Web view- doc or docx [Score: 1] _ 2 _ ... PDA [Score: 0] Firewire ... XXX logging (often called...

54
Pinelands High School Online Assessments Student Name:____________________________ Grade 11 November 2010 v2 Important: Please read the following instructions before proceeding: Test Instruction You have 1 hour to do this test. Top of Form Section: Software 1. A professional artist uses a … to touch up and improve a digital picture. brush and roller [Score: 0] mouse and stylus [Score: 1] 2. Look at the image of your teacher's laptop. Identify what is found in the different drives or identify the different hard drives: 1. E

Transcript of Web view- doc or docx [Score: 1] _ 2 _ ... PDA [Score: 0] Firewire ... XXX logging (often called...

Pinelands High School Online Assessments

Student Name:____________________________

Grade 11 November 2010 v2

Important: Please read the following instructions before proceeding:

Test Instruction You have 1 hour to do this test. 

Top of FormSection: Software 

1.   A professional artist uses a … to touch up and improve a digital picture.

  brush and roller [Score: 0] 

  mouse and stylus [Score: 1] 

2.   Look at the image of your teacher's laptop. Identify what is found in the different drives or identify the different hard drives:

1.  E

2.  F

3.  G

Place the number next to its corresponding match. Use each number only once. 

_1_   - Music [Score: 0.5]

_2_   - Removable hard drive [Score: 0.5]

_3_   - Images [Score: 0.5]

3.   If you use the Print Screen key and a copy of your screen is placed on the clipboard, select what short cut you should use to copy the picture from the clipboard to a document.

  <Ctrl><C> [Score: 0] 

  <Ctrl><X> [Score: 0] 

  <Ctrl><Z> [Score: 0] 

  <Ctrl><S> [Score: 0] 

  <Ctrl><V> [Score: 1] 

  <Ctrl><A> [Score: 0] 

4.   Match the computer terms:

1.  Menu that appears when the user right-clicks on an object.

2.  Structure in which files are grouped together

3.  Area or location where the 'screen capture' is placed temporarily when you press the Print Screen Key

4.  Special 'folder' accessed via the Start menu, and containing a set of tools used to control the way in which Windows looks and behaves

Place the number next to its corresponding match. Use each number only once. 

_1_   - Popup menu [Score: 0.5]

_2_   - Folder [Score: 0.5]

_3_   - Clipboard [Score: 0.5]

_4_   - Control panel [Score: 0.5]

5.   A database would be the most appropriate program to:

  Prepare the budget of the school [Score: 0] 

  Store the details of the learners and their parents [Score: 1] 

  Create a multimedia presentation on AIDS for the grade 8 classes [Score: 0] 

  Design the school's brochure detailing the school's facilities [Score: 0] 

6.   The two main groups of software are:

  System software and Windows [Score: 0] 

  Application Software and Microsoft Office [Score: 0] 

  Application Software and System Software [Score: 1] 

  Operating Software and System Software [Score: 0] 

7.   Which one of the following would be the most appropriate to use in controlling your household budget?

  Vista Business [Score: 0] 

  Word processor [Score: 0] 

  Web browser [Score: 0] 

  Spreadsheet [Score: 1] 

8.   Which one of the following views in Windows Explorer would you use to preview graphics files in a folder?

  Thumbnails [Score: 1] 

  Icons [Score: 0] 

  Details [Score: 0] 

  List [Score: 0] 

9.   Match the application to the file extension:

1.  Word

2.  Access

3.  Word template

4.  Excel

Place the number next to its corresponding match. Use each number only once. 

_1_   - doc or docx [Score: 1]

_2_   - mdb or accdb [Score: 1]

_3_   - dot or dotx [Score: 1]

_4_   - xls or xlsx [Score: 1]

10.  When folders and files are displayed in this view, where do you click to make them display as Name, Date modified, Size and Type, and to change its order? Click on the area of the image where you change the order.

Make a mark on the image below to select your answer. 

Answer Image:

11.  Click on the image in the area where you would go to display file extensions:

Make a mark on the image below to select your answer. 

Answer Image:

12.  Select six features of a good password:

    You may select at most 6 answer(s).

  

  Has a capital letter [Score: 1] 

  Has a number [Score: 1] 

  Long, 15-30 letters [Score: 0] 

  Short, 8-15 letters [Score: 0] 

  Changed regularly [Score: 1] 

  Never changed [Score: 0] 

  Written down [Score: 0] 

  Never written down [Score: 1] 

  Has letters such as ! @ # $ [Score: 1] 

13.  Match up and identify the following applications on our system:

1.  Compression software

2.  Gaming software

3.  Operating system

4.  Spreadsheet

5.  Anti-Virus software

6.  Browser

Place the number next to its corresponding match. Use each number only once. 

_1_   - Winzip [Score: 0.5]

_2_   - Solitaire [Score: 0.5]

_3_   - Windows XP [Score: 0.5]

_4_   - Excel [Score: 0.5]

_5_   - F-Secure [Score: 0.5]

_6_   - Internet Explorer [Score: 0.5]

14.  Which one of the following is the best reason for never changing the file extension of an existing file?

  The computer will run more slowly without the file extension. [Score: 0] 

  The operating system will not display the correct icon for that type of file. [Score: 0] 

  Files with missing extensions are more vulnerable to viruses. [Score: 0] 

  The operating system may try to load the file with a different program than was intended. [Score: 1] 

15.  Which one of the following best describes the defragmentation process of a drive?

  It makes more space available on the drive. [Score: 0] 

  It clears out temporary files. [Score: 0] 

  It rewrites file fragments so that they are grouped together in adjacent locations on the disk. [Score: 1] 

  All of the above. [Score: 0] 

16.  Which one of the following applications would you use to open a file with a pdf file extension?

  Delphi [Score: 0] 

  Adobe Reader [Score: 1] 

  Microsoft Word [Score: 0] 

  Pastel [Score: 0] 

17.  Which one of the following is NOT associated with obtaining help when using a software package?

  Wizard [Score: 0] 

  Macro [Score: 1] 

  FAQ [Score: 0] 

  F1 Key [Score: 0] 

18.  Which one of the following best describes the effects of the defragmentation process?

  More RAM is made available. [Score: 0] 

  Files are made smaller. [Score: 0] 

  More hard drive space is made available. [Score: 0] 

  Files are organised in contiguous clusters. [Score: 1] 

19.  Which one of the following is NOT an example of system software?

  Office 2007 [Score: 1] 

  Windows XP [Score: 0] 

  Windows Server 2003 [Score: 0] 

  Linux [Score: 0] 

20.  Which one of the following refers to a free category of software which allows the program to be altered and improved on by users to suit their needs, such as the Linux operating system?

  Proprietary software [Score: 0] 

  Freeware [Score: 0] 

  Open source software [Score: 1] 

  Shareware [Score: 0] 

21.  Match the type of software usage:

1.  Hard-disk loading

2.  Counterfeiting

3.  License misuse

4.  Internet piracy

Place the number next to its corresponding match. Use each number only once. 

_1_   - Computer manufacturer illegally loads an unlicensed copy of the software onto the computer prior to sale [Score: 1]

_2_   - Wide-scale illegal duplication and distribution of software [Score: 1]

_3_   - Legitimate programs are misdirected during distribution, violating its original licensing conditions [Score: 1]

_4_   - Use of the Internet for illegally copying or distributing illegal software via online auctions and Web sites [Score: 1]

22.  Which one of the following best describes what happens when a disk is defragmented?

  Parts of the same file are written to different areas of the disk. [Score: 0] 

  Parts of different files are written to a single file. [Score: 0] 

  The files are compressed so as to occupy less space. [Score: 0] 

  The files are rewritten in adjacent locations on the disk. [Score: 1] 

23.  Which one of the following refers to a location into which an anti-virus program will move an infected file if the virus cannot successfully be removed?

  Control Panel [Score: 0] 

  Quarantine [Score: 1] 

  Registry [Score: 0] 

  History [Score: 0] 

24.  The most appropriate chart type to show a trend such as the price of fuel over a period of time is a ... chart.

  line [Score: 1] 

  column [Score: 0] 

  area [Score: 0] 

  bar [Score: 0] 

25.  The most appropriate type of chart to show changes in the gold price over 3 years is a ... chart.

  column [Score: 0] 

  line [Score: 1] 

  pie [Score: 0] 

  bar [Score: 0] 

Section: File management 

1.   Program used to create this folder structure:

  Internet Explorer [Score: 0] 

  Windows Explorer [Score: 1] 

2.   Match the search criteria to obtain the required files from the list: Alumni.docAlumni4.txtAlumni.jpgAlumni2.jpgAlumni.pubAlumniLondon.docAlumniDubai.docAlumniNewYork.docAlumniDonations.accdb

1.  Get all the files that begin with Alumni

2.  Get all the image files

3.  Get all the word files that begin with Alumni

4.  Get all the word files that begin with Alumni followed by one letter

Place the number next to its corresponding match. Use each number only once. 

_1_   - Alumni* [Score: 0.5]

_2_   - *.jpg [Score: 0.5]

_3_   - Alumni*.doc [Score: 0.5]

_4_   - alumni?.doc [Score: 0.5]

3.   Match the software programs with their functions:

1.  Group all the files of the alumni association into one file.

2.  Create a web site for the alumni association

3.  Manage the financial affairs of the alumni association

4.  Create a brochure for the association

Place the number next to its corresponding match. Use each number only once. 

_1_   - WinZip, WinRar [Score: 0.5]

_2_   - FrontPage, Dreamweaver [Score: 0.5]

_3_   - Excel, Calc [Score: 0.5]

_4_   - Publisher [Score: 0.5]

4.   Which one of the following file extensions is associated with a compressed file?

  .com [Score: 0] 

  .jpg [Score: 0] 

  .zip [Score: 1] 

  .doc [Score: 0] 

5.   Which one of the following is NOT an available option when making use of the search function in Windows?

  Some word or phrase that the document is known to contain [Score: 0] 

  The name of the person who originally created the document [Score: 1] 

  The drive in which the document is thought to have been saved [Score: 0] 

  The approximate size of the document [Score: 0] 

6.   The folders which have no sub folders. ___1___

Circle the correct answer. Circle only one answer per Picklist. 

1. (a) dump, examold [Score: 0] (b) access, AccessIntro [Score: 1] (c) AccessQuiz, AccessSave [Score: 0] (d) AccessSave, Boolean [Score: 0] (e) examold, examples [Score: 0]

7.   The verb used when you create a compressed file. ___1___

Circle the correct answer. Circle only one answer per Picklist. 

1. (a) zip [Score: 1] (b) extract [Score: 0] (c) archive [Score: 2]

8.   Select the open folder. ___1___

Circle the correct answer. Circle only one answer per Picklist. 

1. (a) access [Score: 0] (b) Boolean [Score: 0] (c) examples [Score: 1]

Section: Internet 

1.   Which ONE of the following terms does not logically belong with the others?

  Shopping cart [Score: 0] 

  HTTPS [Score: 0] 

  Amazon.com [Score: 0] 

  Hub [Score: 1] 

2.   Which of the following is NOT offered by Internet banking?

  Paying accounts at different stores [Score: 0] 

  Transferring money between accounts [Score: 0] 

  Applying for a loan [Score: 0] 

  Depositing cash [Score: 1] 

3.   Which one of the following buttons in a web browser allows you to store shortcuts to web pages that you wish to revisit?

  Favorites [Score: 1] 

  Refresh [Score: 0] 

  History [Score: 0] 

  Back [Score: 0] 

4.   Which one of the following is an example of a web browser?

  Yahoo [Score: 0] 

  Mozilla Firefox [Score: 1] 

  Windows Explorer [Score: 0] 

  Twitter [Score: 0] 

5.   Your browser keeps a record of the names and addresses of sites previously visited since you logged on and displays them in (the):

  Go menu [Score: 0] 

  URL [Score: 0] 

  Bookmarks Window [Score: 0] 

  History [Score: 1] 

6.   Match terms:

1.  Facebook

2.  Blog

3.  Post

Place the number next to its corresponding match. Use each number only once. 

_1_   - Social networking website open to anyone 13 years of age or older [Score: 0.25]

_2_   - Short for web log or weblog. Will traditionally include regular entries of commentary, descriptions of events, or other material such as photos or video [Score: 0.25]

_3_   - Article within a ?. Can be on any topic, and it's the collection of ?s that form the basis of a ? [Score: 0.25]

7.   What do we call the crime of stealing a person's passwords, banking details or credit card numbers with the aim of impersonating or defrauding them?

  Playing Trojan [Score: 0] 

  Phishing [Score: 0] 

  Malware [Score: 0] 

  Impersonation [Score: 0] 

  Identity theft [Score: 1] 

8.   Click on the area in the image which shows that the site is secure.

Make a mark on the image below to select your answer. 

Answer Image:

9.   Be aware of Internet online banking security.

1.  Fraudulent attempts to gather your sensitive information ? like PIN numbers and passwords ? and perform criminal activities

2.  Logon alert received via SMS

3.  Padlock icon on your browser

Place the number next to its corresponding match. Use each number only once. 

_1_   - Phishing [Score: 1]

_2_   - Notification [Score: 1]

_3_   - Visible security [Score: 1]

10.  Which ONE of the following is not a benefit of online banking?

  Transfer money, i.e. pay accounts [Score: 0] 

  Check balances [Score: 0] 

  Buy airtime [Score: 0] 

  Draw cash [Score: 2] 

11.  A signature is a string of text that can be automatically appended to the   end   [Score: 1]  of every email message you send.

12.  Look at the picture. Two numbers are entered: Access account number and Pin number. Think of security!

1.  Access account number

2.  Pin number

Place the number next to its corresponding match. Use each number only once. 

_1_   - Known only by client [Score: 1]

_2_   - Known by client and bank [Score: 1]

13.  A web service which allows you to send Twitter and Facebook updates via SMS directly from your mobile phone.

  Facebook.com [Score: 0] 

  TweetSMS.co.za [Score: 1] 

  Twitter.com [Score: 0] 

  Vodacom.co.za [Score: 0] 

14.  What is the slogan of Twitter?

  Who to follow [Score: 0] 

  What's happening? [Score: 1] 

  Social networking [Score: 0] 

  Following [Score: 0] 

15.  Be careful that you understand the term. Twitter information is found in a Google CV.

  True [Score: 1] 

  False [Score: 0] 

16.  How often should you tweet?

  Regularly [Score: 1] 

  Only when an event happens [Score: 0] 

  Only when you want to respond to someone [Score: 0] 

  Only when you have something to say [Score: 0] 

17.  Word for a running feed of tweets as a commentary on an event:

  Backchannel [Score: 1] 

  Discussion [Score: 0] 

  Report [Score: 0] 

  Commentary [Score: 0] 

18.  Match the action and word:

1.  Identify the topic of a tweet

2.  Tweet with message for that person only

3.  Forward tweet

4.  Tweet addressed specifically at them

Place the number next to its corresponding match. Use each number only once. 

_1_   - # in front of a word [Score: 1]

_2_   - D in front of their name at the beginning of the tweet [Score: 1]

_3_   - RT at beginning of a tweet [Score: 1]

_4_   - @ in front of their name [Score: 1]

19.  What key word is used to stop a person from following you?

  unfollow [Score: 0] 

  report [Score: 0] 

  mention [Score: 0] 

  block [Score: 1] 

20.  What is the maximum numbers of characters in a tweet message?

 140 [Score: 1]

21.  To shorten a long URL before posting in a tweet you can use the following:

    You may select at most 2 answer(s).

  

  bit.ly [Score: 1] 

  facebook.com [Score: 0] 

  google.com [Score: 0] 

22.  Select the correct URL for Twitter:

  [email protected] [Score: 0] 

  twitter.co.za [Score: 0] 

  twitter.www.com [Score: 0] 

  twitter.com [Score: 1] 

Section: Mobile technology 

1.   Select the disadvantages of using 3G over ADSL:

    You may select at most 2 answer(s).

  

  May not have access or coverage in the area [Score: 1] 

  Provides mobility [Score: 0] 

  Users can connect to the Internet via cellphone [Score: 0] 

2.   Select the advantages of using 3G as opposed to using ADSL.

    You may select at most 2 answer(s).

  

  Provides mobility [Score: 1] 

  Signal can easily be disrupted [Score: 0] 

  Users can connect to the Internet via cellphone [Score: 1] 

3.   A way of connecting to the Internet is wireless: an example of cellular technology is ___1___ and an example of radio technology is ___2___ .

Circle the correct answer. Circle only one answer per Picklist. 

1. (a) iBurst or Sentech [Score: 0] (b) 3G [Score: 0.5]2. (a) iBurst or Sentech [Score: 0.5] (b) 3G [Score: 0]

4.   Match the following terms:

1.  Bandwidth

2.  Broadband

3.  Dial-up line

4.  Dedicated or leased line

Place the number next to its corresponding match. Use each number only once. 

_1_   - Refers to the total amount of data that can be carried from one point to another in a given period of time. [Score: 0.5]

_2_   - Any high speed, high bandwidth connection to the Internet. Any media where you can surf the Internet and at the same time make and receive telephone calls. [Score: 0.5]

_3_   - Like a normal telephone. Available on a time-and-distance charge. [Score: 0.5]

_4_   - Always on, continuous connection. Pay fixed monthly cost which increases with the amount of bandwidth you choose. [Score: 0.5]

5.   Limit on the amount of data that can be transferred monthly via the Internet by a user:

  Broadband [Score: 0] 

  Cap [Score: 1] 

  Bandwidth [Score: 0] 

  ADSL [Score: 0] 

6.   Video conferencing is often not possible when Internet connectivity is used. The most likely reason for this is that ...

  web cameras do not have enough pixels [Score: 0] 

  the Internet cannot send moving pictures [Score: 0] 

  many users do not have broadband connections [Score: 1] 

  the operating system of many PCs is incompatible with video conferencing [Score: 0] 

7.   A form of technology that will determine your current position or location via satellite:

  GPRS [Score: 0] 

  3G [Score: 0] 

  GPS [Score: 1] 

  WAP [Score: 0] 

8.   There are many ways of connecting your phone to the Internet. Which of the following systems has been around for the longest time?

  2G [Score: 0] 

  1G [Score: 1] 

  3G [Score: 0] 

  4G [Score: 0] 

9.   Which one of these is the best for browsing the Internet and watching video?

  GPRS [Score: 0] 

  Bluetooth [Score: 0] 

  EDGE [Score: 1] 

  GRSM-09 [Score: 0] 

10.  What are the most likely technologies that a smartphone would use to connect to the Internet?

  GSM and GPRS [Score: 0] 

  WAP [Score: 0] 

  Bluetooth [Score: 0] 

  Wi-Fi and 3G [Score: 1] 

11.  Which two of these are advantages of a dial-up connection?

    You may select at most 4 answer(s).

  

  You can connect whenever you have access to a phone line. [Score: 0.5] 

  Dial-up is much faster than DSL. [Score: 0] 

  Most computers have dial-up modems built into them. [Score: 0.5] 

12.  Which two of the following are disadvantages of (A)DSL?

    You may select at most 4 answer(s).

  

  You have to establish a connection every time you want to go online. [Score: 0] 

  Setup costs are higher than for dial-up connections. [Score: 0.5] 

  DSL connections are slow. [Score: 0] 

13.  Wi-Fi is:

  A type of internet radio. [Score: 0] 

  A way of connecting to the Internet without using a cable. [Score: 1] 

  The same thing as 3G. [Score: 0] 

  A type of internet connection that doesn't use a modem. [Score: 0] 

14.  A computer on a (A)DSL connection is more secure than a computer on a dial-up connection.

  False [Score: 1] 

  True [Score: 0] 

15.  One of the advantages of a dial-up internet connection is that you can connect wherever there is a phone line.

  True [Score: 1] 

  False [Score: 0] 

16.  3G is the name of a technology that is used to:

  Transfer money securely over an internet connection. [Score: 0] 

  Connect multiple computers on the same network to the World Wide Web. [Score: 0] 

  Connect three or more computers to one another in a local network. [Score: 0] 

  Connect to the internet via your cellphone. [Score: 1] 

  Bypass the local network hub between your computer and your service provider. [Score: 0] 

17.  The 'A' in 'ADSL' stands for:

  Anonymous - which means that a computer on such a network cannot be traced. [Score: 0] 

  Asynchronous - which means that downloads and uploads can happen at different speeds. [Score: 0] 

  Advanced - which means it is faster than a standerd "DSL" connection. [Score: 0] 

  Annotated - which means that it can trace the source of the downloaded information. [Score: 0] 

  Asymetrical - which means that the download and the upload speed are not the same. [Score: 1] 

18.  Adverts for ADSL connections give two different speeds, such as 256 kbps / 1 Mbps. The ___1___ speed is the upload speed and the ___2___ one is the download speed.

Circle the correct answer. Circle only one answer per Picklist. 

1. (a) faster [Score: 0] (b) slower [Score: 0.5]2. (a) faster [Score: 0.5] (b) slower [Score: 0]

19.  Wi-Fi is a technology that allows you to connect to the World Wide Web via a 'Wired Fidelity' network - in other words, via a modem and cable.

  True [Score: 0] 

  False [Score: 1] 

20.  Which of the following is the best description of what a modem does?

  A modem acts as a translator between your computer and the network infrastructure of the internet. [Score: 1] 

  A modem is a device that sends and receives data. [Score: 0] 

  A modem is a small device that allows you to use your phone while you are online. [Score: 0] 

  A modem is another name for a remote server. [Score: 0] 

  A modem is a device that filters all traffic to and from your computer. [Score: 0] 

21.  When using a computer on a ADSL connection, your phone will give a 'busy' signal as long as you are online.

  True [Score: 0] 

  False [Score: 1] 

22.  It is likely that your Internet connection has a 'usage cap'. What is this?

  A filter that protects your computer from hackers and online viruses. [Score: 0] 

  A limit to the amount of data that you can download and upload per month. [Score: 1] 

  A device that translates the digital signal from a computer into a signal that can travel via the phone network. [Score: 0] 

  A device used on the telephone network to collect data from a number of phone lines into one stream of information. [Score: 0] 

  A limit to the amount of data you can download per month. [Score: 0] 

23.  The main advantage of the image is that it can enable one to connect to the Internet:

  At your desk in lab [Score: 0] 

  Anywhere [Score: 1] 

  At a WiFi hot spot [Score: 0] 

24.  Match the following:

1.  Device which acts as an electronic diary

2.  Device with miniaturised parts, low power consumption and ability of a computer

3.  Feature added to cellular communications which 'pushes' e-mail to you ? you do not have to connect and download

4.  Technology which increases the amount of data that a device can send and receive at any time

5.  Short range radio connection

6.  Connects devices in line of sight

Place the number next to its corresponding match. Use each number only once. 

_1_   - PDA [Score: 0.5]

_2_   - Laptop [Score: 0.5]

_3_   - Blackberry [Score: 0.5]

_4_   - 3G [Score: 0.5]

_5_   - Bluetooth [Score: 0.5]

_6_   - Infrared [Score: 0.5]

25.  Look at the image of the ADSL modem. On the image select the cable which links the modem to the network.

Make a mark on the image below to select your answer. 

Answer Image:

26.  Technology associated with cellular communication:

  3G [Score: 1] 

  PDA [Score: 0] 

  Firewire [Score: 0] 

27.  Select the operating system that will NOT be found on a mobile phone:

  Mobile Linux [Score: 0] 

  Windows XP [Score: 1] 

  Windows Mobile [Score: 0] 

  Symbian [Score: 0] 

28.  The main benefit of using a 3G or iBurst connection over an ADSL connection:

  Two channels can be on Internet and make phone call at same time [Score: 0] 

  3G and iBurst provide mobility [Score: 1] 

  Permanently on / no need to dial out each time [Score: 0] 

  Faster [Score: 0] 

  More cost effective [Score: 0] 

29.  Match the mediums of Internet connectivity:

1.  ADSL

2.  3G

3.  iBurst

Place the number next to its corresponding match. Use each number only once. 

_1_   - telephone lines / cables [Score: 0.5]

_2_   - wireless, cellular [Score: 0.5]

_3_   - wireless, radio [Score: 0.5]

30.  Select the advantage(s) of laptop computers over desktop computers:

  

  Not as bulky as normal computers. [Score: 0.5] 

  Useful in a classroom as learners cannot hide behind the large monitors found in desktop computers. [Score: 0.5] 

  Useful when one wishes to carry them from classroom to classroom and share resources between classes. [Score: 0.5] 

  Very useful if there are power outages as they can work for about two hours without recharging. [Score: 0.5] 

  When laptops are moved from class to class one must be careful as they are fragile. [Score: 0] 

31.  Select the advantage(s) of a laptop computer:

  

  A normal mouse can be plugged in and the computer can be used as a normal computer. [Score: 0.5] 

  Can easily be stolen as they are small and can fit into a bag. [Score: 0] 

  Can easily be carried home by learners on loan in order to do homework. [Score: 0.5] 

  Can work like ordinary computers using normal electrical power. [Score: 0.5] 

32.  A small, hand-held device that acts as an electronic diary, and often provides Internet access as well. It is a   PDA   [Score: 1] .

33.  Which one of the following statements about 3G technology is true?

  3G makes it possible for a cellphone to be used to watch live TV. [Score: 1] 

  3G is a technology for use with Local Area Networks. [Score: 0] 

  With 3G you pay only for the time that you are connected. [Score: 0] 

  3G decreases the amount of data that can be sent and received at any time. [Score: 0] 

34.  To have a mobile office you need a:

  Landline and laptop [Score: 0] 

  Desktop and cell phone [Score: 0] 

  Landline and PDA [Score: 0] 

  Laptop and cell phone [Score: 1] 

35.  Several (cellphone) companies are publishing their content under the Internet domain .mobi (standing for mobile). This is because:

  A cellphone is by definition a mobile, wireless device. [Score: 0] 

  Most websites are designed for normal (full-size) monitors. [Score: 1] 

  Cellphones are manufactured by several different companies. [Score: 0] 

  Cellphones use LCD technology for their displays. [Score: 0] 

36.  A small, personal 'network' centred around mobile computing tools, e.g. cellphone and laptop:

  PAN [Score: 1] 

  WAN [Score: 0] 

  LAN [Score: 0] 

37.  Which one of the following is NOT a hardware item associated with networks?

  NIC [Score: 0] 

  PIM [Score: 1] 

  UTP [Score: 0] 

  Switch [Score: 0] 

Section: Social issues 

1.   Select the advantages to a company if they allow customers to shop online.

    You may select at most 4 answer(s).

  

  Can operate 24/7/365 [Score: 1] 

  Lower overhead costs [Score: 1] 

  Cash transferred at time of purchase [Score: 1] 

  Electronic nature allows valuable sales data to be analysed [Score: 1] 

  Maybe difficult to return goods [Score: 0] 

2.   The bank whose clients are being targeted is   Absa   [Score: 1] . This security infringement is an example of   Phishing   [Score: 2] . Stupid people believe this type of letter, supply their details, and then have their money taken.

3.   Identify the anti-virus software being used to scan the removable drive.   Norton   [Score: 1] 

4.   The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Absa and Standard Bank customers are often victims.

  Malware [Score: 0] 

  Computer virus [Score: 0] 

  Firewall [Score: 0] 

  Pop-up [Score: 0] 

  Phishing [Score: 2] 

  Spam [Score: 0] 

  Adware [Score: 0] 

  Cookies [Score: 0] 

  Spyware [Score: 0] 

  Keystroke [Score: 0] 

5.   XXX logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

  Malware [Score: 0] 

  Pop-up [Score: 0] 

  Spyware [Score: 0] 

  Adware [Score: 0] 

  Keystroke [Score: 2] 

  Phishing [Score: 0] 

  Spam [Score: 0] 

  Computer virus [Score: 0] 

  Firewall [Score: 0] 

  Cookies [Score: 0] 

6.   Part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.

  Firewall [Score: 2] 

  Malware [Score: 0] 

  Computer virus [Score: 0] 

  Spam [Score: 0] 

  Adware [Score: 0] 

  Spyware [Score: 0] 

  Cookies [Score: 0] 

  Phishing [Score: 0] 

  Keystroke [Score: 0] 

  Pop-up [Score: 0] 

7.   Small piece of text stored on a user's computer by a web browser. It is sent as an HTTP header by a web server to a web browser and then sent back unchanged by the browser each time it accesses that server. Being simple pieces of text, xxx are not executable. They are neither spyware nor viruses, although xxx from certain sites are detected by many anti-spyware products because they can allow users to be tracked when they visit various sites.

  Adware [Score: 0] 

  Pop-up [Score: 0] 

  Keystroke [Score: 0] 

  Cookies [Score: 2] 

  Spam [Score: 0] 

  Firewall [Score: 0] 

  Spyware [Score: 0] 

  Phishing [Score: 0] 

  Malware [Score: 0] 

  Computer virus [Score: 0] 

8.   Match the following types of security risks and irritants.

1.  Computer program that can copy itself and infect a computer.

2.  Form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses.

3.  The abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.

4.  Short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.

Place the number next to its corresponding match. Use each number only once. 

_1_   - Computer virus [Score:

1]

_2_   - Pop-up [Score: 1]

_3_   - Spam [Score: 1]

_4_   - Malware [Score: 1]

9.   Advertising functions which are integrated into or bundled with the software, which is often designed to note what Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. Can also download and install spyware.

  Spyware [Score: 0] 

  Adware [Score: 2] 

  Computer virus [Score: 0] 

  Pop-up [Score: 0] 

  Spam [Score: 0] 

  Malware [Score: 0] 

  Cookies [Score: 0] 

  Firewall [Score: 0] 

  Keystroke [Score: 0] 

  Phishing [Score: 0] 

10.  Type of malware that is installed on computers and collects information about users without their knowledge.

  Pop-up [Score: 0] 

  Firewall [Score: 0] 

  Adware [Score: 0] 

  Spam [Score: 0] 

  Computer virus [Score:

0] 

  Malware [Score: 0] 

  Cookies [Score: 0] 

  Keystroke [Score: 0] 

  Phishing [Score: 0] 

  Spyware [Score: 2] 

11.  Where in the image of Word 2007 Manage Resources do you enter the date when the file was created? Click on the area.

Make a mark on the image below to select your answer. 

Answer Image:

12.  Where in the image of Word 2007 Manage Resources do you enter the date when you looked at the web page? Click on the area.

Make a mark on the image below to select your answer. 

Answer Image:

13.  The word used to refer to passing off someone else's ideas, words or images as though they were your own is   plagiarism   [Score: 1] .