TITC102 Mid Term Exam Study Questions
Student Answers
1. What is a computer, and what is the relationship between data and information?
A computer is an electronic device that accepts user input (data) and processes it under the
influence of a set of instructions referred to as programs to produce the desired output generally
referred to as information and store it.
→ Computers process data into information.
• Data are the raw facts may not make much meaning to the user. Wisdom
Knowledge
Information
• Programs are set of instructions that instruct a computer what to do. Data
• Information is result after data has been processed.
• Input – any data and instructions entered into the MEMORY of a computer.
• Output – data that has been processed into a useful form.
2. Differentiate between the three types of era.
Era Criteria
Agricultural Era Land cultivation, animal and plants breeding, sustenance
Simplified work processes through automation, industrial revolution,
Industrial Era
introduction of various inventions
- Workers and users in creating, distributing and
Information Era
use of information
(21st Century)
- computerized systems used with rapid pace in most field
3. List and describe the five components of a computer.
1. Input devices
2. Memory
3. Output devices
4. Processor – Central Processing Unit (CPU)
5. Storage devices
https://www.google.com/url?sa=i&url=https%3A%2F%2F2.zoppoz.workers.dev%3A443%2Fhttps%2Fwww.pinterest.com%2Fpin%2F
485825878522107698%2F&psig=AOvVaw1TalBE8VIq6Iz6E0L0DRQk&ust=1668021973
864000&source=images&cd=vfe&ved=0CA0QjRxqFwoTCPjhk5uon_sCFQAAAAAdAAA
AABAE
4. What are the control unit and arithmetic logic unit components of a processor?
CPU is divided into two sections or units. These two components work togehter to perform
processing operations:
Contol Unit (CU) Arithmetic Logic Unit (ALU)
Instructions from RAM are decoded into
Commands are executed
Commands
DIRECT, CONTROL & COORDINATE
CALCULATE, COMPARE & PERFORM
all computer activities
5. What are the four steps in a machine cycle?
1. Fetching
2. Decoding
3. Executing
4. Storing
6. What is a bit, and how does a series of bits represent data?
The smallest unit of data → BIT (binary digit).
A bit (binary digit) is the smallest unit of data that a computer can process and store. A bit
is always in one of two electronic states: on or off. The state is represented by a 0 or 1.
7. How do POS terminals and ATM works?
Point-of-Sale Terminals (POS) Automated Teller Machine (ATM)
A point-of-sale (POS) terminal is a
An ATM is a machine built into the wall of a
hardware system for processing card
bank or other building, which allows people
payments at retail locations. Software to
to take out money from their bank account
read magnetic strips of credit and debit
by using a special card
cards is embedded in the hardware.
How it works: ATMs require consumers to use a plastic card—either a bank debit card or a
credit card—to complete a transaction. Consumers are authenticated by a PIN before any
transaction can be made.
8. What are alternative input devices for physically challenged users?
Alternative input devices for physically challenged users (assistive technology):
• Voice recognition
• On-Screen keyboard
• Large Key Keyboard
• Head Mounted Pointer
9. What are the four types of output?
OUTPUT DEVICES
• Text
• Graphics
• Audio
• Video
10. What are storage devices different from storage media?
Storage device Storage medium (Seconday storage)
physical material for computers to store
designed to store data and instructions
data, instructions and information, e.g.
permanently and for future retrieval
hard disk, flash memory card, CD
➢ Reading: Process of transferring items from storage media to memory.
When storage devices read from storage media, they function as source of input.
➢ Writing: Process of transferring items from memory to storage media.
When storage devices write on storage media, they are creating output.
11. What is cloud storage and what are its advantages?
Cloud Storage can be defined as a virtual memory unit. In this storage method, files and folders
can be stored in the internet-based cloud memory offered by the cloud service providers.
Advantages:
• Disaster Recovery
• Access to your data anywhere
• Low cost
• Security
12. How are magnetic stripe cards and smart cards used?
magnetic stripe cards smart cards
- credit, debit or entertainment card
- contains a stripe that contains
information identifiying you and the - It stores data on an embedded
card integrated circuit chip (ICC)
- information stripe often includes your
name, account number and the - Two types of reading it:
accounts, cards expiry date contactless or with making physical
- when you swipe the card through a contact
magnetic stripe reader, it reads
information stored on the stripe
13. Differentiate between packaged software and freeware.
Packaged software Freeware
- Sale for profit, mass production and
copyrighted, wide variety of users.
- Packaged software is a collection of - Free, copyrighted, users don’t have
programs that perform similar access to the source code to make
functions or have similar features. any modification
- For example, Microsoft Office - For example, Yahoo Messenger
includes multiple applications such
as Excel, Word, and PowerPoint.
14. Describe five characteristics of a word processing application.
- References
- Mailings
- Add-Ins
- Information entry
- Information editing
- Information storage
- Information printing
15. Is there a difference between a web-based application and the cloud-based?
Web-based application Cloud-based application
- Almost exclusively designed to be
used from a web server - Data stored in cloud
- Limited options for consumer - Cloud infrastructure (the tools
customization needed to build a cloud)
- More limited functionality - You can cash the data locally for full
- Accessible for all users offline mode
- No installation required
16. What is system software, and what are the two types of system software?
There are two types of software: systems software and application software.
• System software includes the programs that are dedicated to managing the computer
itself. It enables the application software to interact with the computer.
Four categories of system software, namely operating system (OS), utility program,
device driver and language translator.
17. What are the functions of an operating system?
• Start the computer
• Provide a user interface
• Manage programs
• Manage memory
• Schedule jobs and configure devices
• Establish an internet connection
• Monitor performance
• Provide file management and other utilities
• Control a network
• Administer security
An operating system is a set of programs containing instructions that coordinate all the activities
among computer hardware resources. It manages resources, provides user interface, and
execute applications.
18. What is the purpose of several utility programs?
• Type of system software for maintenance-type tasks
• Built-in utility programs
• Functions include: managing files, searching for files, uninstalling programs, cleaning up
disks, defragmenting disks, securing from unauthorized access.
19. What are the advantages of using a network?
• to search for images, videos, maps, audio, publications, people or businesses, blogs
• messaging
• news, sports, weather, maps, shopping, e-mail
20. How are LANs, MANs and WANs different?
Local Area Network (LAN) MAN WAN
Within the government
agency, private company or MAN is a comparatively The WAN network spans to
university, network are wider network that covers an even larger locality. It
connected to allow large regions- like towns, has the capacity to connect
resource sharing (printers), cities, etc. various countries together.
communication
21. Differentiate between wired and wireless communication devices?
Wired Wireless
- radio signals
- via cable - wireless modem
- modem - satellite
- router - connect to the internet
- refers to any physical medium made - media that is made up of
up of cables electromagnetic waves (EM Waves)
or infrared waves
22. Outline the distinct characteristics of bricks-and-mortar, click-and-order and
clicks-and-mortar business presence types in e-Commerce.
Business Presence Types
Bricks-and-mortar: Click-and-order: Clicks-and-mortar:
- don't have a Web - sell goods primarily via the - have both a physical and
Presence Web an online presence
(e.g. general stores) (e.g. amazon)
23. Describe the steps involved in e-Commerce transactions.
1. The customer visits the e-retailer’s electronic storefront via the Internet.
2. The customer collects purchases in an electronic shopping cart.
3. Customer enters payment information in a secure Web site. The e-retailer sends
financial information to the bank.
4. The bank performs security checks and sends authorization back to the e-retailer.
5. E-retailer’s Web server sends confirmation to the customer, processes the order, and
then sends it to the fulfillment center.
24. Discuss major concern with online payment.
• Major concern is SECURITY and PRIVACY
• Mobile phone susceptible to lost or being stolen
➔ Apple Pay uses iPhone Touch ID
25. Name and describe two services and tools for referencing and language
purposes.
Referencing Language
- Zotero (needs to be downloaded,
Browser extension & application - Dictionary.com
itself) - Grammarly
- CiteThisForMe
26. Discuss the web evolution by outlining its distinct contribution or characteristics.
Web Web of…
✓ Web 1.0 – Developing the Internet 1. Content (read-only web)
✓ Web 2.0 – Shopping carts &
2. Communication
static web
✓ Web 3.0 – Semantic executing web 3. Context (web application, user)
✓ Web 4.0 – Mobile web 4. Things (connecting)
✓ Web 5.0 – Symbiotic web 5. Thoughts (powerful, intelligence)
BUSINESS & COMMUNICATION & ENTERTAINMENT
27. Discuss various features available in Grammarly.
Reviews spelling, grammar, punctuation, clarity, engagement, and delivery mistakes.
28. Differentiate between cyberwarfare and cyberterrorism.
Cyberwarfare Cyberterrorism
- an attack with the aim at disabling - To create fear by large-scale
government’s computer network to disruption of computer networks
crippling a country - motivated by political or religious
- have “certain targets” beliefs
Cyberterrorism and cyberwarfare require a team of highly skilled individuals, millions of
dollars and years of planning.
29. Differentiate between the four types of cybercrime perpetrators.
State sponsored
Script kiddie Cyber Terrorist Hacktivist
Hacker
30. Elaborate methods to safeguarding against network attacks.
✓ Use antivirus software.
✓ Be suspicious of unsolicited email attachments.
✓ Scan removable media for malware before using it.
✓ Implement firewall solutions.
✓ Back up regularly.
31. How to access the ribbon options in Microsoft Office Word by using the shortcut
keys?
https://support.microsoft.com/en-us/office/use-the-keyboard-to-work-with-the-ribbon-in-word-467089f1-b4f9-4407-a80a-
6a1f351fd44e
32. Explain three non-printing characters and its usefulness.
- Tab characters
- Spaces
- Paragraph marks
34. Identify three shortcut keys used for formatting line spacing in Word.
Apply double spacing to the paragraph | Ctrl+2
Apply 1.5-line spacing to the paragraph | Ctrl+5
Add or remove space before the paragraph | Ctrl+0 (zero)
36. Name two types of paragraphs indentation.
First line: Indentation is applied to the first line of each paragraph. This provides a visual clue
to readers that you’re shifting focus or introducing a new idea.
Hanging: An indent is applied to the second and subsequent lines of each paragraph.
37. Differentiate between floating and inline objects.
Floating objects Inline objects
Floating objects are anchored to a
position on a page. Inline objects are embedded in the text
If you want an object to remain in flow. If you type more text above them,
place so that text on the page flows they are pushed along as the text grows.
around it, use a floating object.
40. Describe two options available for bullet design.
Symbol & Picture
43. Discuss the purpose and benefits of mail merge in Word.
Typing one letter to be distributed to many recipients
44. Differentiate between author-focus and info-focus for in-text citations.
Author-focus Info-focus
The author’s name is in the paragraph The Information comes first, and the
included e.g., authors are included towards the end in
“according to Ahmad (2010)” brackets e.g., “… (Ahmad, 2010)”