The study-notes marketplace
Buy and sell all your summaries, notes, theses, essays, papers, cases, manuals,
researches, and
many more...
www.stuvia.co.za
,14 ADDENDUM
ASSIGNMENT 01 (Compulsory) [50]
Due date Semester 1: 31/03/2016
Unique number: 551880
Study material: Chapters 1–4 and 8 of the textbook
Use an HB pencil to answer all the questions on an optical mark-reading sheet on which your
name, address, student number, module code, assignment number and the unique number of
the assignment are all clearly indicated.
Questions 1–23: Choose for each of the questions the most appropriate answer from the
list of possible answers and mark the number of your chosen answer against the question
number on the mark-reading sheet.
1. A single point is about ____________ of an inch in height.
(1) 10/72
(2) 1/72
(3) 10.5 pts
(4) 15’’
2. The ____________ interprets and carries out the basic instructions that operate a computer.
(1) system unit
(2) mother board
(3) central processing unit
(4) All of the above.
3. Clock speed is measured in ____________.
(1) megabytes
(2) kilobytes
(3) megahertz
(4) gigahertz
4. A series of instructions that tells a computer how to perform the tasks necessary to process
data into information is referred to as a(n) ____________.
(1) input device
(2) program
(3) command
(4) output device
5. All of the following are commonly used output devices, except __________.
(1) display devices and printers
(2) pointing devices and keyboards
(3) data projectors and speakers
(4) facsimile machines and headsets
12
, FDEME3L/101
6. Three commonly used audio output devices are ____________.
(1) text, graphics and video
(2) speakers, headphones and earphones
(3) graphics, speakers and headphones
(4) None of the above.
7. Storage devices can function as sources of ___________.
(1) input
(2) output
(3) input and output
(4) None of the above.
8. A compact disc-rewritable (CD-RW) is an erasable disc. Users can ____________.
(1) write to different parts of the disc, one after the other
(2) write to each part of the disc only one time
(3) not erase the content of the disc
(4) write to the disc multiple times
9. Memory stores __________.
(1) the operating system and other system software
(2) application programs for specific tasks
(3) the data being processed by application programs
(4) All of the above.
10. To work with a saved file, the file must be removed from ________.
(1) storage and placed in memory
(2) memory and placed in storage
(3) storage and placed in ROM
(4) ROM and placed in storage
11. All of the following are types of nonimpact printers except __________ printers.
(1) dot-matrix
(2) ink-jet
(3) laser
(4) thermal
12. A(n) _____________ projects the image that appears on a computer screen onto a large
screen.
(1) NTSC converter
(2) data projector
(3) LCD projector panel
(4) digital light processing (DLP) projector
13. A person who tries to break into a computer system is called a __________.
(1) cracker
(2) hacker
(3) cookie
(4) Both (1) and (2).
13
, 14. The most common type of software theft is __________.
(1) stealing a CD-ROM
(2) stealing a flash drive (memory stick)
(3) software piracy
(4) All of the above.
15. Software licences are agreements that __________.
(1) provide specific conditions for use of the software
(2) users must accept before using the software
(3) outline the rights to use the software
(4) All of the above.
16. A single-user licence typically includes the condition that __________.
(1) users may install the software on only one computer
(2) users may make one backup copy of the software
(3) users may not give copies to friends
(4) All of the above.
17. __________ is the process of converting readable data into unreadable characters.
(1) Ciphertext
(2) Plaintext
(3) Encryption
(4) Call back
18. ________ software prevents your browser from displaying materials from targeted sites or
sites that contain keywords or phrases.
(1) Controlling
(2) Preventing
(3) Filtering
(4) Monitoring
19. A security system consisting of hardware and/or software that prevent(s) unauthorised
access to data and information on a network is called a(n) __________
(1) proxy
(2) firewall
(3) blocker
(4) defender
20. A ___________ virus replaces the program that is used to start the computer system with a
modified, infected version of the startup program.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro
21. A __________ virus hides within or is designed to look like a legitimate program.
(1) boot sector
(2) file
(3) Trojan horse
(4) macro
14
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller lizagloy. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $4.68. You're not tied to anything after your purchase.