0% found this document useful (0 votes)
176 views37 pages

ICT Exam Prep Guide

The document contains a series of questions and answers related to Information and Communication Technology (ICT) across multiple lectures. It covers topics such as the role of ICT in education, computer systems, artificial intelligence, human-computer interaction, and file management. Each lecture includes multiple-choice questions aimed at assessing knowledge in these areas.

Uploaded by

ramazan.kubeev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
176 views37 pages

ICT Exam Prep Guide

The document contains a series of questions and answers related to Information and Communication Technology (ICT) across multiple lectures. It covers topics such as the role of ICT in education, computer systems, artificial intelligence, human-computer interaction, and file management. Each lecture includes multiple-choice questions aimed at assessing knowledge in these areas.

Uploaded by

ramazan.kubeev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

FINAL EXAM ICT ANSWER TO THE QUESTIONS

LEC 1-13 AUTHOR:BEGADIL ARAILYM


LECTURE 1
1.What is one of the main purposes of the ICT course?

a) To teach programming languages


b) To teach students how to process information and gain communication competencies
c) To understand analog systems
d) To focus solely on database development

2. What role does ICT play in modern education?


a) Limiting the use of technology
b) Encouraging traditional teaching methods
c) Improving general culture, education, and justice
d) Replacing in-person education entirely

3.What is the main difference between analog and digital data?

a) Analog data is finite; digital data is continuous


b) Analog data is continuous; digital data is discrete
c) Digital data uses electricity; analog data does not
d) Analog data is cheaper to store than digital data

4. Why is data often represented in binary form in computing systems?

a) Binary numbers are easier for humans to understand


b) Binary systems are less expensive and more reliable
c) Binary allows for faster processing of text
d) Binary eliminates errors entirely

5. What is the formula for calculating the number of items that can be represented by n bits?
a) n+2
b) 2^n -1
c) 2^n
d) n × 2

6. Which organization is responsible for the Unicode standard?

a) ANSI
b) ISO
c) IEEE
d) IBM
7. What is one of the advantages of Unicode over ASCII?
a) It uses fewer bits per character
b) It can represent a much larger number of characters
c) It is simpler to implement
d) It is faster than ASCII

8.What is the primary purpose of standards in computing systems?

a) To reduce software costs


b) To enable communication and interoperability
c) To simplify operating systems
d) To increase binary efficiency

9. Which of the following is not an example of an operating system?

a) Windows
b) MacOS
c) Unix
d) SQL

10. What is the main function of a database management system (DBMS)?

a) To create multimedia presentations


b) To store, retrieve, and manage data
c) To design user interfaces
d) To encode binary values

11. What is one example of using ICT in professional activities?

a) Writing code in binary


b) Planning and managing ICT initiatives for social development
c) Designing electronic devices
d) Replacing text with multimedia

12. Which tool is commonly used for visualizing data in spreadsheets?

a) Coding systems
b) Audio tools
c) Charts and diagrams
d) Encryption algorithms

13. Which of these is an example of a cloud service used in ICT?

a) Photoshop
b) Google Drive
c) Notepad
d) Unix

14. How many combinations of values can be created using 4 bits?

a) 8
b) 12
c) 16
d) 32
15. What is the ASCII representation of the letter 'A'?

a) 65 in decimal
b) 01000001 in binary
c) Both of the above
d) None of the above

16. What is a “control code” in ASCII?

a) A code used to represent numbers


b) A code used for encrypting messages
c) A code that controls console or communication features
d) A code for graphical representation

LECTURE 2

1.What defines a computer system?

a) A standalone hardware device


b) A combination of hardware and software that works together
c) A device with internet access
d) Any electronic device

2. Which component is considered the 'brain' of the computer?

a) Memory
b) Hard drive
c) Central Processing Unit (CPU)
d) Power supply

3. What type of computer is commonly embedded in appliances?

a) Supercomputer
b) Mainframe
c) Embedded system
d) Personal computer

4. Which computer type is typically used for scientific calculations?

a) Mainframe
b) Supercomputer
c) Embedded system
d) Workstation

5. What type of computer is most commonly used at home or in offices?

a) Mainframe
b) Personal computer
c) Workstation
d) Mini-computer
6. What is the function of a scanner?

a) To convert physical documents into digital formats


b) To print documents
c) To store data
d) To display digital images

7. Which of the following is a peripheral output device?

a) Mouse
b) Microphone
c) Speaker
d) Touchpad

8. What is an example of an all-in-one input and output device?

a) Projector
b) Keyboard
c) Touchscreen
d) External hard drive

9. Which storage device uses optical technology?

a) Flash drive
b) CD/DVD
c) SSD
d) RAM

10. What does SSD stand for?

a) Secure Storage Device


b) Standard Storage Drive
c) Solid-State Drive
d) Scalable System Disk

11. Which of the following is the fastest type of storage?

a) RAM
b) SSD
c) HDD
d) USB drive

12. What is the main characteristic of volatile memory?

a) Data is stored permanently


b) It is used for long-term storage
c) Data is lost when the power is turned off
d) It requires no power to operate
13. Which storage device has the largest capacity for data storage?

a) Flash drive
b) DVD
c) Hard disk drive (HDD)
d) RAM

14. What is the purpose of a RAID system?

a) To reduce processor load


b) To speed up boot times
c) To provide data redundancy and improve performance
d) To enhance graphics processing

15. What does the term 'input' refer to in computing?

a) The processing of data


b) The storage of information
c) Data entered into a computer system
d) Data displayed by the computer

16. What is the role of an operating system?

a) To manage hardware and software resources


b) To act as a storage device
c) To process raw data
d) To handle only peripheral devices

17. Which device stores data on magnetic surfaces?

a) SSD
b) Optical drive
c) Hard disk drive (HDD)
d) RAM

18. What is an example of primary storage?

a) USB drive
b) RAM
c) DVD
d) SSD

19. What is an example of secondary storage?

a) CPU
b) External hard drive
c) Cache memory
d) Registers
20. What does the term "cloud storage" mean?

a) Storage located within the CPU


b) Storage using optical media
c) Data storage on remote servers accessed via the internet
d) Backup storage on external drives

LECTURE 3

1.What is one main feature of artificial intelligence (Al)?

a)Performing manual tasks without programming


b)Simulating human intelligence and decision-making
c) Creating virtual environments for training
d) Translating languages in real time

2. How is biometric authentication used in workplaces?

a) Employees wear a biometric badge


b) Fingerprints are scanned to sign in and out
c) Voice recognition is used to track working hours
d) Eye recognition monitors computer usage

3. What technology amplifies infrared light for better vision in darkness?

a) Biometrics
b) Vision Enhancement
c) Robotics
d) Virtual Reality

4. In factories, robots are often used to:

a) Train employees in virtual simulations


b) Complete labor-intensive tasks with precision
c) Secure communication systems online
d) Translate technical documents

5. Quantum cryptography is primarily used for:

a) Enhancing virtual reality gaming experiences


b) Securing data in online shopping and banking
c) Monitoring factory operations remotely
d) Generating 3D holographic images

6. Which of the following is an example of computer-assisted translation?

a) Virtual reality simulations


b) Google Translate
c) Self-driving vehicles
d) Biometric voice recognition

7. What is the first step in creating a hologram?

a) Splitting a laser beam


b) Scanning the object’s surface
c) Reflecting light onto a mirror
d) Wearing a head-mounted display

8. Virtual reality is commonly used in all of the following EXCEPT:

a) Education
b) Sports training
c) Holographic imaging
d) Construction

9. What is a key benefit of using robots in medical surgery?

a) No need for human programming


b) Ability to work in extreme conditions
c) Greater precision and reduced error rates
d) Real-time translation of medical records

10. Which emerging technology is used to prevent fraudulent documentation at airports?

a) Biometrics
b) Vision Enhancement
c) Robotics
d) Virtual Reality

11. What is a common use of robots in factories?


a) Training employees on machinery
b) Joining parts together using welding or glue
c) Analyzing employee productivity
d) Providing real-time holographic visuals

12. Which biometric method uses the iris of the eye for recognition?
a) Facial recognition
b) Eye recognition
c) Voice recognition
d) Fingerprint scanning

13. What is one advantage of using biometrics over traditional passwords?


a) Biometrics can be shared among multiple users
b) Unique characteristics make it more secure
c) They are cheaper to implement than passwords
d) Biometrics eliminate the need for technology
14. What type of imaging produces three-dimensional visuals that move like real objects?
a) Vision Enhancement
b) Holographic Imaging
c) Virtual Reality
d) Quantum Imaging

15. Which of the following is an application of virtual reality?


a) Measuring athletic performance in sports
b) Programming robotic factory systems
c) Translating languages in real time
d) Scanning fingerprints for security

16. What issue might arise from using AI in military operations?


a) Limited computational speed
b) Lack of empathy in critical decisions
c) High energy consumption
d) Difficulty in training robots

17. How does vision enhancement benefit surveillance?


a) By detecting fraudulent documents
b) By improving focus in low-light environments
c) By creating virtual 3D environments
d) By allowing holographic projections in real-time

18. What is one key feature of virtual reality in education?

a) It allows immersive exploration of historical sites


b) It replaces physical schools with online classrooms
c) It tracks students’ biometric data for analysis
d) It uses AI to grade student tests automatically

19. What is the purpose of quantum cryptography?

a) To create 3D holographic images for marketing


b) To enhance data security during online transactions
c) To program AI systems in self-driving cars
d) To improve gaming experiences in virtual reality

20. Which of the following is a limitation of current self-parking cars?


a) They require complete human intervention
b) They rely heavily on military-grade technology
c) They are not fully independent in their operation
d) They cannot be used in low-light conditions
LECTURE 4

1.What is the role of an interface in HCI?


a) To enhance hardware performance
b) To allow humans and computers to exchange information
c) To design computer networks
d) To store data

2.HCI is also referred to as:

a) Human Digital Interaction


b) Man-Machine Interaction
c) User-Centered Design
d) Interactive System Engineering

3.What are the main components of interaction in HCI?

a) Hardware and networking


b) User-to-machine and machine-to-user communication
c) Input devices and storage devices
d) Software and cloud systems

4. Which type of interface is commonly used in terminals and requires textual input?

a) Menu-Driven Interface
b) Natural Language Interface
c) Command Line Interface (CLI)
d) Graphical User Interface (GUI)

5. What is the defining feature of a menu-driven interface?

a) Users can interact with voice commands


b) Users select options from a predefined list
c) Uses natural language for commands
d) Provides only graphical elements

6. What is an advantage of GUIs compared to CLIs?

a) GUIs are faster for experienced users


b) GUIs require no prior training
c) GUIs consume fewer resources
d) GUIs are exclusively for expert users

7. What technology is required for a natural language interface?

a) Database management system


b) Natural language processing (NLP)
c) Graphical rendering engine
d) Touchscreen interaction
8. What is the primary goal of interaction design?

a) To maximize system performance


b) To improve hardware efficiency
c) To design systems that fit seamlessly into daily life
d) To reduce costs of implementation

9. What is a critical element of user experience (UX)?

a) Visual design
b) Usability and emotional impact
c) Hardware specifications
d) The speed of system processing

10. Which factor contributes to the emotional impact of an interface?

a) System architecture
b) Data storage capacity
c) Pleasure, novelty, and aesthetics
d) Command execution speed

11.What does usability measure in a system?

a) Hardware durability
b) Effectiveness, efficiency, and learnability
c) Processing power
d) Emotional response

12.What are the three categories of unimodal HCI systems based on modality?

a) Keyboard, mouse, and joystick


b) Audio-based, sensor-based, and visual-based systems
c) Interactive, static, and passive systems
d) Input-only, output-only, and hybrid systems

13. What is an example of an audio-based HCI application?

a) Facial recognition software


b) Automated speech recognition (ASR)
c) Haptic feedback
d) Eye-tracking systems

14. Which technology is most associated with visual-based HCI?

a) Voice command processing


b) Gesture recognition systems
c) Motion sensors
d) Text-based command systems
15. What defines a multimodal HCI system?

a) Relies exclusively on one input channel


b) Combines multiple hardware devices
c) Uses two or more input modalities for interaction
d) Focuses only on visual feedback

16. What is the benefit of a multimodal HCI system?

a) Uses less computational power


b) Supports diverse user needs, including disabled and illiterate users
c) Simplifies system design
d) Reduces the need for hardware

17. What is Sixth Sense technology in HCI used for?

a) Speech synthesis
b) Gesture-based interaction via wearable devices
c) Advanced data storage
d) Real-time audio feedback

18. Which application is a typical example of visual-based HCI?

a) Speaker recognition
b) Facial expression analysis
c) Audio signal detection
d) Text-based command line

19. What is the purpose of motion-tracking sensors in HCI?

a) To improve system efficiency


b) To detect and interpret user movements
c) To enhance graphical interfaces
d) To process natural language commands

LECTURE 5

1. What is a file?
a) A temporary data repository
b) A named repository for data
c) A program that runs on an operating system
d) A backup system

2. Which of the following is NOT a type of file structure?


a) Byte sequence
b) Record sequence
c) Tree-based structure
d) Linked list
3. What is sequential access to a file?
a) Reading or writing data in any order
b) Reading or writing data from the beginning to the end
c) Direct access using a key
d) None of the above

4. What does the 'tree of records' structure provide?


a) Sequential access only
b) Fixed-length records only
c) Retrieval based on associated keys
d) No specific structure

5. Which of these is NOT a file operation?


a) Create
b) Read
c) Compile
d) Append

6. What is a key field in a sequential file?


a) The largest field in a record
b) A field that uniquely identifies a record
c) The first field in a record
d) The last field in a record

7. What is a "current working directory"?


a) The root directory of the file system
b) A directory where all system files are stored
c) A directory relative to which file paths are resolved
d) A temporary directory created during execution

8. What does an index in an indexed sequential file provide?


a) Data compression
b) A pointer to a specific location in the main file
c) Direct access to hardware
d) None of the above

9. Which of these is NOT a file type?


a) Regular file
b) Directory
c) Block device
d) Variable pointer

10. Which access type allows users to load and execute a file but not copy it?
a) Execution
b) Reading
c) Appending
d) Updating

11. What is the purpose of a file management system?


a) To manage memory usage
b) To bridge the gap between disk organization and programmer’s view
c) To manage CPU processes
d) To create backups automatically

12. What is a file's absolute pathname?


a) A path specified from the current directory
b) A path that is relative to a specific file
c) A path specified from the root of the file system
d) A temporary path generated during execution

13. Which file organization method uses no structure?


a) Sequential records
b) Indexed sequential records
c) Unstructured stream
d) Direct or hashed records

14. What does a file directory NOT typically store?


a) File attributes
b) File location
c) File ownership
d) File size in megabytes

15. What is a key disadvantage of unstructured stream file organization?


a) High update performance
b) Poor single-record retrieval performance
c) Poor storage economy
d) None of the above

16. Which file access type is essential for database systems?


a) Sequential access
b) Random access
c) Read-only access
d) Append access

17. What is the main advantage of the sequential file structure?


a) Ease of update for variable-size records
b) Optimized single-record retrieval
c) Efficient exhaustive search
d) No need for key fields

18. Which of these operations is specific to directories?


a) Create
b) Rename
c) Opendir
d) Delete

19. Which of the following is a characteristic of a byte stream file structure?


a) It imposes a strict record format
b) It is unstructured and allows applications to define structure
c) It is used exclusively in mainframe systems
d) It requires an index for efficient access
20. What happens when a user has 'append' access rights to a file?
a) They can read the file but not modify it
b) They can modify existing content in the file
c) They can add new data without changing existing content
d) They can delete the file

21. What is the maximum length of a file name determined by?


a) The operating system
b) The file management application
c) The user’s preference
d) The type of storage device

22. What does the term "magic number" in a file refer to?
a) A number identifying file ownership
b) A unique identifier for executable file formats
c) The size of the file in bytes
d) The number of key fields in a record

23. Which of the following is NOT a criterion for file organization?


a) Rapid access
b) Ease of update
c) Color-coding of files
d) Economy of storage

24. Which of these users typically has all rights to a file?


a) Guest user
b) Owner
c) Administrator only
d) Group user

25. Which of the following tools is considered outside the kernel for file management?
a) Defragmentation utility
b) File delete command
c) Read operation
d) File open command

LECTURE 6

1. What is a database?

a) A program used to design websites


b) A collection of data or information stored in a logical format
c) A method of compressing files
d) A hardware device for data storage

2. What is one advantage of a computer-based database compared to a paper-based


database?

a) Takes up more physical space


b) Requires manual sorting of records
c) Easier to edit and search for data
d) Data cannot be copied
3. What is a table in a database?

a) A backup of data
b) A structure used to store specific pieces of data in records and fields
c) A type of database software
d) A field used to create charts

4. What is a record in a database table?

a) A collection of tables
b) A type of software program
c) A single row of data in a table
d) A description of the database

5. What does the term "field" refer to in a database?

a) The entire database


b) A column that contains specific data for each record
c) A file within the database
d) A visual element in the user interface

6. What is the purpose of a primary key in a database table?

a) To create relationships between databases


b) To uniquely identify each record in a table
c) To sort data alphabetically
d) To calculate totals

7. What file format is commonly used to import data into Microsoft Access?

a) .doc
b) .jpg
c) .exe
d) .csv

8. What should you always check when importing a CSV file?

a) The file’s location on the drive


b) The data types of fields
c) The file size
d) The color scheme

9. Which step ensures the date format is correct when importing a CSV file?

a) Click "Compress"
b) Open the file in a text editor
c) Set the date format to DMY in advanced options
d) Use a specific file naming convention
10. What is a relational database?

a) A database with no primary keys


b) A database with two or more tables connected by key fields
c) A database designed for graphics
d) A type of backup file

11. What does enforcing referential integrity ensure in a relational database?

a) Tables can be deleted without issue


b) No orphan records exist
c) Data types are consistent
d) Fields are sorted alphabetically

12. Which key field is typically on the "One" side of a relationship?

a) Foreign key
b) Composite key
c) Primary key
d) Duplicate key

13. What is the purpose of a query in Microsoft Access?

a) To compress database files

b) To search and retrieve specific data based on criteria

c) To add navigation buttons to a form

d) To create relationships between tables

14. Which wildcard can be used to find records containing "John" anywhere in the field?

a) >John

b) ?John

c) *John*

d) John%

15. What is a calculated runtime field used for in a query?

a) To calculate specific values using data from existing fields


b) To create a new table
c) To format field data
d) To delete records

16. What is the main purpose of a data entry form in a database?

a) To compress data
b) To make it easier to add, edit, and delete records

c) To export records into Excel

d) To create relationships

17. What field property allows you to create a drop-down menu in a form?

a) Primary Key
b) Lookup Wizard
c) Validation Rule
d) Date Format

18. What is one feature of a well-designed data entry form?

a) Overlapping fields
b) Difficult-to-read fonts
c) Drop-down lists and tick boxes for input
d) Bright, distracting colors

19. What does the "Enforce Referential Integrity" option do?

a) Allows duplicate records


b) Prevents orphaned records in related tables
c) Creates calculated fields automatically
d) Formats the header of the report

20. What is the best way to adjust a report so all data fits on one page?

a) Reduce the font size


b) Use advanced sorting options
c) Adjust column widths in layout view
d) Hide unused fields

21. Which of the following is a formula used in reports to calculate values?

a) Format Field = Field_Name


b) Sum, Average, Count, Max, Min
c) Compress = Field_Name/2
d) Runtime = Field_Name + Header

Lecture 7

1. What is a data model?


a) A structured representation of data relationships and rules ✅
b) A graphical representation of a spreadsheet
c) A formula for analyzing data
d) A type of data visualization
2. What is the primary purpose of a spreadsheet?
a) Writing text documents
b) Storing unstructured data
c) Entering, editing, and analyzing data ✅
d) Developing software programs

3. Which term describes the vertical sections in a spreadsheet?


a) Rows
b) Cells
c) Columns ✅
d) Tabs

4. What is a formula in a spreadsheet?


a) A graphical chart
b) A single cell reference
c) A calculation expressed using cell references and operators ✅
d) A color or style applied to data

5. What does a relative reference in a formula do?


a) Links to another sheet
b) Adjusts when copied to another cell ✅
c) Remains constant when moved
d) Creates a named range

6. What is an absolute reference in a spreadsheet?


a) A reference to another sheet
b) A reference that is dynamic
c) A fixed cell reference using $ symbols ✅
d) A range of selected cells

7. Which of these is NOT an example of test data?


a) Normal data
b) Abnormal data
c) Extreme data
d) Relative data ✅

8. What is the purpose of a "What-If Analysis"?


a) To test data for errors
b) To explore potential outcomes based on variable changes ✅
c) To format data in a spreadsheet
d) To create charts for stakeholders

9. What type of data is used to test edge cases in a model?


a) Normal data
b) Expected data
c) Extreme data ✅
d) Abnormal data

10. What does "nested formula" mean in a spreadsheet?


a) A single, simple formula
b) A formula inside a chart
c) A formula embedded within another formula ✅
d) A function applied to multiple ranges

11. Which feature is used to highlight important cells in a spreadsheet?


a) Named ranges
b) Relative references
c) Text color and cell shading ✅
d) Nested functions

12. What is a named range?


a) A chart within a spreadsheet
b) A style applied to a cell
c) A defined group of cells with a specific name ✅
d) A formula that adjusts dynamically

13. What is the difference between a function and a formula in spreadsheets?


a) A formula is user-defined, while a function is built-in ✅
b) A function is graphical, and a formula is numerical
c) A function creates data models, and a formula tests data
d) Both terms are interchangeable

14. What is "normal data"?


a) Data that includes errors
b) Data within the expected range for testing ✅
c) Data used for edge case testing
d) Data that fails validation

15. Which is an example of an abnormal data entry?


a) Entering letters in a numeric-only field ✅
b) Entering a valid date format
c) Entering a value within the expected range
d) Using a named range

16. What is the purpose of testing a data model?


a) To create charts for stakeholders
b) To remove redundant cells
c) To ensure the model works as intended with various inputs ✅
d) To design the layout of a spreadsheet

17. What is the main function of charts in spreadsheets?


a) To visualize data trends and comparisons ✅
b) To apply formulas
c) To test extreme data
d) To highlight errors

18. How is "actual outcome" used in testing?


a) As the expected behavior of the system
b) As the observed result during testing ✅
c) As a placeholder for missing data
d) As a hypothetical output
19. What is the role of stakeholder requirements in spreadsheet design?
a) To test extreme data
b) To define chart axes
c) To guide formatting and presentation features ✅
d) To create random test cases

20. Which feature can be used to emphasize specific data in a spreadsheet?


a) Bold, underline, and italic styles ✅
b) Relative references
c) Nested functions
d) Test data

21. What is extreme data?


a) Normal values expected during regular use
b) Invalid entries for testing constraints
c) Unusually high or low values used for testing limits ✅
d) Data from unrelated ranges

22. Which element is a part of spreadsheet terminology?


a) Buffer
b) Processor
c) Sheet tab ✅
d) Array

23. Why are expected outcomes important in data testing?


a) They highlight abnormal data
b) They define stakeholder requirements
c) They act as benchmarks for validating results ✅
d) They automatically correct errors

24. What is the purpose of shading cells in a spreadsheet?


a) To create charts
b) To define absolute references
c) To visually group or highlight data ✅
d) To test abnormal data

25. What is the first step in creating a data model?


a) Define relationships and rules for the data ✅
b) Format cells with colors
c) Create charts for visualizing data
d) Test the model with extreme data

Lecture 8

1. What does "multimedia" mean?


a) A combination of printed and hand-produced materials
b) A combination of text, graphics, audio, video, and animation ✅
c) A form of linear communication
d) A synonym for printed media

2. What is the basic characteristic of a multimedia system?


a) It integrates different media types ✅
b) It uses only printed text
c) It focuses exclusively on linear presentations
d) It operates without user interaction

3. What is NOT an element of multimedia?


a) Text
b) Audio
c) Animation
d) Cloud storage ✅

4. What is the primary feature of interactive multimedia?


a) Linear content playback
b) Lack of user control
c) User interaction and navigation control ✅
d) Use of only static elements

5. Which is an example of non-linear multimedia?


a) A movie
b) A computer game ✅
c) A lecture video
d) A TV commercial

6. What is the role of animation in multimedia?


a) To create the illusion of motion and enhance user experience ✅
b) To replace video elements entirely
c) To serve as the only interactive component
d) To capture live motion pictures

7. What type of multimedia content takes up the most storage space?


a) Text
b) Audio
c) Video ✅
d) Animation

8. Which tool is NOT a multimedia authoring tool?


a) Microsoft PowerPoint
b) Macromedia Flash
c) Adobe Reader ✅
d) Macromedia Director

9. What is hypermedia?
a) A linear form of multimedia
b) A non-interactive combination of text and images
c) Multimedia with interactivity and linked elements ✅
d) A simplified version of multimedia
10. What is a key advantage of multimedia in education?
a) It eliminates the need for instructors
b) It enhances engagement and improves learning retention ✅
c) It is easier to create than traditional methods
d) It only supports textual information

11. Which multimedia element is produced by vibrations?


a) Animation
b) Text
c) Audio ✅
d) Video

12. Which is an example of linear multimedia?


a) A movie ✅
b) A video game
c) Interactive e-learning software
d) A multimedia directory

13. What is the main disadvantage of multimedia?


a) Lack of interactivity
b) It is inexpensive to produce
c) It requires minimal time to develop
d) It is complex and time-consuming to create ✅

14. Which multimedia component is used for live motion capture?


a) Animation
b) Text
c) Video ✅
d) Graphics

15. Which industry heavily utilizes multimedia for special effects?


a) Agriculture
b) Healthcare
c) Entertainment ✅
d) Real estate

16. What is the significance of multimedia in business?


a) It replaces traditional advertising completely
b) It is primarily used for casual presentations
c) It supports marketing, staff training, and customer engagement ✅
d) It is limited to creating simple promotional content

17. Which is NOT a field where multimedia is commonly used?


a) Education
b) Entertainment
c) Business
d) Geology ✅

18. What is an example of multimedia in public places?


a) Video conferencing
b) E-learning platforms
c) Mobile applications
d) Information kiosks ✅

19. What does the term "non-linear multimedia" imply?


a) Users have control over the content navigation ✅
b) The content follows a fixed sequence
c) The content is static and non-interactive
d) It includes only video and audio elements

20. What is a common use of multimedia in science and technology?


a) Marketing presentations
b) Game development
c) Computer simulations ✅
d) Traditional hand-drawn schematics

21. What device is used to capture multimedia content directly?


a) Keyboard
b) Printer
c) Video camera ✅
d) Scanner

22. What is the main purpose of data compression in multimedia?


a) To enhance video quality
b) To increase file size for better storage
c) To reduce storage and bandwidth requirements ✅
d) To eliminate the need for editing

23. Which multimedia element combines images to create the illusion of movement?
a) Animation ✅
b) Video
c) Graphics
d) Text

24. Which feature makes multimedia products user-friendly?


a) High file size
b) Lack of navigation options
c) Interactive modes and clear navigation ✅
d) Complexity in design

25. What is an important consideration when planning to use video in multimedia?


a) Video requires minimal storage
b) Video cannot include sound
c) Video takes significant storage space and must be planned carefully ✅
d) Video does not require compression

Lecture 9
 What is the main purpose of a router?
A) To store data centrally
B) To connect networks and direct data packets
C) To manage printers in a network
D) To convert digital signals to analog

 What does LAN stand for?


A) Local Area Network
B) Long Area Network
C) Line Access Network
D) Limited Area Network

 Which device uses MAC addresses to direct data packets?


A) Router
B) Hub
C) Switch
D) Modem

 What is an advantage of using wireless networks?


A) Faster data transfer speeds
B) Reduced cost of cabling
C) No risks of signal interference
D) Always stable connection

 Which of the following is a characteristic of Bluetooth?


A) Long-distance connectivity
B) High data transfer speeds
C) Low energy consumption
D) Wide network coverage

 Which device converts analog signals to digital signals?


A) Bridge
B) Router
C) Modem
D) Switch

 What is an intranet?
A) A global network accessible by everyone
B) A private network within an organization
C) A public network for video conferencing
D) A device for connecting two networks

 What is a disadvantage of using a hub?


A) High cost
B) Poor security
C) Requires IP addresses
D) Limited to wired networks

 What is the function of a network switch?


A) To provide wireless access
B) To direct packets to specific devices using MAC addresses
C) To broadcast data packets to all devices
D) To convert signals

 Which network type covers a large geographical area?


A) LAN
B) WLAN
C) WAN
D) VPN

 What type of network uses WiFi to connect devices?


A) WAN
B) WLAN
C) LAN
D) PAN

 What does an ISP provide?


A) Domain names, email addresses, and internet access
B) Routers and modems
C) Firewalls for security
D) Wireless adapters

 What is a common use of an intranet?


A) Online shopping
B) Hosting public web pages
C) Internal communication within an organization
D) Sharing data globally

 Which of the following is a disadvantage of wireless networks?


A) Difficult installation
B) High cost of hardware
C) Signal interference
D) Requires specific MAC addresses

 What is the main advantage of using a switch over a hub?


A) Lower cost
B) Specific data packet delivery
C) Higher network traffic
D) Easier setup

 Which device connects two LANs into one?


A) Hub
B) Switch
C) Bridge
D) Modem

 What is a disadvantage of using a network?


A) Easy access to shared files
B) Increased risk of hackers and viruses
C) Reduced hardware costs
D) Faster communication

 What information does a router use to direct data packets?


A) MAC addresses
B) IP addresses
C) DNS servers
D) Domain names

 Which of these is a function of a firewall?


A) Connecting networks
B) Protecting against external threats
C) Converting analog signals
D) Providing wireless access

 What is a disadvantage of using a cabled network?


A) Limited stability
B) High risk of interception
C) Limited mobility of devices
D) Requires wireless signals

 What is a unique identifier for devices in a network?


A) IP address
B) MAC address
C) Router address
D) DNS

 What does a modem do?


A) Connects LANs together
B) Converts digital signals to analog and vice versa
C) Directs data packets using MAC addresses
D) Stores IP addresses

 What is the main purpose of an access point?


A) To connect devices wirelessly to a wired network
B) To increase the data transfer speed
C) To provide internet access via satellites
D) To monitor network security

 Which of these uses satellite communication for internet access?


A) LAN
B) WLAN
C) 4G
D) Satellite

 What is a common disadvantage of using Bluetooth?


A) High energy consumption
B) Limited number of supported devices
C) High setup costs
D) Requires cabling

Lecture 10
 What is the Internet?
A) A worldwide collection of connected computers and devices
B) A type of network restricted to one organization
C) A programming language
D) A web browser

 Who developed the World Wide Web?


A) ARPA
B) Sir Tim Berners-Lee and CERN team
C) Microsoft
D) IBM
 What does HTML stand for?
A) Hyperlink Markup Language
B) Hypertext Markup Language
C) Hyperlink Transfer Language
D) Hypertext Transfer Language

 What is the purpose of DNS?


A) Encrypt user data
B) Convert hostnames into IP addresses
C) Monitor network traffic
D) Store email data

 Which of the following is an example of an FQDN?


A) 192.168.0.1
B) www.google.com
C) HTTP/1.1
D) urn:isbn:12345

 What protocol is used for secure web communication?


A) HTTP
B) FTP
C) HTTPS
D) TELNET

 Which port does SMTP use by default?


A) 143
B) 110
C) 25
D) 80

 What is the difference between POP3 and IMAP?


A) IMAP downloads emails to the client; POP3 leaves them on the server
B) IMAP leaves emails on the server; POP3 downloads them to the client
C) IMAP deletes emails after download; POP3 stores them permanently
D) IMAP is not an email protocol

 Which of the following is a client-side technology?


A) JavaScript
B) PHP
C) MySQL
D) ASP.NET

 What does URL stand for?


A) Uniform Resource Name
B) Uniform Resource Locator
C) Universal Resource Link
D) User Resource Locator

 What is an example of a web-based email client?


A) Microsoft Outlook
B) Gmail
C) Mozilla Thunderbird
D) IBM Lotus Notes
 What is the role of the TCP/IP protocol?
A) Convert analog signals
B) Enable communication across the internet
C) Store and forward emails
D) Secure data transmission

 What is a key feature of cascading in CSS?


A) Inline styles override external styles
B) External styles override inline styles
C) Internal styles override inline styles
D) Precedence is not applied

 What type of address does DNS resolve?


A) MAC address
B) IP address
C) URL
D) Email address

 Which is NOT a web protocol?


A) SMTP
B) HTTP
C) FTP
D) HTTPS

 What tag starts an HTML document?


A) <html>
B) <head>
C) <body>
D) <title>

 Which server-side technology is used for database management?


A) JavaScript
B) MySQL
C) CSS
D) HTML

 What is the purpose of AJAX?


A) Secure web pages
B) Update web pages asynchronously without reloading
C) Encrypt user data
D) Stream audio and video

 What does IMAP stand for?


A) Internet Mail Application Protocol
B) Integrated Mail Access Protocol
C) Internet Message Access Protocol
D) Internal Mail Application Protocol

 What is a Uniform Resource Identifier (URI)?


A) A string identifying a web resource
B) A secure communication protocol
C) A database language
D) A browser extension
 What is a key characteristic of the WWW?
A) A private network within organizations
B) A collection of communication standards on the internet
C) A hardware-based technology
D) An email protocol

 What does CSS control?


A) User authentication
B) Page layout and formatting
C) Data transmission protocols
D) Email encryption

 What is the function of the <a> tag in HTML?


A) Display an image
B) Format text
C) Create a hyperlink
D) Add CSS styles

 Which of the following technologies is NOT server-side?


A) JavaScript
B) ASP.NET
C) PHP
D) JSP

 What is the main advantage of using CSS in web design?


A) Separates content from formatting
B) Encrypts data on the server
C) Improves browser compatibility
D) Enables dynamic interactions

Lecture 12
 What is E-government?
A) The use of digital technology to deliver public services
B) Online education system
C) A platform for e-commerce
D) A type of digital banking

 Which of the following is an example of Government-to-Citizens (G2C) interaction?


A) Electronic Voting
B) Group Purchasing
C) Government E-Procurement
D) Internal Efficiency

 What is m-government?
A) E-government for manufacturing
B) Mobile-enabled government services
C) Management of government employees
D) Manual government procedures

 Which is a benefit of E-learning?


A) High equipment costs
B) Flexibility and self-paced learning
C) Limited number of participants
D) Lack of consistent material

 What is a drawback of E-learning?


A) Lack of face-to-face interaction
B) Inability to access from mobile devices
C) Low diversity of learners
D) Limited content availability

 What is the primary purpose of E-books?


A) To replace tablets
B) To provide a digital alternative to printed books
C) To serve as a platform for social media
D) To facilitate email communication

 What does E-health encompass?


A) The transfer of health resources and services electronically
B) The use of printed medical records
C) Health campaigns in schools
D) Manual management of public health services

 What is a key feature of Electronic Medical Record Systems (EMR)?


A) Printed storage of patient data
B) Digital storage and accessibility of medical records
C) Paper-based prescriptions
D) Manual data entry

 What is digital disruption?


A) Internet outages affecting communication
B) Transformation of industries through digital technology
C) Temporary technical failures
D) Replacement of employees by machines

 Which of the following is an example of the sharing economy?


A) Traditional taxis
B) Ride-sharing services like Uber
C) Supermarket chains
D) Fast food delivery

 What does P2P in E-commerce stand for?


A) Person-to-Person
B) Platform-to-Person
C) Product-to-Person
D) Provider-to-Public

 Which is a P2P activity?


A) Online auctions
B) Government e-procurement
C) Corporate training
D) Mobile health monitoring

 What is the primary goal of virtual universities?


A) To provide real degrees through online platforms
B) To reduce the cost of physical campus construction
C) To eliminate traditional teaching methods
D) To offer free education globally

 What is an example of an E-government service for businesses?


A) Social media marketing
B) Mobile app development
C) E-procurement
D) Online tutoring

 What is the purpose of social learning in E-learning platforms?


A) To replace traditional examinations
B) To encourage collaborative learning through social networks
C) To focus on one-on-one instruction
D) To eliminate virtual simulations

 What is a limitation of E-books?


A) Dependency on electronic devices
B) High printing costs
C) Limited accessibility
D) Lack of portability

 What does M-learning stand for?


A) Machine Learning
B) Mobile Learning
C) Multinational Learning
D) Modular Learning

 Which area does E-health NOT cover?


A) Medical research
B) Patient surveillance
C) Manufacturing medical equipment
D) Administrative purposes

 What is the advantage of using E-Learning Management Systems?


A) Efficient tracking and organization of learning activities
B) Enhanced face-to-face interaction
C) Reduced diversity in training content
D) Simplified manual processes

 What is a driver of E-learning adoption?


A) High training costs
B) Flexibility and innovative teaching methods
C) Limited access to content
D) Requirement of extensive retraining

 Which is an example of ride-sharing?


A) Traditional bus services
B) Uber or Lyft
C) Online ticket booking
D) Shipping goods internationally

 What type of activity is classified under P2P money lending?


A) Lending between individuals through online platforms
B) Bank-to-bank transfers
C) Government loans
D) Corporate bonds

 Which is NOT a benefit of E-government?


A) Increased efficiency
B) High implementation costs
C) Enhanced transparency
D) Better accessibility

 What is a key characteristic of digital disruption?


A) Decreased reliance on technology
B) Transformation of traditional business models
C) Increase in manual processes
D) Elimination of digital platforms

 What is the impact of E-health on public health services?


A) Increased manual data entry
B) Improved delivery and training using IT
C) Reduced access to health resources
D) Limited sharing of health information

Lecture 13
1. What is a primary cause of electrocution in ICT labs?

a) Overheating equipment

b) Spilling drinks near computers ✅

c) Using wireless connections

d) Tripping over cables

2. Which strategy minimizes the risk of fire in ICT environments?

a) Using only wireless connections

b) Avoiding overloading sockets or extension cables ✅

c) Keeping ventilation systems off

d) Keeping liquids away from computers

3. What is a recommended way to prevent tripping over cables?

a) Use more extension cables

b) Place cables under desks without covers

c) Use cable ducts to cover wires ✅

d) Avoid placing desks near cables


4. Why should personal data remain confidential?

a) It is required by law

b) To ensure fast internet browsing

c) To avoid risks such as stalking, theft, or blackmail ✅

d) To comply with software installation guidelines

5. Which is NOT a recommended e-safety practice?

a) Activate privacy settings on social media

b) Use trusted websites only

c) Share passwords with friends for backup ✅

d) Avoid sharing personal images online

6. What is phishing?

a) Sending fake emails to trick users into providing personal information ✅

b) Redirecting users to fake websites

c) Installing malicious code on a server

d) Using fraudulent SMS messages to obtain details

7. Which strategy helps prevent phishing?

a) Double-check email URLs and addresses ✅

b) Click on links only from unknown sources

c) Avoid installing anti-virus software

d) Use a weak password for email accounts

8. What is spyware?

a) A virus that replicates itself

b) Software that monitors and logs user activity ✅

c) A type of spam email

d) A method of hacking into secure networks

9. Which strategy prevents spyware?

a) Using a firewall
b) Avoiding websites with multimedia content

c) Installing and updating anti-spyware software ✅

d) Avoiding emails from unknown sources

10. What is pharming?

a) Sending fake SMS messages

b) Gaining unauthorized system access

c) Redirecting users to fake websites through malicious code ✅

d) Hacking into government systems

11. What is the main difference between phishing and pharming?

a) Phishing uses emails; pharming redirects users to fake websites ✅

b) Phishing uses spyware; pharming uses spam

c) Phishing is legal, and pharming is not

d) Pharming involves SMS while phishing uses pop-ups

12. What is smishing?

a) Fake SMS messages claiming prizes to trick users into providing details ✅

b) Fake emails to steal login credentials

c) Redirecting users to legitimate websites

d) Downloading spam attachments

13. Which is a safe practice to avoid smishing?

a) Double-check SMS messages for legitimacy ✅

b) Use a weak phone password

c) Open all links in SMS messages

d) Share personal details via text

14. What is a computer virus?

a) A type of phishing attack

b) A method of identity theft

c) Programming code that replicates itself without user permission ✅


d) A form of firewall protection

15. How can you prevent computer viruses?

a) Avoid updating your operating system

b) Share USB drives across systems

c) Install and regularly update antivirus software ✅

d) Disable all network connections

16. What is encryption used for?

a) Monitoring internet traffic

b) Storing data without user consent

c) Converting data into a meaningless format for secure transmission ✅

d) Deleting sensitive data automatically

17. What does a secure website use to ensure data safety?

a) HTTPS and a padlock icon ✅

b) HTTP without additional symbols

c) Large text warnings on the homepage

d) No visible encryption protocols

18. What is a firewall?

a) A security system that monitors and controls network traffic ✅

b) A virus protection software

c) A tool for managing email spam

d) A database authentication method

19. What is the primary purpose of biometric authentication?

a) To use unique human characteristics for secure access ✅

b) To replace traditional computer passwords

c) To prevent overheating in devices

d) To detect phishing emails


20. Which is NOT a characteristic of fingerprint scanning?

a) Small storage requirements

b) High accuracy

c) Intrusive scanning process ✅

d) Requires user presence

21. What is the purpose of moderated forums?

a) To restrict access to all users

b) To encourage anonymous posting

c) To ensure inappropriate posts are monitored and removed ✅

d) To allow users unrestricted interaction

22. What is a digital certificate used for?

a) Encrypting passwords locally

b) Preventing spam emails

c) Verifying the identity of the sender in online transactions ✅

d) Blocking malicious websites

23. What does the padlock symbol in a browser indicate?

a) The website uses a secure connection ✅

b) The website is under maintenance

c) The website contains unencrypted data

d) The website uses cookies

24. Why is the internet difficult to police?

a) Different countries have varying laws and regulations ✅

b) Internet providers refuse to cooperate

c) The technology does not allow regulation

d) It is inexpensive to enforce internet rules

25. What is software piracy?

a) Sharing free, open-source software


b) Using old versions of licensed software

c) Illegally copying, distributing, or using software ✅

d) Installing software updates without permission

You might also like