Sunday, March 7, 2021

Computing Fundamentals / Introduction to Computing

 ITE6100 Computing Fundamentals / Introduction to Computing


Computing has 4 steps, they are:

input, process, output, store

Who among the following is the father of Computer science?

Allen Turing

Information Technology involves the development, maintenance and use of computer systems, software and networks for the processing and distribution of data.

True

When a file is saved for the first time

A name must be given to identify it

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on the lecture of Lesson 1.

1975

Which of these governs the interaction process between the user and the operating system?

User interface

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on the lecture of Lesson 1.

It is used by the first IBM personal computer as the Operating System

1981

Graphical User Interface ( GUI) has made computers easier to use because:

they used icons instead of commands

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on the lecture of Lesson 1.

Build the first computer that does simultaneous solving of equations

1911

It is a combination of hardware and software, which enables information sharing between computer devices.

network

It is use to programmed the first computers

machine language

Which device is required to connect to internet?

Modem

Which of the following statements is true?

Minicomputer operates more efficiently than Microcomputer.

Information is the result of processing a raw data.

True

What type of computers in a client-server system are client computers (most of the time).

Microcomputer

Hardware are the equipment used to process the data and create useful information.

True

Software is a program that consists of step-by-step instructions that tells the computer how to do its work.

True

What is hardware?

Is any computer part that has a physical structure

Information System is an integrated set of components for collecting, storing, and processing data and for delivering information, knowledge and digital products.

True

 

It is the metal and plastic box which contains the computer's main components including the motherboard, central processing unit ( CPU), and power supply

Computer Case

 

One of the developer of the ENIAC

1943

What is Information Technology?

Technology allowing information to be used in the production of products & services

What is software?

any collection of instructions telling the hardware what to do

This port can be used to network and to connect to the Internet.

Ethernet Port

Software and Hardware manufacturer provides procedure manuals for their products and it can be in printed or electronic copy.

True

English Mathematician and Father of Computing

1800

It is the main program running on a computer. It manages the memory and processes of the computer, and all of its software and hardware

Operating System

 

These can be used for connecting almost any computer type including mice, keyboards, printers, and digital cameras.

USB Port

 

Which of the following stores output from a computer:

Flash Drive

Security software is designed to protect computers from the variety of viruses and unwanted intrusions

True

This is the another version of ENIAC that is commercially available for business and government

1946

Desktop Computer is a personal computer which can be moved easily and used in a variety of locations.

True

People are the commonly overlook part of the information system. And the reason why systems are created is to make end-user (people) more productive.

True

Grace Hopper develops the first computer language

1953

This is the another version of ENIAC that is commercially available for business and government

1946

Designs the Punch Card System

1890

Which of the following stores output from a computer:

Flash Drive

Which of these governs the interaction process between the user and the operating system?

User interface

It is used by the first IBM personal computer as the Operating System

1981

Which of the following statements is true?

Minicomputer operates more efficiently than Microcomputer.

People are the commonly overlook part of the information system. And the reason why systems are created is to make end-user (people) more productive.

True

 

Shugart leads the creation of this external storage

1971

This port can be used to network and to connect to the Internet.

Ethernet Port

Which device is required to connect to internet?

Modem

Software and Hardware manufacturer provides procedure manuals for their products and it can be in printed or electronic copy.

True

 

Hardware are the equipment used to process the data and create useful information.

True

It is use to programmed the first computers

machine language

Raw data are the unprocessed facts including text, numbers, images and sounds.

False

What type of computers in a client-server system are client computers (most of the time).

Microcomputer

What is Information Technology?

Technology allowing information to be used in the production of products & services

It is a combination of hardware and software, which enables information sharing between computer devices.

network

One of the developer of the ENIAC

1943

 

 

What is hardware?

Is any computer part that has a physical structure.

Information Technology involves the development, maintenance and use of computer systems, software and networks for the processing and distribution of data.

True

Build the first computer that does simultaneous solving of equations

1911

Who among the following is the father of Computer science?

Allen Turing

To increase the performance of my computer, I should add _______________.

add more RAM

The First commercially available portable computer by IBM

1975

Procedure is the guidelines for people to follow when using the software, hardware and data

True

How do you explain the CPU (Central Processing Unit) inside a computer?

The brain of the computer

Computing has 4 steps, they are:

input, process, output, store

Security software is designed to protect computers from the variety of viruses and unwanted intrusions

True

Software is a program that consists of step-by-step instructions that tells the computer how to do its work.

True

It is the first DRAM chip of the Intel Company

1970

When a file is saved for the first time

A name must be given to identify it

Information is the result of processing a raw data.

True

It is the metal and plastic box which contains the computer's main components including the motherboard, central processing unit ( CPU), and power supply

Computer Case

Graphical User Interface ( GUI) has made computers easier to use because:

they used icons instead of commands

These can be used for connecting almost any computer type including mice, keyboards, printers, and digital cameras.

USB Port

Desktop Computer is a personal computer which can be moved easily and used in a variety of locations.

True

It is the main program running on a computer. It manages the memory and processes of the computer, and all of its software and hardware.

Operating System

Which of these is used commonly to measure storage capacity

bytes

Personal Cloud storage is the combination of public and private cloud storage where some critical data resides in the enterprise’s private cloud while other data is stored and accessible from a public cloud storage provider.

False

 

What happens if there isn't enough RAM available?

Your computer slows down, as everything has to be loaded from the hard drive

Serial Advanced Technology Attachment (SATA) Hard Disk is a standard electronic interface used between a computer motherboard’s data paths or bus and the computer’s disk storage devices.

False

 

The tem 'read/write time' refer to what?

How long it takes to read or write data to your computer

What is Random Access Memory (RAM)

All of the given

Why is it that computers use binary to read memory data?

Computers are made up of electronic switches

Co-Processor is a special set of circuits in a micro-processor chip that is designed to manipulate numbers or perform some other specialized function more quickly than the basic microprocessor circuits.

True

 

 

The term durability refers to

How easy that device can be damaged

Read-Only Memory is a memory chip that stores information or data in it and usually data written to or programmed to a ROM by the manufacturer or the computer engineer.

True

The term portability refers to

How easy to carry / transport your computer

The term capacity refers to

The amount of data that you can transfer to your computer

Blu-ray Disc is the next generation optical disc that can hold high-definition video due to its high capacity

True

Which three components are most important in Gaming computer when it comes to performance?

CPU, RAM, Graphics Card

What happens to the Main Memory / RAM data when we turn off the power?

All data is lost

It is a category of Application Software that are originally offered for general productivity and information retrieval including email, calendar, contacts, stock market and weather information

Mobile Applications

A ___ mobile operating s is a software that allows smartphones, tablet PCs and other devices to run applications and programs

mobile operating system

It is a category of Application Software that run applications for amusement, leisure, or as a diversion

Entertainment Software

It is a category of Application Software that allows the user to create and manage information, usually for individual projects within a department, in contrast to enterprise management.

Information Worker Software

 

It is a category of Application Software that provide common capabilities needed to support enterprise software systems.

Enterprise Infrastructure Software

 

This type of software includes a variety of PC utilities for managing and optimizing your computer systems

System Utility Software

 

The use of UNIX spread around the country and initially____ gave it away free.

Bell Labs

Windows XP (codename:_____) is a personal computer operating system produced by Microsoft as part of the Windows NT Family of operating system.

Whistler

It is a category of Application Software that generates print and electronic media for other to consume, most often in a commercial or educational settings.

Media Development Software

It is a category of Application Software that is related to content access software but has the content and/or features adapted for use in by educators or students.

Educational Software

It is a category of Application Software that simulates physical or abstract system for research, training or entertainment purposes

Simulation Software

It is a type of software that operates and controls a particular type of device that is attached to a computer

Device Drivers

Massachusetts Institute of Technology in 1960’s had a time sharing operating system they called_____.

MULTICS

It is a category of Application Software that is used in developing hardware and software products.

Product Engineering Software

Windows 7 (codename: ________) is a personal computer operating system and was released to manufacturing on July 22, 2009.

Blackcomb

_____  Million of Windows 8 licenses have been sold through January 2013, a number which includes both upgrades and sales to OEM for new PCs.

60

Windows 8.1 (codename:____) is an upgrade for Windows 8, a version of Windows NT, a computer operating system released by Microsoft.

Blue

It is a category of Application Software that is used primarily to access a content without editing but may include software that allows for content editing.

Content Access Software

This is the most important program that runs on a computer

Operating System

Fedora is a____ based operating system developed and supported by the Fedora Project as a partnership with Red Hat and volunteer contributors.

Linux

It is the way to arrange or configure a network.

Network Topology

It is a category of Application Software that are originally offered for general productivity and information retrieval including email, calendar, contacts, stock market and weather information

Mobile Applications

It is a server that is used by IP Networks to dynamically distribute network configuration parameters like IP address for interface and services.

DHCP Server

 

 

A Type of Network that is being utilized nowadays by individuals for their homes and apartments. This network allows all users to connect and share resources.

Home Network

It is a category of Application Software that allows the user to create and manage information, usually for individual projects within a department, in contrast to enterprise management.

Information Worker Software

Read-Only Memory is a memory chip that stores information or data in it and usually data written to or programmed to a ROM by the manufacturer or the computer engineer.

True

 

 

_____ Layer allows session establishment between processes running on different stations

Session

Expansion Slots is a mechanical components that provides mechanical and electrical connections between a microprocessor and a printed circuit board (PCB).

False

Laser Printers are printers that used the same technology as to photocopying machines. It uses a laser light beam to produce images with excellent letter and graphics quality.

True

___ Layer formats the data to be presented to application layer. It can be viewed as the translator for the network

Presentation

Aspect Ratio is the distance between each pixel

False

It is a category of Application Software that is used in developing hardware and software products.

. Product Engineering Software

 

Control Unit performs two operations (arithmetic and logical).

False

Processor is the heart and brain of the computer because without this computer cannot do anything

True

Serial Advanced Technology Attachment (SATA) Hard Disk is a standard electronic interface used between a computer motherboard’s data paths or bus and the computer’s disk storage devices.

False

This type of software includes a variety of PC utilities for managing and optimizing your computer systems

System Utility Software

ANSI stands for___________.

American National Standards Institute

It is a distributed communication framework of network process among service requestors, clients and service providers

Client-Server Model

_____ Layer ensures that message are delivered error-free in sequence and with no losses or duplications.

Transport

It is a category of Application Software that run applications for amusement, leisure, or as a diversion.

Entertainment Software

It is a category of Application Software that is used primarily to access a content without editing but may include software that allows for content editing.

Content Access Software

 

This is the most important program that runs on a computer

Operating System

A college student in Finland,______, developed a version of UNIX as an operating system for personal computer. He called it Linux

Linus Torvalds

Is a meta-network and constantly changing collection of thousands of individual networks intercommunicating with a common protocol?

Architecture

It is a type of software that operates and controls a particular type of device that is attached to a computer

Device Drivers

IEEE stands for _____

Institute of Electrical and Electronics Engineer

Copywright is a legal right credited by law of a country that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time.

False

It is a special type of application that prevents its user to access the computer system without paying its creator or subscribing/buying to its creator’s product or services.

Ransomware

 

It is a collection of individual data items that are stored in a highly structured way that represetnts a model of reality

Database

It is the main program running on a computer. It manages the memory and processes of the computer, and all of its software and hardware.

Operating System

 

Graphical User Interface ( GUI) has made computers easier to use because:

they used icons instead of commands

One of the greatest contribution of ISO in the Computer networking industry because it is used by company as their references

OSI Mode

Which of the following is the reason to Denormalize a Table?

Remove redundant information

It is a model that provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This model is maintained by the IETF.

TCP/IP Model

 

 

____ Layer is concerned with the transmission and reception of the unstructured raw bit stream over the physical medium

Physica

What happens if there isn't enough RAM available?

Your computer slows down, as everything has to be loaded from the hard drive

It is a type of software that operates and controls a particular type of device that is attached to a computer.

Device Drivers

A series of rules that your databases table structure must pass in order to be considered a good relational design.

Normalization

The term durability refers to

How easy that device can be damaged

Which of the following is not a Relational Database Management System?

Python

Control Unit performs two operations (arithmetic and logical)

False

It is the term used to describe an individual’s anonymity and how safe they feel in a website location.

Microsoft Visio

It is use to programmed the first computers

. machine language

Desktop Computer is a personal computer which can be moved easily and used in a variety of locations.

True

Shugart leads the creation of this external storage

1971

It is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event

Back-up

What is Random Access Memory (RAM)

All of the given

What type of computers in a client-server system are client computers (most of the time).

Microcompute

Which of the following are not included in the Database Development Life Cycle?

Testing

Read-Only Memory is a memory chip that stores information or data in it and usually data written to or programmed to a ROM by the manufacturer or the computer engineer.

True

This hardware is commonly known as the Layer 3 Hardware because it uses logical addresses to forward the information from the sender to its destination.

Router

When a file is saved for the first time

A name must be given to identify it

It is a server that is used by IP Networks to dynamically distribute network configuration parameters like IP address for interface and services.

DHCP Server

 

This port can be used to network and to connect to the Internet.

Ethernet Port

It is the smallest grouping among the Internet Technologies.

Local Area Network

Who among the following is the father of Computer science?

Allen Turing

Which three components are most important in Gaming computer when it comes to performance?

CPU, RAM, Graphics Card

Computer Security is very important to learn because it enables the people to carry out their jobs, education and research, it supports critical business process and lastly it protects personal and sensitive information

True

 

ANSI stands for ______

American National Standards Institute

It is the fast-growing area of crime because more and more criminals are exploiting the speed, convenience and anonymity of the internet to commit a diverse range of criminal activities.

Cyber Crime

The term portability refers to

How easy to carry / transport your computer

Service Pack or Updates are piece of software release by software vendors, mainly to address security vulnerabilities in their existing products.

True

It is a software application that brings potential harm to your computer because it disrupt your computer operation by installing Trojan, viruses, worms, spyware, adware and other software that does malicious intent.

Malware

______ Layer controls the operations of the subnet, deciding which physical path the data takes.

Network

It is the relationship of one data to another data.

Cardinality

Layer provides error-free transfer of data frames from one node to another over Physical layer

Data Link

A maintenance utility included in Microsoft Windows that is used to free up disk spaces on the computer hard drive.

Disk Cleanup

It is a network created when two or more PCs are connected and share resources without going through a separate server computer.

Peer-to-Peer Model

It is an additional type of Database that is useful in any database design because they help support the business rules that you established while gathering the requirements for the system.

Lookup Table

 

It is a software application installed in your computer that is spying in your data, meaning this software gets information from your computer without you knowing it and sends it to the attacker or the hacker.

Spyware

 

 

It is a category of Application Software that generates print and electronic media for other to consume, most often in a commercial or educational settings.

Media Development Software

Which of the following is NOT a characteristic of Relational database?

Order of Either the columns or rows is very significant

It is a simple toggling property in the column of the table in MySQL or SQL that make the field required.

Not Null

It is a virus that replicates itself to infect the whole computer and typically used by attacker to make a DoS or Denial of Service attack

Worms

is an open source Debian-based Linux distribution sponsored by Canonical Ltd.

Ubuntu

It is the data type used by Oracle Databases.

CLOB Data Type

Why is it that computers use binary to read memory data?

Computers are made up of electronic switches

Firewall is the process of converting a data or information into another form also known as cipher text.

False

A special type of software that is used to hide malware, bots and worms. This software should be installed in the target computer

Rootkits

 

This are set of rules that governs a communication or the exchange of information.

Protocol

Honey Pot is a software application that scans your whole computer’s hard drives and folders for possible malware or virus infections.

False

 

Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that no errors exist before loading the operating system.

False

A Type of Wireless Area Network that works within a very small area – your immediate surroundings.

Local Area Network

It is a server that translates the public IP Address into Domain Names

DNS Server

A type of wireless transmission that uses electromagnetic waves to transmit data through air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per second.

Radio Frequency

No comments:

Post a Comment