Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CIC2601 Assignment 5 (QUALITY ANSWERS) 2024

Puntuación
5.0
(1)
Vendido
2
Páginas
46
Grado
A+
Subido en
25-09-2024
Escrito en
2024/2025

This document contains workings, explanations and solutions to the CIC2601 Assignment 5 (QUALITY ANSWERS) 2024. For assistance whats-app us on 0.6.8..8.1.2..0.9.3.4.... Question 1 Complete Mark 1.00 out of 1.00 Question 2 Complete Mark 1.00 out of 1.00 QUIZ Word processing software is used to create, edit and format documents that mostly consist of text. Select one: True False Which one of the following is NOT an example of social a networking site. a. Twitter b. Facebook c. Wikipedia d. Instagram Question 3 Complete Mark 1.00 out of 1.00 Question 4 Complete Mark 1.00 out of 1.00 Question 5 Complete Mark 1.00 out of 1.00 The development of computer technology and advancement in mobile technology plays a huge role in how each one of usworks, lives, plays, and learns. Select one: True False The terms World Wide Web and Internet are interchangeable. Select one: True False Viruses like those described in the accompanying fi gure commonly infect computers through e-mail attachments. Select one: True False Question 6 Complete Mark 1.00 out of 1.00 Question 7 Complete Mark 1.00 out of 1.00 Question 8 Complete Mark 1.00 out of 1.00 The predecessor of word processing is the typewriter. Select one: True False Teachers always must protect the identity of their students on student and teacher Web pages. Select one: True False A database is a collection of information or data organised in a specifi c way. Select one: True False Question 9 Complete Mark 1.00 out of 1.00 Question 10 Complete Mark 1.00 out of 1.00 Question 11 Complete Mark 1.00 out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False Operating systems are the software needed to run your electronic device (computer, tablet or mobile phone). Select one: True False _______ apps are add-on programs for a variety of mobile devices including smartphones and tablets. a. Mobile b. Cloud c. System d. Utility Question 12 Complete Mark 1.00 out of 1.00 Question 13 Complete Mark 1.00 out of 1.00 It focuses on knowledge, understanding of, and use of computers. a. Computer literacy b. Information literacy c. Integration literacy d. Educational literacy __________ is system software that contains instructions that coordinate all the hardware of a computer and allow you toinstall and use application software. a. Operating System b. Application software c. Mobile application d. Drivers’ application Question 14 Complete Mark 0.00 out of 1.00 Question 15 Complete Mark 1.00 out of 1.00 _________ consists of a protocol, domain name, path and a web page name. a. Website b. Search engine c. Uniform resource locator d. Address bar A _______ is a collection of related data—the electronic equivalent of a fi le cabinet. a. Gallery b. Database c. Spreadsheet d. Presentation Question 16 Complete Mark 1.00 out of 1.00 Question 17 Complete Mark 1.00 out of 1.00 Fair use guidelines allow teachers to use any copyrighted works for educational purposes without any restrictions. Select one: True False ____ is the use of a computer or data for unapproved or possibly illegal activities. a. Access control b. Unauthorized use c. Unauthorized access d. Biometric trespass Question 18 Complete Mark 1.00 out of 1.00 Question 19 Complete Mark 1.00 out of 1.00 A _______ store is typically a website that provides access to specifi c mobile apps that can be downloaded either for anominal fee or free of charge. a. Cloud b. App c. QR d. Electronic _________ is the person carrying out the activity. a. Object b. Subject c. Tools or mediation d. Division of labour Question 20 Complete Mark 1.00 out of 1.00 Question 21 Complete Mark 1.00 out of 1.00 Question 22 Complete Mark 1.00 out of 1.00 An antivirus program like the one in the accompanying fi gure also is called a serum. Select one: True False As with word processing and spreadsheet software, database software includes wizards that allow teachers and students tocreate databases for use as address books and directories of parents and students. Select one: True False ____ is the use of a computer system without permission. a. Access controls b. Unauthorized use c. Unauthorized access d. Biometric trespass Question 23 Complete Mark 1.00 out of 1.00 Question 24 Complete Mark 1.00 out of 1.00 Question 25 Complete Mark 1.00 out of 1.00 Teachers and administrators can overcome integration barriers with effective leadership, proper training, planning, and acommitment to enhancing teaching and learning using technology. Select one: True False A ____ is the most widely used pointing device because it takes full advantage of a graphical user interface. a. Mouse b. Keyboard c. Graphics tablet d. Joystick Any illegal act involving a computer generally is referred to as a computer crime. Select one: True False Question 26 Complete Mark 1.00 out of 1.00 Question 27 Complete Mark 1.00 out of 1.00 Question 28 Complete Mark 0.00 out of 1.00 System software consists of programs that control the computers and its devices’ operations. Select one: True False There are very few ways to integrate educational technology with only one computer in your classroom. Select one: True False To help organize a presentation, small versions of all the slides can be viewed in the presentation view. Select one: True False Question 29 Complete Mark 1.00 out of 1.00 Question 30 Complete Mark 1.00 out of 1.00 Question 31 Complete Mark 1.00 out of 1.00 A ____ port is used to connect up to 127 different peripheral devices with a single connector. a. DVD b. VCR c. USB d. CPU Application software is those that we download to perform a specifi c task. Select one: True False Formulas in MS Excel always begin with... a. # b. % c. = d. + Question 32 Complete Mark 1.00 out of 1.00 Question 33 Complete Mark 1.00 out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False The results of presentation graphics software programs normally are viewed as ____. a. Macros b. Audience handouts c. Slides d. Notes pages Question 34 Complete Mark 1.00 out of 1.00 Question 35 Complete Mark 1.00 out of 1.00 _______ are used to create text-based documents. a. Databases b. Presentation programs c. Spreadsheets d. Word processors Integration literacy a. Combine with teaching and learning strategies b. Use technology to search for and make sense of online information c. Knowledge, understanding of and use of computers d. Enhance learning. Question 36 Complete Mark 1.00 out of 1.00 Question 37 Complete Mark 1.00 out of 1.00 Many desktop computer keyboards have a numeric keypad located on the left side of the keyboard. Select one: True False All of the following are true concerning viruses like those described in the accompanying fi gure EXCEPT ____. a. viruses are potentially damaging computer programs. b. a virus is a segment of a programs. c. many viruses are generated by chance. d. damage caused by a virus is called the virus payload. Question 38 Complete Mark 1.00 out of 1.00 Question 39 Complete Mark 1.00 out of 1.00 _______ organize, analyze, and graph numeric data such as budgets and fi nancial reports. a. Spreadsheet programs b. Word processor c. Databases d. Presentation programs __________ is the illegal and unethical representation of some other person’s work and ideas as your own without givingcredit to the original source. a. Plagiarism b. Copyright c. Ethics d. Phishing Question 40 Complete Mark 1.00 out of 1.00 Question 41 Complete Mark 1.00 out of 1.00 __________ are the guidelines according to which users use computers and information systems. a. Computer ethics b. Protocol c. Security risks d. Computer literacy Research shows that using technology in the classroom motivates students, encourages them to become problem solvers,and creates new avenues to explore information. Select one: True False Question 42 Complete Mark 1.00 out of 1.00 Question 43 Complete Mark 1.00 out of 1.00 __________ is an illegal action involving special knowledge of computer technology. a. Cybercrime b. Computer Ethics c. Virus d. Privacy Offi ce suites are also known as _______ suites. a. Lotus b. Utility c. Productivity d. Symphony Question 44 Complete Mark 0.00 out of 1.00 Question 45 Complete Mark 1.00 out of 1.00 Question 46 Complete Mark 1.00 out of 1.00 Unauthorized access is the use of a computer system or data for unapproved purposes. Select one: True False Most viruses like those described in the accompanying fi gure are harmless pranks that cause no permanent damage. Select one: True False Which ONE of the following acronyms is often used in software licensing? a. GNU b. WLAN c. WWW d. LAN Question 47 Complete Mark 1.00 out of 1.00 Question 48 Complete Mark 1.00 out of 1.00 Question 49 Complete Mark 1.00 out of 1.00 _______ are programs that combine a variety of visual objects to create attractive, visually interesting presentations. a. DBMS b. Desktop publishers c. Spreadsheets d. Presentation graphics Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Question 50 Complete Mark 1.00 out of 1.00 Learning by utilizing electronic technologies to access educational curriculum outside of a traditional classroom is called a. E-learning b. M-learning c. Paperless classroom d. Technology-integrated lesson CIC2601-24-Y  Welcome Message  Assessment 5 Question 1 Not yet answered Marked out of 1.00 Question 2 Not yet answered Marked out of 1.00 QUIZ Word processing software is used to create, edit and format documents that mostly consist of text. Select one: True False Which one of the following is NOT an example of social a networking site. a. Twitter b. Facebook c. Wikipedia d. Instagram Clear my choice Question 3 Not yet answered Marked out of 1.00 Question 4 Not yet answered Marked out of 1.00 Question 5 Not yet answered Marked out of 1.00 The development of computer technology and advancement in mobile technology plays a huge role in how each one of usworks, lives, plays, and learns. Select one: True False The terms World Wide Web and Internet are interchangeable. Select one: True False Viruses like those described in the accompanying fi gure commonly infect computers through e-mail attachments. Select one: True False Question 6 Not yet answered Marked out of 1.00 Question 7 Not yet answered Marked out of 1.00 Question 8 Not yet answered Marked out of 1.00 The predecessor of word processing is the typewriter. Select one: True False Teachers always must protect the identity of their students on student and teacher Web pages. Select one: True False A database is a collection of information or data organised in a specifi c way. Select one: True False Question 9 Not yet answered Marked out of 1.00 Question 10 Not yet answered Marked out of 1.00 Question 11 Not yet answered Marked out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False Operating systems are the software needed to run your electronic device (computer, tablet or mobile phone). Select one: True False _______ apps are add-on programs for a variety of mobile devices including smartphones and tablets. a. Mobile b. Cloud c. System d. Utility Clear my choice Question 12 Not yet answered Marked out of 1.00 Question 13 Not yet answered Marked out of 1.00 It focuses on knowledge, understanding of, and use of computers. a. Computer literacy b. Information literacy c. Integration literacy d. Educational literacy Clear my choice __________ is system software that contains instructions that coordinate all the hardware of a computer and allow you toinstall and use application software. a. Operating System b. Application software c. Mobile application d. Drivers’ application Clear my choice Question 14 Not yet answered Marked out of 1.00 Question 15 Not yet answered Marked out of 1.00 _________ consists of a protocol, domain name, path and a web page name. a. Website b. Search engine c. Uniform resource locator d. Address bar Clear my choice A _______ is a collection of related data—the electronic equivalent of a fi le cabinet. a. Gallery b. Database c. Spreadsheet d. Presentation Clear my choice Question 16 Not yet answered Marked out of 1.00 Question 17 Not yet answered Marked out of 1.00 Fair use guidelines allow teachers to use any copyrighted works for educational purposes without any restrictions. Select one: True False ____ is the use of a computer or data for unapproved or possibly illegal activities. a. Access control b. Unauthorized use c. Unauthorized access d. Biometric trespass Clear my choice Question 18 Not yet answered Marked out of 1.00 Question 19 Not yet answered Marked out of 1.00 A _______ store is typically a website that provides access to specifi c mobile apps that can be downloaded either for anominal fee or free of charge. a. Cloud b. App c. QR d. Electronic Clear my choice _________ is the person carrying out the activity. a. Object b. Subject c. Tools or mediation d. Division of labour Clear my choice Question 20 Not yet answered Marked out of 1.00 Question 21 Not yet answered Marked out of 1.00 Question 22 Not yet answered Marked out of 1.00 An antivirus program like the one in the accompanying fi gure also is called a serum. Select one: True False As with word processing and spreadsheet software, database software includes wizards that allow teachers and students tocreate databases for use as address books and directories of parents and students. Select one: True False ____ is the use of a computer system without permission. a. Access controls b. Unauthorized use c. Unauthorized access d. Biometric trespass Clear my choice Question 23 Not yet answered Marked out of 1.00 Question 24 Not yet answered Marked out of 1.00 Question 25 Not yet answered Marked out of 1.00 Teachers and administrators can overcome integration barriers with effective leadership, proper training, planning, and acommitment to enhancing teaching and learning using technology. Select one: True False A ____ is the most widely used pointing device because it takes full advantage of a graphical user interface. a. Mouse b. Keyboard c. Graphics tablet d. Joystick Clear my choice Any illegal act involving a computer generally is referred to as a computer crime. Select one: True False Question 26 Not yet answered Marked out of 1.00 Question 27 Not yet answered Marked out of 1.00 Question 28 Not yet answered Marked out of 1.00 System software consists of programs that control the computers and its devices’ operations. Select one: True False There are very few ways to integrate educational technology with only one computer in your classroom. Select one: True False To help organize a presentation, small versions of all the slides can be viewed in the presentation view. Select one: True False Question 29 Not yet answered Marked out of 1.00 Question 30 Not yet answered Marked out of 1.00 Question 31 Not yet answered Marked out of 1.00 A ____ port is used to connect up to 127 different peripheral devices with a single connector. a. DVD b. VCR c. USB d. CPU Clear my choice Application software is those that we download to perform a specifi c task. Select one: True False Formulas in MS Excel always begin with... a. # b. % c. = d. + Clear my choice Question 32 Not yet answered Marked out of 1.00 Question 33 Not yet answered Marked out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False The results of presentation graphics software programs normally are viewed as ____. a. Macros b. Audience handouts c. Slides d. Notes pages Clear my choice Question 34 Not yet answered Marked out of 1.00 Question 35 Not yet answered Marked out of 1.00 _______ are used to create text-based documents. a. Databases b. Presentation programs c. Spreadsheets d. Word processors Clear my choice Integration literacy a. Combine with teaching and learning strategies b. Use technology to search for and make sense of online information c. Knowledge, understanding of and use of computers d. Enhance learning. Clear my choice Question 36 Not yet answered Marked out of 1.00 Question 37 Not yet answered Marked out of 1.00 Many desktop computer keyboards have a numeric keypad located on the left side of the keyboard. Select one: True False All of the following are true concerning viruses like those described in the accompanying fi gure EXCEPT ____. a. viruses are potentially damaging computer programs. b. a virus is a segment of a programs. c. many viruses are generated by chance. d. damage caused by a virus is called the virus payload. Clear my choice Question 38 Not yet answered Marked out of 1.00 Question 39 Not yet answered Marked out of 1.00 _______ organize, analyze, and graph numeric data such as budgets and fi nancial reports. a. Spreadsheet programs b. Word processor c. Databases d. Presentation programs Clear my choice __________ is the illegal and unethical representation of some other person’s work and ideas as your own without givingcredit to the original source. a. Plagiarism b. Copyright c. Ethics d. Phishing Clear my choice Question 40 Not yet answered Marked out of 1.00 Question 41 Not yet answered Marked out of 1.00 __________ are the guidelines according to which users use computers and information systems. a. Computer ethics b. Protocol c. Security risks d. Computer literacy Clear my choice Research shows that using technology in the classroom motivates students, encourages them to become problem solvers,and creates new avenues to explore information. Select one: True False Question 42 Not yet answered Marked out of 1.00 Question 43 Not yet answered Marked out of 1.00 __________ is an illegal action involving special knowledge of computer technology. a. Cybercrime b. Computer Ethics c. Virus d. Privacy Clear my choice Offi ce suites are also known as _______ suites. a. Lotus b. Utility c. Productivity d. Symphony Clear my choice Question 44 Not yet answered Marked out of 1.00 Question 45 Not yet answered Marked out of 1.00 Question 46 Not yet answered Marked out of 1.00 Unauthorized access is the use of a computer system or data for unapproved purposes. Select one: True False Most viruses like those described in the accompanying fi gure are harmless pranks that cause no permanent damage. Select one: True False Which ONE of the following acronyms is often used in software licensing? a. GNU b. WLAN c. WWW d. LAN Clear my choice Question 47 Not yet answered Marked out of 1.00 Question 48 Not yet answered Marked out of 1.00 Question 49 Not yet answered Marked out of 1.00 _______ are programs that combine a variety of visual objects to create attractive, visually interesting presentations. a. DBMS b. Desktop publishers c. Spreadsheets d. Presentation graphics Clear my choice Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Question 50 Not yet answered Marked out of 1.00 Learning by utilizing electronic technologies to access educational curriculum outside of a traditional classroom is called a. E-learning b. M-learning c. Paperless classroom d. Technology-integrated lesson

Mostrar más Leer menos
Institución
Grado

Vista previa del contenido

CIC2601
Assignment 5 2024
Unique #
Due Date: 3 October 2024



This document includes:

• Helpful answers and guidelines
• Detailed explanations and/ or calculations
• References



Connect with the tutor on

+27 68 812 0934

Libro relacionado

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
25 de septiembre de 2024
Número de páginas
46
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$3.00
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Reseñas de compradores verificados

Se muestran los comentarios
1 año hace

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0
Reseñas confiables sobre Stuvia

Todas las reseñas las realizan usuarios reales de Stuvia después de compras verificadas.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
StudyShack Cornerstone College, Pretoria, Gauteng
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
30816
Miembro desde
9 año
Número de seguidores
13937
Documentos
2015
Última venta
4 horas hace
Study Guides for Unisa Students

4.1

1803 reseñas

5
992
4
336
3
265
2
81
1
129

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes