100% found this document useful (3 votes)
4K views17 pages

Ais160 Final Examination Feb 2023

The document is a confidential exam paper for a Fundamentals of Information Technology course. It consists of two parts with a total of 100 multiple choice questions to be answered in three hours. The exam covers topics related to IT fundamentals and concepts.

Uploaded by

Adam Haziq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
4K views17 pages

Ais160 Final Examination Feb 2023

The document is a confidential exam paper for a Fundamentals of Information Technology course. It consists of two parts with a total of 100 multiple choice questions to be answered in three hours. The exam covers topics related to IT fundamentals and concepts.

Uploaded by

Adam Haziq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

ADAM HAZIQ

AC1102G

CONFIDENTIAL AC/FEB 2023/ArS160

UNIVERSITI TEKNOLOGI MARA


FINAL EXAMINATION

COURSE : FUNDAMENTALS OF INFORMATION TECHNOLOGY


COURSE CODE : AlS160
EXAMTNATION : FEBRUARY 2023
TIME : 3 HOURS

INSTRUCTIONS TO CAN DIDATES

1. This question paper consists of two (2) parts: PART A (80 Questions)
PART B (20 Questions)

2. Answer ALL questions from all two (2) parts:

i) Answer PART A in the Objective Answer Sheet


ii) 'Answer PART B in the True/False Answer Sheet.

3. Do not bring any material into the examination room unless permission is given by the
invigilator.

4. Please check to make sure that this examination pack consists of:

i) the Question PaPer


ii) an Objective Answer Sheet - provided by the Faculty
iii) a True/False Answer Sheet - provided by the Faculty
5. Answer ALL questions in English.

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


This examination paper consrsfs of 17 printed pages

@ Hak Gipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL AC/FEB Z0Z3lArS160

PART A

This part consists of 80 multiple-choice questions. Ghoose the most suitable answer
and shade the corresponding alphabet representing the answer in the objective answer
sheet provided.

1. A website is

A. a worldwide collection of electronic documents.


B. a computer that delivers requested webpages to your device.
a collection of related webpages stored on a webserver.
D.
C. an electronic document that contains text, graphic, audio and video.

2. When a user uses an application stored on web server that he/she accesses through
a browser, he/she is using a

A. mobile aPPlication.
B. server aPPlication.
C. desktoP aPPlication.
D. web aPPlication.

3. The gesture "swipe" in touch screen is used to

A. zoom in.
B. zoom out.
C. scroll.
D. run a program or aPPlication.

4. A produces hardcopy of text and graphics in black and white or colour.

A. scanner
B. printer
C. displaY
D. speaker

5. A collection of computers and devices connected wirelessly or via communications


devices and transmission media is called a

A. server.
B. network.
C. website.
D. search engine.

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL AC/FEB 2023lAlS160

6. A video conference is

A. a service that allows user to leave a voice message and videos for one or more
PeoPle.
B. a real time conversation among two or more people on a computer or mobile
devices connected to the network.
C. a real time meeting between two or more geographical separated people who
use network to transmit audio and video.
D. a real time conversation with another connected user where you also can
exchange photos, videos and other content.

T. The wireless communication technologies that use short range radio signal to
communicate is called

A. Wi-Fi.
B. cellular radio.
C. Bluetooth.
D. infrared.

B. The controls how users enter data and instructions and how information
is displayed on the screen.
chapter 3 part 1
A. user interface page 11
B. application
C. program
D. operating sYstem

g. A navigation system that determines location and direction is called

A. VolP. chapter 4 part 2


page 52
B. RSS.
C. FTP.
D. GPS.

10. Users use computer for publishing thoughts and ideas using the following media
EXCEPT

A. blog. chapter 3 part 2


B. podcasts. page 40
C. e-mail.
D. wiki.

11. Which of the following is a major DIFFERENCE between a server and a client
computer?

A. The server required a password to sign into the network.


B. The server has more power and bigger storage space'
C. Client computer can save more time and money.
D. The server requests resources from the client computer.

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL AC/FEB 2023/AlS160

12. Which of the following statements is TRUE?

A. Media Player is one of the personal interest applications.


B. A personal firewall can protect a computer against viruses.
C. Operating systems allow users to communicate with a computer and a mobile
device.
D. A desktop app refers to an application that can be accessed through a browser.

13. A(n) is a system that is used by scientist to imitate the behaviour of


human brain.

A. neural network
B. virtual realitY
C. augmented realitY
D. biology system

14. A network allows users in an organisation to share

A. data and information.


B. hardware.
C. software.
D. all the above.

15. Which of the following keys is a "toggle" key?

A. Clrl Z
B. F5
C. Navigation keYs
D. Num Lock

16. device contains a camera that detects gestures and converts. them to
digital signals.

A. A body recognition
B. The movement
C. A motion-inPut
D. The simulation

17. Which of the following statements about voice input is INCORRECT?

A. Speech-to-text features recognize spoken words and enter them into email or
text messages.
B. A voice recognition application allows users to dictate text and instructions by
speaking into a microPhone.
C. VolP enables users to speak to others via their lnternet connection.
D. A built-in speaker is used to enter voice input into the computers.

@ Hak Cipta Universiti Teknologi MARA GONFIDENTIAL


CONFIDENTIAL AC/FEB 2023/AlS160

18. Keylogging software is used to internet

A. automatically translate input to another language as the user enters data.


B. secure the device's keyboard from entering input in case of theft.
C. store every keystroke in a file for later retrieval.
D. determine if a computer's primary input device has been compromised.

19. Wireless mouse uses technologies to transmits instructions to


computers.

A. Wi-Fi
B. infrared
C. Bluetooth
D. cellular

ZO. Which of the following statements about output devices is INCORREGT?

A. Earbuds have noise-cancelling technology to reduce the interference of


sounds from the surrounding environment.
B. The LCD projectors produce sharper and brighter images shown on the
computer screen.
C. Data projectors are used during business proposal presentations for the panel
to see the presentation image and information clearly'
D. Notes written on the interactive whiteboard can be saved directly on the
computer or tablet.

21. When a student enters a calculation in a calculator app, the will translate
the instruction into a signal understood by a computer to be executed.

A. control unit
B. machine cycle
C. decode
D. comparison operation

22. Most photo printers use technology to produce lab-quality photo


printouts.

A. thermal
B. 3-D
C. laser
D. ink-jet

23. is an optical disc on which users can write once but cannot erase.

A. CD-ROM
B. CD-R chapter 2 part 2
C. CD-RW page 36
D. DVD-R

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL AC/FEB 2023/AtS160

24 consists of an antenna and a memory chip that contains the information


to be transmitted via radio waves.

A. NFCTags
B. Smart Cards chapter 2 part 2
C. Magnetic Stripe Cards page 47
D. RFID Tags

25. Which of the following statements about memory cards is INGORRECT?

A. Memory cards are fixed permanently in computer devices.


chapter 2 part 2
page 12
B. The capacities of memory cards vary.
C. Common types of memory cards include SDHC, SDXC, mini-SD, and many
more.
D. Memory cards are typically no more than 1.5 inches tall or wide.

26. Which of the following statements about SSD is CORRECT?


chapter 2 part 2
A. SSDs have slower access times than hard disks. page 22
B. A computer can only have either a hard disk or SSD.
C. SSD require frequent defragmentation.
D. SSDs are quieter than hard disks.

27. is the speed of which data, instructions and information are transferred
to and from a storage device.

A. Number of bytes internet


B. Access time
C. Transfer rate
D. Reading time

28. is a portable freestanding storage device that connect to USB port.

A. Optical disk
chapter 2 part 2
B. USB flash memory page 23
C. Memory card
D. External hard drives

29. Which of the following is NOT TRUE about the function/s of an operating system?

A. Operating system uses plug and play, to place items while waiting for the
devices to become idle.
B. There are two types of operating system user interface, which are graphic
interface and common line interface.
C. Operating system uses virtual memory to run applications simultaneously.
D. Its function is to starl and shut down the computer or mobile devices.

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


GONFIDENTIAL AC/FEB 2023lAlS160

30. will causes a display screen to show moving images or blank space
screen.

A. lmage viewer
B. File manager
C. Screen saver
D. PC maintenance

31. is memory resident, which means it remains in memory while the


computer is running.

A. Foreground internet
B. Kernel
C. Background
D. Virtual

32. Which of the following statements discuss the ADVANTAGE of multi-core processors?

A. A multi-core processor runS at a faster speed compared to a single-core


processor..
B. A multi-core processor is used in fixed-size computers.
C. A multi-core processor increases overall performance, especially when users
are running multiple programmes simultaneously.
D. A multi-core processor requires higher levels of power consumption.

33. Which of the following statements about computer memory is TRUE?

A. The content in volatile memory is permanent, and it will remain when the
computer's power is turned off.
B. Read-only memory (ROM) is one example of volatile memory.
c. Random-access memory (RAM) consists of memory chips that can be read
from and written to by the processor or other devices.
D. Flash memory chips store data and programmes on many servers.

34. Which of the following statements is INGORRECT regarding buses?

A. The bus width determines the number of bits that the computer can transmit at
one time.
B. The data bus is the number of bits the processor can interpret and execute at
a given time.
c. The larger the number of bits handled by the bus, the faster the computer
transfers data.
D. The purpose of a backside bus is to connect the processor to the cache.

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL AC/FEB 2023/AtS160

35. ln operating system, the memory management function is to

A. optimize the use of a computer or device's internal memory.


B. check for viruses.
C. allowing user to open application.
D. run the computer hardware.

36. ltems are placed in the while waiting to be transferred from an input
device or to an output device.

A. buffer
B. spooling
C. print spooler
D. device driver

37. The program that assesses and reports information about various computer resources
and devices is called

A. operating system. internet


B. buffer.
C. performance monitor.
D. device driver.

38. The process of starting or restading a computer is called

A. keying.
B. launching.
C. booting.
D. loading.

39. A user interface that uses short keyruords or abbreviations to enter data and
instructions is called
chapter 3 part 1
A. Graphical User lnterface. page 13
B. Super User lnterface.
C. Command Line lnterface.
D. Command User lnterface.

40. An application is defined as a

A. program that makes users more productive.


B. series of related instructions.
C. process of coordinating activities among computer or mobile device hardware.
D. technique to manage devices and media.
chapter 3 part 2
page 6

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL AG/FEB 2023/AIS160

41. sofht/are allows users to create, access and manage a collection of data.

A. Note taking
B. Database chapter 3 part 2
C. Spreadsheet page 19
D. Word processing

42. The following statements are true and discuss how software is distributed EXCEPT

A. custom software performs specific functions for a business.


B. public-domain software is software that is provided for use, modification, and
redistribution.
C. shareware is copyrighted software that is distributed at no cost for a trial period.
D. freeware is copyrighted software provided at no cost to users.

43. is a collection of individual related applications available together as a


unit.

A. Project management software


B. Accounting software
C. Software suite
D. Legal software

44. Screen savers and backup is a function in application.

A. ProductivitY
B. Security
C. File, disk and system management
D. Personal interest

45. The following descriptions refer to

. lt requires minimal storage space to back up


. Recovery is most time-consuming
. Fastest backup method
. Only most recent changes are saved

A. incremental backup. internet


B. selective backup.
C. cloud backup.
D. full backup.
46. A(n) is a request for specific data from a database'

A. query
B. retrieval internet
C. filter
D. function

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 10 AC/FEB 2023/AlS160

42. Search tools typically use a(n) , which stores a variety of information
about a file.

A. index
B. signature
internet
C. directory
D. header

48. A file is when it is reduced in size through the application of a


compression algorithm, commonly performed to save disk space.

A. packed internet
B. boxed
C. zipped
D. abbreviated

49. Disk defragmentation is used to chapter 3 part 2


page 54
A. reorganise the hard disks so that files are stored in contiguous sectors.
B. remove unnecessary files.
C. compress backup and other files to increase disk storage'
D. install paftitions on the hard disk to run separate operating systems on the
same comPuter.

50. Which of the following are NOT the examples of the web and mobile applications for
personal productivity?

A. Virlual reality simulation application


B. Travel applications
C. Calendar apPlication
D, Online social network web application

51. is tool that identifies and fixes operating system problems, detects and
repairs drive problems, and includes the capability of improving a computer's
performance.
chapter 3 part 2
A. PC maintenance page 55
B. File manager
C. Disk defragmenter
D. Disk cleanuP

52. All of the followings are the goals of ARPANET EXCEPT chapter 4 part 1
page 7
A. build a network that allowed scientists at different physical locations to share
information
B. build a network that allowed scientists at different physic.al locations to work
together.
C. build a network that could function even if part of the network were disabled.
D. build a network that could provide resources and access variety of services.

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 11 AC/FEB 2023/AlS160

53. The following logos rePresent

A. mobile browsers.
B. home page.
C. HTML.
D. DNS server.

54. A webpage has a unique address called a

A. web name.
B. browser.
C. websites.
D. web address.

55. All of the following is true about 3G EXCEPT

A. third generation of cellular transmissions.


B. improved video transmissions.
c. digital data transfer at speeds up from 144 Kbps to 3.84 Mbps.
D. standards include UMTS (Universal Mobile Telecommunications System) and
EVDO (Evolution Data OPtimized).

56. The following activities might be considered cyberbullying, EXCEPT for

A. sending or forwarding threatening text messages.


B. posting embarrassing or altered pictures of someone without his or her
permission.
C. setting up a fake online social network page where others make cruel
comments.
D. posting news on schoolactivities on social media'

57. Which of the following are practical applications of virtual reality?

A. Games and simulations.


B. Models of molecules, organisms, and other structures in science education.
C. Showcase products or create advertisements.
D. Allthe above internet

58. A hot spot is chapter 4 part 1 page 14

A. an unsearchable area of the interneJ known for illegal activity.


B. a zone in which it is safe to use your computer.
C. a wireless network that provides internet connections to mobile computers and
devices.
D. an area on a webpage that provides up-to-date content.

@ Hak Gipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 12 AC/FEB 2023/AtS160

59. A successful communication depends on the following EXCEPT

A. sending device.
B. receiving device.
C. communication channel.
D. transmission device.

60. The following cable is called a

chapter 4 part 2
page 46

A. twisted-pair cable.
B. transmission cable.
C. coaxial cable.
D. fiber-optic cable.

61. The best communications line for networks with large amount of traffic is

A. T-carrier.
B. cable.
C. FTTP.
D. ATM.

62. is a measure of the capability of a network to send and receive data.

A. Tethering
internet
B. Bandwidth
C. lnternet backbone
D. Dongle

63. "lt is a high-speed network that connects local area network in a city to handle
communications across the region". This statement refers to

A. MANs. chapter 4 part 2


B. WANs.
page 12

C. PANs.
D. LANs.

@ HakCipta Universitl Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 13 AC/FEB 2023/AlS160

64. A network standard is defined as a guideline

A. specified in the communication network.


B. that specifies the way computers access the medium to which they are
connected.
C. for the physical configuration of a network, such as cabling, network devices,
and nodes.
D. for the physical configuration of a network, such as cabling, network cards, and
devices.

65 Which of the following is NOT a physical transmission media?

A. Twisted-Pair Cable
B. Coaxial Cable
C. Fibre-Optic Cable
D. lnfrared

66. When a user chooses which folder and file to include in a backup, he is using method
called
is backup method.

A. full
B. selective
C. differential
D. incremental
67. When a perpetrator sends an influx message to attack a computer network and causes
the network to become unresponsive, he is carrying out a(n) computer
abuse technique.

A. denial of service attack


B. malware
C. access control
D. back door

68. is a filter that blocks unreliable and unauthorized information from the
lnternet before it reaches a computer or network.
chapter 3 part 2
A. Firewall page 42
B. Malware
C. Virus
D. Zombie

69. A program that displays an online advertisement in a banner, pop-up window, or other
lnternet services is called

A. adware. chapter 3 part 2


B. malware. page 45
c. spyware.
D. ransomware.

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 14 AG/FEB 2023/A15160

70. involves defacing or destroying digital equipment.

A. Hardware theft
B. Restore internet
C. Hardware vandalism
D. Hardware failure

71. A program that blocks or limits access to a computer, phone or file until the user pays
a specified amount of money is called

A. malicious software.
B. adware. internet
C. ransomware.
D. spyware.

72. A is private combination of characters associated with the username that


allows access to certain computer resources.

A. password
B. passphrase
C. PtN
D. username

73. Cookies is a small that web Server stores in a computer.

A. ' text file internet


B. command
C. scriPt
D. instruction

74. in cybersecurity involves scammers pretending to be someon9 else to


steal data or money or to spread malware'

A. Malicious software internet


B. Adware
C. Spoofing
D. Spyware

75. ldentify the CORRECT definition of cloud computing.

A. lt is a set of product-oriented architectures, which allow users to access a few


resources.
B. lt is a set of service-oriented architectures, which allow users to access a few
resources.
C. lt is a set of product-oriented architectures, which allow users to access a
limited number of resources.
D. lt is a set of service-oriented architectures, which allow users to access a
limited number of resources

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 15 AC/FEB 2023/AtS160

76. lnfrastructure as Service (laaS) provides

A. applications, management, and user interfaces provided over a network.


B. virtual computing, storage, and network resource that can be provisioned on-
demand.
C. application development frameworks, operating systems, and deployment
framework.
D. virtual computing, user interface, and network resource.

77. The followings are advantages of cloud computing EXCEPT

A. unlimited storage capacity.


B. easier group collaboration.
C. increased data reliabilitY.
D. weak data securitY.

78. The following statements is correct about big data EXCEPT

A. it is not compatible with sophisticated analytical techniques.


B. it uses new or expanded datasets and data.
C. it adopts the technologies required to generate, collect and store these new
forms of data.
D. it uses advanced data processing technologies.

79. The followings are the challenges in financial technology (Fintech) application
EXCEPT

A. regulatory compliance.
B. Iimited Credit and stafi-up experience.
C. low consumer protection.
D. well-developed business model.

80. The emergence of FinTech is attributed to the following factors EXCEPT for

A. technology groMh.
B. favourable regulatory environment.
C. the rise of the millennials and Gen Z who are more open to newer mediums
and technologies.
D. increase in financial services cost.

(Total: 80 Marks)

@.Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 16 AG/FEB 2023/AIS160

PART B

This part contains twenty (20) true or false statements. ldentify whether the statement
is true or false. Answer ALL of the True or False questions on the True or False answer
sheet.

1. Home network allows users to subscribe and use VolP.

2. A desktop app is an application that user accesses through a browser.

3. A computer requires an operating system to use application software.

4. The access time of storage devices is faster than ihe access time of memory.

5. The computer uses analog signals that recognise only two discrete states: on and off.

6. Military uses motion inputs for flight simulation and physical rehabilitation therapy.

7. UNIX is a multitasking operating system and an open-source software whose code is


provided for use, modification, and redistribution.

8. MacBook Pros have different user interface features manufactured by Google.

9. The user may exit the programme or try a warm boot and then a cold boot if an
application stops responding.

10. Fetching is the process of translating the instruction into signals the computer can
execute in a machine cycle.

11. A cooling pad rests below a laptop and protects the computerfrom overheating and
also the user's lap from excessive heat.

12. Desktop publishing software is an application that assists professionals and designers
in creating engineering, architectural, and scientific designs and models.

13. The Track Exercise application is one of the personal interest applications commonly
used by users.

14. Phishing filters will not block your computer from suspicious websites.

15. One way to protect yourself from identity theft online is to clear or disable web cookies
in your browser.

16. A dynamic webpage's contents generate each time a user displays the page.

@ Hak Cipta Universiti Teknologi MARA CONFIDENTIAL


CONFIDENTIAL 17 AC/FEB 2023/AtS160

17. lnternet backbones provide individuals and organisations access to the lnternet for
free or for a fee.

18. One of the advantages of using Bluetooth technology is that it can be used to connect
devices that are not the same make or model.

19. Digital signatures are often used to ensure that an impostor is not participating in an
lnternet transaction.

20. lnformation transmitted over networks has a lower degree of security risk than
information kept on an organization's premises.

(Total: 20 Marks)

END OF QUESTION PAPER

@ Hak Gipta Universiti Teknologi MARA CONFIDENTIAL

You might also like