0% found this document useful (0 votes)
35 views48 pages

Cit202 Applications of Computer in Business Nounelearn

The document provides an overview of various types of computers, including mainframes, microcomputers, and supercomputers, along with their functions and applications in business. It also discusses components of computer systems such as hardware, software, input/output devices, and storage media. Additionally, it covers the basics of operating systems, databases, and the importance of software in performing tasks on computers.

Uploaded by

belovedangel918
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views48 pages

Cit202 Applications of Computer in Business Nounelearn

The document provides an overview of various types of computers, including mainframes, microcomputers, and supercomputers, along with their functions and applications in business. It also discusses components of computer systems such as hardware, software, input/output devices, and storage media. Additionally, it covers the basics of operating systems, databases, and the importance of software in performing tasks on computers.

Uploaded by

belovedangel918
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

CIT202 - APPLICATIONS OF COMPUTER IN BUSINESS SUMMARY

There is no one single definition of a computer.


True

A _____ is a fast operating machine that can be used for the home and
business to enhance productivity.
Computer

A _____ is a collection of electronic parts or hardware that has a set of


electronic instructions called software.
Computer

All computers perform the same basic functions they enable you to _____
and manipulate information.
Store

All computers perform the same basic functions they enable you to store
and _____ information.
Manipulate

A few years ago computers were easily classified as mainframe,


minicomputer or_______.
Microcomputer

______ computers were physically large and powerful systems capable of


supporting hundreds of users.
Mainframe

_____ were small humble machines with 8-bit or 16-bit processors, 16Kb to
256Kb of RAM and 5 to 10 Mb of disk storage, used mainly for games and
basic word processing.
Microcomputers

_____ is the term used for the most powerful computer available at any time.
Supercomputer

Page 1
Supercomputers are typically tailored for very fast processing of what are
known as ______ applications.
number crunching

The _____ is the most well known supercomputer named after its designer,
Seymour Cray.
Cray

_______ are the most common type of computers in existence today


Microcomputers

A ______ is a computer with a microprocessor as its central processing unit.


Microcomputer

A______ is a personal computer (PC) in a form intended for regular use at a


single location, as opposed to a mobile laptop or portable computer.
desktop computer

The term _____ refers specifically to a horizontally-oriented case, usually


intended to have the display screen placed on top to save space on the desk
top.
Desktop

A ______ is a handheld computer also known as small or palmtop


computers.
Personal Digital Assistant (PDA)

A Personal Digital Assistant (PDA) is also known as small or______________.


Palmtop computers

WWAN stands for_____________


Wireless Wide-Area Networks

A ______________ is a small and lightweight portable computer, with most of


the features of a standard laptop computer but smaller.
Subnotebook

The term "ultra-mobile PC" (UMPC) is also frequently used to refer to such
machines, although this also refers to a small form-factor tablet PC
platform.

Page 2
Subnotebooks are smaller than laptops but larger than handheld computers
and UMPCs.

A ______________or simply laptop (also notebook computer, notebook and


notepad) is a small mobile computer, typically weighing 3 to 12 pounds (1.4
to 5.4 kg)
laptop computer

Laptops may utilize a touchpad also known as a_____________


Trackpad

The term ______________ was coined at the time when most computers were
cabinet sized like Mainframe Computers.
Mini computer

______________ were much smaller, less powerful, and much less expensive
than Mainframe Computers.
Mini computers

Mini computers were typified by small word sizes such as 8 or 16 bits


whereas larger machines had larger word sizes.

_____________ is a largely obsolete term for a class of multi-user computers


that lies in the middle range of the computing spectrum, in between the
largest multi-user systems (mainframe computers) and the smallest single-
user systems.
Minicomputer

______________ computers are used in large institutions such as government,


banks and large corporations.
Mainframe

_______________ (often colloquially referred to as Big Iron) are computers


used mainly by large organizations for critical applications, typically bulk
data processing such as census, industry and consumer statistics, ERP, and
financial transaction processing.
Mainframes

______________ refers to computers compatible with the computer


architectures established in the 1960s.
Mainframe

Page 3
Large systems that are not based on the System/360 are referred to as
either "servers" or "supercomputers".

The first Web server running anywhere outside Switzerland ran on an IBM
mainframe at Stanford University as early as _____________
1990

____________refers to a computer that is dedicated to the task of storing and


retrieving large amounts of data
Server

_____________ process web pages and web applications.


Web servers

_____________ are computers that are intended to serve one user and may
contain special hardware enhancements not found on a personal computer.
Workstations

_____________ (more commonly known as PDET's) are handheld devices that


are used to record or capture data away from the mainframe computer that
they are linked to.
Portable data entry terminals

Examples of PEDTs include: Barcode readers Gas Meter Optical mark


readers (as in lottery ticket readers) Optical character recognition Scanner
Graphics tablet Magnetic stripe reader

______________ computers are general purpose CPUs that are a part of a


machine or device
Embedded

_____________ computer runs a program that is stored in read only memory


(ROM) and is only intended to operate a specific machine or device
Embedded

A ______________is focused on performing one task involving intense


numerical calculations such as weather forecasting and solving scientific
problems.
Supercomputer

A computer system is made up of both hardware and______________.


Software

Page 4
Software is another term for______________.
computer program

_____________controls the computer and makes it do useful work.


Software

Without software a computer is useless


True

______________ refers to the physical components that make up a computer


system.
Hardware

CPU stands for_____________


Central Processing Unit

______________ is the memory that the computer uses to temporarily store


the information as it is being processed.
Random Access Memory or RAM

The more information being processed the more ______________ the computer
needs.
RAM

One of the first home computers used 64 kilobytes of RAM memory


(Commodore 64).

RAM memory chips come in many different sizes and speeds and can
usually be _____________
Expanded

Memory chips range in size from 1 Mb to 4 Gb.

The physical component or materials on which data are stored are


called________________.
storage media

A ______________ is a piece of hardware that permanently store information.


storage device

Page 5
______________ are used to store information.
Disks

All information on computers are stored in_______________.


Files

The size of a file is measured in______________.


Bytes

A _______________is approximately one character (letter 'a', number '1',


symbol '?'
Byte

A byte is made up of ____________ bits.


8

A bit is simply an on or an off signal which passes through the computers


circuitry.

Every piece of software can be broken down into a series of on or off signals
or its ______________
Binary Code

About a thousand bytes is a kilobyte (Kb).

About a million bytes is a megabyte (Mb).

About a billion bytes is a gigabyte (Gb).

About a trillion bytes is a Terabyte

One Terabyte is a Petabyte

One Petabyte is an Exabyte

Disk are a common way of transporting information such as bringing files


home from work or sharing files.

_______________ have become less useful as file sizes increase and Compact
disks (CDs) and Digital Video Devices (DVDs) are becoming more popular.
Floppy disks

Page 6
Compact disks or CDs can store large amounts of information.

CD-RW which stands for ________________


Compact Disk - Read/Write

DVD disks can store ___________ Gb on standard disk


4.5

_____________ allow you to store large files, such as movies, on a single disk.
DVD recorders

_____________ store the majority of information on today's modern computer.


Hard disks

Floppy disk or diskette comes in two basic sizes; 5.25 inch and 3.5 inch.

Information is stored in an _______________ form much like a cassette or


video tape.
Electromagnetic

The ______________ is the storage device which contains computer files - or


software
Disk

The _____________ is the mechanism that runs the disk.


Drive

_______________ or thumb drives work slightly differently as they use


memory cards to store information on.
USB Flash Drives

Flash drives or thumb drives range from 512 Mb to 8 Gb in capacity.

______________ are the computer hardware that accept data and instructions
from a user.
Input devices

The ______________ and mouse are the most widely used input devices
Keyboard

The keyboard and ______________are the most widely used input devices
Mouse

Page 7
The _______________is used to type information into the computer or input
information.
Keyboard

The standard keyboard has _____________ keys.


101

______________ designed keyboards are designed to make typing easier.


Ergonomically
The ______________ is used as a pointing device and to select options from
menus.
Mouse

A ______________ is used for the same purposes as a mouse and is popular


on laptop computers.
tracker ball

A touch sensitive screen is a method of input based on touching a specially


designed screen in particular places.

_____________ can be used to point at a monitor, serving a similar function


as a mouse.
Light Pen

OCR stands for_______________


Optical Character Recognition

In order to automate processing such payments, a form of input called


____________ was developed.
optical character recognition

The QWERTY keyboard, so called because the keys 'q','w','e','r','t' and 'y' are
adjacent, is the commonest form of keyboard.

MICR stands for_____________


Magnetic Ink Character Recognition

The _____________ is translated to a number which can be used by the


computer to identify the product and look up its price in a database.
Barcode

Page 8
______ are devices which scan an image (document, photograph) and
produce a digital version of the image i.e. the image is stored as a sequence
of binary numbers.
Image Scanners

The term _______ is used to describe the application of this technique and it
is becoming an important application in insurance and banking
organisations.
document image processing (DIP)

_______ return processed data that is information back to the user or allow
the computer to communicate with the user.
Output devices

Most desktop computers use a monitor with a ______


cathode tube

Most notebooks use a ______________monitor.


Liquid Crystal Display (LCD)

The three basic types of printer are; dot matrix, inkjet, and_____________.
Laser

A _____________ is used to translate information transferred through


telephone lines or cable.
Modem

The term modem stands for modulate and demodulate which changes the
signal from digital, which computers use, to analog, which telephones use
and then back again.

Modems are measured by the speed that the information is transferred and
the measuring tool is called the _____________
baud rate

Information is transferred in _____________


Packets

The amount of information that can travel through a line is limited is called
_____________
Bandwidth

Page 9
Scanners allow you to transfer pictures and photographs to your computer.

Most scanners use _______________ software that makes the scanner


accessable by other software applications.
TWAIN

______________ are used to take digital photographs.


Digital cameras

_____________ allow computers to produce sound like music and voice.


Sound Cards

The older sound cards were 8 bit then 16 bit then 32 bit.

______________ allow computers to produce colour (with a colour monitor of


course).
Colour Cards

______ allow computers to display video and animation.


Video Cards

______ allow computers to connect together to communicate with each other


Network cards

_______ connect internal components to the Motherboard


Cables

There are _____types of cable


Two

There are two types of cable:______


serial cable and parallel cable

XML is the acronym for _____


Extensible Marking Language

A computer system is made up of both _____________ and software.


Hardware

There are many terms used for the process of accessing software including
 Running
 Executing

Page 10
 Starting up
 Opening

_____________refers to parts of the computer which do not have a material


form, such as programs, data, protocols
Software

______________ is a general term used to describe a collection of computer


programs, procedures and documentation that perform some tasks on a
computer system.
Software

Computer programs allow users to ______________ tasks


Complete

Examples of software programs or applications would be the Operating


System (DOS, Windows 9x/Millenium/XP, O/S2, UNIX, MacOS 9.x/10.x
and various others), Wordprocessor (typing letters), Spreadsheet (financial
info), Database (inventory control and address book), Graphics program,
Internet Browser, Email and many others.

Practical computer systems divide software systems into three major


classes:
 system software
 programming software
 application software

______________ gives the user the right to use the software in the licensed
environment
Software license

All files are stored in a _______________


Directory

DPI stands for______________


Dots Per Inch

RAID stands for_______________


Redundant Arrays of Inexpensive Disks

Page 11
_______________displays a list of the programs that are installed through
Windows and available to use.
Program or Dock

_______________ displays a list of the last 15 documents used allowing the


user to open them directly from this menu.
Documents

_______________ displays system components, such as printers, control panel


and taskbar.
Settings

______________ has search abilities to find files, folders and phrases in


documents on your computer.
Find/Search

_______________ displays help topics broken up into contents, index and find
components.
Help

______________ allows you to start a program from a command line.


Run

______________ shuts down the computer, restarts the computer or logs you
off a network.
Shut down

_______________ allows users to leave a task running while working on


another
32 bit Preemptive Multitasking

_______________ is used to display event specific or context sensitive menus


(Microsoft)
Right Mouse button

_______________ feature allows files or other information to be dragged from


one area and dropped in a new location or into another application.
Drag and Drop

_______________ make your Desktop behave like a web site (Microsoft).


Active Windows

Page 12
______________ automates updating software through the Internet.
Software Update

_______________ provides information about the computer system


System Information or Profile
_______________ list general topics grouped by subject.
Contents

______________ list specific topics accessed by scroll bars or typing the topic.
Index

______________ creates an index of words in Help and allows searches by


word or phrase
Find

An _______________ is the software component of a computer system that is


responsible for the management and coordination of activities and the
sharing of the resources of the computer.
Operating System

GUI stands for_______________


Graphical User Interface

The Microsoft Windows family of operating systems originated as an add-on


to the older MS-DOS operating system for the IBM PC.

The differentiate types of operating systems commonly available


 Microsoft Windows
 Plan 9
 Mac OS X

An _______________ is a collection of technologies which are designed to allow


the computer to perform certain functions.
operating system

The initial code executing on the computer is loaded from firmware which is
stored in read only memory (ROM) is called the________________.
BIOS or boot ROM

_______________refers to the running of multiple independent computer


programs on the same computer, giving the appearance that it is performing
the tasks at the same time.

Page 13
Multitasking

A ______________ is a specific type of computer software developed to allow


interaction with hardware devices.
device driver

The Functions of Operating Systems


 Providing User Interface
 Managing the Hardware
 Managing the File System
 Supporting Programs
A real-time operating system (RTOS) is a multitasking operating system
intended for applications with fixed deadlines (real-time computing).

An operating system's most basic function is to support the running of


programs by the users.

Application programs or software consists of programs that perform specific


tasks such as writing a letter, tracking payroll information, producing a
chart and so on

Windows comes with WordPad to edit and format documents and NotePad to
edit text.

A ______________ is a collection of information stored in a way that makes it


easy to retrieve, modify and search.
Database

Each person or item in a database has it's own Record. Each piece of
information about that person or record are stored in Fields.

All the information in all the records makes up the ______________


Database

The intersection of spreadsheet row and column is called a ______________


Cell

Spreadsheets use ______________ to create simple to complex mathematical


equations.
formulas

A ______________ can be built to handle the financial needs of businesses.

Page 14
Sheet

The three main bitmapped format graphics used on the Internet are
 .gif
 .jpeg (.jpg)
 .png

MPEG stands for_______________


Moving Picture Experts Group

MIDI stands for ________________


Musical Instruments Digital Interface

_______________ are anything that can be displayed on the screen except the
text and sometimes even text falls into the graphics category if it is saved in
a graphics format.
Computer graphics

A _______________ is computer software designed for the purpose of


managing databases based on a variety of data models.
database management system (DBMS)

DBMS stands for_______________


Database Management System

DBMSs are complex set of software programs that control the organization,
storage, management, and retrieval of data in a database.

Page 15
A database management system (DBMS) is computer software designed for
the purpose of managing databases based on a variety of data models.

A DBMS is a complex set of software programs that controls the


organization, storage, management, and retrieval of data in a database.

Systems development life cycle is a procedure for automating manual


systems and solving problem with computer programs.

SLDC stands for_______________


Systems Development Life Cycle

Typical SDLC phases are the following:


 Planning/Feasibility Definition
 Analysis Design
 Implementation
 Testing

Page 16
 Maintenance
 Evaluation

_______________ is the study of the ongoing environment to identifying


problem solving possibilities.
Planning

____________ is the first step in an SDLC aimed at identifying the business


need of an organization.
Planning

______________ is the study of the problem environment and subsequent


definition and prioritization of the requirements for solving the problem.
Systems analysis

______________ is the evaluation of alternative problem solutions, and the


detailed specification of the final system
Systems design

________________ is the construction or the assembly of the problem solution


culminating in new environment based on the solution.
Systems implementation

_______________ consists of making sure that the system runs in operational


use and continues to do so for as long as is required.
Systems maintenance

A ______is a computer network used for communication among computer


devices close to one person.
personal area network (PAN)

PAN means______
Personal Area Network

A ______ is a network that connects two or more Local Area Networks or


Campus Area Networks together but does not extend beyond the boundaries
of the immediate town/city.
Metropolitan Area Network

A ______is a data communications network that covers a relatively broad


geographic area (i.e. one city to another and one country to another country)

Page 17
and that often uses transmission facilities provided by common carriers,
such as telephone companies.
WAN

Page 18
WAN means______
Wide Area Network

A ______ is a group of interconnected computers.


computer network

PAN stands for________


Personal area network

LAN stands for_____________


Local Area Network

CAN stands for _______________


Campus Area Network

MAN stands for ________________


Metropolitan area network

WAN stands for _______________


Wide area network

An ______________ is a set of interconnected networks, using the Internet


Protocol and uses IP-based tools such as web browsers and ftp tools, that is
under the control of a single administrative entity.
Intranet

An _____________ is a network or internetwork that is limited in scope to a


single organization or entity
Extranet

A network card, network adapter or NIC (network interface card) is a piece of


computer hardware designed to allow computers to communicate over a
computer network.

A repeater is an electronic device that receives a signal and retransmits it at


a higher level or higher power, or onto the other side of an obstruction, so
that the signal can cover longer distances without degradation.

A ______________ connects multiple network segments at the data link layer


(layer 2) of the OSI model.
network bridge

Page 19
_______________ Directly connect local area networks (LANs)
Local bridges

_____________ can be used to create a wide area network (WAN) link between
LANs.
Remote bridges

_______________ can be used to join LANs or connect remote stations to


LANs.
Wireless bridges

A ______ is a device that performs switching.


switch

_____ are networking devices that forward data packets between networks
using headers and forwarding tables to determine the best path to forward
the packets.
Routers

_______ on networks begins with passwords.


Security

Security on networks begins with______.


Passwords

The_____ is the authority that coordinates the assignment of unique


identifiers on the Internet, including domain names, Internet Protocol (IP)
addresses, and protocol port and parameter numbers.
Internet Corporation for Assigned Names and Numbers (ICANN)

______ is a specific internetwork, consisting of a worldwide interconnection


of governmental, academic, public, and private networks based upon the
Advanced Research Project Agency Network (ARPANET) developed by ARPA
of the U.S.
Internet

WWW stands for_______


World Wide Web

The term ______ generally refers to small programs designed to take


advantage of a software flaw that has been discovered, either remote or
local.

Page 20
Exploit

A ________ in a computer system (or cryptosystem or algorithm) is a method


of bypassing normal authentication, securing remote access to a computer,
obtaining access to plaintext
backdoor

A ________ is a program designed by a computer programmer (malicious


hacker) to do a certain unwanted function.
Virus

Subnotebooks were seen as niche computing products and have rarely sold
in large numbers until the 2007 introduction of the Asus Eee PC and the
OLPC XO-1, known as_____
ultra low-cost PC (ULPC or ULCPC)

________are general purpose CPUs that are a part of a machine or device


Embedded computers

______ computer runs a program that is stored in read only memory (ROM)
and is only intended to operate a specific machine or device
Embedded

A state of computer "security" is the conceptual ideal, attained by the use of


the three processes:
1. Prevention
2. Detection
3. Response

A discussion of viruses would not be complete without mentioning______.


hoaxes

EBCDIC is ____-bit code


8

ICANN means____
Internet Corporation for Assigned Names and Numbers

______is a huge set of interlinked documents, images and other resources,


linked by hyperlinks and URLs
World Wide Web

Page 21
VoIP stands for______
Voice over IP

______ is a piece of software, a chunk of data, or sequence of commands that


take advantage of a bug, glitch or vulnerability in order to cause unintended
or unanticipated behaviour to occur on computer software, hardware, or
something electronic
An exploit

_______ is the act of surreptitiously listening to a private conversation.


Eavesdropping

DDoS means______
Distributed denial of service

An _____attack is an attack launched by a third party computer.


Indirect

______ is a method of bypassing normal authentication, securing remote


access to a computer, obtaining access to plaintext, and so on, while
attempting to remain undetected.
Backdoor

A state of computer "security" is the conceptual ideal, attained by the use of


the ______processes Three (Prevention, Detection and Response)

_____ are designed to detect network attacks in progress and assist in post-
attack forensics, while audit trails and logs serve a similar function for
individual systems.
Intrusion Detection Systems (IDS's)

__________ defined by the assessed security requirements of an individual


system and may cover the range from simple upgrade of protections to
notification of legal authorities
Response

A ______ is a program designed by a computer programmer (malicious


hacker) to do a certain unwanted function.
Virus

______ type of virus infects the boot or master section of any disks that it
comes in contact with

Page 22
Boot sector viruses

______ infects other programs when the infected program is run or executed.
Program virus

_____problems can occur when improper office equipment is used.


Musculoskeletal

______can be caused by staring at a fix object for extended periods of time


(like a computer).
Eye strain

_______ is an integral part of the new technological workplace.


Ventilation

______ is the degree of discretion individuals or groups have in planning,


regulating, and controlling their own work. Power is the ability to get others
to do things.
Autonomy

The range of different types of things people do at work is called_____


task variety

____ is the size of the task relative to the overall purpose of the organization.
Installing a single door lock on an automobile assembly line is a task with
minimal scope.
Task scope

Work done using computers, rather than through direct physical contact
with the object of task, is often called _____
computer-mediated work

____is a related issue because computer-mediated work doesn’t involve


direct physical contact with the object of the task.
Abstractness of work

____is an umbrella term that includes all technologies for the manipulation
and communication of information
ICT

Limitations of PC-Internet based ICT are______

Page 23
Bandwidth, Language, Text/Voice Disruptive Software, Participation,
Security

Arpanet means___ ___


Advanced Research Project Agency Network

A ______contains multiple ports


Hub

A ______ is an electronic device that receives a signal and retransmits it at a


higher level or higher power, or onto the other side of an obstruction, so that
the signal can cover longer distances without degradation.
Repeater

A_____ is a piece of computer hardware designed to allow computers to


communicate over a computer network
network card

A network that connects two or more LANs but which is limited to a specific
and contiguous geographical area such as a college campus, industrial
complex, or a military base is referred to as______
Campus area network

______is the study of the ongoing environment to identifying problem solving


possibilities
Planning

The process of removing unwanted part of an image is called _____.


Cropping

______ is the evaluation of alternative problem solutions, and the detailed


specification of the final system.
Systems design

______ is the study of the problem environment and subsequent definition


and prioritization of the requirements for solving the problem.
Systems analysis

A number which is stored and processed but not in the standard


exponential form is called ____ number
Fixed point

Page 24
The storage area used in storing data to compensate for the difference in
speed at which the different units handle data is called ______
Buffer

EBCDIC stands for _____


Extended Binary Coded Decimal Interchange Code

Microprocessors as switching devices are for _____ generation of computers


Fourth

The horizontal bar at the bottom of the screen is called______ bar


Task

A _____ computer is a personal computer (PC) in a form intended for regular


use at a single location, as opposed to a mobile laptop or portable computer
Desktop

_______case is used to covert from upper case to lower case and vice versa.
Toggle

A character that is raised and smaller above the baseline is known as _____
Superscript

If you need to change the typeface of a document in Microsoft office, which


menu will you choose?
Format

A digital computer did not score over an analog computer in terms of _____
Accuracy

In a typical 32-bit computer, ______ number system is usually followed


Binary

Open ____ software are created by generous programmers and released into
the public domain for public use.
Source

_____ are smaller than laptops but larger than handheld computers and
UMPCs.
Subnotebooks

Computer systems divide software systems into ____ major classes.

Page 25
Three

Special effects used to introduce slides in a presentation are called ______


Transitions

The term "____" computer was coined at the time when most computers were
cabinet sized like Mainframe Computers
Mini

Desktop publishing (dtp) uses both word processing and _____ to produce
publications and presentations
Graphics

A _____ is used to translate information transferred through telephone lines


or cable.
Modem

______ bar is at the top of the window and it displays the name of the
application.
Title

The ______ tool is used to select any kind of object on the page.
Pointer

A _____ is made up of 8 bits.


Byte

The ______ tool is used to change the magnification of the page view.
Zoom

A ______ is a collection of information stored in a way that makes it easy to


retrieve, modify and search.
Database

Work done using computers, rather than through direct physical contact
with the object of task, is often called computer-______ work.
Mediated

_______moves the text inward from right and left margins.


Indent

Cut option is present in_______ menu

Page 26
Edit

A _____ is a table consisting of rows and columns.


Worksheet

Computer system and ______ revolution are changing every area of our lives.
Technology

_______ in a job is the degree of discretion individuals or groups have in


planning, regulating, and controlling their own work.
Autonomy

______ tool is used to reduce or cut image area in Microsoft Word.


Crop

The tool used to move the entire page on the screen is called______ tool.
Hand

Microsoft PowerPoint is a _____


Program

Presentation

_______ is the term used for the most powerful computer available at any
time
Supercomputer

An excel workbook is a collection of ______ and charts


Worksheets

______ computers are the most common type of computers in existence


today,
Micro

In Word, the mailing list is known as the_______ source


Data

_______ is graphics solution for Word Processors.


Clipart

A Personal Digital Assistant (PDA) is a handheld computer, also known as


______ computers

Page 27
Small

A mainframe speed is so fast that it is measured in millions of tasks per


______.
Milliseconds

_____ computers are often colloquially referred to as Big Iron


Mainframe

Mainframe computers are often colloquially referred to as ______


Big Iron

_____ are computers that are intended to serve one user and may contain
special hardware enhancements not found on a personal computer.
Workstations

Portable data entry terminals are ____ devices that are used to record or
capture data away from the mainframe computer
Handheld

_____ computers are general purpose CPUs that are a part of a machine or
device
Embedded

The act of retrieving existing data from memory is called _____.


Read-out

A paper printout of a document is known as _____ output


Hardcopy

The computer code for the interchange of information between terminals is


______
ASCII

Embedded systems are typically required to operate continuously without


being ____
Reset

A ______ computer is focused on performing one task involving intense


numerical calculations such as weather forecasting and solving scientific
problems.
Super

Page 28
Data are organized in rows and _______ in a spreadsheet.
Columns

The default page setup orientation for slides in PowerPoint is _______


Landscape

The computer power has been on the increase while ____ has been on the
decline
Size

_____ is another term for computer program


Software

Other hardware parts of the computer system aside the central processing
unit (CPU) are called _____ components or devices.
Peripheral

_____ is the memory that the computer uses to temporarily store the
information as it is being processed.
Random Access Memory

Which of the following is not a type of the interface provided by operating


systems?
Instruction line interface

Which of the following statements is not true about Find and Replace in
Excel?
You can search by rows or columns or sheets

The ____ key toggles between Insert and Typeover.


Insert

Which of the following is a function of the Start Button or Apple menu?


opens documents

The numeric data entered in the worksheet is______ aligned by default.


Right

The Desktop offers many features that make using your computer easier.
Which of the following is not part of the features?
None of the options

Page 29
A bookmark is an item or location in document that you identify as a name
for future reference. Which of the following task is accomplished by using
bookmarks?
To quickly jump to specific location in document

______ programs compress and decompressed files for computer users.


shareware

Which of the following is not a valid data type in Excel?


Character

The most popular form of data compression is called _____.


stuffit

A worksheet range is _____.


A group of cells

Which of the following is not a commercial database program/software?


None of the options

Which of the following system components is NOT displayed by Settings?


none of the options

_____ allows you to start a program from a command line.


Run

______ are used to work with financial information


Spreadsheets

Which of the following is the latest version of MS Word?


Word 2016

Windows _____ displays icon menu of main options


Toolbar

Which of the following is not a word processing software?


None of the options

Which of the following is NOT a commercial spreadsheet?


PageMaker Sheets

Page 30
By default, in Excel 2007, there are______ worksheets in a workbook
3

To insert a chart in Excel worksheet, click on______ tab.


Insert

When working with numbers in a spreadsheet, we refer to the cell addresses


when creating _____.
mathematical formulas

Which of the following is not a commercial graphics program?


None of the options

Which of the following is not one of the main bitmap graphics format used
on the Internet
.tif

To drag a selected range of data to another worksheet in the same


workbook, use the
Ctrl key

Which of the following is not a valid Zoom percentage in Excel?


500

Which of the following is not a method of opening documents and programs


in Windows?
Use the Find command in the Sherlock program

_____ is not a structured format of graphics


.tga

Which of the following graphics can be created and modified in a paint


program?
Bitmap graphics

Portrait and Landscape are types of ______


Page Orientation

Which of the following is not available on the Ruler of MS Word screen?


Center Indent

Which of the following is not a type of page margin?

Page 31
Center

Which of the following method is used to select files non-sequentially?


click on the first file and hold CTRL key while clicking the rest

Which of the following graphics cannot be created and modified in a draw


program?
Bitmapped graphics

______ is multimedia format that is attempting to create a standardization


among the various formats available
.mpg

_______ is not a common desktop publishing programs.


None of the options

_____ are the most common way of interacting or controlling your software
Menus

______ was heavily marketed by Microsoft as a multi-user alternative to its


single user MS-DOS operating system
XENIX

_______ operating system supports only cooperative multitasking


Windows 1.0

______'s underlying operating system kernel was designed by the same team
as Digital Equipment Corporation's VMS.
Windows NT

_______ properly track resources allocated by processes at runtime.


Windows NT

_____ did not have preemptive multitasking


MAC OS

The content of all formula cells in Excel begins with the symbol _____.
=

Which of the following Unix variants is designed to run on multiple types of


hardware?
Solaris

Page 32
______ interoperability was sought by establishing the POSIX standard
Unix

The initial code executing on the computer is usually loaded from _____.
firmware

Which of the following is not a function of operating systems?


None of the options

FAT file systems are commonly found on _____.


All of the options

With cooperative memory management it takes ______ misbehaved


program(s) to crash the system
only one

The initial code executing on the computer is sometimes called ______


BIOS

A typical server program creates some remote objects, makes references to


these objects accessible and waits for ______ to invoke methods on these
objects
Clients

The compiler is a typical ______ program


System

A Microsoft Windows is a (n) ______ system


Operating

Networking refers to the interconnection of computers for the purpose of


information and resource ______
Sharing

The computer's processor, memory, monitor, keyboard, mouse, disk drive,


printer are all examples of_____ devices.
Hardware

The size of a file is measured in _______


Bytes

Page 33
________ is a general term used to describe a collection of computer
programs, procedures and documentation that perform some tasks on a
computer system.
Software

Keyboards, scanners, barcode readers are all examples of input _______


Devices

________ System is the software component of a computer system that is


responsible for the management and coordination of activities and the
sharing of the resources of the computer.
Operating

Interpreter is used as a translator for _______ level languages


High

A collection of related data is known as a_______


Database

_______ refers to the running of multiple independent computer programs on


the same computer, giving the appearance that it is performing the tasks at
the same time.
Multitasking

A device _______ is a specific type of computer software developed to allow


interaction with hardware devices.
Driver

The ______ Access Memory is the sort of memory that the computer uses to
temporarily store the information as it is being processed.
Random

_______ programs or software consists of programs that perform specific


tasks such as writing a letter, tracking payroll information, producing a
chart and so on.
Cutting

_________ is a collection of information stored in a way that makes it easy to


retrieve, modify and search.
Database

Page 34
In a Spreadsheet program, the intersection of a row and a column is called a
_____
Cell

Spreadsheets use _______ to create simple to complex mathematical


equations.
Formulas

_______ graphics are images that are mapped to the tiny dots of the monitor
or screen called pixels.
Bitmapped

________ graphics use objects created from mathematical formulas to


represent things like lines, curves, fills, line thickness, etc., to create the
images.
Vector

______ is the process of requesting from a database attribute information in


various perspectives and combinations of factors from a database.
Querying

An Internet server provider is required to connect a ______ system to the


internet
Computer

Database is generally ______ centred


User

To protect a computer from virus, you should install ______on your


computer
Anti-Virus

The DVD is an example of a _______device


Storage

A _______ is an electronic device that receives a signal and retransmits it at a


higher level or higher power, or onto the other side of an obstruction, so that
the signal can cover longer distances without degradation.
Repeater

A network bridge connects multiple network segments at the _______ layer of


the Open System Interconnected (OSI) model.

Page 35
data link

A ______ is a device that forwards and filters OSI layer 2 datagrams between
ports based on the MAC-Addresses in the packets.
Switch

________ are networking devices that forward data packets between networks
using headers and forwarding tables to determine the best path to forward
the packets.
Routers

The network ________ determines how computers become part of the


network and how they are recognised.
Protocol

The altering of data so that it is not usable unless the changes are undone is
called ______
Encryption

_______ is the act of surreptitiously listening to a private conversation on


computer systems.
Eavesdropping

An _______ is a piece of software, a chunk of data, or sequence of commands


that takes advantage of a bug, glitch or vulnerability in order to cause
unintended or unanticipated behaviour to occur on computer software,
hardware, or something electronic
Exploit

A ______ is a program designed by a computer programmer to do a certain


unwanted function.
Virus

________ computers were physically large and powerful systems capable of


supporting hundreds of users. They are used mainly by large organizations
for critical applications, typically bulk data processing such as census,
industry and consumer statistics, ERP, and financial transaction
processing.
Mainframe

A _______ is a computer with a microprocessor as its central processing unit.


microcomputer

Page 36
The ______, is a board with series of electronic path ways and connections
allowing the CPU to communicate with the other components of the
computer.
Motherboard

Computers are connected to printers by cables using ______ and sockets.


Plugs

There are _______ types of cable which may be used to connect a printer to a
computer.
Two

Operating systems, device drivers, diagnostic tools, servers, windowing


systems, utilities are all examples of______ software.
System

______ instructions are those operations that are performed one after
another.
Sequential

________ instructions are performed such that different sets of instructions


execute depending on the value(s) of some data.
Conditional

________ instructions are performed repetitively and may depend on some


data value.
Iterative

In Windows operating system, you hold down the ______key while deleting a
file to bypass the Recycle Bin and permanently delete files.
Shift

Applications access operating system services through application


programming interfaces (APIs) or system _____
Calls

Normally, planning is the ______ step in the software development life cycle.
First

Microsoft Publisher is a common ______ publishing program.


Desktop

Page 37
Specialized program that allows user to utilize specific application is
classified as ______
Relative programs

System programs include ______


Compiler

Which of the following is not a way of acquiring software?


Buying pre-written software

The interconnection of computers for the purpose of information and


resource sharing is called _______
Telecommunicating

Which of the following is NOT a characteristic of a typical computer?


The ability to use simple logical rules to make decisions

Which of the following is an input device for a typical computer system?


Scanner

Which of the following options is NOT a typical portable data entry terminal?
Barcode readers

The memory that the computer uses to temporarily store the information as
it is being processed is called ______
Random Access Memory

The following are all optical storage devices EXCEPT ______


CD ROM

Which of the following devices is both an input AND output device?


Scanner

Which of the following is NOT an example of a typical operating system?


Windows

Platform software includes all the following options EXCEPT ______


Firmware

Which of the following is NOT a function of operating systems?


Providing the user interface

Page 38
The following options are all word processing programs ______
Microsoft Word

The following options are all examples of commercial database programs


EXCEPT ______
Corel Paradox

The following options are all examples of commercial spreadsheet programs


EXCEPT ______
Lotus 123

Which of the following options would you upgrade if you want to improve the
performance of your PC?
Printer

The following options are examples of common desktop publishing programs


EXCEPT ______
Microsoft Publisher

DBMSs are categorized according to their data structures or types. Which of


the following options is not one of the four most common categories
according to the data model?
Hierarchical

Which of the following is NOT a benefit of the database management system


(DBMS)?
Application-data independence

Features commonly offered by database management systems include all


the following options EXCEPT _____
Backup and replication

Typical phases in the software development life cycle (SDLC) include all the
following EXCEPT ______
Analysis Design

The first step in the software development life cycle (SDLC) is normally
_______
Analysis Design

Page 39
The outcomes of the first step in the software development life cycle (SDLC)
include all the following options EXCEPT ______
Term of Reference (TOR)

The following options are all classifications of computer networks according


to their scale EXCEPT _____
Personal Area Network

The following options are all classifications of computer networks according


to their connection method EXCEPT _____
Wireless LAN

The following options are all classifications of computer networks according


to their functional relationship EXCEPT______
Active networking

The following options are all classifications of computer networks according


to the network topology EXCEPT _____
Active network

There are at least three variants of internetwork, depending on who


administers and who participates in them. Which of the following options is
NOT one of them?
Burnet

Which of the following components provide physical access to a networking


medium and often provides a low-level addressing system via MAC address?
Network Interface Cards

______ can protect messages in transit.


Firewalls

The following are all typical examples of resources that can be shared on a
network EXCEPT ______
Peripheral Devices

Which of the following is NOT a common use for the Internet?


Systems Design

The various types of "attacks" that can be made against computer systems
(threats) can typically be classified into seven categories. Which of the
following options is NOT one of them

Page 40
Hardware failure

A state of computer "security" is the conceptual ideal, attained by the use of


three processes. Which of the following options is NOT one of these
processes?
Prevention

Which network attack prevention system works by shielding access to


internal network services, and block certain kinds of attacks through packet
filtering?
User account access controls

In Windows operating system, which of the following options is NOT a


method for opening documents and programs?
Double click on an icon in a Folder

Which key is typically used to select multiple files in Windows operating


system?
Ctrl

Which of the following options is NOT a typical category of operating


systems?
Real-time operating systems

______is not a named phase in the System Development Life Cycle


Stratification

A virus can be introduced into a computer system, through the infected


_____
File

_______ is the process of requesting attribute information from various


perspectives and combinations of factors.
Querying

______ is the construction or the assembly of the problem solution


culminating in new environment based on the solution.
Systems implementation

______ is the evaluation of alternative problem solutions, and the detailed


specification of the final system.
Systems design

Page 41
______ is an umbrella term that includes all technologies for the
manipulation and communication of information.
Information and Communications Technology

A_____ is a program designed by a computer programmer to do a certain


unwanted function.
virus

To connect computers, each of the computers needs a network card with a


connection that allows a_____ to be connected to it.
Cable

______ are networking devices that forward data packets between networks
using headers and forwarding tables to determine the best path to forward
the packets.
Routers

Switches is a marketing term that encompasses______ and bridges, as well


as devices that may distribute traffic on load or by application content.
Routers

_____ bridges is directly connect local area networks (LANs).


Local

______ bridges can be used to join LANs or connect remote stations to LANs.
Wireless

A network card, network adapter or_____ is a piece of computer hardware


designed to allow computers to communicate over a computer network.
Network Interface Card

An______ is a network or internetwork that is limited in scope to a single


organization or entity but which also has limited connections to the
networks of one or more other usually, but not necessarily, trusted
organizations or entities.
Extranet

An intranet is a set of______ networks, using the Internet Protocol and uses
IP-based tools such as web browsers and ftp tools, that is under the control
of a single administrative entity.

Page 42
Interconnected

______ specifications are in development by several groups, and there is no


common definition.
Global Area Network

A_____ is a data communications network that covers a relatively broad


geographic area geographic area and that often uses transmission facilities
provided by common carriers, such as telephone companies.
Wide Area Nettwork

A______ is a network that connects two or more Local Area Networks or


Campus Area Networks together but does not extend beyond the boundaries
of the immediate town/city.
Metropolitan Area Network

A______ is a network that connects two or more LANs but which is limited to
a specific and contiguous geographical area such as a college campus,
industrial complex, or a military base
Campus Area Network

______ is a network that covers a small geographic area, like a home, office,
or building.
Local Area Network

A______ is a computer network used for communication among computer


devices close to one person.
Personal Area Network

As_____ increasingly is the standard interface for networks, these


distinctions are more important to the network administrator than the user.
Ethernet

The short cut to UNDO an action is______


ctrl Z

______ files are basically sound tracks which use a collection of sounds
contained in the .mid file to play a tune
Musical Instruments Digital Interface

The screen is made up of tiny dots called______


Pixels

Page 43
There are basically_____ types of computer graphics
2

______ is a collection of information stored in a way that makes it easy to


retrieve, modify and search
Database

______ multimedia format that is attempting to create a standardization


among the various formats available.
Moving Picture Experts Group

MPEG means______
Moving Picture Experts Group

______ is a computer software designed for the purpose of managing


database based on variety of data models
Database management system

DBMS means_______
Database Management System

_______ relates to models or meethodologies that people use to develop


systems
Software development life cycle

SDLC Means______
Software Development Life Cycle

Users may also interact with the operating system by typing commands or
using a______
Graphical user interface

Applications access the services offered by operating systems through______


Application programming interfaces

______ windows make your desktop behave like a web site (Microsoft).
Active

______is a multitasking operating system inteded for applications with fixed


deadlines (real-time computing).
Real-Time Operating System

Page 44
RTOS means______
Real-Time Operating System

The_____ computer did not have operating systems.


First

The______ provided many operating systems like features, such as disk


access.
MS-DOS

An_____ is the software component of a computer system that is responsible


for the management and coordination of activities and the sharing of
resources of the computer
Operating System

The term "software" was first used in this sense by John W. Tukey in______
1958

A______ is used to translate information transferred through telephone lines


or cable.
Modem

We have ______ basic type of printer.


3

______ are a common way of transporting information such as bringing files


home from work or sharing files.
Disks

Every piece of software can be broken down into a series of on or off signals
or its______
Binary code

About a million bytes is a_____


Megabyte

The size of a file in a computer is measured in_____


Temporarily

Memory is common to confuse to______ memory with disk storage.


Chip

Page 45
Supercomputer was name after its designer, called______
Seymour Cray

All computers perform the same basic functions; they enable you to store
and manipulate_____
Information

Health and safety are crucial to the effective operation of a_______


Computer

Copying data from one place in memory to another involves use of a


temporary storage area called_____
Clipboard

General purpose programs that do not return data but shared by different
users or applications are termed______
Subroutines

Demonstration versions softwares developed by individuals or small


companies is termed______
Shareware

The term "software" was first used in respect to computing by______


J.W. Tukey

The type of values used in computer languages is_______


Binary

The software language at the lowest level is called______


Machine

When software is stored in hardware that cannot easily be modified, it is


called_______
Firmware

The operating system acts on a machine as_____


Host for application programs

Supercomputers are more suited to______


Intense numerical calculations

Page 46
Embedded computers are found today in devices such as_____
Electric toothbrushes

Embedded computers only run programs stored in_____


ROM

Computers dedicated to the task of storing and retrieving large amounts of


data are called______
Servers

Micro computers have RAM of_____


16Kb to 256Kb

The differences between the microcomputers and minicomputers is the use


of______
Software

DBMS is characterised by______


Attributes

The software language at the lowest level is called_____


Machine

Health and safety are crucial to the effective operation of a_____


Computer

______in a job is the degree of discretion individuals or groups have in


planning, regulating, and controlling their own work.
Autonomy

______ is the ability to get others to do things.


Power

Computer system may increase _____ whenever the individual can control
the use of the tools.
Autonomy

Page 47
Page 48

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy