Multiple Choice Flashcards

1
Q

A router is categorized as a/an … device
1. Storage
2. Input
3. Communication
4. Output

A

Communication

Router manages the communication between computer networks by forwarding internet traffic from one network node to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the unit of measurement used for the speed of an internet connection
1. KB
2. Mbps
3. GHz
4. MHz

KB -Kilobyte
Mbps - Megabits
GHz - Gigahertz
MHz - Megahertz

A

Mbps

Megabits

Units of measurement for network bandwith and throughput. They are used to show how fast a network of internet connection is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A firewall is used to stop ……. from accessing a computer
1. Approved programs
2. Trojans and worms
3. Unauthorised programs
4. Wireless Fidelity [Wi-Fi]

Firewall: Network Security Device

It monitors traffic to or from your network

A

Unauthorized programs

Any computer programs, applications, tools, or extensions that have been installed onto a device without the necessary liceses or permissions required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OCR may fail to recognise alphabetical characters in a scanned document because….
1. The electronic files are too large
2. A poor quality scanner as used
3. The scanner malfunctioned
4. A Wi-Fi scanner was used

Optical Character Recognition

It is technology that recognizes text within a digital image. It is commonly used to recognize text in scanned documents or images

A

Poor quality scanner used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a concept which refers to technology that can learn and make decisions
1. Augmented reality
2. Internet Protocol
3. Virtual reality
4. Artificial Intelligence

A

Artificial Intellegence

AI

It is the science of making machines that can think like humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which one of the following spreadsheet functions will identify the middle number of an ordered list
1. MEDIAN
2. MID
3. AVERAGE
4. MODE

A

Median

Measures central tendency, which is the location of the center of a group of numbers in a statistical distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of internet attack that crashes a website by flooding it with requests
1. Spoofing
2. Denial of service
3. Click-jacking
4. Social engineering

A

Denial of service

DoS

A type of cyber attack in which a malicious actor aims to render a computer or other device available to its intended users by interrupting the device’s normal functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a disadvantage of having electronic access to the personal information of people
1. Copyright infringement
2. Limited freedom of expression
3. Encrypted communications
4. Invasion of Privacy

A

Invasion of Privacy

Risk of confidentiality

Includes, privacy breaches and other legitimate private interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A system utility that can be used to check the performance of a CPU
1. Task Manager
2. System Restore
3. Disk Management
4. Disk Cleanup

CPU: Central Processing Unit

CPU provides the instructions and processing power the computer needs to do it’s work

A

Task Manager

Allows the user to view the performance of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process during which your ISP slows down your internet connection is known as ….
1. Data cap
2. Shaping
3. Throttling
4. Bandwidth

ISP: Internet Service Provider

Any company that provides internet access to consumers and businesses

A

Throttling

Internet Service Providers deliberately restricts your internet bandwith or speed without telling you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of the following processes would you use to protect your data
1. Archiving
2. Compression
3. Error checking
4. Firewall

A

Archiving

Backing up your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Plug-and-play technology is used to ….
1. Play games on a gaming console
2. Access the content of a CD
3. Install an operating system
4. Detect and configure new devices

Plug-and-play [PnP]

A

Detect and configure new devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A fraudulent process which tries to obtain sensitive information is called …
1. Pharming
2. Spamming
3. Phishing
4. Hoaxing

A

Phishing

Is an attack that attemps to steal your money or your identity by getting you to reveal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is used by the operating system to communicate with hardware devices
1. Device Manager
2. Device Driver
3. Audio Manager
4. Disk Defragmenter

Operating system [OS]

A

Device Driver

Device drivers are program files that enable the OS to recognize the hardware decive and it’s properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name a task that is not generally performed during the processing phase of the information processing cycle
1. Send to storage
2. Search and sort
3. Compare and decide
4. Perform calculations

A

Send to storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name a database object that is a user-friendly interface for capturing data
1. Table
2. Query
3. Report
4. Form

A

Form

Primary interface that most users of a database enter and display data

Typically used for entering new records or data into a table or edit/deleting/display existing records in table.

17
Q

A user may suffer from ….. when spending a lot of time at the computer.
1. RSI
2. ALU
3. ICT
4. HCI

RSI - Repetitive Strain Injury
ALU - Arithmetic logic unit
ICT - Information and communication technologies
HCI - Human -Computer Interaction

A

RSI

Repeated use of a body part, such as a shoulder, elbow, forearm,wrist or hand

18
Q

A ….. could be used to input data instead of using the number keys on a keyboard

  1. Barcode scanner
  2. Touch pad
  3. Joystick
  4. Game controller
A

Barcode scanner

19
Q

Which one of the following is NOT an example of a biometric input device
1. Fingerprint reader
2. Microphone
3. Touch pad
4. Camera

A

Touch pad

20
Q

In a word processor, the …. fixes misspelt words without user input
1. Thesaurus
2. Find and Replace
3. Spelling and Grammer
4. AutoCorrect

A

AutoCorrect

21
Q

This type of file contains data which is most likely separated by commas
1. csv
2. doc
3. xls
4. ppt

A

CSV

CSV - comma-separated value

A file where the data is input as data separated by commas

22
Q

Which one of the following is the fastest option for permanent storage
1. DVD
2. ROM
3. HDD
4. Cache

DVD - Digital Video Disc
ROM - Read-only memory
HDD - Hard Disk Drive
Cache - Commenly refers to a technique used in computer storage for easier data access

A

HDD

Hard Disk Drive

An internal or external computer component that stores data, such as the operating system, applications and user files

23
Q

A point of sales [POS] system is typically linked to a…..
1. Spreadsheet
2. Database
3. Text file
4. Jpeg file

A

Database

Is an organized collection of structured information, or data, typically stored electronically in a computer system

24
Q

Which ONE of the following options allows for data to become useful information?
1. Backup
2. Processing
3. Communication
4. Storage

A

Processing

25
Q

… is an online income tax return service provided by the South African government to its citizens.
1. e-Filing
2. e-Learning
3. e-Portal
4. e-Government

A

e-Filing / e-Government

26
Q

A computer connected to the internet that has been compromised by a hacker is known as a …
1. Server
2. Work Station
3. Zombie
4. Firewall

A

Zombie

27
Q

Which ONE of the following words would return a result of 4 when used with the LEN function in a spreadsheet?
1. Array
2. Text String
3. Number
4. Link

LEN counts the number of characters in a text string, letters, numbers, special characters, etc.

A

Link

28
Q

Which ONE of the following options is NOT a function of the operating system?
1. Manages computer hardware
2. Provides clould storage
3. Provides the user interface
4. Manages the programs

A

Provides cloud storage

29
Q

… technology can assist game rangers to monitor and detect poaching activities.
1. Systems
2. Blockchain
3. Assistive
4. Drone

A

Drone

30
Q

The … attribute in HTML specifies the distance between the border of a table cell and the text in the cell.
1. Cellpadding
2. Cell Align
3. Cellspacing
4. Cell Width

A

Cellpadding

31
Q

The date and time when a photo was taken can be found in the … of the photo.
1. Resolution
2. Metadata
3. Pixels
4. Aspect Ratio

A

Metadata

32
Q

… uses special high-speed memory to store data that is frequently used to improve computer performance.
1. Syncing
2. Backup
3. Compression
4. Caching

A

Caching

33
Q

Which communication technology enables a person to tap his/her bank card on a device to pay?
1. LTE
2. Wi-Fi
3. NFC
4. Bluetooth

A

NFC

Near Field Communication

A set of a short-range wireless technologies, typically requiring a distance of 4cm or less to initiate connection