Multiple Choice Flashcards
A router is categorized as a/an … device
1. Storage
2. Input
3. Communication
4. Output
Communication
Router manages the communication between computer networks by forwarding internet traffic from one network node to another
What is the unit of measurement used for the speed of an internet connection
1. KB
2. Mbps
3. GHz
4. MHz
KB -Kilobyte
Mbps - Megabits
GHz - Gigahertz
MHz - Megahertz
Mbps
Megabits
Units of measurement for network bandwith and throughput. They are used to show how fast a network of internet connection is
A firewall is used to stop ……. from accessing a computer
1. Approved programs
2. Trojans and worms
3. Unauthorised programs
4. Wireless Fidelity [Wi-Fi]
Firewall: Network Security Device
It monitors traffic to or from your network
Unauthorized programs
Any computer programs, applications, tools, or extensions that have been installed onto a device without the necessary liceses or permissions required
OCR may fail to recognise alphabetical characters in a scanned document because….
1. The electronic files are too large
2. A poor quality scanner as used
3. The scanner malfunctioned
4. A Wi-Fi scanner was used
Optical Character Recognition
It is technology that recognizes text within a digital image. It is commonly used to recognize text in scanned documents or images
Poor quality scanner used
What is a concept which refers to technology that can learn and make decisions
1. Augmented reality
2. Internet Protocol
3. Virtual reality
4. Artificial Intelligence
Artificial Intellegence
AI
It is the science of making machines that can think like humans
Which one of the following spreadsheet functions will identify the middle number of an ordered list
1. MEDIAN
2. MID
3. AVERAGE
4. MODE
Median
Measures central tendency, which is the location of the center of a group of numbers in a statistical distribution
A type of internet attack that crashes a website by flooding it with requests
1. Spoofing
2. Denial of service
3. Click-jacking
4. Social engineering
Denial of service
DoS
A type of cyber attack in which a malicious actor aims to render a computer or other device available to its intended users by interrupting the device’s normal functioning
What is a disadvantage of having electronic access to the personal information of people
1. Copyright infringement
2. Limited freedom of expression
3. Encrypted communications
4. Invasion of Privacy
Invasion of Privacy
Risk of confidentiality
Includes, privacy breaches and other legitimate private interest
A system utility that can be used to check the performance of a CPU
1. Task Manager
2. System Restore
3. Disk Management
4. Disk Cleanup
CPU: Central Processing Unit
CPU provides the instructions and processing power the computer needs to do it’s work
Task Manager
Allows the user to view the performance of the system
The process during which your ISP slows down your internet connection is known as ….
1. Data cap
2. Shaping
3. Throttling
4. Bandwidth
ISP: Internet Service Provider
Any company that provides internet access to consumers and businesses
Throttling
Internet Service Providers deliberately restricts your internet bandwith or speed without telling you
Which one of the following processes would you use to protect your data
1. Archiving
2. Compression
3. Error checking
4. Firewall
Archiving
Backing up your data
Plug-and-play technology is used to ….
1. Play games on a gaming console
2. Access the content of a CD
3. Install an operating system
4. Detect and configure new devices
Plug-and-play [PnP]
Detect and configure new devices
A fraudulent process which tries to obtain sensitive information is called …
1. Pharming
2. Spamming
3. Phishing
4. Hoaxing
Phishing
Is an attack that attemps to steal your money or your identity by getting you to reveal personal information
What is used by the operating system to communicate with hardware devices
1. Device Manager
2. Device Driver
3. Audio Manager
4. Disk Defragmenter
Operating system [OS]
Device Driver
Device drivers are program files that enable the OS to recognize the hardware decive and it’s properties
Name a task that is not generally performed during the processing phase of the information processing cycle
1. Send to storage
2. Search and sort
3. Compare and decide
4. Perform calculations
Send to storage