Your browser does not support JavaScript!

Introduction to Computing

Showing 1-75 of 144 answers

___ Layer formats the data to be presented to application layer. It can be viewed as the translator for the network
  • Presentation Correct
____ Layer is concerned with the transmission and reception of the unstructured raw bit stream over the physical medium
  • Physica Correct
_____ Layer allows session establishment between processes running on different stations
  • Session Correct
_____ Layer ensures that message are delivered error-free in sequence and with no losses or duplications.
  • Transport Correct
_____ Million of Windows 8 licenses have been sold through January 2013, a number which includes both upgrades and sales to OEM for new PCs.
  • 60 Correct
______ Layer controls the operations of the subnet, deciding which physical path the data takes.
  • Network Correct
________ is a collection of many separate networks
  • None of the above
  • A LAN
  • A WAN
  • AN Internet Correct
A ___ mobile operating s is a software that allows smartphones, tablet PCs and other devices to run applications and programs
  • mobile operating system Correct
A college student in Finland,______, developed a version of UNIX as an operating system for personal computer. He called it Linux
  • Linus Torvalds Correct
A maintenance utility included in Microsoft Windows that is used to free up disk spaces on the computer hard drive.
  • Disk Cleanup Correct
A series of rules that your databases table structure must pass in order to be considered a good relational design.
  • Normalization Correct
A special type of software that is used to hide malware, bots and worms. This software should be installed in the target computer
  • Rootkits Correct
A Type of Network that is being utilized nowadays by individuals for their homes and apartments. This network allows all users to connect and share resources.
  • Home Network Correct
A Type of Wireless Area Network that works within a very small area – your immediate surroundings.
  • Local Area Network
  • Personal Area Network Correct
A type of wireless transmission that uses electromagnetic waves to transmit data through air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per second.
  • Radio Frequency Correct
ANSI stands for ______
  • American National Standards Institute Correct
Aspect Ratio is the distance between each pixel
  • False Correct
Blu-ray Disc is the next generation optical disc that can hold high-definition video due to its high capacity
  • True Correct
Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that no errors exist before loading the operating system.
  • False Correct
Build the first computer that does simultaneous solving of equations
  • 1911 Correct
Co-Processor is a special set of circuits in a micro-processor chip that is designed to manipulate numbers or perform some other specialized function more quickly than the basic microprocessor circuits.
  • True Correct
Computer Security is very important to learn because it enables the people to carry out their jobs, education and research, it supports critical business process and lastly it protects personal and sensitive information
  • True Correct
Computing has 4 steps, they are:
  • input, process, output, store Correct
Control Unit performs two operations (arithmetic and logical)
  • False Correct
Convert this (2BCD)16 value to decimal Select the correct answer -
  • (11413)10
  • (21213)10
  • (11211)10
  • (11213)10 Correct
Copywright is a legal right credited by law of a country that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time.
  • False Correct
Designs the Punch Card System
  • 1890 Correct
Desktop Computer is a personal computer which can be moved easily and used in a variety of locations.
  • True Correct
English Mathematician and Father of Computing
  • 1800 Correct
Expansion Slots is a mechanical components that provides mechanical and electrical connections between a microprocessor and a printed circuit board (PCB).
  • False Correct
Fedora is a____ based operating system developed and supported by the Fedora Project as a partnership with Red Hat and volunteer contributors.
  • Linux Correct
Firewall is the process of converting a data or information into another form also known as cipher text.
  • False Correct
Grace Hopper develops the first computer language
  • 1953 Correct
Graphical User Interface ( GUI) has made computers easier to use because:
  • they used icons instead of commands Correct
Hardware are the equipment used to process the data and create useful information.
  • True Correct
Honey Pot is a software application that scans your whole computer’s hard drives and folders for possible malware or virus infections.
  • False Correct
How do you explain the CPU (Central Processing Unit) inside a computer?
  • The brain of the computer Correct
How many layers are there in the OSI reference model?
  • 4
  • 6
  • 5
  • 7 Correct
IEEE stands for _____
  • Institute of Electrical and Electronics Engineer Correct
In terms of the size of the network the correct order (ascending) is -
  • LAN, MAN, WAN, PAN
  • PAN, MAN, LAN, WAN
  • PAN, LAN, MAN, WAN Correct
  • LAN, PAN, MAN, WAN
Information is the result of processing a raw data.
  • True Correct
Information System is an integrated set of components for collecting, storing, and processing data and for delivering information, knowledge and digital products.
  • True Correct
Information Technology involves the development, maintenance and use of computer systems, software and networks for the processing and distribution of data.
  • True Correct
Is a meta-network and constantly changing collection of thousands of individual networks intercommunicating with a common protocol?
  • Architecture Correct
is an open source Debian-based Linux distribution sponsored by Canonical Ltd.
  • Ubuntu Correct
It is a category of Application Software that allows the user to create and manage information, usually for individual projects within a department, in contrast to enterprise management.
  • Information Worker Software Correct
It is a category of Application Software that are originally offered for general productivity and information retrieval including email, calendar, contacts, stock market and weather information
  • Mobile Applications Correct
It is a category of Application Software that generates print and electronic media for other to consume, most often in a commercial or educational settings.
  • Media Development Software Correct
It is a category of Application Software that is related to content access software but has the content and/or features adapted for use in by educators or students.
  • Educational Software Correct
It is a category of Application Software that is used in developing hardware and software products.
  • Product Engineering Software Correct
It is a category of Application Software that is used primarily to access a content without editing but may include software that allows for content editing.
  • Content Access Software Correct
It is a category of Application Software that provide common capabilities needed to support enterprise software systems.
  • Enterprise Infrastructure Software Correct
It is a category of Application Software that run applications for amusement, leisure, or as a diversion.
  • Entertainment Software Correct
It is a category of Application Software that simulates physical or abstract system for research, training or entertainment purposes
  • Simulation Software Correct
It is a collection of individual data items that are stored in a highly structured way that represetnts a model of reality
  • Database Correct
It is a combination of hardware and software, which enables information sharing between computer devices.
  • network Correct
It is a distributed communication framework of network process among service requestors, clients and service providers
  • Client-Server Model Correct
It is a model that provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This model is maintained by the IETF.
  • TCP/IP Model Correct
It is a network created when two or more PCs are connected and share resources without going through a separate server computer.
  • Peer-to-Peer Model Correct
It is a server that is used by IP Networks to dynamically distribute network configuration parameters like IP address for interface and services.
  • DHCP Server Correct
It is a server that translates the public IP Address into Domain Names
  • DNS Server Correct
It is a simple toggling property in the column of the table in MySQL or SQL that make the field required.
  • Not Null Correct
It is a software application installed in your computer that is spying in your data, meaning this software gets information from your computer without you knowing it and sends it to the attacker or the hacker.
  • Spyware Correct
It is a software application that brings potential harm to your computer because it disrupt your computer operation by installing Trojan, viruses, worms, spyware, adware and other software that does malicious intent.
  • Malware Correct
It is a special type of application that prevents its user to access the computer system without paying its creator or subscribing/buying to its creator’s product or services.
  • Ransomware Correct
It is a type of software that operates and controls a particular type of device that is attached to a computer.
  • Device Drivers Correct
It is a virus that replicates itself to infect the whole computer and typically used by attacker to make a DoS or Denial of Service attack
  • Worms Correct
It is an additional type of Database that is useful in any database design because they help support the business rules that you established while gathering the requirements for the system.
  • Lookup Table Correct
It is the data type used by Oracle Databases.
  • CLOB Data Type Correct
It is the fast-growing area of crime because more and more criminals are exploiting the speed, convenience and anonymity of the internet to commit a diverse range of criminal activities.
  • Cyber Crime Correct
It is the first DRAM chip of the Intel Company
  • 1970 Correct
It is the main program running on a computer. It manages the memory and processes of the computer, and all of its software and hardware
  • Operating System Correct
It is the main program running on a computer. It manages the memory and processes of the computer, and all of its software and hardware.
  • Operating System Correct
It is the metal and plastic box which contains the computer's main components including the motherboard, central processing unit ( CPU), and power supply
  • Computer Case Correct
It is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event
  • Back-up Correct
All courses