0% found this document useful (0 votes)
143 views5 pages

Ugbs 102 Introduction To Computing in Business

The document contains a practice exam for a business computing course. It includes multiple choice and short answer questions over three sections covering topics like computer hardware, software, networking, security and more. It provides context and tests students' understanding of fundamental computing concepts.

Uploaded by

joe creek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
143 views5 pages

Ugbs 102 Introduction To Computing in Business

The document contains a practice exam for a business computing course. It includes multiple choice and short answer questions over three sections covering topics like computer hardware, software, networking, security and more. It provides context and tests students' understanding of fundamental computing concepts.

Uploaded by

joe creek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

STUDENT ID: ........... ........................... .

DII '
I
&I
lr~~
UNIVERSITY OF GHANA
(All rights reserved)

BSc. BUSINESS ADMINISTRATION


SECOND SEMESTER EXAMINATIONS 201412015
UGBS 102: INTRODUCTION TO COMPUTING IN BUSINESS (3 CREDITS)

THIS PAPER IS DIVIDED INTO TWO (2) SECTIONS.


ANSWER ALL QUESTIONS IN BOTH SECTIONS
TIME ALLOWED: TWO (2) HOURS

SECTION A [60 MARKS]


ANSWER ALL QUESTIONS IN THIS SECTION

1. The owner of "Glasses" Ltd intends to add an Internet cafe to his current business. He plans to
deploy 20 computers in the new Internet cafe. During a fact finding on the business, he read
about client/server and peer-to-peer computing. He has asked your opinion about which one of
the two will be appropriate for the Internet cafe.
A. Explain to the owner the concepts of client/server and peer-to-peer computing.
[2 Marks]
B. List three advantages and disadvantages each of client/server and peer-to-peer
computing. [6 Marks]
C. Indicate which of the concepts will be appropriate for his new Internet cafe and
why? [4 Marks]
D. Explain private and public Internet protocol (IP) addresses. [2 Marks]
E. List three characteristic of private and public Internet protocol (lP) addresses.
[3 Marks]
F. Explain how these types ofIPs can be used in the cafe business. [3 Marks]

[Total: 20 Marks]

Examiner: Prince K. Senyo Page 1 of5


STUDENT ID: ........... •...................... .....

2. A. With appropriate examples, explain the following computer network terminologies:


I. Local Area Network (LAN)
II. Transmission Control Protocol (TCP)
III. Wide Area Networks (WAN)
IV. Ring Topology
V. Star Topology [10 marks]

B. With aid of an appropriate diagram, explain the information processing cycle. (5 marks]

C. What is an instruction cycle? List and explain the stages of an instruction cycle. [5 marks]

[Total: 20 Marks]

3. A. List and explain the five categories of computer hardware. Provide examples for each of the
categories. [5 Marks]

B. With appropriate examples, explain each of the following E-Cornrnerce terms.

I. Business-To-Consumer (B2C)
n. Business-To-Business (B2B)
III. Consumer-To-Consumer (C2C)
IV. Business-To-Governrnent (B2G) (4 Marks]

C. Define operating system and explain four activities that it performs. [4 Marks]

D. Name and explain three types of operating systems and provide examples of each type.
[3 Marks]

E. List and explain any four goals of information security. [4 Marks]

[Total: 20 Marks]

Examiner: P rince K . Senyo Page 2 of 5


STUDENT ID: ...................................... .

SECTION B [40 MARKS)


ANSWER ALL QUESTIONS IN THIS SECTION
Circle the best option that completes the statement or answers the question.

1) The four-step process of fetch, decode, 8) The greater the number of on a


execute, and store is called a(n): microprocessor, and proximity to each other,
A) machine cycle. B) logical operation. the faster the processing speed.
C) instruction cycle. D) arithmetic A) buses B) registers
operation. C) disks D) transistors

2) Which of the following would NOT be 9) Comparing a binary digit to a _ _ __


found on the motherboard? is an easy-to-understand analogy.
A) Drive bays B) Input/output buses A) highway B) memory chip
C) System clock D) Microprocessor C) light switch D) storage bin

3) Which of the following characters is NOT 10) Which of the following components
permitted in file names? would NOT be found inside the system unit?
A) - B) " C) _ D) A space A) Cooling fan B) Power supply
C) Motherboard D) USB port
4) The type of software that sits on top of
the operating system and utilizes the 11) A is a client that relies on the
computer's capabilities to perform a user server for its processing ability.
task is called: . A) thin client B) minimal client
A) system software. B) internal software. C) terminal client D) limited client
C) application software. D) utility software.
12) Which of the following is TRUE about
5) The set of programs designed to manage RAM?
the resources of a computer is the: A) It is located on the motherboard.
A) operating system. B) boot strap set. B) It holds documents in progress.
C) utility set. D) resource manager. C) It holds all programs in use.
D) All of the above.
6) NIC is an abbreviation for which of the
following terms? 13) A byte:
A) Network interface capability A) represents one digit in the decimal
B) Network interface card numbering system.
C) Network information card B) can be compared to the state of one light
D) Network integration card switch being either on or off.
C) is the equivalent of eight binary digits.
7) The CPU is often referred to as the D) is the smallest unit of information that a
- - - - of the computer. computer can process.
A) heart B) core
C) brain D) soul

Examiner: Prince K. Senyo Page 3 of5


STUDENT ID: ...................................... .

14) System utilities are used for all of the 20) A utility program that contains the
following purposes EXCEPT to: instructions to make peripheral devices
A) protect your computer from viruses. function correctly is a:
B) serve as an Internet interface with your
Internet browser. A) peripheral OS. B) driver.
C) organize and find files on your computer. C) specialized OS. D) standalone
D) create backups of system and application program.
fi les.
21) In order from slowest to fastest, the
15) The information on a web page is in correct order of the types of Internet access
is as follows: .
- - - format.
A) dial-up, cable, DSL, satellite, FiOS.
A) WEB B)HTML B) DSL, dial-up, FiOS, cable, satellite.
C)HTLM D) MIME C) FiOS, satellite, cable, DSL, dial-up.
D) dial-up, DSL, cable, satellite, FiOS.
16) Application files commonly have the
extension: 22) Given the file designation below, in
A) .exe. B) .docx. which folder is the file located?
C) .txt. D) .prog. C:\Computer\Program\Homework\Al.docx

17) Which of the following computers A) Computer B)C:


would be used in a large corporation to C) Homework D) Program
complete huge processing needs, such as
airline reservations? 23) All of the following are needed to access
A) Supercomputer B) Mainframe your computer in a multiuser environment
C) MipJcomputer D) Server EXCEPT a(n):
A) home directory. B) Internet address.
18) was developed to enable C) user name. D) password.
recording, rewriting, and playing back high-
definition video and large amounts of data 24) A file provides information
storage. about the file such as its date of creation or
A) BIu-ray disc B) Virtual technology SIze.
C) Hybrid technology D) NTFS A) setting B) name
C) property D) extension
19) The device that combines the
capabilities of a handheld computer with
mobile phone capabilities and Web access is
known as a - - - -
A) mobile computer B) minicomputer
C) multiphone D) smartphone

Examiner: Prince K.. Senyo Page 4 of5


STUDENT ID: ...................................... .

25) An efficient way to reduce the chance of


losing all of the work in your file as a result 31) _ _ _ _ _ _ _ _ _ _ is Internet
of a power failure is to: software that may monitor your computer or
online activity, relay information about you
A) save your file for the first time before to its source, or allow others to take control
you enter any text on the document screen. of your computer.
B) save your file with a new filename every
10 minutes.
C) save your file for the fust time after you 32) The hardware responsible for processing
have completed entering the content. input into output in a computer system is
D) activate the Autosave 'option and set it to
save automatically every 10 minutes. called
-------------
26) Instead of:looking up information in a 33) A network in which each node is
printed manual, you can use a program's connected to the line is called a(n)
- - - - featUre to read documentation
right on the computer. _ _ _ _ _ _ _ _ _ _ topology.
A) View B) Help
C) Question D) About 34) A(n) sector virus
installs itself on the beginning tracks of a
27) The second part of a file name on a PC hard disk where code is stored, which
is called the: automatically executes every time the user
A) suffix. B) domain. starts the computer.
C) prefix. D) extension.
35) is the use of
28) A complete URL has four parts: networks or the Internet to carry out
protocol, , path, and resource business of any type.
name.
A) network id B) server name 36) Computer is
C) domain name D) IP address another term for primary storage.

29) Which of the following is the study of 37) The is


converting information into encoded or the large printed circuit board that holds the
scrambled formats? computer's important components such as
A) Numerology B) Cryptography the microprocessor.
C) Epistemology D) Cartography
38) A computer uses _ _ _ _ _ _ __
30) A local area network (LAN) in which all memory when the RAM gets full.
the computers are equals is called a(n)
- - - - network. 39) Ethical hackers are also known as
A) equal resource B) equal sharing
D) client/server
C) peer-to-peer
- - - - - - - - - - -hats.
SHORT ANSWER. Write the word or 40) VPN stands for
phrase that best completes each statement
or answers the question.

Examiner: Prince K. Senyo Page 5 of5

You might also like