0% found this document useful (0 votes)
4 views2 pages

Social EcoImpact of ICT

Uploaded by

Yashema Martluck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

Social EcoImpact of ICT

Uploaded by

Yashema Martluck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

b.

Expert system
__________________________________________________________
__________________________________________________________ Gingerland Secondary School
__________________________________________________________ Information Technology
Social and Economic Impact of ICT
40
c. The World Wide Web
__________________________________________________________ Teacher: Ms. Y. Martluck
__________________________________________________________ Name: _____________________________ Date:___________
__________________________________________________________
Instructions:
This test consists of two (2) Sections Section 1: ten multiple choice
questions and Section 2: four structured questions.
Read each question carefully before answering.
There is no penalty for incorrect answers, so attempt ALL questions.
You have 45 minutes to complete this test.

Section 1: Multiple Choice Questions

1. An online attack on an 4. Robots controlled by computer


might replace a human worker in a:
that employees and customers a. car factory b. nursery
cannot access that company's web c. law court d. hairdresser
site. This is called:
a. cyber bullying b. denial of service 5. Software that gives answers to
c. data backup d. phishing problems using stored models is
called:
2. Precautions taken by a. simulation
organizations to prevent cybercrime b. expert system
are called: c. applications software
a. identity theft b. propaganda d. manual system
c. espionage d. countermeasures
6. A system where employees can
3. Software that blocks access to a work at home and connect remotely
network from outside is called: to the company computer is called:
a. anti-virus software a. telemarketing b. teleconferencing
b. operating system c. telephony d. telecommuting
c. biometric d. firewall
7. MRI and CT scan are two a. Use a password
technologies that are used by which b. Establish a protocol
of the following professionals? c. Make a backup
a. Teacher b. Doctor d. Set up a firewall
c. Meteorologist d. Police
10 What is a biometric system?
8. Which of these is a collection of a. A robot that can rescue people
web pages hosted on a server? from danger
a. Website b. Internet b. A security system using physical
c. URL d. Search engine features such as fingerprints
c. A computer that diagnoses
9. A severe event such as a hurricane medical conditions
can destroy stored information. d. A type of computer virus that will
Which of these precautions will help make you ill
to deal with that problem?

Section 2: Structured Questions

You might also like