
It is a server that is used by IP Networks to
dynamically distribute network configuration parameters like IP address for
interface and services. |
DHCP Server |
A Type of Network that is being utilized
nowadays by individuals for their homes and apartments. This network allows
all users to connect and share resources. |
Home Network |
It
is a category of Application Software that allows the user to create and
manage information, usually for individual projects within a department, in
contrast to enterprise management. |
Information Worker Software |
Read-Only
Memory is a memory chip that stores information or data in it and usually
data written to or programmed to a ROM by the manufacturer or the computer
engineer. |
True |
_____ Layer allows session establishment
between processes running on different stations |
Session |
Expansion Slots is a mechanical components that
provides mechanical and electrical connections between a microprocessor and a
printed circuit board (PCB). |
False |
Laser Printers are printers that used the same
technology as to photocopying machines. It uses a laser light beam to produce
images with excellent letter and graphics quality. |
True |
___ Layer formats the data to be presented to
application layer. It can be viewed as the translator for the network |
Presentation |
Aspect Ratio is the distance between each pixel |
False |
It is a category of Application Software that
is used in developing hardware and software products. |
. Product Engineering Software |
Control
Unit performs two operations (arithmetic and logical). |
False |
Processor
is the heart and brain of the computer because without this computer cannot
do anything |
True |
Serial
Advanced Technology Attachment (SATA) Hard Disk is a standard electronic
interface used between a computer motherboard’s data paths or bus and the
computer’s disk storage devices. |
False |
This
type of software includes a variety of PC utilities for managing and
optimizing your computer systems |
System Utility Software |
ANSI
stands for___________. |
American National Standards Institute |
It
is a distributed communication framework of network process among service
requestors, clients and service providers |
Client-Server Model |
_____
Layer ensures that message are delivered error-free in sequence and with no
losses or duplications. |
Transport |
It
is a category of Application Software that run applications for amusement,
leisure, or as a diversion. |
Entertainment Software |
It
is a category of Application Software that is used primarily to access a
content without editing but may include software that allows for content
editing. |
Content Access Software |
This
is the most important program that runs on a computer |
Operating System |
A
college student in Finland,______, developed a version of UNIX as an
operating system for personal computer. He called it Linux |
Linus Torvalds |
Is
a meta-network and constantly changing collection of thousands of individual
networks intercommunicating with a common protocol? |
Architecture |
It
is a type of software that operates and controls a particular type of device
that is attached to a computer |
Device Drivers |
IEEE
stands for _____ |
Institute of Electrical and Electronics Engineer |
Copywright
is a legal right credited by law of a country that grants the creator of an
original work exclusive rights to its use and distribution, usually for a
limited time. |
False |
It
is a special type of application that prevents its user to access the
computer system without paying its creator or subscribing/buying to its
creator’s product or services. |
Ransomware |
It
is a collection of individual data items that are stored in a highly
structured way that represetnts a model of reality |
Database |
It is the main program running on a computer.
It manages the memory and processes of the computer, and all of its software
and hardware. |
Operating System |
Graphical
User Interface ( GUI) has made computers easier to use because: |
they used icons instead of
commands |
One
of the greatest contribution of ISO in the Computer networking industry
because it is used by company as their references |
OSI Mode |
Which
of the following is the reason to Denormalize a Table? |
Remove redundant information |
It
is a model that provides end-to-end connectivity specifying how data should
be packetized, addressed, transmitted, routed and received at the
destination. This model is maintained by the IETF. |
TCP/IP Model |
____ Layer is concerned with the transmission
and reception of the unstructured raw bit stream over the physical medium |
Physica |
What
happens if there isn't enough RAM available? |
Your computer slows down, as everything has to be
loaded from the hard drive |
It
is a type of software that operates and controls a particular type of device
that is attached to a computer. |
Device Drivers |
A
series of rules that your databases table structure must pass in order to be
considered a good relational design. |
Normalization |
The term durability refers to |
How easy that device can be damaged |
Which
of the following is not a Relational Database Management System? |
Python |
Control
Unit performs two operations (arithmetic and logical) |
False |
It
is the term used to describe an individual’s anonymity and how safe they feel
in a website location. |
Microsoft Visio |
It
is use to programmed the first computers |
. machine language |
Desktop Computer is a personal computer which
can be moved easily and used in a variety of locations. |
True |
Shugart
leads the creation of this external storage |
1971 |
It
is the process of copying and archiving the computer data so that it may be
used to restore its original data after a data loss event |
Back-up |
What
is Random Access Memory (RAM) |
All of the given |
What
type of computers in a client-server system are client computers (most of the
time). |
Microcompute |
Which
of the following are not included in the Database Development Life Cycle? |
Testing |
Read-Only
Memory is a memory chip that stores information or data in it and usually
data written to or programmed to a ROM by the manufacturer or the computer
engineer. |
True |
This
hardware is commonly known as the Layer 3 Hardware because it uses logical
addresses to forward the information from the sender to its destination. |
Router |
When
a file is saved for the first time |
A name must be given to identify it |
It
is a server that is used by IP Networks to dynamically distribute network
configuration parameters like IP address for interface and services. |
DHCP Server |
This port can be used to network and to connect
to the Internet. |
Ethernet Port |
It
is the smallest grouping among the Internet Technologies. |
Local Area Network |
Who
among the following is the father of Computer science? |
Allen Turing |
Which three components are most important in
Gaming computer when it comes to performance? |
CPU, RAM, Graphics Card |
Computer
Security is very important to learn because it enables the people to carry
out their jobs, education and research, it supports critical business process
and lastly it protects personal and sensitive information |
True |
ANSI
stands for ______ |
American National Standards
Institute |
It
is the fast-growing area of crime because more and more criminals are
exploiting the speed, convenience and anonymity of the internet to commit a
diverse range of criminal activities. |
Cyber Crime |
The
term portability refers to |
How easy to carry / transport
your computer |
Service
Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products. |
True |
It
is a software application that brings potential harm to your computer because
it disrupt your computer operation by installing Trojan, viruses, worms,
spyware, adware and other software that does malicious intent. |
Malware |
______
Layer controls the operations of the subnet, deciding which physical path the
data takes. |
Network |
It
is the relationship of one data to another data. |
Cardinality |
Layer
provides error-free transfer of data frames from one node to another over Physical
layer |
Data Link |
A
maintenance utility included in Microsoft Windows that is used to free up
disk spaces on the computer hard drive. |
Disk Cleanup |
It
is a network created when two or more PCs are connected and share resources
without going through a separate server computer. |
Peer-to-Peer Model |
It
is an additional type of Database that is useful in any database design
because they help support the business rules that you established while
gathering the requirements for the system. |
Lookup Table |
It is
a software application installed in your computer that is spying in your
data, meaning this software gets information from your computer without you
knowing it and sends it to the attacker or the hacker. |
Spyware |
It
is a category of Application Software that generates print and electronic
media for other to consume, most often in a commercial or educational
settings. |
Media Development Software |
Which
of the following is NOT a characteristic of Relational database? |
Order of Either the columns or
rows is very significant |
It
is a simple toggling property in the column of the table in MySQL or SQL that
make the field required. |
Not Null |
It
is a virus that replicates itself to infect the whole computer and typically
used by attacker to make a DoS or Denial of Service attack |
Worms |
is
an open source Debian-based Linux distribution sponsored by Canonical Ltd. |
Ubuntu |
It
is the data type used by Oracle Databases. |
CLOB Data Type |
Why is it that computers use binary to read
memory data? |
Computers are made up of electronic
switches |
Firewall
is the process of converting a data or information into another form also
known as cipher text. |
False |
A
special type of software that is used to hide malware, bots and worms. This
software should be installed in the target computer |
Rootkits |
This
are set of rules that governs a communication or the exchange of information. |
Protocol |
Honey
Pot is a software application that scans your whole computer’s hard drives
and folders for possible malware or virus infections. |
False |
Bootstrap
Loader is a part of the BIOS that test the computer hardware and make sure
that no errors exist before loading the operating system. |
False |
A
Type of Wireless Area Network that works within a very small area – your
immediate surroundings. |
Local Area Network |
It
is a server that translates the public IP Address into Domain Names |
DNS Server |
A
type of wireless transmission that uses electromagnetic waves to transmit
data through air. Transmission is usually measured in Hertz and One Hertz is
equivalent to one cycle per second. |
Radio Frequency |
No comments:
Post a Comment