Laden....
|
Druk & Houd Vast om te Verslepen |
|||
|
Klik hier om te sluiten |
|||
Vraag 1 Verslag
Which doesn't belong to the group?
Antwoorddetails
Out of the given options, "Memory unit" doesn't belong to the group. Flash drive, floppy disk, and compact disk are all examples of storage devices that store digital data. In contrast, "Memory unit" is a broad term that can refer to any device or component that stores data temporarily or permanently. While flash drives, floppy disks, and compact disks are all types of memory units in the sense that they store data, the term "memory unit" is more general and encompasses other types of storage, such as hard drives, solid-state drives, and RAM (Random Access Memory). Therefore, "Memory unit" is the odd one out in this group, as it is not a specific type of storage device like the other options.
Vraag 2 Verslag
Computers are used majorly at offices for ____________
Antwoorddetails
Computers are commonly used in offices for a variety of tasks, but some of the major purposes include: 1. Creating and editing documents: Computers are used to create and edit documents such as letters, reports, presentations, and spreadsheets. This is because computers offer a range of software applications that allow users to create and edit documents easily and quickly. 2. Communication: Computers are used to communicate with other employees, clients, and customers through email, video conferencing, and instant messaging. 3. Data management: Computers are used to store and manage data such as customer information, financial records, and inventory lists. This is because computers offer software that allows users to organize and track data efficiently. 4. Accounting: Computers are used for accounting purposes such as bookkeeping, payroll, and invoicing. This is because computers offer specialized software that allows users to manage financial data accurately and quickly. 5. Security: Computers are also used for security purposes such as monitoring and controlling access to sensitive data and systems. This is because computers offer software and hardware tools that can be used to safeguard against unauthorized access and cyber threats. Overall, computers have become an essential tool in the modern office environment, enabling employees to work more efficiently, communicate more effectively, and manage data and information more securely.
Vraag 3 Verslag
Which part of a processor contains the hard ware necessary to perform all the operations required by a computer?
Antwoorddetails
The part of a processor that contains the hardware necessary to perform all the operations required by a computer is the "Data path". The data path, also known as the "Arithmetic Logic Unit" (ALU), is a component of the processor that performs arithmetic and logical operations on data. It is responsible for carrying out the instructions of the computer program, performing calculations, and manipulating data. The controller, registers, and cache are also important components of a processor, but they do not contain the hardware necessary to perform all the operations required by a computer. The controller, also known as the "Control Unit", is responsible for directing the flow of data and instructions within the processor, as well as between the processor and other components of the computer. Registers are high-speed storage locations within the processor that store data temporarily for processing. Cache is a small amount of high-speed memory that stores frequently used data and instructions, making them quickly accessible to the processor. Therefore, out of the given options, the data path or ALU is the part of the processor that contains the hardware necessary to perform all the operations required by a computer.
Vraag 4 Verslag
The Caps key on a keyboard is used to___________
Antwoorddetails
The Caps key on a keyboard is used to switch between upper and lower case letters. When you press the Caps key, it changes the letter case of the letters you type from lowercase to uppercase or vice versa. This means that if you type with the Caps key on, all the letters you type will appear in uppercase. Similarly, if you type with the Caps key off, all the letters you type will appear in lowercase. This feature is particularly useful when you want to emphasize certain words or phrases, such as in titles or headings. It can also be used to make your text easier to read by adding some variety to the letter case. For example, when typing a password or other sensitive information, you may want to use a combination of upper and lower case letters to make it more secure. In summary, the Caps key is used to switch between uppercase and lowercase letters in order to make text easier to read, emphasize words, or add security to sensitive information.
Vraag 5 Verslag
Total types of data that can be read by document reader are
Antwoorddetails
Document readers are devices or software programs that can analyze and interpret written or printed text on a document. These devices can read different types of data from documents such as marks, handwritten and printed characters, and printed lines. Marks can include things like checkmarks or ticks that people might use to indicate a selection on a form or questionnaire. Handwritten characters are any letters, numbers or symbols that are written by hand, whereas printed characters are those that are produced by a printer. Printed lines refer to the lines of text that are printed on a page. Therefore, the correct answer is "all of the above" as document readers can read all of these types of data from documents.
Vraag 6 Verslag
Binary coded decimals (BCD) numbers express each digit as a ___________
Antwoorddetails
Binary coded decimals (BCD) numbers express each digit as a nibble. A nibble is a group of 4 bits, which can represent 16 distinct values (0-15). In BCD, each decimal digit is encoded using a separate nibble, where each nibble represents the binary equivalent of the digit. For example, the decimal number 123 would be represented in BCD as four nibbles: 0001 (1), 0010 (2), 0011 (3), and 0011 (3). Using a nibble to represent each digit is a simple and efficient way to encode decimal numbers in binary form. BCD is commonly used in computer systems where decimal arithmetic is required, such as in financial calculations or in control systems where numerical values need to be displayed on digital screens. In summary, BCD numbers express each decimal digit as a nibble, allowing for efficient and accurate representation of decimal numbers in binary form.
Vraag 7 Verslag
Which process is used by large retailers to study trends?
Antwoorddetails
Large retailers use data mining to study trends. Data mining is the process of analyzing large amounts of data and identifying patterns and trends in that data to make informed decisions. This can involve looking at customer behavior, sales data, market trends, and other types of data to gain insights into what products are popular, what customers are looking for, and how the market is changing. The goal of data mining is to help retailers make informed decisions about their business and stay ahead of the competition.
Vraag 8 Verslag
Computer files can be characterised by all but,
Antwoorddetails
Computer files can be characterized by their title, accessibility, ability to be modified, and where they are stored. The title of a file is simply its name, which can be used to help identify and organize it among other files. Accessibility refers to whether or not a file can be accessed or viewed by the user. Depending on the permissions set by the owner of the file, it may be accessible to everyone, only to specific users, or not accessible at all. The ability to be modified refers to whether or not the file can be edited or changed in some way. For example, a text file can be modified by adding, deleting, or changing the text within it. Where the file is stored refers to the location on a computer or network where the file is saved. This could be on the computer's hard drive, a USB drive, a cloud storage service, or a network server. Therefore, all four of these characteristics are applicable to computer files and are important to consider when working with them.
Vraag 9 Verslag
What is the shortcut key to "undo" last action on a Microsoft word page?
Antwoorddetails
The shortcut key to "undo" the last action on a Microsoft Word page is "Ctrl + Z". When you perform an action on a Word page, such as typing, deleting, formatting or copying text, you can undo that action by using the "Ctrl + Z" keyboard shortcut. This will revert the page to the state it was in before the action was performed. For example, if you accidentally delete a sentence, you can press "Ctrl + Z" to undo the deletion and restore the sentence. The "Ctrl + Z" shortcut is a very useful and commonly used feature in Microsoft Word as it allows you to quickly correct mistakes without having to manually undo each action. It can be used multiple times to undo several actions in a row. If you want to redo an action that was previously undone, you can use the "Ctrl + Y" keyboard shortcut. In summary, the "Ctrl + Z" keyboard shortcut is used to undo the last action performed on a Microsoft Word page, allowing you to easily correct mistakes and restore the previous state of the page.
Vraag 10 Verslag
A half byte is known as ________.
Antwoorddetails
A half byte is known as a nibble. A byte is a unit of digital information in computing, typically consisting of 8 bits. A nibble, on the other hand, is half of a byte, consisting of 4 bits. This unit is often used in computer architecture and data representation, especially when referring to memory addresses or data manipulation.
Vraag 11 Verslag
Word processor, spreadsheets, database, graphics and presentation software are all examples of?
Antwoorddetails
Word processor, spreadsheets, database, graphics and presentation software are all examples of application packages. Application packages are software programs designed to perform specific tasks or functions for the user. They are also known as "applications" or "apps" for short. Each of the software examples mentioned - word processor, spreadsheets, database, graphics, and presentation software - have a specific function and are designed to make tasks related to those functions easier for the user. For instance, a word processor is designed to create, edit and format text documents, while a spreadsheet program is designed to perform calculations and data analysis. Database software is designed to store, organize and retrieve large amounts of data, while graphics software is designed to create and edit visual elements such as images and videos. Presentation software is designed to create slideshows and presentations. Overall, application packages are a type of software that provides users with specific tools to perform tasks more efficiently and effectively.
Vraag 12 Verslag
What is a computer file.
Antwoorddetails
A computer file is a place on a computer where information is stored in a package. A file can contain many different types of information, including text, images, audio, video, and executable programs. The information in a file is organized in a specific format, and the file can be opened and edited using appropriate software. For example, a text file contains plain text, while a Word document file contains formatted text and other elements like images and tables. A file is often saved with a specific name and extension that identifies the type of file and the type of information it contains. The extension is the part of the file name that comes after the dot, such as ".txt" for a plain text file or ".docx" for a Microsoft Word document file.
Vraag 13 Verslag
Files that maintain the hierarchical structure of the file system.
Antwoorddetails
The correct answer is "Directories." Directories are special files that organize the hierarchical structure of the file system by grouping related files together into named collections. They act like folders, allowing users to easily locate and access the files they need. Each directory can contain other directories (sub-directories) and files. For example, in a Windows system, the "C:\Users" directory contains a sub-directory for each user account on the computer, and each user account directory contains sub-directories for documents, pictures, music, etc. In short, directories allow us to maintain a structured and organized file system.
Vraag 14 Verslag
The combination of the arithmetic and logic units, as well as the ______________ unit makes up the central processing unit.
Antwoorddetails
The combination of the arithmetic and logic units, as well as the control unit makes up the central processing unit (CPU). A CPU is the "brain" of a computer. It is responsible for executing instructions and performing calculations. The arithmetic and logic units (ALU) are the parts of the CPU that perform mathematical operations, such as addition, subtraction, multiplication, and division, as well as logical operations, such as AND, OR, and NOT. The control unit is responsible for controlling the flow of data and instructions within the CPU and between the CPU and other parts of the computer, such as memory and input/output devices. It fetches instructions from memory, decodes them to determine what operation to perform, and then directs the ALU to perform the operation. In summary, the combination of the ALU and control unit makes up the CPU, which is responsible for processing data and instructions and performing calculations in a computer.
Vraag 15 Verslag
Which type of network can span several building, but is usually less than 30 square miles big?
Antwoorddetails
The type of network that can span several buildings but is usually less than 30 square miles big is called a MAN (Metropolitan Area Network). A MAN is a network that covers a larger geographical area than a LAN (Local Area Network) but is smaller than a WAN (Wide Area Network). It typically spans across a city or a town, connecting various LANs within its area. MANs are designed to provide high-speed connectivity between different locations within a metropolitan area, allowing users to share resources and information. They can be owned and managed by a single organization or shared by multiple organizations, such as service providers or government agencies. Some examples of MAN technologies include Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM), and Ethernet.
Vraag 17 Verslag
A collection of facts and figures is known to be _________
Antwoorddetails
The correct answer is "Data". Data refers to a collection of facts, figures, or information that can be processed or analyzed to gain insights or make informed decisions. Data can come in different forms, such as numbers, text, images, audio, or video. It can be stored in various formats, including spreadsheets, databases, documents, or files. For example, if you have a list of customer names, addresses, and phone numbers in a spreadsheet, this is considered data. If you store this information in a database, it becomes a structured collection of data that can be easily accessed and manipulated. However, whether the data is sequenced or structured depends on how it is organized, and it is not a defining characteristic of data itself.
Vraag 18 Verslag
CRACKING comes under _________
Antwoorddetails
CRACKING is a type of computer crime. It refers to the unauthorized access and manipulation of computer systems or networks. Cracking is usually done by malicious individuals with the intention of stealing information, causing damage or disrupting services. It is different from hacking, which is the process of finding vulnerabilities in computer systems in order to improve their security. Crackers use a variety of techniques, including exploiting security weaknesses, stealing passwords, and installing malware. Cracking is a serious offense that can result in legal consequences, including fines and imprisonment. To protect against cracking, it is important to use strong passwords, keep software up-to-date, and use antivirus software.
Vraag 19 Verslag
Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
Antwoorddetails
The reason "protection" does not satisfy why people create a computer virus. This is because a computer virus is not created to protect a system or its data, but rather to cause harm to it by spreading and infecting other systems. Creating a virus goes against the goal of protecting a computer system, and instead puts it at risk.
Vraag 20 Verslag
An Operating System is a type of?
Antwoorddetails
An Operating System (OS) is a type of system software. It is a program that manages the hardware and software resources of a computer, and provides a platform for other software applications to run on. The OS controls the input/output operations, manages memory and storage resources, and schedules tasks to be executed by the computer's processor. Examples of common operating systems include Windows, macOS, Linux, and Android.
Vraag 21 Verslag
Which key deletes text?
Antwoorddetails
The key that deletes text is the backspace key. When you type, the characters you enter are added to the right of the cursor, which shows you where the next character will be inserted. If you want to delete a character, you can move the cursor to the left of that character using the arrow keys, and then press the backspace key. This will remove the character to the left of the cursor. You can also use the backspace key to delete a selection of text. To do this, you first need to highlight the text you want to delete by clicking and dragging the cursor over it. Once the text is highlighted, you can press the backspace key to delete it. In summary, the backspace key is used to delete characters to the left of the cursor or to delete a selected portion of text.
Vraag 22 Verslag
What differs a system software from application software?
Antwoorddetails
System software and application software are two broad categories of computer software, each with different functions and purposes. System software is a collection of programs that control and manage the basic operations of a computer system. It is designed to provide a platform for other software applications to run on. System software includes operating systems, device drivers, utilities, and other tools that enable the computer to operate and perform its functions. On the other hand, application software refers to programs that are designed to perform specific tasks or applications for the user. These programs are used for word processing, spreadsheets, photo editing, web browsing, and other specialized tasks. Application software is often created by third-party developers and can be installed and used by end-users. The main difference between system software and application software is the purpose they serve. System software is responsible for managing the hardware and providing a platform for other software to run on, while application software is designed to perform specific tasks for the user. Other differences between system software and application software include: - Ability to multi-task: System software is designed to manage and allocate system resources, while application software is designed to perform specific tasks. Therefore, system software has more multitasking capabilities than application software. - Minimal in terms of space: System software is usually larger in terms of size and requires more storage space than application software. - Presence of cache memory: System software may use cache memory to improve the performance of the computer system, while application software does not typically use cache memory. - Unique programs installed by the creators to help run the computer: System software includes programs that are installed by the computer manufacturer or operating system developer to help run the computer, such as device drivers and system utilities. Application software does not include these types of programs.
Vraag 23 Verslag
Typically, an ATM is used for
Antwoorddetails
An ATM, or Automated Teller Machine, is typically used for withdrawing cash. It is a machine that allows customers of a financial institution to perform financial transactions, such as withdrawing cash, checking their account balance, or depositing money, without the need to visit a bank branch. ATMs are widely available and can be found in many public places such as shopping centers, airports, and gas stations. They provide customers with convenient access to their money 24 hours a day, seven days a week.
Vraag 25 Verslag
Which term describes accessing files from a computer other than the one where the files are stored.
Antwoorddetails
The term that describes accessing files from a computer other than the one where the files are stored is "remote access". Remote access means that you can access files, data or resources from a different computer or server that is located elsewhere, using a network connection like the internet. This allows you to work with files and data as if they were stored on your local computer, even though they are actually stored on a different computer or server. For example, if you are working from home and need to access files that are stored on your work computer, you can use remote access to connect to your work computer over the internet and access those files. Similarly, if you use cloud storage services like Dropbox or Google Drive, you can access your files from any computer with an internet connection, which is also a form of remote access.
Vraag 26 Verslag
Storage which retains data after power cut off is called.
Antwoorddetails
The type of storage that retains data even when the power is turned off is called non-volatile storage. Non-volatile storage is different from volatile storage, which loses all data when the power is turned off. To help you understand the difference, imagine that you have two types of memory: a whiteboard and a notebook. The whiteboard is like volatile memory because anything you write on it will disappear as soon as you erase it or turn off the lights. On the other hand, the notebook is like non-volatile memory because anything you write in it will remain there until you deliberately erase or destroy it. Similarly, non-volatile storage, such as hard drives, solid-state drives (SSDs), and flash drives, can retain data even when the power is turned off. This is because the data is stored using physical means that do not require an electrical charge to be maintained. In contrast, volatile storage, such as RAM, loses all data when the power is turned off because the data is stored using electrical charges that require a constant supply of power to be maintained. Overall, non-volatile storage is essential for long-term data storage because it can retain data even in the absence of power, whereas volatile storage is useful for short-term storage of data that does not need to be preserved beyond the current session or power cycle.
Vraag 27 Verslag
Why is the base 10 system unique?
Antwoorddetails
The base 10 system, also known as the decimal system, is unique because it is the most widely used number system in the world and has been adopted by nearly all cultures and civilizations. The reason for this widespread usage is that it is based on the number of human fingers, with 10 being the number of digits on two hands. This made it a convenient and intuitive system for early humans to count and perform mathematical operations with. Additionally, the base 10 system allows for easy representation of numbers using only 10 symbols (0 to 9), making it simple to write, communicate, and perform mathematical operations with larger numbers.
Vraag 28 Verslag
The set of rules that defines the combination of symbols that are considered to be correctly structured statements or expressions in that language is called _________
Antwoorddetails
The set of rules that defines the combination of symbols that are considered to be correctly structured statements or expressions in a language is called Syntax. Think of syntax as the grammar of a language. Just like in English, there are certain rules that dictate what combinations of words and punctuation are considered to be a proper sentence, in programming languages there are rules that dictate what combinations of symbols and syntax are considered to be a proper statement or expression. The syntax of a language determines how code should be written in order for it to be properly understood by the computer and executed as intended.
Vraag 29 Verslag
Fire fox is an example of __________
Antwoorddetails
Firefox is an example of application software. Application software is a type of software that is designed to perform specific tasks for the user, such as creating documents, browsing the web, sending emails, etc. In other words, it is a program that is used to accomplish specific tasks and is meant to be used by the end-user, as opposed to system software, which is designed to run the computer itself and support the application software. Firefox is a web browser, which is a type of application software that allows users to access, browse and interact with websites on the Internet.
Vraag 30 Verslag
___________ is the combination of already processed _____________
Antwoorddetails
Information is the combination of already processed data. Data refers to raw, unprocessed facts and figures. For example, a list of numbers or a set of survey answers are data. Information is created when data is processed, organized, and given meaning. For example, taking the average of the numbers in the list would turn the data into meaningful information.
Vraag 31 Verslag
Which of the following is not a type of logic gate
Antwoorddetails
The option that is not a type of logic gate is "DOR" because it is not a commonly used logic gate in digital electronics. Logic gates are the building blocks of digital circuits, and they perform basic logical operations on input signals to generate output signals. The three most commonly used types of logic gates are XOR, OR, and AND. XOR (exclusive OR) gate generates a high output only when the inputs are different, and a low output when they are the same. It is commonly used in digital communication systems and encryption algorithms. OR gate generates a high output if any of its inputs are high, and a low output if all of its inputs are low. It is used to combine multiple input signals in digital circuits. AND gate generates a high output only when all of its inputs are high, and a low output if any of its inputs are low. It is used to implement logical conjunction (AND) in digital circuits. In summary, DOR is not a type of logic gate because it is not commonly used in digital electronics. The commonly used types of logic gates are XOR, OR, and AND.
Vraag 32 Verslag
Which is not a network for distribution of information?
Antwoorddetails
Microsoft Word is not a network for the distribution of information. Microsoft Word is a word processing software that is used to create, edit, and format documents. It is not a network because it does not distribute information, it is used to create and store information on a single device or in a cloud storage service. On the other hand, cloud storage, several computers to one printer, and e-mail are all examples of networks that distribute information.
Vraag 33 Verslag
What is the permanent memory built into your computer called?
Antwoorddetails
The permanent memory built into a computer is called ROM (Read-Only Memory). It is called "read-only" because, unlike RAM (Random Access Memory), which can be written to and rewritten, the information stored in ROM cannot be changed by the computer or the user. ROM is a type of memory that is built into the computer's hardware and contains the basic instructions that the computer needs to boot up and run its basic functions. These instructions are often referred to as the "firmware" of the computer, and include the BIOS (Basic Input/Output System) that controls the startup process, as well as other low-level software that interacts directly with the computer's hardware. CD-ROM, on the other hand, is a type of storage medium that can be used to store data or programs, but it is not built into the computer itself. CDs and DVDs can be used to store data, programs, or other types of media, but they are not considered a type of permanent memory built into the computer.
Vraag 34 Verslag
The delete permission allows one to ____________
Antwoorddetails
The delete permission allows someone to remove or delete files and directories. This means that if a user has the delete permission, they can get rid of files and folders that they have access to, and these files and folders will no longer be available on the system. This permission is typically used to allow users to clean up or manage their own files and directories, but it can also be used by system administrators to control access and prevent unwanted modifications or deletions.
Vraag 35 Verslag
How many different values can a bit have?
Antwoorddetails
A bit is the smallest unit of digital information in computing, and it can have two possible values: 0 or 1. This is because a bit is used to represent a binary digit, which can be either on or off, true or false, or high or low. So, the answer is 2. To give an example, imagine a light switch that can either be turned on or off. We can use a bit to represent the state of the switch, where 0 represents the switch being off, and 1 represents the switch being on. In this case, a single bit is enough to represent the two possible states of the switch. Similarly, in computing, a single bit is enough to represent two possible states of any digital information.
Vraag 36 Verslag
Which can be the input and output devices both?
Antwoorddetails
There are some devices that can be used as both input and output devices. These are: 1. Touch screen monitor: A touch screen monitor can be used as both an input and output device. It can display information to the user and also accept input from them through touch. 2. Digitizer: A digitizer is another device that can act as both an input and output device. It is used to convert analog signals, such as handwriting or sketches, into digital form. It can also display the digital output on a screen. In contrast, devices like a scanner and speaker are typically designed to perform just one function. A scanner is primarily an input device that converts physical documents into digital images, while a speaker is an output device that produces sound. To summarize, touch screen monitors and digitizers can be used as both input and output devices, while scanners and speakers are typically limited to a single function.
Vraag 37 Verslag
Running other software on idle computer without the knowledge of the organisation is called theft of ___________
Antwoorddetails
Running other software on an idle computer without the knowledge of the organization is called theft of computer time. This means that the person is using the resources (e.g. processing power, memory, storage) of the computer without permission, which can slow down the performance of the computer and potentially interfere with the work of others. This unauthorized use of resources can be seen as equivalent to theft, since the person is taking something (in this case, computer time) without permission.
Vraag 38 Verslag
A word processor can be used to
Antwoorddetails
A word processor is a computer program that is used to create, edit, and print text documents. With a word processor, you can type in text, make changes to it, format it with different fonts and styles, and then print it out if you need a hard copy. In short, a word processor allows you to write, edit, and print text in a convenient and flexible way.
Vraag 39 Verslag
What is the full form of UDP?
Antwoorddetails
The full form of UDP is User Datagram Protocol. It is a communication protocol used for sending and receiving data over the internet. UDP is a lightweight, connectionless protocol that operates at the Transport layer of the Internet Protocol (IP) suite. Unlike TCP (Transmission Control Protocol), which guarantees delivery of data, UDP does not provide any guarantees regarding delivery or sequencing of packets. Instead, UDP is often used for applications that require faster data transfer, such as video streaming or online gaming, where small amounts of lost data are acceptable. The "User Datagram" part of the name refers to the fact that UDP sends data in the form of datagrams, which are discrete chunks of data that are sent as individual packets. The "Protocol" part of the name indicates that UDP is a set of rules and procedures that govern how data is transmitted and received over a network. In summary, UDP is a fast and lightweight protocol used for sending data over the internet. Its name reflects the fact that it operates using datagrams and is a protocol for communication.
Vraag 40 Verslag
What tells the computer how to use its components?
Antwoorddetails
The operating system (OS) tells the computer how to use its components. An operating system is a software program that manages the computer hardware and software resources and provides common services for computer programs. The operating system acts as an intermediary between the computer's hardware and the programs or applications that run on the computer. It is responsible for controlling and allocating memory, prioritizing system requests, ensuring security, and managing input/output operations. In short, the operating system acts as the foundation for the computer to function and allows different applications and programs to communicate with the hardware and work together.
Wilt u doorgaan met deze actie?