Multiple Choice Flashcards
A router is categorized as a/an … device
1. Storage
2. Input
3. Communication
4. Output
Communication
Router manages the communication between computer networks by forwarding internet traffic from one network node to another
What is the unit of measurement used for the speed of an internet connection
1. KB
2. Mbps
3. GHz
4. MHz
KB -Kilobyte
Mbps - Megabits
GHz - Gigahertz
MHz - Megahertz
Mbps
Megabits
Units of measurement for network bandwith and throughput. They are used to show how fast a network of internet connection is
A firewall is used to stop ……. from accessing a computer
1. Approved programs
2. Trojans and worms
3. Unauthorised programs
4. Wireless Fidelity [Wi-Fi]
Firewall: Network Security Device
It monitors traffic to or from your network
Unauthorized programs
Any computer programs, applications, tools, or extensions that have been installed onto a device without the necessary liceses or permissions required
OCR may fail to recognise alphabetical characters in a scanned document because….
1. The electronic files are too large
2. A poor quality scanner as used
3. The scanner malfunctioned
4. A Wi-Fi scanner was used
Optical Character Recognition
It is technology that recognizes text within a digital image. It is commonly used to recognize text in scanned documents or images
Poor quality scanner used
What is a concept which refers to technology that can learn and make decisions
1. Augmented reality
2. Internet Protocol
3. Virtual reality
4. Artificial Intelligence
Artificial Intellegence
AI
It is the science of making machines that can think like humans
Which one of the following spreadsheet functions will identify the middle number of an ordered list
1. MEDIAN
2. MID
3. AVERAGE
4. MODE
Median
Measures central tendency, which is the location of the center of a group of numbers in a statistical distribution
A type of internet attack that crashes a website by flooding it with requests
1. Spoofing
2. Denial of service
3. Click-jacking
4. Social engineering
Denial of service
DoS
A type of cyber attack in which a malicious actor aims to render a computer or other device available to its intended users by interrupting the device’s normal functioning
What is a disadvantage of having electronic access to the personal information of people
1. Copyright infringement
2. Limited freedom of expression
3. Encrypted communications
4. Invasion of Privacy
Invasion of Privacy
Risk of confidentiality
Includes, privacy breaches and other legitimate private interest
A system utility that can be used to check the performance of a CPU
1. Task Manager
2. System Restore
3. Disk Management
4. Disk Cleanup
CPU: Central Processing Unit
CPU provides the instructions and processing power the computer needs to do it’s work
Task Manager
Allows the user to view the performance of the system
The process during which your ISP slows down your internet connection is known as ….
1. Data cap
2. Shaping
3. Throttling
4. Bandwidth
ISP: Internet Service Provider
Any company that provides internet access to consumers and businesses
Throttling
Internet Service Providers deliberately restricts your internet bandwith or speed without telling you
Which one of the following processes would you use to protect your data
1. Archiving
2. Compression
3. Error checking
4. Firewall
Archiving
Backing up your data
Plug-and-play technology is used to ….
1. Play games on a gaming console
2. Access the content of a CD
3. Install an operating system
4. Detect and configure new devices
Plug-and-play [PnP]
Detect and configure new devices
A fraudulent process which tries to obtain sensitive information is called …
1. Pharming
2. Spamming
3. Phishing
4. Hoaxing
Phishing
Is an attack that attemps to steal your money or your identity by getting you to reveal personal information
What is used by the operating system to communicate with hardware devices
1. Device Manager
2. Device Driver
3. Audio Manager
4. Disk Defragmenter
Operating system [OS]
Device Driver
Device drivers are program files that enable the OS to recognize the hardware decive and it’s properties
Name a task that is not generally performed during the processing phase of the information processing cycle
1. Send to storage
2. Search and sort
3. Compare and decide
4. Perform calculations
Send to storage
Name a database object that is a user-friendly interface for capturing data
1. Table
2. Query
3. Report
4. Form
Form
Primary interface that most users of a database enter and display data
Typically used for entering new records or data into a table or edit/deleting/display existing records in table.
A user may suffer from ….. when spending a lot of time at the computer.
1. RSI
2. ALU
3. ICT
4. HCI
RSI - Repetitive Strain Injury
ALU - Arithmetic logic unit
ICT - Information and communication technologies
HCI - Human -Computer Interaction
RSI
Repeated use of a body part, such as a shoulder, elbow, forearm,wrist or hand
A ….. could be used to input data instead of using the number keys on a keyboard
- Barcode scanner
- Touch pad
- Joystick
- Game controller
Barcode scanner
Which one of the following is NOT an example of a biometric input device
1. Fingerprint reader
2. Microphone
3. Touch pad
4. Camera
Touch pad
In a word processor, the …. fixes misspelt words without user input
1. Thesaurus
2. Find and Replace
3. Spelling and Grammer
4. AutoCorrect
AutoCorrect
This type of file contains data which is most likely separated by commas
1. csv
2. doc
3. xls
4. ppt
CSV
CSV - comma-separated value
A file where the data is input as data separated by commas
Which one of the following is the fastest option for permanent storage
1. DVD
2. ROM
3. HDD
4. Cache
DVD - Digital Video Disc
ROM - Read-only memory
HDD - Hard Disk Drive
Cache - Commenly refers to a technique used in computer storage for easier data access
HDD
Hard Disk Drive
An internal or external computer component that stores data, such as the operating system, applications and user files
A point of sales [POS] system is typically linked to a…..
1. Spreadsheet
2. Database
3. Text file
4. Jpeg file
Database
Is an organized collection of structured information, or data, typically stored electronically in a computer system
Which ONE of the following options allows for data to become useful information?
1. Backup
2. Processing
3. Communication
4. Storage
Processing
… is an online income tax return service provided by the South African government to its citizens.
1. e-Filing
2. e-Learning
3. e-Portal
4. e-Government
e-Filing / e-Government
A computer connected to the internet that has been compromised by a hacker is known as a …
1. Server
2. Work Station
3. Zombie
4. Firewall
Zombie
Which ONE of the following words would return a result of 4 when used with the LEN function in a spreadsheet?
1. Array
2. Text String
3. Number
4. Link
LEN counts the number of characters in a text string, letters, numbers, special characters, etc.
Link
Which ONE of the following options is NOT a function of the operating system?
1. Manages computer hardware
2. Provides clould storage
3. Provides the user interface
4. Manages the programs
Provides cloud storage
… technology can assist game rangers to monitor and detect poaching activities.
1. Systems
2. Blockchain
3. Assistive
4. Drone
Drone
The … attribute in HTML specifies the distance between the border of a table cell and the text in the cell.
1. Cellpadding
2. Cell Align
3. Cellspacing
4. Cell Width
Cellpadding
The date and time when a photo was taken can be found in the … of the photo.
1. Resolution
2. Metadata
3. Pixels
4. Aspect Ratio
Metadata
… uses special high-speed memory to store data that is frequently used to improve computer performance.
1. Syncing
2. Backup
3. Compression
4. Caching
Caching
Which communication technology enables a person to tap his/her bank card on a device to pay?
1. LTE
2. Wi-Fi
3. NFC
4. Bluetooth
NFC
Near Field Communication
A set of a short-range wireless technologies, typically requiring a distance of 4cm or less to initiate connection