Certificate in Purchasing and Supply Management Cohort: ROD/CPSM/ 05 Year 1 Examinations for 2005 MODULE: COMPUTER FUNDAMENTALS MODULE CODE: BISE 010 Duration: 2 Hours Instructions to Candidates: 1. This paper consists of Sections A and B. 2. Section A contains 100 multiple choice each carrying 1 Mark. 3. Section B contains 25 Fill-In-The-Blanks questions each carrying 2 Marks. 4. Answer all questions on the questionnaire. 5. Total percentage 100%. This question paper contains 2 sections and 8 pages. Page 1 of 8
Section A. This Section has 100 Multiple Choice Questions Encircled the right answer with a Black or Blue pen. Each Correct answer carries 1 Mark. 1. Which of the following architecture comprises computers, all having the same services and equal rights? a. client/server b. centralized c. decentralized d. peer to peer 2. Which of the following are secondary storage devices? a. Optical disks b. Floppy Disks c. DVDs 3. The device which detects the presence of shaded dots on the page and then converts this information into an easily manipulated stream of 1 's and 0's is known as a. A Scanner b. A word- processor c. A database 4. An application of voice and vision technology is in a. Word-processing b. Video Conferencing c. Telephone 5. The use of advance technology in education has given rise to a. Tele-communication b. Tele conferencing c. Virtual Education 6. Which one of the following is a system software? a. database management system b. operating system c. application software d. information system 7. The four common types of files are document files, worksheet files, database files, and: a. presentation files b. program files c. digital files d. System files 8. are widely used to store and transport data from one computer to another? a. Hard disks b. CD-ROMs c. Floppy disks d. DVD-ROMs 9. Which of the following is not an example of an Operating System? a. MS DOS b. Windows XP c. MS Access d. Linux 10. The entire computer is coordinated by a. The ALU b. The Control Unit c. The CPU d. The Memory 11. The electrical circuitry that executes program instructions is a. Register b. Memory c. ALU d. CPU 12. Data and instructions are put into primary storage by a. Memory b. Secondary storage c. Control unit d. ALU 13. During the I-Time, the ALU a. Fetches the instructions b. Executes the instructions c. Copies the instructions d. Does nothing 14. The System Bus is a. The computer casing b. The electrical signal that carries data c. The CPU. 15. Which of the following is a port/bus commonly found on PCs a. Floppy Drive b. Monitor c. USB 16. The main memory of the computer is a. Also known as secondary storage b. A permanent storage c. Non-volatile d. volatile Page 2 of 8
17. I/O is used to mean a. Inside/Outside b. In/Out c. Input/Output 18. The following is an input device a. Monitor b. CPU c. Keyboard d. Mother-Board 19. The process of sending data into the computer is known as a. Computing b. Processing c. Input d. Output 20. The keyboard a. Comes with all computers b. Contains keys like a typewriter c. Is available in many languages d. Is all of the above 21. A pointing device a. Is an input device b. Is an output device c. None of the above 22. A mouse can be of the following categories a. Input-Process-Output b. Mechanical-Electrical-Electronic c. Mechanical-Optical-Wireless d. Optical-Logical-Physical 23. The following are pointing devices a. Keyboard, Monitor and Laser Pointer b. Trackball, Touchpad and Mouse c. Mouse, Microphone and Keyboard 24. Input may be of the following forms a. OCR, MICR and CPU b. OMR, VGA and SVGA c. VGA, SVGA and XVGA d. OMR, MICR and OCR 25. A Flatbed Scanner a. Scans viruses on a bed b. Scans viruses on a computer c. Converts a paper document into a digital form 26. Voice Input converts voice into a. A digital form b. Barcodes c. Optical Marks 27. Output devices are used to a. Store information by the computer b. Perform calculation by the CPU c. Provide information to the user 28. Output can be either a. Hard or Rough b. Hard or Soft c. Soft or Rough 29. A Monitor is a. Used to monitor the performance of a computer b. An input device c. An output device 30. Which one of the following is not an application software? a. Windows 3.1 b. MS Word c. Star Office d. ACCPAC 31. A multitasking operating system is one where a. a single task is carried out at a time b. a computer has more than one processor c. more than one task can be executed at a time d. many tasks are executed sequentially 32. A process can be defined as: a. the source code of a program b. part of an application software c. part of a program being executed by an operating system d. part of a system software Page 3 of 8
33. Which one of the following is not a multitasking Operating System? a. MS Windows 98 b. Linux 8.1 c. Unix d. MS DOS 34. Which application software would you use to record data about employees details in a company? a. Word Processor b. Database Management Software c. Web based software d. Graphics Software 35. The advantage of a tailor made software upon a ready made one is that the former is: a. cheaper b. less secured c. more flexible d. easier and faster to implement 36. An operating system can be defined as: a. An interface between the hardware and the software b. An interface between the system and the software c. An interface between the user and the hardware d. An interface between the user and the software 37. Which one is not an entertainment software? a. MS Excel b. Pinball c. Solitaire d. Hearts 38. Which one is an education software? a. CBT b. MS Word c. Pinball d. IRC 39. Which one is a productivity software? a. Notepad b. Solitaire c. IRC d. MS Access 40. Modulation and Demodulation are the function of a a. CPU b. Mother Board c. MODEM d. Node 41. The following is the measurement of the capacity of a communication channel a. Protocol b. Packets c. IP Address d. Bandwidth 42. The standard protocol for the Internet in the a. OSI b. LAN c. WAN d. TCP/IP 43. Any device connected in a network is known as a a. Computer b. Node c. Hub d. Server 44. Devices that sends/receives satellite signals are called a. Modems b. Earth stations c. Tokens d. Servers 45. Distortion in a signal is called a. Phase b. Noise c. Frequency 46. A network that connect all nodes with a single cable is called a. Star b. Switched c. Ring d. Bus 47. Microwave transmission, coaxial cables and fiber optics are example of a. Network topology b. Transmission media c. Modems 48. A network of geographically distant nodes is called a a. Bus b. ATM c. WAN d. LAN 49. The Internet is an example of a: a. LAN b. MAN c. VAN d. WAN Page 4 of 8
50. Users are able to connect on the Internet from different platforms due to the standards. a. PPP b. HTTP c. TCP/IP d. FTP 51. Which of the following is not an Internet browser? a. Internet Explorer b. Netscape Navigator c. Opera d. Microsoft Outlook 52. What are the services provided by an ISP? a. Newsgroups b. Emails services c. Web hosting 53. The protocol utilized for wireless Internet is: a. WAP b. WAN c. WWW d. WXP 54. Which of the following is commonly used for dial-up connection on the Internet via a telephone line from a stand alone PC? a. A modem b. A NIC c. A Flash BIOS d. A TV Card 55. The number of Internet subscribers actually in the world turns around: a. Thousands b. Millions c. Billions d. Trillions 56. When a user requests a search with a key word in a search engine he/she obtains: a. a list of definitions of that word b. a list of hyperlinks related to that word c. a list of sites having same URL as the key word d. a list of more search engines 57. The URL is: a. a user friendly name for a web site location b. the Uniform Resource Locator c. unique on the net d. all of the above 58. Which of the following is not an example of a search engine on the net? a. Google b. Yahoo c. AltaVista d. UTM Newsgroup 59. In which of the following circumstances, the Internet might be harmful to unadvised users? a. Not respecting copyright issues b. Using stolen passwords c. Posting corrupted data on web sites 60. In Mauritius, the use of Internet is under the Act. a. Electronic Transaction b. ICT c. MT d. ISP 61. A 4 GL is a tool used for a. Repairing computer failures b. Building software application c. Learning online 62. EDI refers to the a. Electronic transmission of document b. Email system of an enterprise c. Telecommunication system of an enterprise 63. A knowledge-based system that simulates human reasoning is known as a. A word processor b. A 4GL c. An Expert System d. A Database 64. A textual image is converted into editable text using a. A 4GL b. An Expert System c. An OCR 65. The production of high quality publications by publishers is best made using a a. Word-Processor b. 4 GL c. An Expert System d. A DTP software Page 5 of 8
66. What type of virus self-replicates and resides in your machine s memory? a. Trojan b. Shell c. Worm d. Boot sector 67. Which of the following is not a choice on the Content Advisor s list of configurable options? a. Sex b. Nudity c. Violence d. Brutality 68. If you realized that you had a virus on your local machine, what would be your first course of action? a. Install a service pack b. Install a hot fix c. Run anti-virus software and perform a full scan d. Delete the C drive 69. You want to set up a protected segment on your network where you can build a Web Server with a Web site that is accessible via the public Internet. Where would you put the server? a. Public network b. Private network c. NAT d. DMZ 70. Which of the following is not true about a firewall? a. A firewall can be both hardware and software b. A firewall protects only against external threats c. An anti-virus software can be part of a firewall d. A firewall is only a hardware 71. NAT stands for a. Network Associate Translation b. Network Address Translation c. Network Authentication Translation d. Network Address Transport 72. The most important step in implementing a security strategy is: a. Deployment of a firewall b. Security Awareness c. Cost d. People 73. Which of the following is a non-malicious threat? a. Hackers hacking IP addresses of computers b. Cracking passwords c. Sending infected files deliberately d. Not updating anti-virus software on your local machine regularly 74. Which of the following could be the most damaging to your computer? a. Internal non-malicious threat b. External non-malicious threat c. Internal malicious threat d. External malicious threat 75. What freeware application snaps into Microsoft Outlook Express and helps you personally encrypt your emails and files? a. PGP b. SET c. DMZ d. IPS 76. The IT Dept of an enterprise is also known as the a. Computer Dept b. I.S. Dept c. Data Processing Dept 77. The head of the MIS Dept is typically the a. Programmer b. System Analyst c. MIS Director 78. The MIS Dept a. Works on request for computerization b. Maintains existing computer system c. Deals with the information needs of other depts. 79. is concerned with the analysis and design of new computerized system. a. Programming b. Coding c. Debugging d. System Analysis 80. Monitoring the use of hardware, software and personnel resources in the IS dept is known as a. Operating System b. Operation Management c. Management Information System Page 6 of 8
81. Software Development Life Cycle is a. The life-time of a software b. The stages of software development c. When a software is removed 82. The following is not a stage of the SDLC a. System Testing b. Feasibility Study c. Self Study d. System Design 83. The decision to go or not to go for computerization is taken after a. System Design b. System Implementation c. Feasibility Study d. All the above 84. The FS Report refers to a. Financial Support b. Feasibility Specification c. Functional Specifications 85. System Testing is usually done a. During coding b. After coding c. Both the above 86. Output devices are not used to a. Store information by the computer b. Perform calculation by the CPU c. Feed data to the Computer 87. Which of the following is not a type of mouse? a. Mechanical b. Scroll Wheel c. Optical d. Wireless 88. Joystick is a a. a pointing device b. an input device c. an output device d. both a and b 89. A Monitor is an example of a. an output device b. an input device c. a pointing device d. none of the above 90. LCDs and CRTs are two types of a. printer b. scanner c. mouse d. monitor 91. Dot Matrix printers print a. one line at a time b. one page at a time c. one character at a time d. by spraying ink 92. Which of the following are advantages of a Centralised Architecture? a. Control and Management b. Security c. Low availability of resources d. both a and b 93. The role(s) of an ISP is (are) a. to provide internet connection the outside world b. to bill connectivity c. to route emails to subscribers d. all the above 94. I/O is used to mean a. Inside/Outside b. In/Out c. Input/Output 95. LAN stands for a. Large Area Network b. Local Area Network c. Legal Area Network 96. Two categories of services used by a WAN are a. switched and dial-up b. dedicated and leased c. switched and dedicated d. none of the above 97. The main circuit board of the computer is known as a. CPU b. Motherboard c. MODEM d. Node 98. WAP is a a. transmission media b. protocol c. MODEM d. device Page 7 of 8
99. Which of the following is a transmission media for network? a. Twisted Pair Cables b. Microwave c. Fiber Optics 100. Star, Ring and Bus are a. protocols b. transmission media c. network topologies d. all of the above. Section B This section contains 25 Fill-In-The-Blank questions. Write the appropriate answer in the space provided. Each correct answer carries 2 marks. 1. Each country needs to have an in order to provide connectivity to the rest of the world. 2. are required to enable users to interact with the computer. 3. Input devices converts what people understand into a form that understands. 4. produces excellent graphics and good quality output but is slower than laser printer. 5. output better images but are expensive than CRT monitors. 6. Data communication requires a sending device, a communication and a receiving device. 7. shares data among users who are geographically distant. 8. Both and twisted pair transmits data electrically through a metal conductor. 9. Receiving signals from earth stations is known as. 10. PDAs, Palmtops and notebooks are known as computers. 11. Programs designed specifically to address general-purpose applications and special-purpose applications are called. 12. During E-Time, the ALU the instructions. 13. When a computer boots up it performs a POST which stands for. 14. The physical layout of a LAN is called its. 15. LAN and WAN are two types of. 16. ISP stands for. 17. There are four types of computers: supercomputers, mainframe, microcomputers, and. 18. is the unit of storage used to represent one million bytes. 19. The main circuit board in a computer is the. 20. A software is more suitable for writing a letter. 21. An Expert system is also known as a -Based system. 22. Voice and Vision are essential to implement -Conferencing. 23. The is the range of frequencies that a communication media can carry. 24. Flatbed, Sheet-Feed and Hand-Held are examples of. 25. Satellite transmission is essentially microwave transmission with a acting as a relay. ***END OF QUESTION PAPER*** Page 8 of 8