Ais160 Final Examination Feb 2023
Ais160 Final Examination Feb 2023
AC1102G
1. This question paper consists of two (2) parts: PART A (80 Questions)
PART B (20 Questions)
3. Do not bring any material into the examination room unless permission is given by the
invigilator.
4. Please check to make sure that this examination pack consists of:
PART A
This part consists of 80 multiple-choice questions. Ghoose the most suitable answer
and shade the corresponding alphabet representing the answer in the objective answer
sheet provided.
1. A website is
2. When a user uses an application stored on web server that he/she accesses through
a browser, he/she is using a
A. mobile aPPlication.
B. server aPPlication.
C. desktoP aPPlication.
D. web aPPlication.
A. zoom in.
B. zoom out.
C. scroll.
D. run a program or aPPlication.
A. scanner
B. printer
C. displaY
D. speaker
A. server.
B. network.
C. website.
D. search engine.
6. A video conference is
A. a service that allows user to leave a voice message and videos for one or more
PeoPle.
B. a real time conversation among two or more people on a computer or mobile
devices connected to the network.
C. a real time meeting between two or more geographical separated people who
use network to transmit audio and video.
D. a real time conversation with another connected user where you also can
exchange photos, videos and other content.
T. The wireless communication technologies that use short range radio signal to
communicate is called
A. Wi-Fi.
B. cellular radio.
C. Bluetooth.
D. infrared.
B. The controls how users enter data and instructions and how information
is displayed on the screen.
chapter 3 part 1
A. user interface page 11
B. application
C. program
D. operating sYstem
10. Users use computer for publishing thoughts and ideas using the following media
EXCEPT
11. Which of the following is a major DIFFERENCE between a server and a client
computer?
A. neural network
B. virtual realitY
C. augmented realitY
D. biology system
A. Clrl Z
B. F5
C. Navigation keYs
D. Num Lock
16. device contains a camera that detects gestures and converts. them to
digital signals.
A. A body recognition
B. The movement
C. A motion-inPut
D. The simulation
A. Speech-to-text features recognize spoken words and enter them into email or
text messages.
B. A voice recognition application allows users to dictate text and instructions by
speaking into a microPhone.
C. VolP enables users to speak to others via their lnternet connection.
D. A built-in speaker is used to enter voice input into the computers.
A. Wi-Fi
B. infrared
C. Bluetooth
D. cellular
21. When a student enters a calculation in a calculator app, the will translate
the instruction into a signal understood by a computer to be executed.
A. control unit
B. machine cycle
C. decode
D. comparison operation
A. thermal
B. 3-D
C. laser
D. ink-jet
23. is an optical disc on which users can write once but cannot erase.
A. CD-ROM
B. CD-R chapter 2 part 2
C. CD-RW page 36
D. DVD-R
A. NFCTags
B. Smart Cards chapter 2 part 2
C. Magnetic Stripe Cards page 47
D. RFID Tags
27. is the speed of which data, instructions and information are transferred
to and from a storage device.
A. Optical disk
chapter 2 part 2
B. USB flash memory page 23
C. Memory card
D. External hard drives
29. Which of the following is NOT TRUE about the function/s of an operating system?
A. Operating system uses plug and play, to place items while waiting for the
devices to become idle.
B. There are two types of operating system user interface, which are graphic
interface and common line interface.
C. Operating system uses virtual memory to run applications simultaneously.
D. Its function is to starl and shut down the computer or mobile devices.
30. will causes a display screen to show moving images or blank space
screen.
A. lmage viewer
B. File manager
C. Screen saver
D. PC maintenance
A. Foreground internet
B. Kernel
C. Background
D. Virtual
32. Which of the following statements discuss the ADVANTAGE of multi-core processors?
A. The content in volatile memory is permanent, and it will remain when the
computer's power is turned off.
B. Read-only memory (ROM) is one example of volatile memory.
c. Random-access memory (RAM) consists of memory chips that can be read
from and written to by the processor or other devices.
D. Flash memory chips store data and programmes on many servers.
A. The bus width determines the number of bits that the computer can transmit at
one time.
B. The data bus is the number of bits the processor can interpret and execute at
a given time.
c. The larger the number of bits handled by the bus, the faster the computer
transfers data.
D. The purpose of a backside bus is to connect the processor to the cache.
36. ltems are placed in the while waiting to be transferred from an input
device or to an output device.
A. buffer
B. spooling
C. print spooler
D. device driver
37. The program that assesses and reports information about various computer resources
and devices is called
A. keying.
B. launching.
C. booting.
D. loading.
39. A user interface that uses short keyruords or abbreviations to enter data and
instructions is called
chapter 3 part 1
A. Graphical User lnterface. page 13
B. Super User lnterface.
C. Command Line lnterface.
D. Command User lnterface.
41. sofht/are allows users to create, access and manage a collection of data.
A. Note taking
B. Database chapter 3 part 2
C. Spreadsheet page 19
D. Word processing
42. The following statements are true and discuss how software is distributed EXCEPT
A. ProductivitY
B. Security
C. File, disk and system management
D. Personal interest
A. query
B. retrieval internet
C. filter
D. function
42. Search tools typically use a(n) , which stores a variety of information
about a file.
A. index
B. signature
internet
C. directory
D. header
A. packed internet
B. boxed
C. zipped
D. abbreviated
50. Which of the following are NOT the examples of the web and mobile applications for
personal productivity?
51. is tool that identifies and fixes operating system problems, detects and
repairs drive problems, and includes the capability of improving a computer's
performance.
chapter 3 part 2
A. PC maintenance page 55
B. File manager
C. Disk defragmenter
D. Disk cleanuP
52. All of the followings are the goals of ARPANET EXCEPT chapter 4 part 1
page 7
A. build a network that allowed scientists at different physical locations to share
information
B. build a network that allowed scientists at different physic.al locations to work
together.
C. build a network that could function even if part of the network were disabled.
D. build a network that could provide resources and access variety of services.
A. mobile browsers.
B. home page.
C. HTML.
D. DNS server.
A. web name.
B. browser.
C. websites.
D. web address.
A. sending device.
B. receiving device.
C. communication channel.
D. transmission device.
chapter 4 part 2
page 46
A. twisted-pair cable.
B. transmission cable.
C. coaxial cable.
D. fiber-optic cable.
61. The best communications line for networks with large amount of traffic is
A. T-carrier.
B. cable.
C. FTTP.
D. ATM.
A. Tethering
internet
B. Bandwidth
C. lnternet backbone
D. Dongle
63. "lt is a high-speed network that connects local area network in a city to handle
communications across the region". This statement refers to
C. PANs.
D. LANs.
A. Twisted-Pair Cable
B. Coaxial Cable
C. Fibre-Optic Cable
D. lnfrared
66. When a user chooses which folder and file to include in a backup, he is using method
called
is backup method.
A. full
B. selective
C. differential
D. incremental
67. When a perpetrator sends an influx message to attack a computer network and causes
the network to become unresponsive, he is carrying out a(n) computer
abuse technique.
68. is a filter that blocks unreliable and unauthorized information from the
lnternet before it reaches a computer or network.
chapter 3 part 2
A. Firewall page 42
B. Malware
C. Virus
D. Zombie
69. A program that displays an online advertisement in a banner, pop-up window, or other
lnternet services is called
A. Hardware theft
B. Restore internet
C. Hardware vandalism
D. Hardware failure
71. A program that blocks or limits access to a computer, phone or file until the user pays
a specified amount of money is called
A. malicious software.
B. adware. internet
C. ransomware.
D. spyware.
A. password
B. passphrase
C. PtN
D. username
79. The followings are the challenges in financial technology (Fintech) application
EXCEPT
A. regulatory compliance.
B. Iimited Credit and stafi-up experience.
C. low consumer protection.
D. well-developed business model.
80. The emergence of FinTech is attributed to the following factors EXCEPT for
A. technology groMh.
B. favourable regulatory environment.
C. the rise of the millennials and Gen Z who are more open to newer mediums
and technologies.
D. increase in financial services cost.
(Total: 80 Marks)
PART B
This part contains twenty (20) true or false statements. ldentify whether the statement
is true or false. Answer ALL of the True or False questions on the True or False answer
sheet.
4. The access time of storage devices is faster than ihe access time of memory.
5. The computer uses analog signals that recognise only two discrete states: on and off.
6. Military uses motion inputs for flight simulation and physical rehabilitation therapy.
9. The user may exit the programme or try a warm boot and then a cold boot if an
application stops responding.
10. Fetching is the process of translating the instruction into signals the computer can
execute in a machine cycle.
11. A cooling pad rests below a laptop and protects the computerfrom overheating and
also the user's lap from excessive heat.
12. Desktop publishing software is an application that assists professionals and designers
in creating engineering, architectural, and scientific designs and models.
13. The Track Exercise application is one of the personal interest applications commonly
used by users.
14. Phishing filters will not block your computer from suspicious websites.
15. One way to protect yourself from identity theft online is to clear or disable web cookies
in your browser.
16. A dynamic webpage's contents generate each time a user displays the page.
17. lnternet backbones provide individuals and organisations access to the lnternet for
free or for a fee.
18. One of the advantages of using Bluetooth technology is that it can be used to connect
devices that are not the same make or model.
19. Digital signatures are often used to ensure that an impostor is not participating in an
lnternet transaction.
20. lnformation transmitted over networks has a lower degree of security risk than
information kept on an organization's premises.
(Total: 20 Marks)