question and answers for utdbe
TRANSCRIPT
Table of ContentTypes of sof tware ................................................................................................................................................8System sof tware ...................................................................................................................................................9Fil l in the blank test I tems ..........................................................................................................................19True or False Test I tems .................................................................................................................................29
1
COMPUTER
DEFINITION: Computer is an electronic machine used for processing data, store and produce an output to the user
DATA: Data is the raw information that is fed into the computer.
Data comes in three forms: letters (like a, b, c.. .) numerals (such as 1,2,3.. .) and special characters (e.g. $, @,/ . .)
INPUT: Input is the process of feeding data into the computer.
OUTPUT: is the processed data that is communicated to the user. The output is also
CATEGORIES OF COMPUTER
There are four major categories of computer:
1. Microcomputers : These are computer systems that have the microprocessor in one
case. They are further subdivided into palmtop, notebook, laptop and desktop
computers.
2. Minicomputers : These are more powerful than the microcomputers and can
support a number of users performing different tasks. Most powerful mini-
computers are called super mini-computers
3. Mainframe : They are large systems that can handle hundreds of users. They
store large amounts of data and process transactions at high rate. Mainframes require
several rooms to store.
4. Super-computers : They are the most powerful category of computers and also
the most expensive. They are used for such applications as weather forecasting,
engineering designs and testing, space exploration and other tasks, which require long
and complex calculations.
TYPES OF COMPUTER
We have three different kinds of computers:
i) Analog computers;
ii) Digital computers and
2
iii) Hybrid computers
Analog computers
These are devices that measure one form of physical quantities or another like
temperature, pressure, speed and so on. Examples of analog computers are
thermometer, barometer, speedometer and hygrometer
Digital computers :
These are devices that are used for counting. Examples include adding machine, billing machine, electronic wrist-watch and calculator
Hybrid computers
These devices combine the functions of measuring physical quantities as well
as counting. Electronic computers like desktop computers and notebooks are examples
of hybrid computers
PARTS OF A COMPUTER
There are four major parts of a computer:
1. Monitor;
2. System Unit (which contains the CPU, hard disks & others)
3. Disk drive (provides slot for diskettes)
3. Keyboard
PERIPHERALS
These are those external devices that must be attached to the System unit for them to work.
Examples of Peripherals:
i) mouse;ii) light pen;iii) printer;iv) plotter;
3
v) modem (modulator-demodulator);vi) UPS (Uninterruptible power supply);vii) scanner;viii) telephone;ix) data projectors;x) Microphone among several others.
Some peripherals, not a major part, are becoming indispensable features of a modern PC (Personal Computer). Examples are the mouse, scanner and printer
HARDWARE
This is the physical component of the computer which we can see and touch.
Hardware is made up of four types of devices or units. These include: input devices, processing devices, output devices and storage devices.
INPUT DEVICES
Input devices are those devices that are used for feeding in data into the computer.
Enlisted below are various input devices:
a) keyboardb) mouse;c) scannerd) light pen;e) joystick (for playing computer games);f) voice input;g) touch screens;h) trackball;
PROCESSING DEVICES
These are units that process data from one form to another. The CPU (central processing unit) which is generally regarded as the 'heart ' or the 'brain' of the computer is a major processing device. Another example is the Modem (modulator-Demodulator) which is processes data for communication purpose. The modem enables the computer to dial a telephone or access the INTERNET (more on this later on the course) by dial-up method
4
OUTPUT DEVICES
They are devices that computer uses to produce output (information) or the unit that is used to communicate with the user. They may include:
a) monitor;b) printer;c) data projectors;d) plotters;e) computer output microfilm;f) voice output (such as we find in Robot technology)
STORAGE DEVICES
Storage is the fourth and final operation in the information processing cycle (earlier mentioned). As the name implies, storage devices are those devices used for storing data and programs for later use. We have primary storage (main memory inside the system unit) and the secondary storage devices. The latter is sometimes called
Auxillary storage.
In the section that follows, we are going to look at some of them in detail:
MONITOR
Monitor is the part of the computer that looks like television set. It is variously called as CRT (Cathode Ray tube), VDU (Visual display unit), Screen or just Display .
The output that is displayed on the computer cannot be touched, as it were, and is called soft copy output.
Pixel : also called 'picture element’ are the individual dots that make up the text or graphic and can be illuminated. The greater the number of pixels, the better the screen resolution.
Resolution : This is the clarity of a monitor and is determined by the number of pixels that can be illuminated.
TYPES OF MONITORS
We have two major kinds of monitors: monochrome monitors and colour monitors.
Monochrome Monitors : They are computer terminals that display a single colour such as amber, green or white on a black background; or black characters against white background
Colour Monitors
5
They are more expensive than the monochrome monitors and are more desirable
because colour enables users to more easily read and understand the information on
the screen.
Several Graphic standards have been developed and they include:
CGA: (Colour Graphics Adapter);
EGA (Enhanced Graphics Adapter)
VGA (Video Graphics Array)
SVGA (Super Video Graphics Array)
Each standard provides for a different number of pixels and colours and offer even higher resolution screens.
With the development of mobile computing in the form of truly portable computers
that could be conveniently carried by hand or in a briefcase, came a need for an
output display that was equally portable. Today, we have what we call the Flat panel
Monitors that are actually LCD (stands for Liquid Crystal Display) and plasma
screens.There are also the TFT (stands for thin-film transistors) monitors that makes
use of LED (Light emitting diodes).
Printers
Printers are very important peripheral in that they produce hard copy output
that the user can carry about unlike the soft copy output from monitors.
How are Printers Classified?
6
Printers can be classified by how they transfer characters from the printer to the
paper. This is either by impact or non-impact
Impact printers
These transfer the image onto the paper by some type of printing mechanism striking
the paper, ribbon, and character together.
Examples of impact printers include:
a) dot-matrix printer
b) daisy wheel printer
c) chain printer
d) band printer
Non-Impact printers
There are also a variety of non-impact printers. These include ink-jet printer, thermal
printer and page printers like the laser jet printer.
Choosing a Printer
Besides understanding the features and capabilities of the various types of printers
that are available, one must consider other factors before choosing a printer. Such
factors include how much output will be produced, the speed as well as the quality of
the text and graphics. Laser-jet is very desirable for printing heavily text documents
while ink-jet printer is the best bet for graphics intensive documents.
Terms associated with Printers
DQ Draft quality
NLQ Near Letter quality
LQ Letter quality
CPS Characters per second
PPM Papers per minute
BRIEF HISTORY OF COMPUTERS
7
Computing has a long history and started with man’s search for the best method of easy counting and manipulation of items and number of materials and other resources. The Chinese and the Ancient Babylonians made use of the Abacus . During the renaissance period however, notable scientists like Blasé Pascal, James-Marie Jacquard, and Charles Babbage devised better counting devices. We had the punched cards by Jacquard, Herman Hollerith’s tabulating machine that eased the 1890 American census and became the older cousin of the IBM computers. The first electronic computer was the ENIAC and was developed by IBM in the year 1946. They were very large and produced large amount of heat because of the use of vacuum tubes. They were the first generation computers. The development of transistors gave birth to the second-generation computers, which were not as large and produced less heat.
In 1969, Ted Hoff invented IC (Integrated circuit) and together with Gordon Moore developed the 8008 microprocessor in INTEL. Microcomputers were born. In 1975, average person could now purchase personal computers. In 1980, IBM gave Bill Gates of Microsoft Corporation, a contract to come out with an operating system. His MS-DOS and later several releases of ‘Windows’ have changed the face of computing world-over.
INTERNET is the information superhighway that started as ARPANET in late 60s but became popular in the mid 1990s. With the advent of INTERNET came e-commerce, e-mail, virtual research, and teleconferencing. Suffice it to say that the INTERNET is perhaps the greatest gift of computing to man and has changed the way that he views his world.
What is a program?
Program is a set of instructions that are fed into a computer to carry out a task.
The computer is lifeless and you can really not do any thing without programs. We can type our
letters with the computer because of a program that makes the computer to allow us to do so. The
program could be a simple one like instructing the computer to add two numbers together or could be a
complex one like forecasting what the weather would be like in Calabar tomorrow.
SOFTWARE
Software is the collection of programs in the computer, which we can see at times but cannot touch.
Types of software
There are three major types of software, namely:
8
a) System software;
b) Application software and
c) Utility software
System software
These are programs that control the operations of any computer. Some of these
operations include starting up the computer (booting), loading, executing (that is
carrying out instructions).
System software includes operating system and language translators or what we call
compilers.
Some operating systems include:
a) MS-DOS [Microsoft Disk Operating System]
b) WFWG (Windows [3.11] For Work Groups)
c) Windows 95 or 98
d) Windows 2000 Professional
e) Windows ME (Millennium Edition)
f) Windows XP (Windows Experience)
Application software:
These are programs that are designed to carry out specific tasks for us. Application
software is sometimes referred to as packages. Again, there are different types of
application software namely:
a) Word-processing : This software enables us to type letters, memos and
documents. E.g. MSWord, WordPerfect, Lotus AmiPro, WordStar, Write,
MultiWrite, Windows WordPad and so on.
b) Spreadsheet: We use spreadsheets to manage tables, prepare
financial reports or calculate scores for an examination report sheet in the
school. E.g. MS Excel, FoxPro, LOTUS 1-2-3
c) Computer Graphic software: This makes it possible for the user to manipulate
charts, pictures and several beautiful designs with the computer. E.g. COREL
DRAW 10, ADOBE PhotoShop, ADOBE Illustrator, PRINTMASTER Gold
Deluxe and so on.
9
d) Database: This software allows the user to enter data such as the names of
students in a school with their ages and classes and enables the user to retrieve
such information at a later date.
UTILITY SOFTWARE
This software takes care of the management and the security of the files inside the
computer. We have Anti-virus packages like Dr Solomon Virus Scan, McAfee, NDD,
Norton Utilities. There are also utility software that clears up the hard disks of
nonsense files when the disk is nearly full.
Central Processing Unit
This is the main control unit of the computer. It can be said to be the brain of the
computer or the heart and so on.
Parts of the CPU
The CPU consists of the control unit and the ALU (which stands for Arithmetic/Logic
unit). These two work together using the program (instructions fed in by the
programmer, you remember) and the data that are stored in the main memory to
perform. Therefore the parts of the CPU include
a) control unit;
b) ALU and
c) Main memory
Main MemoryThe main memory stores three items. These include:
a) the operating system e.g. Windows 95/98 or windows XP that directs and
monitors the activities of the computer equipment;
b) the application software that will direct the work that is to be done by the user
whether it to type a letter or design a card;
c) the data, which is currently being processed by the application software
What is Byte?
What is Memory address?
10
In the main memory, each location is called a byte. Just as a house on a street has a
unique address that shows the location on the street, each byte in the main memory of
a computer has an address that indicates its location in memory.
The number that shows the location of a byte in memory is called a memory
address
Bit: is short form of binary digit. The computer basically understands only two things 1 and 0. This
in Mathematics is called number base two or binary scale.
Nibble : 4 bits make up a nibble
Byte : 8 bits make up a byte or
2 nibbles make a byte
1024 bytes equal 1 kilobyte (KB) (However, this is often abbreviated to 1000 bytes,
so we say that 1kB is equal to 1000 bytes instead of 1024 bytes)
The size of main memory is normally measured in kilobytes. When memory exceeds
1000kB (1 million bytes), it is referred to in megabytes (MB).
1000MB (that is one billion bytes) then it is called Gigabyte.
Types of memory
1. RAM – This stands for Random Access Memory. This is volatile in that
whenever there is a power outage, everything stored in the memory is wiped
off. This is where the computer stores the program that it loads during booting
(later on this course) and also the place that the computer temporarily stores the
data that is being fed in, before you save the work. Saving is the act of
transferring the work that you are doing to the hard disk where you can retrieve
at a later time.
2. ROM: This stands for read-only memory. This is made up of all the
instructions that were stored in by the makers of the computer. These
instructions enable the system (computer is also called system) to start up or
boot, for example. ROM cannot be altered (changed) or modified like the RAM.
3. PROM: This stands for programmable read-only memory. Here, you can be
allowed to program what you want the computer to do but once this is done,
11
you cannot again change anything. Note that it is only in the PROM that this
programming can be allowed not the ROM.
4. EPROM: This stands for Erasable Programmable read-only memory
5. EEPROM: This stands for Electronically Erasable Programmable read-only
memory
What is booting?
This is the initial start-up procedure of the computer. When you put on the computer,
it tests itself and loads the operating system into the main memory of the computer.
When it is doing this, the computer is not ready for use yet and is said to be booting.
Cold Booting
This occurs when the computer is switched on with the plugs correctly wedged into
the socket in the mains. As a general rule, you put on the CPU first before the
monitor. When you finish with the computer, i .e. at shutdown, you put off the monitor
first before the CPU.
Warm Booting
Warm booting means to reset the computer. In this case, one does not have to put off
the computer before switching it on again. To warm boot, three keys on the keyboard
have to be pressed together. These keys are Control (Ctrl) key, Alternate (Alt) key
and the Delete key (Del)..
It is suggested that using your left hands (for a right handed person) press
CTRL and ALT keys together, while at the same time you use the right hand to hit the
DEL key. When you do this, you are warm booting the computer.
AUXILIARY STORAGE DEVICESThese are devices that store data or the output from the computer for later use.
Generally, we have the rigid and the removable auxiliary storage devices
Types of Auxiliary Storage devices
1. Magnetic disk storage ;2. Magnetic tape ;
12
3. Optical disks ; e.g. CD-ROM (Compact disk-read-only memory) ,CD-i(Compact disk-interactive), CD-R (Compact disk- recordable) , CD-RW (Compact disk-rewritable)
4. solid-state devices ;5. Mass storage devices and6. Special-purpose storage devices , e.g. smart cards and optical cards
Of these types of storage devices, we will discuss only the magnetic disk storage. It is the most widely
used storage medium for all types of computers.
Diskettes
The removable type is called the diskette. Since they are thin and flexible, they are
sometimes called floppy disks or simply, floppies. They are convenient, reliable and
inexpensive.
There are two sizes of diskettes: 3½” floppy disk and 5¼” floppy.
13
Care of diskettes
1. They should be prevented from direct sunlight;
2. Heavy objects should not be placed on top of diskettes;
3. Do not expose diskettes to hot places or high temperatures;
4. Avoid touching the magnetic medium with bare hands;
5. Do not press the diskettes with your biro pen or pencil when writing on the
label. That explains why felt pens are recommended.
6. Avoid bringing diskettes close to magnets or magnetic materials;
7. They should not be brought near dust, smoke or water
Hard Disks
This type of magnetic disk storage is rigid and is fixed inside the system unit. Hard
disk is completely sealed and therefore is less prone to damage. Example is
Winchester® disk, Western Digital ® disk, Maxtor ® disk and Seagate ® disk.
The hard disk itself consists of round metal platters on which the data are stored and the read-
write head, which is used to access the data that is sought.
The storage capacity of hard disks is measured in megabytes and more recently
gigabytes (that is millions and billions of characters) of storage. This is just like you
have 60-leave or 80-leave notebooks that will store more notes than the 40-leave
notebooks.
We also have removable hard disks especially in some notebook computers and
these are used to ensure higher security of the stored data. There are also hard cards.
The hard card is a circuit board that has a hard disk built onto it . They provide an
easy way to expand the storage capacity of a personal computer
Protecting data stored on a disk14
Regardless of whether you are using floppy disk or hard disks, you must have to
protect the data that you store on the disk from being lost. The disk storage is re-
usable since the stored data may be overwritten and replaced by new ones. This is
clearly a desirable feature because we are afforded the privilege of replacing or
removing unwanted files. However, it also poses the problem and possibility of
accidentally removing or replacing the file that we wanted to keep. Therefore, to
protect programs and data stored on disks, we may:
a) Write-protect the diskette: This is done by using the write-protect notch that
is located at the lower side of the diskette. So, to prevent writing to a
diskette, you will have to move a plastic cover to open the window. If the
write-protect notch is closed however it means that the drive can write or
copy something on the diskette. Once again, if the window is open, the drive
will not write on the diskette or floppy disk.
b) Back-up storage: Another good way to protect our programs or data stored
on disks is by creating back-up storage. This simply means creating a copy
of important programs and data on one diskette to another diskette. The
diskette is equally a convenient medium that is used to back up the data
stored on a hard disk of a personal computer. Today, we now have
recordable and rewritable compact disks that can store the entire contents of
a hard disk as back-up storage. This is made possible by the use of CD-
Writers.
COMPUTER VIRUS
A computer virus is a computer code or program that is capable of replicating
itself and transferring itself from one computer system to another. Usually, virus can
do such things as change programs or destroy data. They may even at times format the
entire hard disk or blow up a monitor or disable a printer.
When the host program (that is the program with the virus) is shared, the virus
is spread. As the host program is copied to friends through diskettes, the INTERNET,
bulletin boards and other usual channels, the virus is also copied along. It infects the
software with which it comes in contact.
15
They are not detected immediately. Some of them are like time bombs waiting
for particular date to do their havoc. People who copy the host software are unaware
that the virus exist because it is coded in such a way as to hide from computer users
for weeks or even months. There are over 9000 viruses known and continue to
increase by day and with the advent of the INTERNET even by the minute. Major
kinds of computer virus include Boot sector viruses (that prevent the computer from
booting properly), anti-CMOS viruses and Trojan horses.
Examples of computer virus
December 13 Polyboot A eek80 virus
Black Jesus WM.opey97
HowlenCroween B Klein
Jerusalem virus Holy Moses
To neutralize the codes of the viruses, we use the antiviruses such as Dr Solomon
AntiVirus kit, Norton AntiVirus, McAfee Virus Scan among others. Antiviruses have
to be regularly updated if they are to be effective.
HOW TO AVOID COMPUTER VIRUS
These are some techniques to at least minimize viruses and their damaging effects:
The computer should be warm booted when switching suspicious programs or
applications.
Write-protect your diskettes when they are to be inserted into suspicious
computer systems
Always use Antivirus to scan any suspicious diskettes before opening any file
inside them.
16
In using the INTERNET and bulletin board service, open e-mail accounts with
servers that provide antivirus software that will scan all incoming mails.
Do not open or download any e-mail attachments from unknown sources until
they are scanned.
Even when these tips are followed, they cannot be total guarantee that your system or diskette could be
virus-free when you engage in swapping (that is copying software). There fore the best method is to
perhaps avoid swapping. Use only registered and licensed software and avoid tolerating diskettes from
unknown sources from being inserted into your system.
NETWORK
When two or more computers are connected together, they are said to form a
network.
For computers to ‘see’ each other on a network, they have to follow the same set of
rules, commands or configurations called protocol
Examples of protocols:
a) FTP File transfer protocol
b) TCP/IP Transfer control
protocol/Internet or Intranet protocol
c) NetBEUI British standard
protocol
d) WAP Wireless Applications
protocol
17
e) HTTP hyper text transfer
protocol.
Types of Network
There are two major kinds of network based on the geographical distribution of the
computers:
a) Local Area Network (LAN) and
b) Wide Area Network (WAN)
Local Area Network : This is when the computers are connected together within the
same area such as building or campus
Wide Area Network : In this type of network, computers connected together are in
wide geographical area like different cities or even countries. The INTERNET is a
good example of WAN.
What is Server?
What is Client?
Networking is very advantageous for file sharing as well as resource sharing.
When computers are networked, you wouldn’t have to buy separate printers for each
of them. All you have to do is buy a single printer for all of them to share. Note that
they have to have the same protocol, which is the set of rules and regulations
governing the exchange of information between computers in a network.
Now, a server is the network control unit that is dedicated to handling the
communicating needs of the other computers in a network. These other computers are
referred to as clients .
Whatever is to be shared among the computers in such a network, say, a printer has to
be connected to the server. Using LAN, all the computers and the server can use the
printer.
In a network, communication channels are very essential. Wires and cables are
used, although wireless systems such as light beams, radio waves or carrier-connect
18
radio are now prevalent. VSAT (very small aperture terminals) has largely improved
the efficiency of Wide Area networks in both Intranet and INTERNET access.
NETWORK TOPOLOGY
Network topology describes the configuration or physical layout of the equipment
(such as computers and peripherals) in a communications network.
Types
a) star network
b) bus network
c) ring network
Gateway : is a combination of both hardware and software that allow users on one
network to access the resources on a different type of network.
Bridge : is a combination of hardware and software that is used to connect similar
networks.
Nodes : Devices connected to a network, such as terminals, printers or other
computers are referred to as nodes.
Hub : This is a device that connects all the workstations or client computers in a
network to the server.
We have 9- port, 16-port hubs and so on.
Fill in the blank test Items
1. The acronym PC stands for…………………………………………………………….2. To perform “warm boot” the keys……….+………+…………are pressed3. In MS Word the icon is used for………………………………………………….4. The computer keyboard is similar to………………………………………………5. The program that is automatically loaded when the computer is switched on is
the……6. To find an alternate word in MS Word document, you use
the…………………………….7. To type a capital letter on the keyboard, one can use the caps lock key or
the…………
19
8. The unauthorized duplication and or use of computer software are known as………….
9. Computer security is a method of protecting data, programs and ……………………….
10. What is the meaning of the abbreviation BIOS……………………………………………..
11. The circuit board which normally contains the CPU, RAM is called the……………….
12. What is the meaning of the abbreviation POST... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13. A connecting socket on the outside of the system unit is called a……………………….
14. Parallel ports are mostly used to connect…………………….....to the system unit15. Another name for microcomputer
is………………………………………………………….16. The keys Ctrl+Alt+Del are used to perform
……………………………………………….17. In MS Word the iconis used for …………………………………………………….18. The numeric pads on the computer keyboard is similar to the
……………………………19. Computers are classified by purpose, by size/capacity and
by……………………………20. The largest and most powerful computer is the
…………………………………………….21. The raw materials for producing information is
called……………………………………22. The physical components of the computer is called
……………………………………….23. The three types of computers are analog
…………………..and……………………………24. Which computer unit performs arithmetic and logical
operation……………………….25. In MS Word the icon is used for
……………………………………………………...26. What is the computer speed measurement unit
called………………………………………27. What device or devices in a computer is volatile?
………………………………………….28. The three standard peripherals of a computer system aremonitor, keyboard
and……..29. A pointer used to identify where the data will next be
entered…………………………..30. What do the acronym GUI stands
for?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20
31. What is the short form of Binary Digit?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
32. A byte is the equivalent of ………………………bits33. A method of moving text in a document is copy and
……………………………………..34. The backspace key will delete characters on the ……………….of the blinking
cursor.35. Common pointing device found on personal computers is
the……………………………36. An example of portable computer is
the…………………………………………………….37. Another name for a document saved on the computer is a
……………………………….38. The first magnetic medium for storage is called
magnetic………………………………..39. If you turn off the computer you will not lose the information in the
………………….40. The program that operate your computer is called
the……………………………………..41. If 1 byte = 8bits, what is half a byte………………………………….bits42. To move a text in a document, you first ………and then paste where you want it
to be.43. Two examples of portable computer are the laptop computer and
the……………………44. A folder on the computer contains programs
or……………………………………………...45. If you turn off the computer, you will lose the information stored in
the…………………46. The operating system operates the
……………………………………………………………..47. The acronym EBCDIC stands
for……………………………………………………………….48. The largest value that can be contained in a byte
is………………………………………….49. The best way to re-organise your PowerPoint slide is to use
the…………………………...50. The non-volatile devices in the PC are collectively
called………………………………….51. List two windows Operating Systems that can be used on
PC………………………………52. When the computer first starts it checks
the………………………………………………….53. The speed of the processor is measured
in…………………………………………………….
21
54. The expansion slot is located on the …………………………………………………………..
55. The component that distributes power inside the computer is called………………………
56. The acronym ASCII stands for………………………………………………………………….
57. The decimal equivalent of 11111111 base 2 is………………………………………base 10
58. The port used to connect the printer is called…………………………………………………
59. An example of non-volatile devices on the PC is…………………………………………….
60. An example of Window Operating system used on PC is……………………………………
61. The short form for Graphical User Interface is……………………………………………….
62. When the compute first starts, one of the hardware checked by POST is the…………….
63. The Memory slot is located on the …………………………………………………………….
64. Inside the computer, power is distributed by the……………………………………………..
65. When the computer is first put on the……………………….…….is automatically loaded
66. ……………………..will allow you to find alternative word to use in MS Word document
67. In MS Word misspelled word is underlined with a …………………………………………..
68. Computer piracy is illegal copying of………………………………………………………….
69. A method of protecting data, programs and computer system asset is called……………..
70. The BIOS manages peripherals such as………………………………………………………..
71. The main circuit board is called………………………………………………………………..
72. What is the meaning of the abbreviation FDD………………………………………………..
73. A connecting socket on the outside of the system unit is called a …………………………
74. Com port are mostly used to connect……………………………………..to the system unit
75. The icon at the bottom left corner of the desktop is called………………………………….
22
76. Clicking the mouse very quickly but three times is called…………………………………..
77. A method of protecting any computer system assets including data is called…………….
78. The PC market is divided broadly into two, the IBM compatible and the…………………
79. The medium version of mainframe computer is the ………………………………………….
80. The meaning of the acronym EPROM is……………………………………………………….
81. The security of the computer asset and capital equipment is called………………………..
82. The box that houses the PC hardware and other components is called the………………..
83. Cables connect input and output components to……………………………………………..
84. USB stands for……………………………………………………………………………………
85. Peripherals are hardware components that connects to the ………………………………..
86. The screen pointer found on the computer is controlled by the …………………………..
87. The most common output device on a desktop computer is the……………………………
88. To obtain multiple copies of a document it is appropriate to use………………………….
89. A communication channel is the path through which data is……………………………….
90. Which device receives and converts signal back into usable information…………………
91. The opening page of a web site is called the………………………………………………….
92. Two examples of graphic are……………………………………………………………………
93. Sounds are captured using a microphone or a…………………………………………………
94. Educational technology is the application of technology in teaching and…………………
95. The acronym LCD stands for……………………………………………………………………
96. A typical communication channel is the……………………………………………………….
97. When the computer first starts it checks the…………………………………………………..
23
98. Computers are classified by purpose as general purpose and……………………………….
99. There are two types of PC found on the market, the Apple Mac and………………………
100. The abbreviation PDA stands for……………………………………………………………
101. Computers that solve problem by counting precisely are called………………………..
102. The illegal copying or use of programs is called…………………………………………
103. An unsolicited or unwanted e-mails is known as…………………………………………
104. Secret code that allows you assess to a computer system or program is………………
105. The MS office software used for students assessment is called…………………………
106. Software that helps users to perform their routine task is called……………………….
107. Another name for the main printed circuit board is the………………………………….
108. Software used to view web pages are called……………………………………………….
109. The abbreviation WYSIWYG stands for……………………………………………………
110. The ASCII code is used to represent ………………………………..on the computer
111. To transfer a photograph to your computer you will need a …………………………….
112. Bill Gate is the brain behind the software company called………………………………
113. Beside the keyboard the most common input device is the ……………………………..
114. The latest window operating system used on PC is the…………………………………..
115. The acronym CLI stands for…………………………………………………………………
116. Another name for the monitor is the………………………………………………………..
117. The speed of modern PC like Pentium IV are measured in………………………………
118. An example of a browser is………………………………………………………………….
119. The abbreviation PROM stands for…………………………………………………………
120. The microphone can be classified as an……………………………………….device24
121. Cordless mouse are…………………………….expensive than other mouse122. An example of a page printer is
the…………………………………………………………123. To obtain multiple copies from one print you need
an……………………………………124. Computer monitors are of two main types CRT monitor
and…………………………….125. The communication channel used by microwave for transmission
is…………………..126. Connection to the internet using telephone lines is
called………………………………127. An example of network device is a
……………………………………………………….128. A printer-like device that only prints lines and graphs are
called……………………..129. The major keyboard standard for the PC world is
the……………………………………130. The general name given to the mouse trackball, joystick etc. is
the……………………131. OMR stands
for……………………………………………………………………………….132. A device that converts analog signal to digital signal and vice versa is
called……….133. Converting from analog to digital is
called………………………………………………..134. The most common communication medium is
the…………………………………………135. Half-duplex transmission send data in both
direction…………………………………….136. A metropolitan area network is a network that
covers……………………………………137. An interface software used to explore the internet is
called…………………………….138. The use of computers to integrate and present information using a combination
of media element is called...………………………………………………………………………..
139. Name any two examples of graphics………………………………………………………..
140. Hardware may be defined as the………………………….part of a computer141. The instruction that controls the operations of a computer is
called…………………..142. The process writing or coding programs is termed
………………………………………143. The software that controls the hardware is called
the……………………………………25
144. The two user interfaces are the GUI and…………………………………………………..
145. Software used for solving real world problems are called……………………………….
146. Word processing software create, edit, format and……………………………………….
147. Adding more RAM have big effect on system…………………………………………….
148. Operating system that permit concurrent users are called……………………………….
149. The smallest unit of measurement on the computer is called the ………………………
150. The two main input devices on the PC world are the…………………and……………..
151. An example of a pointing device used on the computer is………………………………
152. OCR is the abbreviation for…………………………………………………………………
153. Converting from digital to analog is called……………………………………………….
154. The fastest communication medium is……………………………………………………..
155. Full-duplex transmission send data in both directions…………………………………..
156. Simulations is the application of ………………………………………….…in education
157. The software used to browse the internet is called a……………………………………..
158. The technique used in scoring WAEC multiple choice questions is called…………….
159. The cursor is also called the insertion……………………………………………………...
160. Data validation ensures that the input data is free from………………………………….
161. Hardcopy is also known as…………………………………………………………………..
162. The abbreviation HTTP stands for………………………………………………………….
163. Modems inside the computer and therefore not visible are called………………………
164. Data transmission can be characterized as simplex…………………..and………………
165. When you enter a formula in Excel you star with an…………………………….sign
26
166. In multimedia, the movement of text, graphic and images is called……………………
167. The abbreviation CBT stands for……………………………………………………………
168. A scanner can convert printed image into………………………………………………….
169. A terminal consist of a keyboard and………………………………………………………
170. The typing on the computer is done though a device known as the……………………
171. Examples of toggle keys on the keyboard are caps lock key and………………………
172. The acronym UPC stands for……………………………………………………………….
173. A point of sale terminal uses barcode reader to identify products……………………
174. Telephone lines are used for voice transmission hence require……………signal175. Simplex transmission send data in one
direction………………………………………..176. Any device or computer to a network is referred to
as…………………………………177. Using more than one type of media element in a single presentation is
called………178. Objects in multimedia applications are selected
by……………………………………..179. A computerized information center that provides specific information to users
is called... . . .………………………………………………………………………………………….
180. An application program which interprets HTML is called a…………………………
181. On the internet………………………help you to find sites related to a particular topic
182. ……………………………………………..…converts drawings, photos to digital signal
183. Terminal are also called……………………………………………………………………...
184. A …………………………..has no ability to process or store data185. …………………………is data that has been processed into useful form186. The most used means of output are
the……………………….and……………………….187. An……………………………strikes papers and ribbon together to form a
character188. The web site address for CNN
is……………………………………………………………
27
189. HTML stands for……………………………………………………………………………..
190. MS windows includes a browser called…………………………………………………..
191. A digitizer converts drawings, photos into as………………………………………signal
192. A dump terminal has no ability to process or store………………………………………
193. Information is data that has been……………………………into useful form194. Dot matrix printers are example
of…………………………………………………………195. Printers are classified as character, line and………………………………..printers196. …………………………….convers data into a form that the computer can
understand197. Keyboards that help avoid repetitive stress injury are
called……………………………198. A handheld device used at the point of sale terminal is
the……………………………..199. The most vital output device connected to the computer system is
the………………..200. A typical communication channel is
the……………………………………………………201. An example of a communication device that sends and receives data is
the…………..202. Computer-based training is a tool for teaching and
……………………………………...203. A digital version of the regular books is
called…………………………………………..204. A computer-based training that uses web technology is
called…………………………205. A standard for compression and decompression is
called……………………………….206. The most vital storage medium for multimedia is
the……………………………………207. The most common barriers to technology integration is training
and………………….208. To integrate technology in the classroom, you need a personal computer
and……….209. To have access to the web in the classroom, you need access to
the…………………..210. The abbreviation FTP stands
for……………………………………………………………211. Drill and practice software is an example
of……………………………………………..
28
212. Computerized tool for teaching and learning is called………………………………….
213. Electronic book is the …………………version of the regular books214. MPEG is a standard for compression
and………………………………………………….215. The use of PC and LCD projectors allows the user to integrate technology into
the…216. To enter text and characters into the computer you will need a device
called………..217. The wheel located between the two buttons of the mouse is used
for………………….218. Two main input devices found on modern laptop are keyboard
and…………………….219. The input device always used with speech recognition software is
the………………..220. A set of program that manage the data transmission is called…………….
…..software221. A transmitter takes information and converts it to………………….…for
transmission222. A browser is a piece of software used to
read…………………………………………….223. A ring network links all nodes together in
a……………………………………………..224. The movement of text, graphic and images is
called…………………………………….225. The act of responding to questions posed by multimedia system is
called……………
True or False Test Items
Indicate T (TRUE) and F (FALSE) for each of the following statements1. Application software is the same as system
software…………………………………….2. Computer is made from
wood………………………………………………………………..29
3. Present day computers are mechanical in nature………………………………………….
4. The computer cannot store information on human beings………………………………..
5. Computers can do a restricted number of basic operations………………………………
6. The soldier can use computer to hit an enemy target with precision……………………
7. Information to one person may be data to another person……………………………….
8. One common layout of the keyboard is QWERTY………………………………………..
9. Viruses show us how vulnerable our systems are…………………………………………
10. If you perform regular backups, you will hopefully reduce the possibility of recovery..………………………………………………………………………………………
11. Information from one computer cannot become data to another computer…………….
12. “Random Access” memory means the computer can get data in any way……………..
13. Application software is part of the system software loaded on the PC………………..
14. The analog computer solves problems by counting precisely…………………………..
15. The mainframe computer is larger than minicomputer…………………………………..
16. MS Word is an example of application software………………………………………….
17. The icon is used for comparing two documents……………………………………….
18. Unauthorized access is the use of computer without permission……………………….
19. Hardware theft is stealing computer hardware……………………………………………
20. Good passwords are those that are obvious or easy to guess……………………………
21. The fastest computer ever design to meet the computing needs is the mainframe……
22. The amount of space necessary to store one character is one bit……………………….
23. The memory is permanent and storage is temporary……………………………………..
24. The clipboard allows you to copy text……………………………………………………..
30
25. The icon is used for centering text…………………………………………………
26. The most commonly used auxiliary storage is the magnetic tape……………………….
27. In data representation eight bit is equivalent to one bite………………………………...
28. The safest choice for a password is dictionary word……………………………………..
29. Medical practitioners cannot computer to support patient in intensive care…………..
30. The difference between the computer keyboard and the typewriter is the arrow key…
31. Data and information can be used interchangeably……………………………………….
32. Both RAM and ROM found on the computer are volatile………………………………..
33. The icon is used for typing the characters ABC……………………………………….
34. In real terms one megabyte is exactly equal to 1000 bytes………………………………
35. The computer is faster and more intelligent than the human being…………………….
36. The anti-virus program can be made to run when the system is. booted……………….
37. Another name for temporary memory is ROM……………………………………………
38. The latest type of storage is the punch card………………………………………………
39. Computers are used to store data and information……………………………………….
40. The supercomputer is faster than the other computers…………………………………..
41. The punch card storage was used for many years………………………………………..
42. Computers cannot perform decision-making operation………………………………….
43. The content of the ROM is lost when the power is off………………………………….
44. Both hard drive and the floppy drive are made of metallic platters………………….
45. One common example of optical disk is the pen drive…………………………………
46. 8 bit will represent exactly 100 characters, symbols and special characters………..
31
47. One name commonly used for coding is Unicode………………………………………
48. The port used commonly only to connect the printer is the serial port……………..
49. In PowerPoint presentation it’s possible to hide a slide………………………………
50. Slides on PowerPoint presentation cannot be copied………………………………….
51. Timing can be added to PowerPoint presentation………………………………………
52. The computer can perform decision-making operation………………………………..
53. The content of the RAM is lost when the power is off………………………………..
54. 8 bit will represent exactly 120 characters, symbols and special characters……….
55. An example of coding scheme is the Unicode………………………………………….
56. To re-organise your PowerPoint slides you will need a slide sorter…………………
57. In PowerPoint it is not possible to hide a slide………………………………………..
58. Slides in PowerPoint can be copied……………………………………………………..
59. Timing cannot be added to PowerPoint presentation………………………………….
60. Computers can do unlimited number of basic operation………………………………
61. It is possible to use computers to hit an enemy target with precision……………….
62. To avoid viruses one should treat all disks as though they are not infected………….
63. The QWERTY keyboard does not contain numeric keypads…………………………….
64. All viruses are cleaned by any anti-virus software ever produced……………………..
65. A bit is the same as a bite……………………………………………………………………
66. “Erasable Read only” memory means the computer can write data only………………
67. Floppy disks access information much slower than hard disks………………………….
68. Disks access time is faster for floppy disk than the hard disk…………………………..
32
69. The fan is responsible for the noise when the PC runs…………………………………..
70. The microprocessor cannot become hot due to processing………………………………
71. Graphics-coprocessor is required for graphical packages……………………………….
72. There are two types of keyboard called QWERTY and DVOKA……………………….
73. Anti-virus software varies in terms of performance……………………………………..
74. A typical clock speed is 1.0GHz……………………………………………………………
75. A character is represented by 1bites……………………………………………………….
76. EBCDIC is used in data representation and not ASCII………………………………….
77. Hard disks access information much faster than floppydisks…………………………..
78. Disk access time depends on the type of storage device…………………………………
79. Curriculum enables pupils to adopt a positive attitude to learning…………………….
80. One barrier to technology integration is the availability of infrastructure……………
81. The speed of modern printers is measured in pages per minutes (ppm)………………..
82. A thermal printer can print on any ordinary paper………………………………………..
83. To integrate technology into teaching there is no need to plan…………………………
84. Voice synthesis ensures that computers communicate with human verbally…………..
85. One example of innovation through educational technology is projections……………
86. A laser printer require toner to print……………………………………………………….
87. Light penis not an example of an input device…………………………………………….
88. Digital camera has no memory………………………………………………………………
89. The normal computer monitors are all touch screen………………………………………
90. A school network is a local area network………………………………………………..
33
91. No specifically designed input devices cater for the handicapped…………………….
92. One disadvantage of a school network is that, i t is expensive…………………………
93. Microphone cannot also serve as an input device………………………………………..
94. Cordless mouse are less expensive than other mouse……………………………………
95. The laser printer is a character printer…………………………………………………….
96. Telecommunication technologies are heavily used on the internet…………………….
97. Non-impact printers can print multiple copies……………………………………………
98. Two main types of software are system software and operating system………………
99. Viruses cannot be passed to another computer through a network…………………….
100. Taking a back-up is not a security control measure……………………………….
101. Spreadsheet is composed of 100 rows and 100 columns ……………….102. The application software is a coordinator of all hardware
components………………………….103. It is possible to minimize all programs widows when using Msoffice
………………………………………..104. Anti – virus m prevent people from developing viruses…………………105. Software are the non – physical component of the computer…………..106. Msword cannot create new letter – style column………………………107. Msword cannot create chart……………108. Computers cannot perform decision – making operations……………..109. The content of the ROM is lost when the power is put off……………110. Both the hardware and floppy drive have the same capacity………….111. One common example of optical dick is CDROM………………………112. 8 bits is equivalent to 1 byte…………………………113. The QWERTY keyboard is the most common today………………………114. A computer virus is not program…………………………………………115. When the computer is first put on, Msword is the first to loaded. …..116. The BIOS mdoes not manage the keyboard…………………………………117. Msoffice package include only Ms word and MsExel……………….118. Decision – making operation cannot be performed by the computers….119. When the power is off the content of the ROM is lost……………………120. The capacity of the harddrive and the floppy drive are not the same…121. An example optical dick is FDD……………………………………122. The computer can perform arithmetic operation only……………………123. When the power is off the content of the floppy disk is lost………….
34
124. The capacity of a normal floppy drive is 144byte………………………..125. The ESS key on the keyboard is located at the top left corner………….126. CDROM is an example of magnetic disk…………………………………..127. 1000bits is equivalent to 1kolobyte………………………………………..128. A computer virus is design intentionally to cause annoyance or
damage... . . .…………………………………129. The BIOS does manage the keyboard ……………………………….130. Ms windows package include only internet browser ……………………131. Output drives converts data into a form that the computer can
understand .. . . . . . . .……………………..132. Any type of keyboard can help aid repetitive stress injury……………. 133. A mouse controls the movement of the cursor or pointer on a
monitor…………………………..134. One advantage of a school network is that it’s expensive……………….135. Point –of scale terminal is a stand-alone computer at the counter……..136. The monitor is the most fundamental output device………………………137. The fastest communication channel is the shielded twisted…………….138. There is no difference whatsoever between the router and the
switch………………… 139. Cybercitizen is a negative impact of the internet…………………140. Simulation is not an application of multimedia in education……………..141. Text, graphic and images that have the illusion of motion is known as
animation..……………………………….142. The pointing device used for computer games is known as
joystick………………………………143. Excel updates results automatically if the data in reference cells has
changed formula and a reference to another cell………………………….144. Excel spreadsheet does not allow characters to be entered in a
cell…………………………145. The function key on the computer perform the same
function…………………………….146. Text is used in multimedia to convey information ………………….147. An example of electronic book is Microsoft Encarta………………..148. Flash memory are volatile RAM………………………………….149. The open – source software is a variation of free wire150. Off – the – shelf software is another name for in – horse software151. The fan s designed to blow – up when too much power is supplied to it152. Parallel ports are used to connect more and keyboard 153. Magnetic disk is used for direct access to data154. 32bits is equivalent to 4 bytes of information155. Both EBCDIC and ASCII are 8bit code each 156. One gigabyte is exactly 1billion bytes157. Every personal computer has a hard disk 158. Metropolitan Area Network is a network that covers a city\town159. The pointing device used for computer games is known as light pen
35
160. The use of computer to integrate and present information using a combination of media element is called multimetion…………………………..
161. Excel spreadsheet allow only characters to be entered in acell…………………………
162. The genetic naming for the keys used in moving the cursor around the screen is called cursor movement/ arrow keys…………………………………..
163. Excel spreadsheet displays an error message if you enter an incorrect formular………………………………..
164. Excel spreadsheet does not allow a number to be entered in a cell……165. Transmission that occur in only one direction is known as full
duplex……………………………166. The internet service provider enables users to send e- mail
only……………………….167. The abbreviation URL stands for Universal Resource
Location…………………………………168. Interactivity in multimedia makes the student part of the learning
process……………………………….169. Pressing ALT and 155 from numeric key will produce the cedi
sign……………………………….170. LAN covers a far wider area than WAN……………………………..171. Coaxial cable is an example of communication medium…………….172. The enter key cannot be used in spread sheet……………………..173. Excel spreadsheet can use formulas for calculations…………………174. Excel spreadsheet does not allow the insertion of pictures………….175. Excel spreadsheet does not allow a formula to be entered in a
cell…………………………….176. An example of database software is Msword……………………………177. The act of responding to questions on multimedia system is called
interactivity.. . . .…………………………178. An individual dot on a computer screen is called a screen
point……………………….179. Modem stands for modulator and demodulator180. The first country to connect the internet in Africa is Ghana…………….181. QWERTY is the name of the manufacture of computer
keyboard………………….182. The ALT and CTRL keys (on the keyboard) can work on their
own………………………………183. The most obvious signs of the growth of Electronic fund Transfer is
ATM…………………………..184. The internet itself does not contain information …………………………185. An individual dot on a computer screen is called a pixel………………186. Modem coverts analog signal to digital only 187. On the keyboard the function keys are programmable keys……………188. QWERTY is the name of person who inverted the keyboard………….189. The shift keys (on the keyboard) cannot work alone………………….
36
190. Most multimedia application are interactive………………………….191. The light pens let you move the pointer and select items on the display
screen…………………………………..192. Multimedia software refers to any computer based presentation
……………………..193. Multimedia software cannot be used as productivity tool……………194. Technology integration can take place without computers and
software……… …………………..195. To integrate technology the teacher must adopt new teaching
tool………………………………196. Only ICT teachers need to integrate technology into the
classroom……………………………197. For successful integration, the teachers must change the way they
teach………………………….198. To integrate software into curriculum, one needs to evaluate the
software……………………………..199. Interactivity does not make the student part of the learning
adventures…………………………200. In multimedia applications most objects are not clickable…………………201. Most multimedia applications are mostly non – interactive ……………..202. All teachers need to integrate technology into the classroom…………….203. One can integrate software into the classroom without evaluating
it………………..204. In multimedia application most objects are clickable………………………205. Joystick are the most appropriate input device to use for computer
games……………………………….206. Ms Excel document cannot be exported into Msword……………………207. Dot Matrix printers creates images and characters by placing
dots………………………208. An example of database software is Ms PowerPoint…………………209. MsAcess can be used for queries……………………………….210. Another name for the arrow keys is the cursor movement keys211. Plotters are devices used in engineering and architectural
environments.. . . . . . . . . . . . . . . . . . . . . . . . . .212. Technology has no impact on other curriculum areas……………………….213. Changing instructional strategy is to select appropriate materials and
tools……………………………………………….214. Digital camera is an example of output device……………………215. There are two types of computers, they are analog and
digital………………………………216. The control unit that performs arithmetic and logical
operation……………………………..217. The Msword the icon B is used for bolding text………………………218. Modem computers speed in measured in gigahertz…………………………..219. The main memory of the Personal Computer is volatile……………….
37
220. The standard peripherals of a computer system are monitor, keyboard and mouse……………………………..
221. A blinking cursor identifies where the data will next be entered…………………………
222. What do the acronym GUI stands for Graphic User Interaction
38