ITE-6101-2013T (UGRD) Computing Fundamentals: My Courses
ITE-6101-2013T (UGRD) Computing Fundamentals: My Courses
ITE-6101-2013T (UGRD) Computing Fundamentals: My Courses
Home
My courses
UGRD-ITE6101-2013T
Final Exam
Started on Friday, 16
October 2020,
5:12 PM
State Finished
Completed on Friday, 16
October 2020,
6:48 PM
Marks 44.00/50.00
Grade 88.00 out of
100.00
Question 1
Complete
Flag question
Question text
Identify whether the said program is a System Software or an Application Software.
Select one:
a. Application Software
b. System Software
Question 2
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
mobile operating system a software that allows smartphones, tablet PCs and other devices
to run applications and programs.
Question 3
Complete
Flag question
Question text
Which of the following is the reason to Denormalize a Table?
Select one:
a. Performance
Question 4
Complete
Flag question
Question text
A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:
a. Objects
b. Normalization
c. Field Names
d. Record
Question 5
Complete
Flag question
Question text
This are set of rules that governs a communication or the exchange of information.
Select one:
a. Standards
b. Protocol
c. Connectivity
d. Architecture
Question 6
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Windows XP Whistler is a personal computer operating system produced by Microsoft as
part of the Windows NT Family of operating system.
Question 7
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:
True
False
Question 8
Complete
Flag question
Question text
Computing has 4 steps, they are:
Select one:
a.
state hypothesis, collect data, test, and conclude
b.
input, process, output, store
c.
science, technology, engineering, math
d.
prophase, metaphase, anaphase, telophase
Question 9
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and
accessible from a public cloud storage provider.
Select one:
True
False
Question 10
Complete
Flag question
Question text
Which of the following is not a result a result of Duplicate Data?
Select one:
b. It slows down the system by taking up extra bandwidth across the network and extra disk
space on the server.
c. Difficult to maintain, requiring multiple reads and writes to update records and keep thing in
sync.
Question 11
Complete
Flag question
Question text
It is a software package that automatically renders advertisements in order to generate
revenue for its authors.
Select one:
a. Ransomware
b. Adware
c. Patch
d. Driver
Question 12
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Raw data are the unprocessed facts including text, numbers, images and sounds.
Select one:
True
False
Question 13
Complete
Flag question
Question text
The term durability refers to
Select one:
a.
c.
How easy that device can be damaged
Question 14
Complete
Flag question
Question text
This is the most important program that runs on a computer
Select one:
a. Device Drivers
b. Operating System
Question 15
Complete
Flag question
Question text
Who among the following is the father of Computer science?
Select one:
a. Simur Cray
b. Charles Babbage
c. Allen Turing
d. Augusta Adaming
Question 16
Complete
Flag question
Question text
A collection of computers and network resources connected via a network over a
geographic area.
Select one:
Question 17
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Information Technology is just a part of an Information System and Information Technology
is much more focus in the use of the said computer technology.
Select one:
True
False
Question 18
Complete
Flag question
Question text
When a file is saved for the first time
Select one:
Question 19
Complete
Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:
a. Peer-to-Peer Model
b. Client-Server Model
c. TCP/IP Model
d. OSI Model
Question 20
Complete
Flag question
Question text
It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:
a. Entertainment Software
d. Educational Software
Question 21
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Transport Layer ensures that message are delivered error-free in sequence and with no
losses or duplications.
Question 22
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The process of physically organizing the content of the mass storage device into the
smallest number of contiguous regions (fragments).
Select one:
a. Backup
b. Disk Cleanup
c. Defragmentation
d. Software Updates
Question 23
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:
True
False
Question 24
Complete
Flag question
Question text
It is the main program running on a computer. It manages the memory and processes of the
computer, and all of its software and hardware.
Select one:
a.
Application Software
b.
Software
c.
Hardware
d.
Operating System
Question 25
Complete
Flag question
Question text
The term capacity refers to
Select one:
Question 26
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 27
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
: 1946
Question 28
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Presentation Layer formats the data to be presented to application layer. It can be viewed
as the translator for the network
Question 29
Complete
Flag question
Question text
What shape shows the representation of Table or Entity?
Select one:
a. Rectangle
b. Oval
c. Circle
d. Cylinder
Question 30
Complete
Flag question
Question text
It is the data type used by Oracle Databases.
Select one:
Question 31
Complete
Flag question
Question text
It is a server that is used by IP Networks to dynamically distribute network configuration
parameters like IP address for interface and services.
Select one:
a. DNS Server
b. DHCP Server
c. Firewall
d. Router
Question 32
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Hardware are the equipment used to process the data and create useful information.
Select one:
True
False
Question 33
Complete
Flag question
Question text
It is the smallest grouping among the Internet Technologies.
Select one:
Question 34
Complete
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Network Layer controls the operations of the subnet, deciding which physical path the data
takes.
Question 35
Complete
Flag question
Question text
A maintenance utility included in Microsoft Windows that is used to free up disk spaces on
the computer hard drive.
Select one:
a. Backup
b. Defragmentation
c. Software Updates
d. Disk Cleanup
Question 36
Complete
Flag question
Question text
It is a malicious codes that is attached to infected application programs or software which
will execute a different set of actions that will bring harm to your computer.
Select one:
a. Worms
b. Trojans
c. Key Loggers
d. Rootkits
Question 37
Complete
Flag question
Question text
It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.
Select one:
a. Pharming
b. Phishing
c. Spyware
d. Malware
Question 38
Complete
Flag question
Question text
It is a category of Application Software that provide common capabilities needed to support
enterprise software systems.
Select one:
b. Simulation Software
Question 39
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Laser Printers are printers that used the same technology as to photocopying machines. It
uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:
True
False
Question 40
Complete
Flag question
Question text
A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.
Select one:
b. Home Network
Question 41
Complete
Flag question
Question text
Which of the following are not included in the Database Development Life Cycle?
Select one:
a. Testing
b. Logical Design
c. Requirement Gathering
d. Planning
Question 42
Complete
Flag question
Question text
It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:
a. Data
b. Database
c. Information
d. Records
Question 43
Complete
Flag question
Question text
Which of the following statements is true?
Select one:
a.
The speeds of both of these machines cannot be compared to advanced speeds
b.
Minicomputer operates more efficiently than Microcomputer.
c.
Both computers have the same speed
d.
Microcomputer operate faster than minicomputer
Question 44
Complete
Question text
One piece of information that you can use to identify exactly one record, with absolutel no
ambiguity.
Select one:
a. Natural Key
b. Foreign Key
c. Composite Key
d. Primary Key
Question 45
Complete
Flag question
Question text
It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and other
software that does malicious intent.
Select one:
a. Phishing
b. Malware
c. Spyware
d. Pharming
Question 46
Complete
Flag question
Question text
Which of these is used commonly to measure storage capacity
Select one:
a.
Mb/s
b.
hertz
c.
bytes
d.
the number of text documents you can store on it
Question 47
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Expansion Slots is a mechanical components that provides mechanical and electrical
connections between a microprocessor and a printed circuit board (PCB).
Select one:
True
False
Question 48
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Question 49
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Software is a program that consists of step-by-step instructions that tells the computer how
to do its work.
Select one:
True
False
Question 50
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Control Unit performs two operations (arithmetic and logical).
Select one:
True
False