0% found this document useful (0 votes)
454 views

Sample Questions CSC134 TEST2 JAN23

Uploaded by

imtiyazhamidun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
454 views

Sample Questions CSC134 TEST2 JAN23

Uploaded by

imtiyazhamidun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

CONFIDENTIAL 2 CS/JAN2023/CSC134/TEST2

PART A (20 MARKS)

Answer ALL questions.

1. A multimedia is ________.

A. a newsgroup that requires a user name and password to participate


B. a group of e-mail names and addresses given a single name
C. an application that combines text with graphics, audio and video.
D. a collaborative application that allows users to create, add to, modify, or delete content
via their Web browser.

2. A feature, called _______, allow users of word processing software to type words
continually without pressing the ENTER key at the end of each line.

A. word-wrap
B. autoformat
C. autocorrect
D. clipboard

3. Choose the right match of communication types below.

A. Blogs - Worldwide collection of networks that links millions of businesses, government


agencies, educational institutions, and individuals.
B. Chat Rooms - Real-time typed conversation among two or more people that takes
place on a computer connected to a network.
C. E-mail - Transmits and receives documents over telephone lines.
D. Fax - Transmission of messages and files via a computer network.

4. Which one of the following software can be utilized to create tables, graphs, and financial
schedules?

A. Adobe Photoshop
B. Adobe Premiere
C. Microsoft Power Point
D. Microsoft Excel

5. The following statement are described about browser EXCEPT

A. Opens and transfers files


B. Displays text and images
C. Organize, analyze, and graph numeric data
D. Provides an uncomplicated interface to the Internet and web documents

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 3 CS/JAN2023/CSC134/TEST2

6. An irrelevant or inappropriate message sent on the Internet to a large number of recipients


at once is called ______

A. spam
B. spyware
C. adware
D. cookies

7. A unique address connected to the Internet is called a(n) _______.

A. Client Address
B. DNS Address
C. Internet Protocol (IP)
D. Broadcast Address

8. In the e-mail address of [email protected], which item is the user’s name?

A. academic
B. uitm
C. edu.my
D. All of the above

9. A business/marketing Website contains _______.

A. factual information
B. newsworthy material
C. content that promotes or sells products or services
D. exciting, challenging avenues for teaching and learning

10. An access provider is a business that provide individual and organization access to the
internet for free or for a fee. Access providers are categorized as ________.

A. Internet service provider (ISP)


B. Wireless Internet service provider (WISP)
C. Online service provider (OSP)
D. All of the above

11. A _______ is the transmission media on which the data, instruction, or information travel.

A. sending device
B. receiving device
C. communications channel
D. wire

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 4 CS/JAN2023/CSC134/TEST2

12. In a ________ network, all devices are connected to a device called a hub and
communication through it.

A. bus
B. star
C. ring
D. mesh

13. Which the following statement CORRECT about personal firewall?

A. Remove or block certain items from being displayed


B. Identifies and removes viruses in memory, storage media, and incoming files
C. Detects and deletes spyware, adware, and similar programs
D. Detects and protects a personal computer from unauthorized intrusions

14. Fiber-optic cables have the following advantages over cables that use wire, such as
twisted pair and coaxial cables EXCEPT

A. capability of carrying significantly more signals than wire cables


B. better security for signals during transmission because they are more susceptible to
noise
C. faster data transmission
D. less susceptible to noise (interference) from other devices such as a copy machine

15. The wires in twisted-pair are twisted to .

A. reduce noise
B. amplify the signal
C. avoid signal collision
D. degrade the signal

16. The right to control your own personal information is the right of:

A. access
B. security
C. privacy
D. none of the above

17. Ethics addresses mainly issues of ______________.

A. religion
B. voluntary behavior
C. mental health
D. what is legal

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 5 CS/JAN2023/CSC134/TEST2

18. A person breaking into a computer laboratory and smashing computers is an example of
______.

A. hardware theft
B. hardware vandalism
C. information theft
D. computer piracy

19. Cyber-bullying is defined as follows:

A. Gaining unauthorized access with malicious intent.


B. Illegal assumption of someone's identity for purpose of economic gain.
C. Use of the Internet, cell phones, or other devices to send or post content intended to
harm.
D. Attempts to trick Internet users into thinking a fake but official-looking website are
legitimate.

20. All of the following are common ways computers become infected with malware, EXCEPT

A. opening infected files


B. installing a software package from a CD
C. running an infected program
D. booting the computer with infected removable media

1 11

2 12

3 13

4 14

5 15

6 16

7 17

8 18

9 19

10 20

PART B (20 MARKS)

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 6 CS/JAN2023/CSC134/TEST2

Answer ALL questions in the space that are provided.

QUESTION 1

Application software can be classified into the several major types. Describe any TWO (2)
types of application software by giving its type, purpose and example.
(5 marks)

QUESTION 2

a) Give any THREE (3) reasons people use the internet


(3 marks)

b) Describe the following terms:

i) Cloud Computing

ii) Internet of Things (IoT)

(4 marks)

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 7 CS/JAN2023/CSC134/TEST2

QUESTION 3

a) State any THREE (3) advantages of using networks.


(3 marks)

b) Illustrate and describe the difference between Peer-to-Peer and Client/Server network.

(5 marks)

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 8 CS/JAN2023/CSC134/TEST2

PART C (10 MARKS)

QUESTION 1

Computer addiction occurs when the computer consumes someone’s entire social life.
Discuss any THREE (3) common symptoms of people suffering from computer addiction and
explain how to prevent it.

(10 marks)

END OF QUESTION PAPER

© Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

You might also like