question and answers for utdbe

50
Table of Content Types of software .......................................................................................................................................... 8 System software ............................................................................................................................................. 9 Fill in the blank test Items ................................................................................................................. 19 True or False Test Items ........................................................................................................................... 29 1

Upload: wisdon-nani

Post on 10-Apr-2015

60 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Question and Answers for Utdbe

Table of ContentTypes of sof tware ................................................................................................................................................8System sof tware ...................................................................................................................................................9Fil l in the blank test I tems ..........................................................................................................................19True or False Test I tems .................................................................................................................................29

1

Page 2: Question and Answers for Utdbe

COMPUTER

DEFINITION: Computer is an electronic machine used for processing data, store and produce an output to the user

DATA: Data is the raw information that is fed into the computer.

Data comes in three forms: letters (like a, b, c.. .) numerals (such as 1,2,3.. .) and special characters (e.g. $, @,/ . .)

INPUT: Input is the process of feeding data into the computer.

OUTPUT: is the processed data that is communicated to the user. The output is also

CATEGORIES OF COMPUTER

There are four major categories of computer:

1. Microcomputers : These are computer systems that have the microprocessor in one

case. They are further subdivided into palmtop, notebook, laptop and desktop

computers.

2. Minicomputers : These are more powerful than the microcomputers and can

support a number of users performing different tasks. Most powerful mini-

computers are called super mini-computers

3. Mainframe : They are large systems that can handle hundreds of users. They

store large amounts of data and process transactions at high rate. Mainframes require

several rooms to store.

4. Super-computers : They are the most powerful category of computers and also

the most expensive. They are used for such applications as weather forecasting,

engineering designs and testing, space exploration and other tasks, which require long

and complex calculations.

TYPES OF COMPUTER

We have three different kinds of computers:

i) Analog computers;

ii) Digital computers and

2

Page 3: Question and Answers for Utdbe

iii) Hybrid computers

Analog computers

These are devices that measure one form of physical quantities or another like

temperature, pressure, speed and so on. Examples of analog computers are

thermometer, barometer, speedometer and hygrometer

Digital computers :

These are devices that are used for counting. Examples include adding machine, billing machine, electronic wrist-watch and calculator

Hybrid computers

These devices combine the functions of measuring physical quantities as well

as counting. Electronic computers like desktop computers and notebooks are examples

of hybrid computers

PARTS OF A COMPUTER

There are four major parts of a computer:

1. Monitor;

2. System Unit (which contains the CPU, hard disks & others)

3. Disk drive (provides slot for diskettes)

3. Keyboard

PERIPHERALS

These are those external devices that must be attached to the System unit for them to work.

Examples of Peripherals:

i) mouse;ii) light pen;iii) printer;iv) plotter;

3

Page 4: Question and Answers for Utdbe

v) modem (modulator-demodulator);vi) UPS (Uninterruptible power supply);vii) scanner;viii) telephone;ix) data projectors;x) Microphone among several others.

Some peripherals, not a major part, are becoming indispensable features of a modern PC (Personal Computer). Examples are the mouse, scanner and printer

HARDWARE

This is the physical component of the computer which we can see and touch.

Hardware is made up of four types of devices or units. These include: input devices, processing devices, output devices and storage devices.

INPUT DEVICES

Input devices are those devices that are used for feeding in data into the computer.

Enlisted below are various input devices:

a) keyboardb) mouse;c) scannerd) light pen;e) joystick (for playing computer games);f) voice input;g) touch screens;h) trackball;

PROCESSING DEVICES

These are units that process data from one form to another. The CPU (central processing unit) which is generally regarded as the 'heart ' or the 'brain' of the computer is a major processing device. Another example is the Modem (modulator-Demodulator) which is processes data for communication purpose. The modem enables the computer to dial a telephone or access the INTERNET (more on this later on the course) by dial-up method

4

Page 5: Question and Answers for Utdbe

OUTPUT DEVICES

They are devices that computer uses to produce output (information) or the unit that is used to communicate with the user. They may include:

a) monitor;b) printer;c) data projectors;d) plotters;e) computer output microfilm;f) voice output (such as we find in Robot technology)

STORAGE DEVICES

Storage is the fourth and final operation in the information processing cycle (earlier mentioned). As the name implies, storage devices are those devices used for storing data and programs for later use. We have primary storage (main memory inside the system unit) and the secondary storage devices. The latter is sometimes called

Auxillary storage.

In the section that follows, we are going to look at some of them in detail:

MONITOR

Monitor is the part of the computer that looks like television set. It is variously called as CRT (Cathode Ray tube), VDU (Visual display unit), Screen or just Display .

The output that is displayed on the computer cannot be touched, as it were, and is called soft copy output.

Pixel : also called 'picture element’ are the individual dots that make up the text or graphic and can be illuminated. The greater the number of pixels, the better the screen resolution.

Resolution : This is the clarity of a monitor and is determined by the number of pixels that can be illuminated.

TYPES OF MONITORS

We have two major kinds of monitors: monochrome monitors and colour monitors.

Monochrome Monitors : They are computer terminals that display a single colour such as amber, green or white on a black background; or black characters against white background

Colour Monitors

5

Page 6: Question and Answers for Utdbe

They are more expensive than the monochrome monitors and are more desirable

because colour enables users to more easily read and understand the information on

the screen.

Several Graphic standards have been developed and they include:

CGA: (Colour Graphics Adapter);

EGA (Enhanced Graphics Adapter)

VGA (Video Graphics Array)

SVGA (Super Video Graphics Array)

Each standard provides for a different number of pixels and colours and offer even higher resolution screens.

With the development of mobile computing in the form of truly portable computers

that could be conveniently carried by hand or in a briefcase, came a need for an

output display that was equally portable. Today, we have what we call the Flat panel

Monitors that are actually LCD (stands for Liquid Crystal Display) and plasma

screens.There are also the TFT (stands for thin-film transistors) monitors that makes

use of LED (Light emitting diodes).

Printers

Printers are very important peripheral in that they produce hard copy output

that the user can carry about unlike the soft copy output from monitors.

How are Printers Classified?

6

Page 7: Question and Answers for Utdbe

Printers can be classified by how they transfer characters from the printer to the

paper. This is either by impact or non-impact

Impact printers

These transfer the image onto the paper by some type of printing mechanism striking

the paper, ribbon, and character together.

Examples of impact printers include:

a) dot-matrix printer

b) daisy wheel printer

c) chain printer

d) band printer

Non-Impact printers

There are also a variety of non-impact printers. These include ink-jet printer, thermal

printer and page printers like the laser jet printer.

Choosing a Printer

Besides understanding the features and capabilities of the various types of printers

that are available, one must consider other factors before choosing a printer. Such

factors include how much output will be produced, the speed as well as the quality of

the text and graphics. Laser-jet is very desirable for printing heavily text documents

while ink-jet printer is the best bet for graphics intensive documents.

Terms associated with Printers

DQ Draft quality

NLQ Near Letter quality

LQ Letter quality

CPS Characters per second

PPM Papers per minute

BRIEF HISTORY OF COMPUTERS

7

Page 8: Question and Answers for Utdbe

Computing has a long history and started with man’s search for the best method of easy counting and manipulation of items and number of materials and other resources. The Chinese and the Ancient Babylonians made use of the Abacus . During the renaissance period however, notable scientists like Blasé Pascal, James-Marie Jacquard, and Charles Babbage devised better counting devices. We had the punched cards by Jacquard, Herman Hollerith’s tabulating machine that eased the 1890 American census and became the older cousin of the IBM computers. The first electronic computer was the ENIAC and was developed by IBM in the year 1946. They were very large and produced large amount of heat because of the use of vacuum tubes. They were the first generation computers. The development of transistors gave birth to the second-generation computers, which were not as large and produced less heat.

In 1969, Ted Hoff invented IC (Integrated circuit) and together with Gordon Moore developed the 8008 microprocessor in INTEL. Microcomputers were born. In 1975, average person could now purchase personal computers. In 1980, IBM gave Bill Gates of Microsoft Corporation, a contract to come out with an operating system. His MS-DOS and later several releases of ‘Windows’ have changed the face of computing world-over.

INTERNET is the information superhighway that started as ARPANET in late 60s but became popular in the mid 1990s. With the advent of INTERNET came e-commerce, e-mail, virtual research, and teleconferencing. Suffice it to say that the INTERNET is perhaps the greatest gift of computing to man and has changed the way that he views his world.

What is a program?

Program is a set of instructions that are fed into a computer to carry out a task.

The computer is lifeless and you can really not do any thing without programs. We can type our

letters with the computer because of a program that makes the computer to allow us to do so. The

program could be a simple one like instructing the computer to add two numbers together or could be a

complex one like forecasting what the weather would be like in Calabar tomorrow.

SOFTWARE

Software is the collection of programs in the computer, which we can see at times but cannot touch.

Types of software

There are three major types of software, namely:

8

Page 9: Question and Answers for Utdbe

a) System software;

b) Application software and

c) Utility software

System software

These are programs that control the operations of any computer. Some of these

operations include starting up the computer (booting), loading, executing (that is

carrying out instructions).

System software includes operating system and language translators or what we call

compilers.

Some operating systems include:

a) MS-DOS [Microsoft Disk Operating System]

b) WFWG (Windows [3.11] For Work Groups)

c) Windows 95 or 98

d) Windows 2000 Professional

e) Windows ME (Millennium Edition)

f) Windows XP (Windows Experience)

Application software:

These are programs that are designed to carry out specific tasks for us. Application

software is sometimes referred to as packages. Again, there are different types of

application software namely:

a) Word-processing : This software enables us to type letters, memos and

documents. E.g. MSWord, WordPerfect, Lotus AmiPro, WordStar, Write,

MultiWrite, Windows WordPad and so on.

b) Spreadsheet: We use spreadsheets to manage tables, prepare

financial reports or calculate scores for an examination report sheet in the

school. E.g. MS Excel, FoxPro, LOTUS 1-2-3

c) Computer Graphic software: This makes it possible for the user to manipulate

charts, pictures and several beautiful designs with the computer. E.g. COREL

DRAW 10, ADOBE PhotoShop, ADOBE Illustrator, PRINTMASTER Gold

Deluxe and so on.

9

Page 10: Question and Answers for Utdbe

d) Database: This software allows the user to enter data such as the names of

students in a school with their ages and classes and enables the user to retrieve

such information at a later date.

UTILITY SOFTWARE

This software takes care of the management and the security of the files inside the

computer. We have Anti-virus packages like Dr Solomon Virus Scan, McAfee, NDD,

Norton Utilities. There are also utility software that clears up the hard disks of

nonsense files when the disk is nearly full.

Central Processing Unit

This is the main control unit of the computer. It can be said to be the brain of the

computer or the heart and so on.

Parts of the CPU

The CPU consists of the control unit and the ALU (which stands for Arithmetic/Logic

unit). These two work together using the program (instructions fed in by the

programmer, you remember) and the data that are stored in the main memory to

perform. Therefore the parts of the CPU include

a) control unit;

b) ALU and

c) Main memory

Main MemoryThe main memory stores three items. These include:

a) the operating system e.g. Windows 95/98 or windows XP that directs and

monitors the activities of the computer equipment;

b) the application software that will direct the work that is to be done by the user

whether it to type a letter or design a card;

c) the data, which is currently being processed by the application software

What is Byte?

What is Memory address?

10

Page 11: Question and Answers for Utdbe

In the main memory, each location is called a byte. Just as a house on a street has a

unique address that shows the location on the street, each byte in the main memory of

a computer has an address that indicates its location in memory.

The number that shows the location of a byte in memory is called a memory

address

Bit: is short form of binary digit. The computer basically understands only two things 1 and 0. This

in Mathematics is called number base two or binary scale.

Nibble : 4 bits make up a nibble

Byte : 8 bits make up a byte or

2 nibbles make a byte

1024 bytes equal 1 kilobyte (KB) (However, this is often abbreviated to 1000 bytes,

so we say that 1kB is equal to 1000 bytes instead of 1024 bytes)

The size of main memory is normally measured in kilobytes. When memory exceeds

1000kB (1 million bytes), it is referred to in megabytes (MB).

1000MB (that is one billion bytes) then it is called Gigabyte.

Types of memory

1. RAM – This stands for Random Access Memory. This is volatile in that

whenever there is a power outage, everything stored in the memory is wiped

off. This is where the computer stores the program that it loads during booting

(later on this course) and also the place that the computer temporarily stores the

data that is being fed in, before you save the work. Saving is the act of

transferring the work that you are doing to the hard disk where you can retrieve

at a later time.

2. ROM: This stands for read-only memory. This is made up of all the

instructions that were stored in by the makers of the computer. These

instructions enable the system (computer is also called system) to start up or

boot, for example. ROM cannot be altered (changed) or modified like the RAM.

3. PROM: This stands for programmable read-only memory. Here, you can be

allowed to program what you want the computer to do but once this is done,

11

Page 12: Question and Answers for Utdbe

you cannot again change anything. Note that it is only in the PROM that this

programming can be allowed not the ROM.

4. EPROM: This stands for Erasable Programmable read-only memory

5. EEPROM: This stands for Electronically Erasable Programmable read-only

memory

What is booting?

This is the initial start-up procedure of the computer. When you put on the computer,

it tests itself and loads the operating system into the main memory of the computer.

When it is doing this, the computer is not ready for use yet and is said to be booting.

Cold Booting

This occurs when the computer is switched on with the plugs correctly wedged into

the socket in the mains. As a general rule, you put on the CPU first before the

monitor. When you finish with the computer, i .e. at shutdown, you put off the monitor

first before the CPU.

Warm Booting

Warm booting means to reset the computer. In this case, one does not have to put off

the computer before switching it on again. To warm boot, three keys on the keyboard

have to be pressed together. These keys are Control (Ctrl) key, Alternate (Alt) key

and the Delete key (Del)..

It is suggested that using your left hands (for a right handed person) press

CTRL and ALT keys together, while at the same time you use the right hand to hit the

DEL key. When you do this, you are warm booting the computer.

AUXILIARY STORAGE DEVICESThese are devices that store data or the output from the computer for later use.

Generally, we have the rigid and the removable auxiliary storage devices

Types of Auxiliary Storage devices

1. Magnetic disk storage ;2. Magnetic tape ;

12

Page 13: Question and Answers for Utdbe

3. Optical disks ; e.g. CD-ROM (Compact disk-read-only memory) ,CD-i(Compact disk-interactive), CD-R (Compact disk- recordable) , CD-RW (Compact disk-rewritable)

4. solid-state devices ;5. Mass storage devices and6. Special-purpose storage devices , e.g. smart cards and optical cards

Of these types of storage devices, we will discuss only the magnetic disk storage. It is the most widely

used storage medium for all types of computers.

Diskettes

The removable type is called the diskette. Since they are thin and flexible, they are

sometimes called floppy disks or simply, floppies. They are convenient, reliable and

inexpensive.

There are two sizes of diskettes: 3½” floppy disk and 5¼” floppy.

13

Page 14: Question and Answers for Utdbe

Care of diskettes

1. They should be prevented from direct sunlight;

2. Heavy objects should not be placed on top of diskettes;

3. Do not expose diskettes to hot places or high temperatures;

4. Avoid touching the magnetic medium with bare hands;

5. Do not press the diskettes with your biro pen or pencil when writing on the

label. That explains why felt pens are recommended.

6. Avoid bringing diskettes close to magnets or magnetic materials;

7. They should not be brought near dust, smoke or water

Hard Disks

This type of magnetic disk storage is rigid and is fixed inside the system unit. Hard

disk is completely sealed and therefore is less prone to damage. Example is

Winchester® disk, Western Digital ® disk, Maxtor ® disk and Seagate ® disk.

The hard disk itself consists of round metal platters on which the data are stored and the read-

write head, which is used to access the data that is sought.

The storage capacity of hard disks is measured in megabytes and more recently

gigabytes (that is millions and billions of characters) of storage. This is just like you

have 60-leave or 80-leave notebooks that will store more notes than the 40-leave

notebooks.

We also have removable hard disks especially in some notebook computers and

these are used to ensure higher security of the stored data. There are also hard cards.

The hard card is a circuit board that has a hard disk built onto it . They provide an

easy way to expand the storage capacity of a personal computer

Protecting data stored on a disk14

Page 15: Question and Answers for Utdbe

Regardless of whether you are using floppy disk or hard disks, you must have to

protect the data that you store on the disk from being lost. The disk storage is re-

usable since the stored data may be overwritten and replaced by new ones. This is

clearly a desirable feature because we are afforded the privilege of replacing or

removing unwanted files. However, it also poses the problem and possibility of

accidentally removing or replacing the file that we wanted to keep. Therefore, to

protect programs and data stored on disks, we may:

a) Write-protect the diskette: This is done by using the write-protect notch that

is located at the lower side of the diskette. So, to prevent writing to a

diskette, you will have to move a plastic cover to open the window. If the

write-protect notch is closed however it means that the drive can write or

copy something on the diskette. Once again, if the window is open, the drive

will not write on the diskette or floppy disk.

b) Back-up storage: Another good way to protect our programs or data stored

on disks is by creating back-up storage. This simply means creating a copy

of important programs and data on one diskette to another diskette. The

diskette is equally a convenient medium that is used to back up the data

stored on a hard disk of a personal computer. Today, we now have

recordable and rewritable compact disks that can store the entire contents of

a hard disk as back-up storage. This is made possible by the use of CD-

Writers.

COMPUTER VIRUS

A computer virus is a computer code or program that is capable of replicating

itself and transferring itself from one computer system to another. Usually, virus can

do such things as change programs or destroy data. They may even at times format the

entire hard disk or blow up a monitor or disable a printer.

When the host program (that is the program with the virus) is shared, the virus

is spread. As the host program is copied to friends through diskettes, the INTERNET,

bulletin boards and other usual channels, the virus is also copied along. It infects the

software with which it comes in contact.

15

Page 16: Question and Answers for Utdbe

They are not detected immediately. Some of them are like time bombs waiting

for particular date to do their havoc. People who copy the host software are unaware

that the virus exist because it is coded in such a way as to hide from computer users

for weeks or even months. There are over 9000 viruses known and continue to

increase by day and with the advent of the INTERNET even by the minute. Major

kinds of computer virus include Boot sector viruses (that prevent the computer from

booting properly), anti-CMOS viruses and Trojan horses.

Examples of computer virus

December 13 Polyboot A eek80 virus

Black Jesus WM.opey97

HowlenCroween B Klein

Jerusalem virus Holy Moses

To neutralize the codes of the viruses, we use the antiviruses such as Dr Solomon

AntiVirus kit, Norton AntiVirus, McAfee Virus Scan among others. Antiviruses have

to be regularly updated if they are to be effective.

HOW TO AVOID COMPUTER VIRUS

These are some techniques to at least minimize viruses and their damaging effects:

The computer should be warm booted when switching suspicious programs or

applications.

Write-protect your diskettes when they are to be inserted into suspicious

computer systems

Always use Antivirus to scan any suspicious diskettes before opening any file

inside them.

16

Page 17: Question and Answers for Utdbe

In using the INTERNET and bulletin board service, open e-mail accounts with

servers that provide antivirus software that will scan all incoming mails.

Do not open or download any e-mail attachments from unknown sources until

they are scanned.

Even when these tips are followed, they cannot be total guarantee that your system or diskette could be

virus-free when you engage in swapping (that is copying software). There fore the best method is to

perhaps avoid swapping. Use only registered and licensed software and avoid tolerating diskettes from

unknown sources from being inserted into your system.

NETWORK

When two or more computers are connected together, they are said to form a

network.

For computers to ‘see’ each other on a network, they have to follow the same set of

rules, commands or configurations called protocol

Examples of protocols:

a) FTP File transfer protocol

b) TCP/IP Transfer control

protocol/Internet or Intranet protocol

c) NetBEUI British standard

protocol

d) WAP Wireless Applications

protocol

17

Page 18: Question and Answers for Utdbe

e) HTTP hyper text transfer

protocol.

Types of Network

There are two major kinds of network based on the geographical distribution of the

computers:

a) Local Area Network (LAN) and

b) Wide Area Network (WAN)

Local Area Network : This is when the computers are connected together within the

same area such as building or campus

Wide Area Network : In this type of network, computers connected together are in

wide geographical area like different cities or even countries. The INTERNET is a

good example of WAN.

What is Server?

What is Client?

Networking is very advantageous for file sharing as well as resource sharing.

When computers are networked, you wouldn’t have to buy separate printers for each

of them. All you have to do is buy a single printer for all of them to share. Note that

they have to have the same protocol, which is the set of rules and regulations

governing the exchange of information between computers in a network.

Now, a server is the network control unit that is dedicated to handling the

communicating needs of the other computers in a network. These other computers are

referred to as clients .

Whatever is to be shared among the computers in such a network, say, a printer has to

be connected to the server. Using LAN, all the computers and the server can use the

printer.

In a network, communication channels are very essential. Wires and cables are

used, although wireless systems such as light beams, radio waves or carrier-connect

18

Page 19: Question and Answers for Utdbe

radio are now prevalent. VSAT (very small aperture terminals) has largely improved

the efficiency of Wide Area networks in both Intranet and INTERNET access.

NETWORK TOPOLOGY

Network topology describes the configuration or physical layout of the equipment

(such as computers and peripherals) in a communications network.

Types

a) star network

b) bus network

c) ring network

Gateway : is a combination of both hardware and software that allow users on one

network to access the resources on a different type of network.

Bridge : is a combination of hardware and software that is used to connect similar

networks.

Nodes : Devices connected to a network, such as terminals, printers or other

computers are referred to as nodes.

Hub : This is a device that connects all the workstations or client computers in a

network to the server.

We have 9- port, 16-port hubs and so on.

Fill in the blank test Items

1. The acronym PC stands for…………………………………………………………….2. To perform “warm boot” the keys……….+………+…………are pressed3. In MS Word the icon is used for………………………………………………….4. The computer keyboard is similar to………………………………………………5. The program that is automatically loaded when the computer is switched on is

the……6. To find an alternate word in MS Word document, you use

the…………………………….7. To type a capital letter on the keyboard, one can use the caps lock key or

the…………

19

Page 20: Question and Answers for Utdbe

8. The unauthorized duplication and or use of computer software are known as………….

9. Computer security is a method of protecting data, programs and ……………………….

10. What is the meaning of the abbreviation BIOS……………………………………………..

11. The circuit board which normally contains the CPU, RAM is called the……………….

12. What is the meaning of the abbreviation POST... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

13. A connecting socket on the outside of the system unit is called a……………………….

14. Parallel ports are mostly used to connect…………………….....to the system unit15. Another name for microcomputer

is………………………………………………………….16. The keys Ctrl+Alt+Del are used to perform

……………………………………………….17. In MS Word the iconis used for …………………………………………………….18. The numeric pads on the computer keyboard is similar to the

……………………………19. Computers are classified by purpose, by size/capacity and

by……………………………20. The largest and most powerful computer is the

…………………………………………….21. The raw materials for producing information is

called……………………………………22. The physical components of the computer is called

……………………………………….23. The three types of computers are analog

…………………..and……………………………24. Which computer unit performs arithmetic and logical

operation……………………….25. In MS Word the icon is used for

……………………………………………………...26. What is the computer speed measurement unit

called………………………………………27. What device or devices in a computer is volatile?

………………………………………….28. The three standard peripherals of a computer system aremonitor, keyboard

and……..29. A pointer used to identify where the data will next be

entered…………………………..30. What do the acronym GUI stands

for?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

20

Page 21: Question and Answers for Utdbe

31. What is the short form of Binary Digit?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

32. A byte is the equivalent of ………………………bits33. A method of moving text in a document is copy and

……………………………………..34. The backspace key will delete characters on the ……………….of the blinking

cursor.35. Common pointing device found on personal computers is

the……………………………36. An example of portable computer is

the…………………………………………………….37. Another name for a document saved on the computer is a

……………………………….38. The first magnetic medium for storage is called

magnetic………………………………..39. If you turn off the computer you will not lose the information in the

………………….40. The program that operate your computer is called

the……………………………………..41. If 1 byte = 8bits, what is half a byte………………………………….bits42. To move a text in a document, you first ………and then paste where you want it

to be.43. Two examples of portable computer are the laptop computer and

the……………………44. A folder on the computer contains programs

or……………………………………………...45. If you turn off the computer, you will lose the information stored in

the…………………46. The operating system operates the

……………………………………………………………..47. The acronym EBCDIC stands

for……………………………………………………………….48. The largest value that can be contained in a byte

is………………………………………….49. The best way to re-organise your PowerPoint slide is to use

the…………………………...50. The non-volatile devices in the PC are collectively

called………………………………….51. List two windows Operating Systems that can be used on

PC………………………………52. When the computer first starts it checks

the………………………………………………….53. The speed of the processor is measured

in…………………………………………………….

21

Page 22: Question and Answers for Utdbe

54. The expansion slot is located on the …………………………………………………………..

55. The component that distributes power inside the computer is called………………………

56. The acronym ASCII stands for………………………………………………………………….

57. The decimal equivalent of 11111111 base 2 is………………………………………base 10

58. The port used to connect the printer is called…………………………………………………

59. An example of non-volatile devices on the PC is…………………………………………….

60. An example of Window Operating system used on PC is……………………………………

61. The short form for Graphical User Interface is……………………………………………….

62. When the compute first starts, one of the hardware checked by POST is the…………….

63. The Memory slot is located on the …………………………………………………………….

64. Inside the computer, power is distributed by the……………………………………………..

65. When the computer is first put on the……………………….…….is automatically loaded

66. ……………………..will allow you to find alternative word to use in MS Word document

67. In MS Word misspelled word is underlined with a …………………………………………..

68. Computer piracy is illegal copying of………………………………………………………….

69. A method of protecting data, programs and computer system asset is called……………..

70. The BIOS manages peripherals such as………………………………………………………..

71. The main circuit board is called………………………………………………………………..

72. What is the meaning of the abbreviation FDD………………………………………………..

73. A connecting socket on the outside of the system unit is called a …………………………

74. Com port are mostly used to connect……………………………………..to the system unit

75. The icon at the bottom left corner of the desktop is called………………………………….

22

Page 23: Question and Answers for Utdbe

76. Clicking the mouse very quickly but three times is called…………………………………..

77. A method of protecting any computer system assets including data is called…………….

78. The PC market is divided broadly into two, the IBM compatible and the…………………

79. The medium version of mainframe computer is the ………………………………………….

80. The meaning of the acronym EPROM is……………………………………………………….

81. The security of the computer asset and capital equipment is called………………………..

82. The box that houses the PC hardware and other components is called the………………..

83. Cables connect input and output components to……………………………………………..

84. USB stands for……………………………………………………………………………………

85. Peripherals are hardware components that connects to the ………………………………..

86. The screen pointer found on the computer is controlled by the …………………………..

87. The most common output device on a desktop computer is the……………………………

88. To obtain multiple copies of a document it is appropriate to use………………………….

89. A communication channel is the path through which data is……………………………….

90. Which device receives and converts signal back into usable information…………………

91. The opening page of a web site is called the………………………………………………….

92. Two examples of graphic are……………………………………………………………………

93. Sounds are captured using a microphone or a…………………………………………………

94. Educational technology is the application of technology in teaching and…………………

95. The acronym LCD stands for……………………………………………………………………

96. A typical communication channel is the……………………………………………………….

97. When the computer first starts it checks the…………………………………………………..

23

Page 24: Question and Answers for Utdbe

98. Computers are classified by purpose as general purpose and……………………………….

99. There are two types of PC found on the market, the Apple Mac and………………………

100. The abbreviation PDA stands for……………………………………………………………

101. Computers that solve problem by counting precisely are called………………………..

102. The illegal copying or use of programs is called…………………………………………

103. An unsolicited or unwanted e-mails is known as…………………………………………

104. Secret code that allows you assess to a computer system or program is………………

105. The MS office software used for students assessment is called…………………………

106. Software that helps users to perform their routine task is called……………………….

107. Another name for the main printed circuit board is the………………………………….

108. Software used to view web pages are called……………………………………………….

109. The abbreviation WYSIWYG stands for……………………………………………………

110. The ASCII code is used to represent ………………………………..on the computer

111. To transfer a photograph to your computer you will need a …………………………….

112. Bill Gate is the brain behind the software company called………………………………

113. Beside the keyboard the most common input device is the ……………………………..

114. The latest window operating system used on PC is the…………………………………..

115. The acronym CLI stands for…………………………………………………………………

116. Another name for the monitor is the………………………………………………………..

117. The speed of modern PC like Pentium IV are measured in………………………………

118. An example of a browser is………………………………………………………………….

119. The abbreviation PROM stands for…………………………………………………………

120. The microphone can be classified as an……………………………………….device24

Page 25: Question and Answers for Utdbe

121. Cordless mouse are…………………………….expensive than other mouse122. An example of a page printer is

the…………………………………………………………123. To obtain multiple copies from one print you need

an……………………………………124. Computer monitors are of two main types CRT monitor

and…………………………….125. The communication channel used by microwave for transmission

is…………………..126. Connection to the internet using telephone lines is

called………………………………127. An example of network device is a

……………………………………………………….128. A printer-like device that only prints lines and graphs are

called……………………..129. The major keyboard standard for the PC world is

the……………………………………130. The general name given to the mouse trackball, joystick etc. is

the……………………131. OMR stands

for……………………………………………………………………………….132. A device that converts analog signal to digital signal and vice versa is

called……….133. Converting from analog to digital is

called………………………………………………..134. The most common communication medium is

the…………………………………………135. Half-duplex transmission send data in both

direction…………………………………….136. A metropolitan area network is a network that

covers……………………………………137. An interface software used to explore the internet is

called…………………………….138. The use of computers to integrate and present information using a combination

of media element is called...………………………………………………………………………..

139. Name any two examples of graphics………………………………………………………..

140. Hardware may be defined as the………………………….part of a computer141. The instruction that controls the operations of a computer is

called…………………..142. The process writing or coding programs is termed

………………………………………143. The software that controls the hardware is called

the……………………………………25

Page 26: Question and Answers for Utdbe

144. The two user interfaces are the GUI and…………………………………………………..

145. Software used for solving real world problems are called……………………………….

146. Word processing software create, edit, format and……………………………………….

147. Adding more RAM have big effect on system…………………………………………….

148. Operating system that permit concurrent users are called……………………………….

149. The smallest unit of measurement on the computer is called the ………………………

150. The two main input devices on the PC world are the…………………and……………..

151. An example of a pointing device used on the computer is………………………………

152. OCR is the abbreviation for…………………………………………………………………

153. Converting from digital to analog is called……………………………………………….

154. The fastest communication medium is……………………………………………………..

155. Full-duplex transmission send data in both directions…………………………………..

156. Simulations is the application of ………………………………………….…in education

157. The software used to browse the internet is called a……………………………………..

158. The technique used in scoring WAEC multiple choice questions is called…………….

159. The cursor is also called the insertion……………………………………………………...

160. Data validation ensures that the input data is free from………………………………….

161. Hardcopy is also known as…………………………………………………………………..

162. The abbreviation HTTP stands for………………………………………………………….

163. Modems inside the computer and therefore not visible are called………………………

164. Data transmission can be characterized as simplex…………………..and………………

165. When you enter a formula in Excel you star with an…………………………….sign

26

Page 27: Question and Answers for Utdbe

166. In multimedia, the movement of text, graphic and images is called……………………

167. The abbreviation CBT stands for……………………………………………………………

168. A scanner can convert printed image into………………………………………………….

169. A terminal consist of a keyboard and………………………………………………………

170. The typing on the computer is done though a device known as the……………………

171. Examples of toggle keys on the keyboard are caps lock key and………………………

172. The acronym UPC stands for……………………………………………………………….

173. A point of sale terminal uses barcode reader to identify products……………………

174. Telephone lines are used for voice transmission hence require……………signal175. Simplex transmission send data in one

direction………………………………………..176. Any device or computer to a network is referred to

as…………………………………177. Using more than one type of media element in a single presentation is

called………178. Objects in multimedia applications are selected

by……………………………………..179. A computerized information center that provides specific information to users

is called... . . .………………………………………………………………………………………….

180. An application program which interprets HTML is called a…………………………

181. On the internet………………………help you to find sites related to a particular topic

182. ……………………………………………..…converts drawings, photos to digital signal

183. Terminal are also called……………………………………………………………………...

184. A …………………………..has no ability to process or store data185. …………………………is data that has been processed into useful form186. The most used means of output are

the……………………….and……………………….187. An……………………………strikes papers and ribbon together to form a

character188. The web site address for CNN

is……………………………………………………………

27

Page 28: Question and Answers for Utdbe

189. HTML stands for……………………………………………………………………………..

190. MS windows includes a browser called…………………………………………………..

191. A digitizer converts drawings, photos into as………………………………………signal

192. A dump terminal has no ability to process or store………………………………………

193. Information is data that has been……………………………into useful form194. Dot matrix printers are example

of…………………………………………………………195. Printers are classified as character, line and………………………………..printers196. …………………………….convers data into a form that the computer can

understand197. Keyboards that help avoid repetitive stress injury are

called……………………………198. A handheld device used at the point of sale terminal is

the……………………………..199. The most vital output device connected to the computer system is

the………………..200. A typical communication channel is

the……………………………………………………201. An example of a communication device that sends and receives data is

the…………..202. Computer-based training is a tool for teaching and

……………………………………...203. A digital version of the regular books is

called…………………………………………..204. A computer-based training that uses web technology is

called…………………………205. A standard for compression and decompression is

called……………………………….206. The most vital storage medium for multimedia is

the……………………………………207. The most common barriers to technology integration is training

and………………….208. To integrate technology in the classroom, you need a personal computer

and……….209. To have access to the web in the classroom, you need access to

the…………………..210. The abbreviation FTP stands

for……………………………………………………………211. Drill and practice software is an example

of……………………………………………..

28

Page 29: Question and Answers for Utdbe

212. Computerized tool for teaching and learning is called………………………………….

213. Electronic book is the …………………version of the regular books214. MPEG is a standard for compression

and………………………………………………….215. The use of PC and LCD projectors allows the user to integrate technology into

the…216. To enter text and characters into the computer you will need a device

called………..217. The wheel located between the two buttons of the mouse is used

for………………….218. Two main input devices found on modern laptop are keyboard

and…………………….219. The input device always used with speech recognition software is

the………………..220. A set of program that manage the data transmission is called…………….

…..software221. A transmitter takes information and converts it to………………….…for

transmission222. A browser is a piece of software used to

read…………………………………………….223. A ring network links all nodes together in

a……………………………………………..224. The movement of text, graphic and images is

called…………………………………….225. The act of responding to questions posed by multimedia system is

called……………

True or False Test Items

Indicate T (TRUE) and F (FALSE) for each of the following statements1. Application software is the same as system

software…………………………………….2. Computer is made from

wood………………………………………………………………..29

Page 30: Question and Answers for Utdbe

3. Present day computers are mechanical in nature………………………………………….

4. The computer cannot store information on human beings………………………………..

5. Computers can do a restricted number of basic operations………………………………

6. The soldier can use computer to hit an enemy target with precision……………………

7. Information to one person may be data to another person……………………………….

8. One common layout of the keyboard is QWERTY………………………………………..

9. Viruses show us how vulnerable our systems are…………………………………………

10. If you perform regular backups, you will hopefully reduce the possibility of recovery..………………………………………………………………………………………

11. Information from one computer cannot become data to another computer…………….

12. “Random Access” memory means the computer can get data in any way……………..

13. Application software is part of the system software loaded on the PC………………..

14. The analog computer solves problems by counting precisely…………………………..

15. The mainframe computer is larger than minicomputer…………………………………..

16. MS Word is an example of application software………………………………………….

17. The icon is used for comparing two documents……………………………………….

18. Unauthorized access is the use of computer without permission……………………….

19. Hardware theft is stealing computer hardware……………………………………………

20. Good passwords are those that are obvious or easy to guess……………………………

21. The fastest computer ever design to meet the computing needs is the mainframe……

22. The amount of space necessary to store one character is one bit……………………….

23. The memory is permanent and storage is temporary……………………………………..

24. The clipboard allows you to copy text……………………………………………………..

30

Page 31: Question and Answers for Utdbe

25. The icon is used for centering text…………………………………………………

26. The most commonly used auxiliary storage is the magnetic tape……………………….

27. In data representation eight bit is equivalent to one bite………………………………...

28. The safest choice for a password is dictionary word……………………………………..

29. Medical practitioners cannot computer to support patient in intensive care…………..

30. The difference between the computer keyboard and the typewriter is the arrow key…

31. Data and information can be used interchangeably……………………………………….

32. Both RAM and ROM found on the computer are volatile………………………………..

33. The icon is used for typing the characters ABC……………………………………….

34. In real terms one megabyte is exactly equal to 1000 bytes………………………………

35. The computer is faster and more intelligent than the human being…………………….

36. The anti-virus program can be made to run when the system is. booted……………….

37. Another name for temporary memory is ROM……………………………………………

38. The latest type of storage is the punch card………………………………………………

39. Computers are used to store data and information……………………………………….

40. The supercomputer is faster than the other computers…………………………………..

41. The punch card storage was used for many years………………………………………..

42. Computers cannot perform decision-making operation………………………………….

43. The content of the ROM is lost when the power is off………………………………….

44. Both hard drive and the floppy drive are made of metallic platters………………….

45. One common example of optical disk is the pen drive…………………………………

46. 8 bit will represent exactly 100 characters, symbols and special characters………..

31

Page 32: Question and Answers for Utdbe

47. One name commonly used for coding is Unicode………………………………………

48. The port used commonly only to connect the printer is the serial port……………..

49. In PowerPoint presentation it’s possible to hide a slide………………………………

50. Slides on PowerPoint presentation cannot be copied………………………………….

51. Timing can be added to PowerPoint presentation………………………………………

52. The computer can perform decision-making operation………………………………..

53. The content of the RAM is lost when the power is off………………………………..

54. 8 bit will represent exactly 120 characters, symbols and special characters……….

55. An example of coding scheme is the Unicode………………………………………….

56. To re-organise your PowerPoint slides you will need a slide sorter…………………

57. In PowerPoint it is not possible to hide a slide………………………………………..

58. Slides in PowerPoint can be copied……………………………………………………..

59. Timing cannot be added to PowerPoint presentation………………………………….

60. Computers can do unlimited number of basic operation………………………………

61. It is possible to use computers to hit an enemy target with precision……………….

62. To avoid viruses one should treat all disks as though they are not infected………….

63. The QWERTY keyboard does not contain numeric keypads…………………………….

64. All viruses are cleaned by any anti-virus software ever produced……………………..

65. A bit is the same as a bite……………………………………………………………………

66. “Erasable Read only” memory means the computer can write data only………………

67. Floppy disks access information much slower than hard disks………………………….

68. Disks access time is faster for floppy disk than the hard disk…………………………..

32

Page 33: Question and Answers for Utdbe

69. The fan is responsible for the noise when the PC runs…………………………………..

70. The microprocessor cannot become hot due to processing………………………………

71. Graphics-coprocessor is required for graphical packages……………………………….

72. There are two types of keyboard called QWERTY and DVOKA……………………….

73. Anti-virus software varies in terms of performance……………………………………..

74. A typical clock speed is 1.0GHz……………………………………………………………

75. A character is represented by 1bites……………………………………………………….

76. EBCDIC is used in data representation and not ASCII………………………………….

77. Hard disks access information much faster than floppydisks…………………………..

78. Disk access time depends on the type of storage device…………………………………

79. Curriculum enables pupils to adopt a positive attitude to learning…………………….

80. One barrier to technology integration is the availability of infrastructure……………

81. The speed of modern printers is measured in pages per minutes (ppm)………………..

82. A thermal printer can print on any ordinary paper………………………………………..

83. To integrate technology into teaching there is no need to plan…………………………

84. Voice synthesis ensures that computers communicate with human verbally…………..

85. One example of innovation through educational technology is projections……………

86. A laser printer require toner to print……………………………………………………….

87. Light penis not an example of an input device…………………………………………….

88. Digital camera has no memory………………………………………………………………

89. The normal computer monitors are all touch screen………………………………………

90. A school network is a local area network………………………………………………..

33

Page 34: Question and Answers for Utdbe

91. No specifically designed input devices cater for the handicapped…………………….

92. One disadvantage of a school network is that, i t is expensive…………………………

93. Microphone cannot also serve as an input device………………………………………..

94. Cordless mouse are less expensive than other mouse……………………………………

95. The laser printer is a character printer…………………………………………………….

96. Telecommunication technologies are heavily used on the internet…………………….

97. Non-impact printers can print multiple copies……………………………………………

98. Two main types of software are system software and operating system………………

99. Viruses cannot be passed to another computer through a network…………………….

100. Taking a back-up is not a security control measure……………………………….

101. Spreadsheet is composed of 100 rows and 100 columns ……………….102. The application software is a coordinator of all hardware

components………………………….103. It is possible to minimize all programs widows when using Msoffice

………………………………………..104. Anti – virus m prevent people from developing viruses…………………105. Software are the non – physical component of the computer…………..106. Msword cannot create new letter – style column………………………107. Msword cannot create chart……………108. Computers cannot perform decision – making operations……………..109. The content of the ROM is lost when the power is put off……………110. Both the hardware and floppy drive have the same capacity………….111. One common example of optical dick is CDROM………………………112. 8 bits is equivalent to 1 byte…………………………113. The QWERTY keyboard is the most common today………………………114. A computer virus is not program…………………………………………115. When the computer is first put on, Msword is the first to loaded. …..116. The BIOS mdoes not manage the keyboard…………………………………117. Msoffice package include only Ms word and MsExel……………….118. Decision – making operation cannot be performed by the computers….119. When the power is off the content of the ROM is lost……………………120. The capacity of the harddrive and the floppy drive are not the same…121. An example optical dick is FDD……………………………………122. The computer can perform arithmetic operation only……………………123. When the power is off the content of the floppy disk is lost………….

34

Page 35: Question and Answers for Utdbe

124. The capacity of a normal floppy drive is 144byte………………………..125. The ESS key on the keyboard is located at the top left corner………….126. CDROM is an example of magnetic disk…………………………………..127. 1000bits is equivalent to 1kolobyte………………………………………..128. A computer virus is design intentionally to cause annoyance or

damage... . . .…………………………………129. The BIOS does manage the keyboard ……………………………….130. Ms windows package include only internet browser ……………………131. Output drives converts data into a form that the computer can

understand .. . . . . . . .……………………..132. Any type of keyboard can help aid repetitive stress injury……………. 133. A mouse controls the movement of the cursor or pointer on a

monitor…………………………..134. One advantage of a school network is that it’s expensive……………….135. Point –of scale terminal is a stand-alone computer at the counter……..136. The monitor is the most fundamental output device………………………137. The fastest communication channel is the shielded twisted…………….138. There is no difference whatsoever between the router and the

switch………………… 139. Cybercitizen is a negative impact of the internet…………………140. Simulation is not an application of multimedia in education……………..141. Text, graphic and images that have the illusion of motion is known as

animation..……………………………….142. The pointing device used for computer games is known as

joystick………………………………143. Excel updates results automatically if the data in reference cells has

changed formula and a reference to another cell………………………….144. Excel spreadsheet does not allow characters to be entered in a

cell…………………………145. The function key on the computer perform the same

function…………………………….146. Text is used in multimedia to convey information ………………….147. An example of electronic book is Microsoft Encarta………………..148. Flash memory are volatile RAM………………………………….149. The open – source software is a variation of free wire150. Off – the – shelf software is another name for in – horse software151. The fan s designed to blow – up when too much power is supplied to it152. Parallel ports are used to connect more and keyboard 153. Magnetic disk is used for direct access to data154. 32bits is equivalent to 4 bytes of information155. Both EBCDIC and ASCII are 8bit code each 156. One gigabyte is exactly 1billion bytes157. Every personal computer has a hard disk 158. Metropolitan Area Network is a network that covers a city\town159. The pointing device used for computer games is known as light pen

35

Page 36: Question and Answers for Utdbe

160. The use of computer to integrate and present information using a combination of media element is called multimetion…………………………..

161. Excel spreadsheet allow only characters to be entered in acell…………………………

162. The genetic naming for the keys used in moving the cursor around the screen is called cursor movement/ arrow keys…………………………………..

163. Excel spreadsheet displays an error message if you enter an incorrect formular………………………………..

164. Excel spreadsheet does not allow a number to be entered in a cell……165. Transmission that occur in only one direction is known as full

duplex……………………………166. The internet service provider enables users to send e- mail

only……………………….167. The abbreviation URL stands for Universal Resource

Location…………………………………168. Interactivity in multimedia makes the student part of the learning

process……………………………….169. Pressing ALT and 155 from numeric key will produce the cedi

sign……………………………….170. LAN covers a far wider area than WAN……………………………..171. Coaxial cable is an example of communication medium…………….172. The enter key cannot be used in spread sheet……………………..173. Excel spreadsheet can use formulas for calculations…………………174. Excel spreadsheet does not allow the insertion of pictures………….175. Excel spreadsheet does not allow a formula to be entered in a

cell…………………………….176. An example of database software is Msword……………………………177. The act of responding to questions on multimedia system is called

interactivity.. . . .…………………………178. An individual dot on a computer screen is called a screen

point……………………….179. Modem stands for modulator and demodulator180. The first country to connect the internet in Africa is Ghana…………….181. QWERTY is the name of the manufacture of computer

keyboard………………….182. The ALT and CTRL keys (on the keyboard) can work on their

own………………………………183. The most obvious signs of the growth of Electronic fund Transfer is

ATM…………………………..184. The internet itself does not contain information …………………………185. An individual dot on a computer screen is called a pixel………………186. Modem coverts analog signal to digital only 187. On the keyboard the function keys are programmable keys……………188. QWERTY is the name of person who inverted the keyboard………….189. The shift keys (on the keyboard) cannot work alone………………….

36

Page 37: Question and Answers for Utdbe

190. Most multimedia application are interactive………………………….191. The light pens let you move the pointer and select items on the display

screen…………………………………..192. Multimedia software refers to any computer based presentation

……………………..193. Multimedia software cannot be used as productivity tool……………194. Technology integration can take place without computers and

software……… …………………..195. To integrate technology the teacher must adopt new teaching

tool………………………………196. Only ICT teachers need to integrate technology into the

classroom……………………………197. For successful integration, the teachers must change the way they

teach………………………….198. To integrate software into curriculum, one needs to evaluate the

software……………………………..199. Interactivity does not make the student part of the learning

adventures…………………………200. In multimedia applications most objects are not clickable…………………201. Most multimedia applications are mostly non – interactive ……………..202. All teachers need to integrate technology into the classroom…………….203. One can integrate software into the classroom without evaluating

it………………..204. In multimedia application most objects are clickable………………………205. Joystick are the most appropriate input device to use for computer

games……………………………….206. Ms Excel document cannot be exported into Msword……………………207. Dot Matrix printers creates images and characters by placing

dots………………………208. An example of database software is Ms PowerPoint…………………209. MsAcess can be used for queries……………………………….210. Another name for the arrow keys is the cursor movement keys211. Plotters are devices used in engineering and architectural

environments.. . . . . . . . . . . . . . . . . . . . . . . . . .212. Technology has no impact on other curriculum areas……………………….213. Changing instructional strategy is to select appropriate materials and

tools……………………………………………….214. Digital camera is an example of output device……………………215. There are two types of computers, they are analog and

digital………………………………216. The control unit that performs arithmetic and logical

operation……………………………..217. The Msword the icon B is used for bolding text………………………218. Modem computers speed in measured in gigahertz…………………………..219. The main memory of the Personal Computer is volatile……………….

37

Page 38: Question and Answers for Utdbe

220. The standard peripherals of a computer system are monitor, keyboard and mouse……………………………..

221. A blinking cursor identifies where the data will next be entered…………………………

222. What do the acronym GUI stands for Graphic User Interaction

38