SlideShare a Scribd company logo
If you want to know more about
technology just come to worlds
technology arena on youtube (
https://youtube.com/@worldstechnology
arena178 on this link
STUDENT NAME:
COURSE:
COURSE CODE
YEAR OF STUDY:
SEMISTER:
INFORMATION TECHNOLOGY
CIT 101
1
1
AKATWIJUKA OSCAR
SECTION A
1. The term 1Gigabyte refers to.
A. 1024 Patabytes
B. 1024 Megabytes
C. 1024 Kilobytes
D. None of the above
2. In computer terminology which of the following best describes a Device Driver?
A. Software that allows the user to control the operating system.
B. Hardware that allows interaction between peripheral devices and Operating system.
C. Hardware that allows the user to control an operating system.
D. Software that allows interaction between peripheral Devices and Operating System.
3. The following option consists of only computer input devices.
A. Keyboard, mouse, Joystick, printer
B. Mouse, Monitor, Joystick, Keyboard
C. Joystick, Keyboard, Digitizer, Monitor
D. Joystick, Keyboard, Mouse, Digitizer
4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following
relates to the above statement.
A. Accuracy
B. Diligence
C. Reliability
D. Versatility
5. The following computers were invented in First Generation except.
E. UNIVAC,
F. IBM-701
G. TDC-316
H. IBM-650
6. Non Volatile Memory is referred to as .
B
D
D
B
G
C
A. RAM
B. Cache Memory
C. ROM
D. Video Memory
7. The following are characteristics of impact printers except.
A. They are noisy
B. There is physical contact with the paper to produce an image
C. Useful for bulk printing due to low cost
D. These printers print a complete page at a time
8. A part of the computer that reads information from a disk is called ___________.
A. Operating System
B. Motherboard
C.Hard Drive
D. Disk Drive
9. The main characteristic of fourth generation was.
A. VLSI
B. Transistor
C. Vacuum tubes
D. Integrated circuit
10.Ctrl + Shift + Esc are keyboard shortcut keys used to.
A. Restart the computer
B. Ctrl + Shift + Esc
C. Open Task Manager.
D. Switch keyboard layout.
11.The following type of memory module has 30 pins on the bottom of circuit board.
A. SIMM
B. DIMM
C. SIPP
D. DIP
12.South Bridge on Motherboard inter connects the following motherboard components (select all).
A. RAM
B. ROM
C. PCI Buss
C
C
A
C
A
C
D. AGP
13.Which of the following is referred to as a web protocol?
A. FTP
B. HTTP
C. IP
D. TCP
14.Convert 1011101two to Decimal.
A. 64ten
B. 80ten
C. 88ten
D. 93ten
15.A time-sharing operating system is also known as.
A. Batch processing OS
B. Distributed OS
C. Multitasking OS
D. Real-OS
16.Which of the following device cannot be shared in Network?
A. Printer
B. Hard Disk
C. CD drive
D. Mouse
17. Which one of the following is not a computer language?
A. BASIC
B. C
C. Fast
D. FORTRAN
18.The spine of a computer is called.
A. RAM
B. BIOS
C. Motherboard
C
D
C
D
C
B
D. CPU
19.Which of the following statements are true about computer virus (select all that apply).
A. Viruses have the ability to replicate themselves and infect computers
B. Strange graphics are displayed on your computer monitor when viruses are present
C. Putting a password on a computer prevents viruses from entering the system
D. A Macros is a type of virus commonly found Microsoft programs
20.The following are optical storage Devices Except.
A. Flash Disk
B. Compact Disk
C. Digital versatile disk
D. Blue Ray
21. Convert 223ten to Octal Base.
A. 330eight
B. 230eight
C. 230eight
D. 337eight
22. Chose the odd man out.
A. Firefox
B. Internet explore
C. Safari
D. Google
23. Traffic-control computer is an example of.
A. General purpose computer
B. Analog Computer
C. Special purpose computer
D. Hybrid computer
24. Which of these is a free operating system?
A. Windows 7
B. Windows XP
C. Mac OSX
A,B,D
A
D
D
A
D
D. Ubuntu
25. Data processing cycle takes on the following steps.
A. Input, processing, storage, output
B. Input, storage, processing, output
C. Input, output, processing, storage
D. Input, processing, output, storage
26. When you see no icons on the desktop, how can you open programs such as Microsoft
Word?.
A. Right-click to reveal all icons.
B. Restart the computer.
C. It is not possible to open the program if no icons are on the desktop.
D. Click the start button and select program from the menu.
27. Which of the following is an example of an e-mail address?
A. Www.google.com
B. Jeandoe.gmail.com
C. Bob Smith@gmail.com
D. Johndoe@cincinnatilibrary.org
28. "Desktop" is a computer term that refers to?
A. Something that is for the computer programmer only.
B. The part of your work area where the computer monitor sits.
C. The initial screen showing icons for folders, applications and files.
D. D.The desk that your computer is stationed on.
29. A Program which detects all necessary computer components during boot sequence is.
A. Bootstrap
B. POST
C. Loader
D. BIOS
30. Which key on the keyboard is used to capitalize letters?
A. Windows
B. Ctrl
C. Shift
A
D
D
C
D
C
D. Tab
31.Which of the following is not a pointing device?
A. Keyboard
B. Mouse
C. Joystick
D. Light pen
32.The background of the desktop is called...
A. Background
B. Screen saver
C. Wallpaper
D. None of these
33.Which of the following interfaces will you encounter when installing Networks?
A. NIC
B. AGP
C. PCI
D. SCSI
34.Speed of the processor is measured in .
A. Mbps
B. Hertz
C. MHz
D. Bytes
35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in
A. Memory Unit
B. Arithmetic Unit
C. Logic Unit
D. Control Unit
36.The Second ERA of computers is concerned with
Phones
A
C
B
B
C
37.The type of backup that only copies data that has been changed or created since the.
previous back up is called.
A. Full backup
B. Deferential backup
C. Incremental backup
D. Total backup
38.A Network of Networks is reffered to as.
A. Intranet
B. WWW
C. Internet
D. Extranet
39.Write the word COMPUTER in Full.
40.The Father of all computers is.
A. John Von Nueman
B. Charles Babbage
C. John Barden
D. Jack Kilby
Common Operating Machine Particularly Used for Technical Education and Research
C
C
B
SECTION B: 30 Marks
Attempt All Questions
Write answers in spaces provided
1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks)
Memory Volatile Non-Volatile
RAM ✓
CMOS ✓
ROM ✓
Punched Card ✓
Magnetic Tape ✓
1b. Identify five examples of adapter cards found in a system unit. (05 marks)
2(a).Give Examples of software under the following categories. (06 Marks)
i. System Utility
Examples
ii. Operating System
Examples
iii. Programming Languages
Examples
1.delete utility
2 diagnostic utility
1.linux
2. mac OS
1. FORTRAN
2. BASIC
1) Video cards
2) Multimedia cards
3) I/O cards
4) Communication cards
5) Network cards
2(b) List two advantages of Smartphone over a Laptop. (2Marks)
2(C) List 2 major Components of a computer System. (2Marks)
3(a) Write true or false against each statement from a to e in the table below (05 Marks)
NO STATEMET TRUE / FALSE
a) Image Viewer Utility Displays Contents of graphics when you
double click on it
True
b) Uninstaller Removes a word document file from False
c) Disk defragmenter compiles technical information about
hardware or software
False
d) Disk Scanner detects and corrects problems on the hard disk true
e) Antivirus utilities protect the physical access to the computer False
3(b) (a) Give the file extension, of any two of the following file types. (02 marks)
File type File extension
Executable file
Motion pictures
Ms Excel
(b) Give two examples of file attributes. (02 marks)
(c) State one function of a file in a computer system (01 mark)
1. It is a convenient way to keep others informed,
2 it is potable
.exe
.amv
.xls
1. Read only
2. Archive
To store organized data
1. software
2. hard ware
Section C: 30 marks
➢ Attempt any one question
➢ Use ms word to present your answers but for the case of QN3 you can answer
using your ball point and scan the answer sheet or u can use ms-word file
Qn1 (a)
With the help of pictures describe step by step how to perform a full backup of the computer.
Qn1 (b)
With the help of pictures describe step by step how to perform backup restore of the
computer.
Qn2
i. Differentiate between a virus and an anti-virus.
ii. Briefly explain six types of viruses.
iii. Explain six ways how viruses can be spread.
iv. List 5 antivirus software’s you know.
Qn3
A. Convert the following numbers to base ten.
i) 101112 ii) 101112 iii) 1000002
B. Convert the following numbers to base two.
i) 24510 ii) 11210 iii) 10210
2. Convert the following numbers to Decimal base.
i) 2348 ii) 1348 iii) 11128
C. Convert the following numbers to Hexadecimal.
i) 11111112 ii) 101111112 iii) 11100100002
D. Convert the following numbers to Binary Base.
i) A1816 ii) ABD16 iii) 891016
answers
qn 2
I. a virus is a malicious software that’s causes unusual effects on a
computer while antivirus is a kind of software used to prevent, scan, detect
and delete viruses from a computer
II. The following are some of the types of computer viruses
File-infecting Virus
A virus that attached itself to an executable program. It is also called a parasitic virus which
typically infects files with .exe or .com extensions. Some file infectors can overwrite host
files and others can damage your hard drive’s formatting.
Macro Virus
This type of virus is commonly found in programs such as Microsoft Word or Excel. These
viruses are usually stored as part of a document and can spread when the files are
transmitted to other computers, often through email attachments.
Browser Hijacker
This virus targets and alters your browser setting. It is often called a browser redirect virus
because it redirects your browser to other malicious websites that you don’t have any
intention of visiting. This virus can pose other threats such as changing the default home
page of your browser.
Web Scripting Virus
A very sneaky virus that targets popular websites. What this virus does is overwrite code
on a website and insert links that can install malicious software on your device. Web
scripting viruses can steal your cookies and use the information to post on your behalf on
the infected website.
Boot Sector Virus
These viruses are once common back when computers are booted from floppy disks.
Today, these viruses are found distributed in forms of physical media such as external
hard drives or USB. If the computer is infected with a boot sector virus, it automatically
loads into the memory enabling control of your computer.
Polymorphic Virus
This virus has the capability to evade anti-virus programs since it can change codes every
time an infected file is performed.
.
III
The following are some of the ways how computer viruses are
spread
-Downloads Free Software
When you are downloading a free software from internet and if the software or files are
infected with a virus then there has a chance that your computer also becomes infected
with the virus
-Download Suspicious E-mail Attachments
If you receive a suspicious email with an attachment file from unknown source, the
attachment file may contain virus or malicious script. In that case, if you download and
open the attachment file then virus will execute and infect to your computer.
-Click on Phishing Emails
Sometimes you will receive promotional emails (Phishing Email) in your inbox from
unknown source. These mails may include attachments or URL that contain viruses or
malicious files. If you click on that URL or opening the email attachment, then your
computer will be infected with the virus or malware to access your computer system.
-Use External Devices
A virus can enter your computer system by inserting external devices such as USB
devices, Mobile, external hard disk. For example, when you connected your mobile
devices to your computer and if the mobile has a virus then your computer could infect with
malware or virus.
-Click on Online Advertisements
If you click on Ads, then it can infect your computer by virus because the Ads may contain
malicious code. Cyber attackers insert malicious codes into ads and place the ads on
trusted websites in order to gain reputation.
-Click on Malicious File
Malicious software is dangerous to your computer. If you click on malicious executable file,
then the malware will spread on your computer. The most common form of malicious
software is viruses, worms, trojan horses, spyware, adware or rootkits.
IV The following are some the computer antivirus software
✓ Kaspersky
✓ Panda
✓ Norton
✓ Bit defender
✓ Bull guard

More Related Content

What's hot

JS1 COMPUTER STUDIES FIRST TERM C.A 2
JS1 COMPUTER STUDIES FIRST TERM C.A 2JS1 COMPUTER STUDIES FIRST TERM C.A 2
JS1 COMPUTER STUDIES FIRST TERM C.A 2
Ejiro Ndifereke
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
anilinvns
 
TLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lessonTLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lesson
Leonel Rivas
 
Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020
bricious mulimbi
 
Desktop icons
Desktop iconsDesktop icons
Desktop icons
MaryJane234
 
SYSTEM SOFTWARE
SYSTEM SOFTWARESYSTEM SOFTWARE
SYSTEM SOFTWARE
Swarnima Tiwari
 
Formating computer
Formating computerFormating computer
Formating computer
argusacademy
 
Computer Fundamentals Test
Computer Fundamentals TestComputer Fundamentals Test
Computer Fundamentals TestSamir Sabry
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
sl0wupl0ads
 
Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework Worksheet
Biscette InfoTech
 
S.S.2 Computer Studies 3rd Term Examination
S.S.2 Computer Studies 3rd Term ExaminationS.S.2 Computer Studies 3rd Term Examination
S.S.2 Computer Studies 3rd Term Examination
Ejiro Ndifereke
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenance
FitaAyalew
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programsnorzaini
 
Visual basic ppt for tutorials computer
Visual basic ppt for tutorials computerVisual basic ppt for tutorials computer
Visual basic ppt for tutorials computersimran153
 
History of OS
History of OSHistory of OS
History of OS
Imran Mirza
 
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
Ejiro Ndifereke
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
Cornelius Micah
 
Basic Computer Concepts
Basic Computer ConceptsBasic Computer Concepts
Basic Computer Concepts
JOANA MARIE DIESTA
 
Unit of storage
Unit of storageUnit of storage
Unit of storage
AKINPELUMIKOLADE
 
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
Ejiro Ndifereke
 

What's hot (20)

JS1 COMPUTER STUDIES FIRST TERM C.A 2
JS1 COMPUTER STUDIES FIRST TERM C.A 2JS1 COMPUTER STUDIES FIRST TERM C.A 2
JS1 COMPUTER STUDIES FIRST TERM C.A 2
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
 
TLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lessonTLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lesson
 
Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020Computer studies p1 revision pack 2020
Computer studies p1 revision pack 2020
 
Desktop icons
Desktop iconsDesktop icons
Desktop icons
 
SYSTEM SOFTWARE
SYSTEM SOFTWARESYSTEM SOFTWARE
SYSTEM SOFTWARE
 
Formating computer
Formating computerFormating computer
Formating computer
 
Computer Fundamentals Test
Computer Fundamentals TestComputer Fundamentals Test
Computer Fundamentals Test
 
Basic Network And Hardware Troubleshooting
Basic Network And Hardware TroubleshootingBasic Network And Hardware Troubleshooting
Basic Network And Hardware Troubleshooting
 
Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework Worksheet
 
S.S.2 Computer Studies 3rd Term Examination
S.S.2 Computer Studies 3rd Term ExaminationS.S.2 Computer Studies 3rd Term Examination
S.S.2 Computer Studies 3rd Term Examination
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenance
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programs
 
Visual basic ppt for tutorials computer
Visual basic ppt for tutorials computerVisual basic ppt for tutorials computer
Visual basic ppt for tutorials computer
 
History of OS
History of OSHistory of OS
History of OS
 
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS1 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
 
Basic Computer Concepts
Basic Computer ConceptsBasic Computer Concepts
Basic Computer Concepts
 
Unit of storage
Unit of storageUnit of storage
Unit of storage
 
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS2 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 

Similar to INTRODUCTION TO COMPUTING.pdf

COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4
kefyalew013
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Yazeed Khalid
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papers
neha rawat
 
test.docx
test.docxtest.docx
test.docx
RajatGupta156554
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
Ejiro Ndifereke
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
sddppml
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Germaneas
 
Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...
Thesuccesspath
 
100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdf
FAWAD KHAN
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
ABHISHEK KUMAR
 
Revision week
Revision weekRevision week
Revision weekfizahPhd
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
Kumar Nirmal Prasad
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008Kumar Nirmal Prasad
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-Alberto Vargas
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-liourte
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-luisbes
 

Similar to INTRODUCTION TO COMPUTING.pdf (20)

COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papers
 
test.docx
test.docxtest.docx
test.docx
 
JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2JS3 COMPUTER STUDIES FIRST TERM C.A 2
JS3 COMPUTER STUDIES FIRST TERM C.A 2
 
Set3 ict-question
Set3 ict-questionSet3 ict-question
Set3 ict-question
 
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERSDIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
DIGITAL FLUENCY MULTIPLE QUESTION ANSWERS
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
 
Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...Engineering and non-engineering trades, Employability skill MCQ questions for...
Engineering and non-engineering trades, Employability skill MCQ questions for...
 
100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdf
 
Computer Quiz MCQ's
Computer Quiz MCQ'sComputer Quiz MCQ's
Computer Quiz MCQ's
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
 
Revision week
Revision weekRevision week
Revision week
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
 
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-20081 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
1 allahabad bank-clerk-exam-computer-general-konwledge-solved-paper-2008
 
3
33
3
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-
 
Examen comptia 50 eng-
Examen comptia 50  eng-Examen comptia 50  eng-
Examen comptia 50 eng-
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

INTRODUCTION TO COMPUTING.pdf

  • 1. If you want to know more about technology just come to worlds technology arena on youtube ( https://youtube.com/@worldstechnology arena178 on this link STUDENT NAME: COURSE: COURSE CODE YEAR OF STUDY: SEMISTER: INFORMATION TECHNOLOGY CIT 101 1 1 AKATWIJUKA OSCAR
  • 2. SECTION A 1. The term 1Gigabyte refers to. A. 1024 Patabytes B. 1024 Megabytes C. 1024 Kilobytes D. None of the above 2. In computer terminology which of the following best describes a Device Driver? A. Software that allows the user to control the operating system. B. Hardware that allows interaction between peripheral devices and Operating system. C. Hardware that allows the user to control an operating system. D. Software that allows interaction between peripheral Devices and Operating System. 3. The following option consists of only computer input devices. A. Keyboard, mouse, Joystick, printer B. Mouse, Monitor, Joystick, Keyboard C. Joystick, Keyboard, Digitizer, Monitor D. Joystick, Keyboard, Mouse, Digitizer 4. “A computer is free from monotony, tiredness, and lack of concentration” which of the following relates to the above statement. A. Accuracy B. Diligence C. Reliability D. Versatility 5. The following computers were invented in First Generation except. E. UNIVAC, F. IBM-701 G. TDC-316 H. IBM-650 6. Non Volatile Memory is referred to as . B D D B G C
  • 3. A. RAM B. Cache Memory C. ROM D. Video Memory 7. The following are characteristics of impact printers except. A. They are noisy B. There is physical contact with the paper to produce an image C. Useful for bulk printing due to low cost D. These printers print a complete page at a time 8. A part of the computer that reads information from a disk is called ___________. A. Operating System B. Motherboard C.Hard Drive D. Disk Drive 9. The main characteristic of fourth generation was. A. VLSI B. Transistor C. Vacuum tubes D. Integrated circuit 10.Ctrl + Shift + Esc are keyboard shortcut keys used to. A. Restart the computer B. Ctrl + Shift + Esc C. Open Task Manager. D. Switch keyboard layout. 11.The following type of memory module has 30 pins on the bottom of circuit board. A. SIMM B. DIMM C. SIPP D. DIP 12.South Bridge on Motherboard inter connects the following motherboard components (select all). A. RAM B. ROM C. PCI Buss C C A C A C
  • 4. D. AGP 13.Which of the following is referred to as a web protocol? A. FTP B. HTTP C. IP D. TCP 14.Convert 1011101two to Decimal. A. 64ten B. 80ten C. 88ten D. 93ten 15.A time-sharing operating system is also known as. A. Batch processing OS B. Distributed OS C. Multitasking OS D. Real-OS 16.Which of the following device cannot be shared in Network? A. Printer B. Hard Disk C. CD drive D. Mouse 17. Which one of the following is not a computer language? A. BASIC B. C C. Fast D. FORTRAN 18.The spine of a computer is called. A. RAM B. BIOS C. Motherboard C D C D C B
  • 5. D. CPU 19.Which of the following statements are true about computer virus (select all that apply). A. Viruses have the ability to replicate themselves and infect computers B. Strange graphics are displayed on your computer monitor when viruses are present C. Putting a password on a computer prevents viruses from entering the system D. A Macros is a type of virus commonly found Microsoft programs 20.The following are optical storage Devices Except. A. Flash Disk B. Compact Disk C. Digital versatile disk D. Blue Ray 21. Convert 223ten to Octal Base. A. 330eight B. 230eight C. 230eight D. 337eight 22. Chose the odd man out. A. Firefox B. Internet explore C. Safari D. Google 23. Traffic-control computer is an example of. A. General purpose computer B. Analog Computer C. Special purpose computer D. Hybrid computer 24. Which of these is a free operating system? A. Windows 7 B. Windows XP C. Mac OSX A,B,D A D D A D
  • 6. D. Ubuntu 25. Data processing cycle takes on the following steps. A. Input, processing, storage, output B. Input, storage, processing, output C. Input, output, processing, storage D. Input, processing, output, storage 26. When you see no icons on the desktop, how can you open programs such as Microsoft Word?. A. Right-click to reveal all icons. B. Restart the computer. C. It is not possible to open the program if no icons are on the desktop. D. Click the start button and select program from the menu. 27. Which of the following is an example of an e-mail address? A. Www.google.com B. Jeandoe.gmail.com C. Bob Smith@gmail.com D. Johndoe@cincinnatilibrary.org 28. "Desktop" is a computer term that refers to? A. Something that is for the computer programmer only. B. The part of your work area where the computer monitor sits. C. The initial screen showing icons for folders, applications and files. D. D.The desk that your computer is stationed on. 29. A Program which detects all necessary computer components during boot sequence is. A. Bootstrap B. POST C. Loader D. BIOS 30. Which key on the keyboard is used to capitalize letters? A. Windows B. Ctrl C. Shift A D D C D C
  • 7. D. Tab 31.Which of the following is not a pointing device? A. Keyboard B. Mouse C. Joystick D. Light pen 32.The background of the desktop is called... A. Background B. Screen saver C. Wallpaper D. None of these 33.Which of the following interfaces will you encounter when installing Networks? A. NIC B. AGP C. PCI D. SCSI 34.Speed of the processor is measured in . A. Mbps B. Hertz C. MHz D. Bytes 35.Operations in CPU Like Greater than, Less than, Not, less or Equal happens in A. Memory Unit B. Arithmetic Unit C. Logic Unit D. Control Unit 36.The Second ERA of computers is concerned with Phones A C B B C
  • 8. 37.The type of backup that only copies data that has been changed or created since the. previous back up is called. A. Full backup B. Deferential backup C. Incremental backup D. Total backup 38.A Network of Networks is reffered to as. A. Intranet B. WWW C. Internet D. Extranet 39.Write the word COMPUTER in Full. 40.The Father of all computers is. A. John Von Nueman B. Charles Babbage C. John Barden D. Jack Kilby Common Operating Machine Particularly Used for Technical Education and Research C C B
  • 9. SECTION B: 30 Marks Attempt All Questions Write answers in spaces provided 1a. Study the table below and State whether Volatile or Non Volatile. (05 Marks) Memory Volatile Non-Volatile RAM ✓ CMOS ✓ ROM ✓ Punched Card ✓ Magnetic Tape ✓ 1b. Identify five examples of adapter cards found in a system unit. (05 marks) 2(a).Give Examples of software under the following categories. (06 Marks) i. System Utility Examples ii. Operating System Examples iii. Programming Languages Examples 1.delete utility 2 diagnostic utility 1.linux 2. mac OS 1. FORTRAN 2. BASIC 1) Video cards 2) Multimedia cards 3) I/O cards 4) Communication cards 5) Network cards
  • 10. 2(b) List two advantages of Smartphone over a Laptop. (2Marks) 2(C) List 2 major Components of a computer System. (2Marks) 3(a) Write true or false against each statement from a to e in the table below (05 Marks) NO STATEMET TRUE / FALSE a) Image Viewer Utility Displays Contents of graphics when you double click on it True b) Uninstaller Removes a word document file from False c) Disk defragmenter compiles technical information about hardware or software False d) Disk Scanner detects and corrects problems on the hard disk true e) Antivirus utilities protect the physical access to the computer False 3(b) (a) Give the file extension, of any two of the following file types. (02 marks) File type File extension Executable file Motion pictures Ms Excel (b) Give two examples of file attributes. (02 marks) (c) State one function of a file in a computer system (01 mark) 1. It is a convenient way to keep others informed, 2 it is potable .exe .amv .xls 1. Read only 2. Archive To store organized data 1. software 2. hard ware
  • 11. Section C: 30 marks ➢ Attempt any one question ➢ Use ms word to present your answers but for the case of QN3 you can answer using your ball point and scan the answer sheet or u can use ms-word file Qn1 (a) With the help of pictures describe step by step how to perform a full backup of the computer. Qn1 (b) With the help of pictures describe step by step how to perform backup restore of the computer. Qn2 i. Differentiate between a virus and an anti-virus. ii. Briefly explain six types of viruses. iii. Explain six ways how viruses can be spread. iv. List 5 antivirus software’s you know. Qn3 A. Convert the following numbers to base ten. i) 101112 ii) 101112 iii) 1000002 B. Convert the following numbers to base two. i) 24510 ii) 11210 iii) 10210 2. Convert the following numbers to Decimal base. i) 2348 ii) 1348 iii) 11128 C. Convert the following numbers to Hexadecimal. i) 11111112 ii) 101111112 iii) 11100100002 D. Convert the following numbers to Binary Base.
  • 12. i) A1816 ii) ABD16 iii) 891016 answers qn 2 I. a virus is a malicious software that’s causes unusual effects on a computer while antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer II. The following are some of the types of computer viruses File-infecting Virus A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting. Macro Virus This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments. Browser Hijacker This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser. Web Scripting Virus A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website. Boot Sector Virus These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer. Polymorphic Virus This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.
  • 13. . III The following are some of the ways how computer viruses are spread -Downloads Free Software When you are downloading a free software from internet and if the software or files are infected with a virus then there has a chance that your computer also becomes infected with the virus -Download Suspicious E-mail Attachments If you receive a suspicious email with an attachment file from unknown source, the attachment file may contain virus or malicious script. In that case, if you download and open the attachment file then virus will execute and infect to your computer. -Click on Phishing Emails Sometimes you will receive promotional emails (Phishing Email) in your inbox from unknown source. These mails may include attachments or URL that contain viruses or malicious files. If you click on that URL or opening the email attachment, then your computer will be infected with the virus or malware to access your computer system. -Use External Devices A virus can enter your computer system by inserting external devices such as USB devices, Mobile, external hard disk. For example, when you connected your mobile devices to your computer and if the mobile has a virus then your computer could infect with malware or virus. -Click on Online Advertisements If you click on Ads, then it can infect your computer by virus because the Ads may contain malicious code. Cyber attackers insert malicious codes into ads and place the ads on trusted websites in order to gain reputation. -Click on Malicious File Malicious software is dangerous to your computer. If you click on malicious executable file, then the malware will spread on your computer. The most common form of malicious software is viruses, worms, trojan horses, spyware, adware or rootkits. IV The following are some the computer antivirus software ✓ Kaspersky ✓ Panda
  • 14. ✓ Norton ✓ Bit defender ✓ Bull guard