Looks like no one added any tags here yet for you.
Internet Protocol
IP stands for
Charles Babbage
Who invented the Analytical Engine?
Lotus Blossom
In the first numbering system of Egyptians number 1,000 is written as:
Abacus
What do you call the very first calculator?
Analyze data
We use computers to:
Operating System
What is the software that acts as an interface between computer hardware components and the user?
File Management
The examples of this function of Operating System is the creation, transfer, copy, and storage of files
CPU
Which among the following is the brain of the computer?
Network
By connecting computers you are creating a?
Long Term Evolution
LTE stands for:
Social Relations
Complete the sentence: ___________Are fundamental aspects of life
Academic and Scientific purposses
Internet is initially indicated for what purpose?
Closing Distance
Technology enables us to communicate with someone from a far.
a.172.163.25.1
b. 172.16.325.10
C. 17.26.325.1
d. None of the above--
Which among the following is an example of a IPV4?
a.172.163.25.1 b. 172.16.325.10 C. 17.26.325.1 d. None of the above
a. Electronic mail
b. File sharing
C. Mobile apps
d. None of the above---
The following are services of the internet except: a. Electronic mail b. File sharing C. Mobile apps d. None of the above
Hyperlinks
World Wide Web is interconnected through?
Websites
Aside from websites how are the resources are being presented in the World Wide Web?
World Wide Web
Which among the following is the most commonly used internet service?
Web 1.0
This generation is called Read-only Internet
Transmission Control Protocol
TCP stands for:
Mother board
It act as the backbone of the computer.
Heatsink
This electronic component prevents the processor from overheating by absorbing the heat generated by the processor.
High Sierra
What is the latest Apple macOS?
a. Analytical engine age ---
b. Mechanical age
c. Pre-mechanical age
d. None of the above
Which among the following doesn't belong to the periods of ICT evolution? a. Analytical engine age b. Mechanical age c. Pre-mechanical age d. None of the above
Electronic Numerical Integrator and Computer
ENIAC stands for:
Discharge
What do you need to do before touching the newly purchased computer casing?
c. Video Card
Which among the following is used to enhance the quality of images showed in a display of a computer? a. Memory b. Monitor C. Video card d. None of the above
Modem
It is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio.
Wireless Local Area Network or Wireless Lan
What does WLAN mean?
64 bit
How many bits does IPv6 have?
WPA 2
Which among the following wireless security is the current and most secure standard?
Open your device's wi-fi connection
What is the first thing to do in connecting your device on a wi-fi?
File management
A function of an Operating System wherein it provides various techniques which assure the integrity and confidentiality of user data.
Avoidance of real-life interactions
One of the disadvantage of technology in people's social relationship wherein an individual tends to stay on their device not wanting to go out and have time with their friends.
Alexander Graham Bell
Who invented the telephone?
International ISP
The following are ways to access the internet except?
Universal Automatic Calculator
UNIVAC stands for:
Radio
During the mechanical age of ICT evolution, Johann Gutenberg invented a device that starts the first information explosion.
Client
The part of internet connection where the data is consumed.
a. Handles memory management and CPU scheduling
b. Provides a platform for running applications
c. Supports application development
d. None of the above----
Which among the following is not a feature of Operating System?
a. Handles memory management and CPU scheduling b. Provides a platform for running applications c. Supports application development d. None of the above
Viruses
All of the following are examples of real security and privacy risks EXCEPT: a. hackers. b. spam. c. viruses. d. identity theft.
Data selection
A process known as __________ is used by large retailers to study trends
Data
is used by large retailers to study trends. terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
PSS
A_______ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.
Computer forensics
The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
C. Analyzing the data or information
Which of the following is NOT one of the four major data processing functions of a computer?
a. gathering data b. processing data into information c. analyzing the data or information d. storing the data or information
RFID
_______Tags, when placed on an animal, can be used to record and track in a database all of the animals movements
robotics
Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
proprietary
Technology no longer protected by copyright, available to everyone, is considered to be
Nanoscience
is the study of molecules and structures whose size ranges from 1 to 100
Explorer
Which of these is not a search engine? a. Google b. Yahoo C. Explorer d. Ask
To process data
What is the primary function of a computer's central processing unit (CPU)?
It ties all the components of the computer together
Why is the motherboard important in a computer?
C. All of the answers are correct.
Why would someone buy an ergonomic keyboard? a. To create their own customized keyboard layout b. To prevent carpal tunnel and other repetitive motion syndromes. C. All of the answers are correct. d. To allow faster and more efficient typing
Biometric identification device
Which type of input device can identify users based on their voice?
by grounding the internal components via attachment to the case
How are the internal components of a computer protected against ESD?
EPS12V
A technician wants to replace a failing power supply on a high-end gaming computer. Which form factor should the technician be looking for?
PCIe
Which expansion slot is used by an NVMe compliant device?
Thunderbold
Which port allows for the transmission of high definition video using the DisplayPort protocol?
b. It superimposes images and audio over the real world in real time.
Which statement describes Augmented Reality (AR) technology?
a. It always requires a headset. b. It superimposes images and audio over the real world in real time. C. The headset closes off any ambient light to users. d. It does not provide users with immediate access to information about their real surroundings.
128 GB
What is the maximum storage capacity of a single DDR5 DIMM stick?
Working on a grounded antistatic mat
Which action can reduce the risk of ESD damage when computer equipment is being worked on?
Motherboard
When a new PC is being built, which component has the most influence when selecting the case and power supply?
a. It makes the I/O ports of the motherboard available for connection in a variety of computer cases.
Which statement describes the purpose of an I/O connector plate?
a. It makes the I/O ports of the motherboard available for connection in a variety of computer cases. b. It provides multiple connections for SATA hard drives to connect to the motherboard. c. It plugs into the motherboard and expands the number of available slots for adapter cards. d. It connects the PCle adapter slots used for video directly to the CPU for faster processing.
Servers
Where is buffered memory commonly used?
SATA
While shopping for a replacement motherboard, a customer decides to also purchase a new mechanical hard drive and asks the technical salesperson for advice. Which storage interface should the salesperson recommend for the motherboard and new drive?
A notch in the memory module should be aligned with a notch in the memory slot.
A technician is installing additional memory in a computer. How can the technician guarantee that the memory is correctly aligned?
Markup language
contains text as well as information about the text.
Warm boot
A user is using the operating system facilities to restart a computer. The user is performing a ________
Device driver
A small program that tells the operating system how to communicate with a specific device is called
Artificial Intelligence (AI)
IS THE SCIENCE THAT ATTEMPTS TO PRODUCE MACHINES THAT DISPLAY THE SAME TYPE OF INTELLIGENCE THAT HUMANS DO
Information
_________ is data that has been organized or presented in a meaningful fashion
Processing
The name for the way that computers manipulate data into information is called:
Input
Computers gather data, which means that they allow users to ___________ data
Data
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
Database
Which of the following is an IT enabled service?
a. Digitization
b. Data transfer
c. Transcription
d. None of the given---
refers to conversion of non-digital material to digital form.
a. Digitization b. Data transfer c. Transcription d. None of the given
Data Path
channel for communicating across a boundary between two or more subsystem is known as
This leads to added abilities for self-regulated learning
What benefits one can get from ICT in education?
Identifying subsystems and interfaces between subsystems
System analyst designs a new system by