100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIC2601_ Exam PACK.

Rating
-
Sold
-
Pages
50
Grade
A+
Uploaded on
27-10-2021
Written in
2021/2022

CIC2601 - Compiled Exams & Assignments (Questions & Answers). Computer Integration In The Classroom. Networked computers contain a (n) ____________ to connect directly to a network. A) Modem B) Conversion card C) Network interface card D) Analog/digital interface card 3. ___________ Signals are signals that are comprised of a continuous electrical wave. A) Analog B) Bidirectional C) Digital D) Modem 4. Tutorials are ____________ . A) Answers to questions that people frequently ask about an application B) The electronic equivalent of a user manual, which is usually integrated into an application software package C) Step-by-step instructions using real-life examples to show how to use an application D) Automated assistants that help complete a task by asking questions and performing actions based on the answers 5. ________ is the process of obtaining a program instruction or data item from memory. A) Fetching B) Storing C) Decoding D) Executing 6. Storage devices can function as a source of ______________. A) Input and processing B) Output and processing C) Input and output D) All of the above 7. To work with a saved file, the file must be removed from __________ . A) Storage and placed in memory B) Memory and placed in storage C) Storage and placed in ROM D) ROM and placed in storage Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 8. _____________ is a digital media application that accepts input from the user and performs some action in response A) Interactive digital media B) A hyperlink C) An interactive link D) Computer-based training 9. Computer based models of real-life situations are called __________ . A) MPEGs B) Computer based training C) Simulations D) Hyperlinks 10. One advantage of computer based training is that it _______________. A) Allows for flexible training B) Provides delayed feedback C) Increases training costs D) All of the above 11. The best strategy for technology ___________ is to put the technology into the hands of trained teachers,to make the technology accessible and to let the teachers decide how best to use the technology in their classrooms at the point of instruction A) Integration B) Awareness C) Literacy D) Perspective 12. The internet is used by teachers to ___________ . A) Access information such as learning support material B) Communicate with colleagues in any part of the world C) Publish information such as lesson places on websites D) All of the above 13. Which one of the following statements is not true concerning most antivirus programs ? A) It can protect a computer against unauthorised access by a learner B) It can detect a virus on a flash drive (memory stick) that a learner inserts in a computer C) It can repair infected files D) It can detect a virus in an e-mail sent by a teacher to a colleague 14. Software licences are agreements that ____________. A) Provide specific conditions for use of software B) Users must accept before using software C) Outline the rights to use software D) All of the above 15. _______ is the process of converting readable data into readable characters. A) Cipher text B) Plain text C) Encryption D) Callback Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 16. An area of computer ethics frequently discussed includes ___________. A) The confidentiality of information B) Copyright issues C) Software theft D) All of the above 17. School computer labs are used to teach learners technological skills or subject-specific skills that are ______________ the rest of the curriculum. A) Integrated with B) Connected to C) Combined with D) Isolated from 18. A collection of related webpages that can be accessed electronically is called a ________. A) Website B) Homepage C) Web server D) Web browser 19. A _______,which is similar to a book cover or a table of contents, provides information about the purpose and the content of a collection of web pages. A) Website B) Homepage C) Web server D) Web browser 20. The role of technology committee at a school is to help make decisions on __________. A) What new technologies are to be purchased B) Where technologies will be placed C) All of the above D) None of the above 21. A(n) _____ projects the image that appears on a computer screen onto a large screen. A) NTSC converter B) Data projector C) LCD projector panel D) Digital light processing (DPL) projector 22. Information literacy means ____________. A) Knowledge and understanding of computers and their uses B) The ability to gather information from multiple sources C) The ability to use computers D) The ability to use other technologies 23. ________________ is data that is organised ,useful and has meaning. A) Software B) Input C) Output D) Information Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 24. A process in which 2 or more devices transfer data, instructions and information is known as ____________ . A) A communication channel B) A communication network C) Communications D) Communication software 25. All of the following are types of non-impact printers except _____________ printers. A) Dot-matrix B) Ink-jet C) Laser D) Thermal 26. To __________ involves developing the document by entering the text or numbers, designing graphics and performing other tasks using an input device. A) Edit B) Insert C) Format D) Create 27. The ability to understand how to match appropriate technology to learning objectives, goals and outcomes is referred to as __________. A) Computer literacy B) Integration literacy C) Information literacy D) Technology literacy 28. The process of making changes to the document’s existing content is referred to as _________. A) Formatting B) Copying C) Editing D) Creating 29. Three popular embedded operating systems include _________. A) Blackberry OS, Windows 7, and Mac OS x B) Mac OS X Lin, Google android and Windows 7 C) Apple IOS, Google android and Blackberry OS D) All of the above 30. _________ consists of programs that control the operations of the computer and its devices. A) The operating system B) System software C) Application software D) Windows 7 31. A(n) ____ combines text graphics and other visual cues to make software easier to use. A) Operating system B) User interface C) Graphical user interface D) System software Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 32. Spell checkers in many word processing programs allow the user to check the spelling of _________. A) A whole document B) A single word C) Sing words as you type them D) All of the above 33. Using ____ software an individual can create newsletters, brochures and advertisements postcards and greeting cards letterheads and business cards banners calendars and logos. A) CAD B) GUI C) URL D) DTP 34. One type of system software, the operating system _________. A) Contains instructions that coordinate a computer’s activities B) Is only important when a computer processes information C) Is not loaded into memory when a computer is first turned on D) Is loaded into memory from a floppy disk each time a computer is turned on 35. A compact disc-rewritable (CD- RW) is an erasable disc users can __________ . A) Write to different parts of the disc, one after the other B) Write to each part of the disc only one time C) Not erase the content of the disc D) Write to the disc multiple times 36. A single user licence typically includes the condition that ____________. A) Users may install the software on only one computer B) Users may make one backup copy of the software C) Users may not give copies to friends D) All of the above 37. A _________ virus replaces the program that is used to start the computer system with a modified, infected version of the start-up program A) Boot sector B) File C) Trojan horse D) Marco 38. A ________ virus hides within or is designed to look like a legitimate program. A) Boot sector B) File C) Trojan horse D) Macro 39. A security system consisting of hardware and or software that prevents unauthorised access to data and information on a network is called a ______________ . A) Proxy B) Firewall C) Blocker D) Defender Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 40. A person who tries to break into a computer system is called a _________ . A) Cracker B) Hacker C) Cookie D) Both A and B 41. A single point is about ________ in height. A) 10/72 of an inch B) 1/72 of an inch C) 10 5 pts D) 15” 42. Memory stores ____________. A) The operating system and other system software B) Application programs for specific tasks C) The data being processed y application programs D) All of the above 43. A(n) ____________ motivates students to want to learn, guides the student learning process, and promotes a learning atmosphere and an appreciation for the subject. A) Facilitator of teaching B) Facilitator of learning C) Instructional facility D) Instructional educator 44. The most important advantage of using a computer lab is that all learners are provided with _______________ using computer technology. A) Special needs software B) Musical experience C) Reference software D) Hands-on experience 45. A well-designed web site is determined by _______________. A) The way the site is arranged B) How content is delivered to the user C) The way it uses instructional design principles D) All of the above 46. The ____________ interprets and carries out the basic instructions that operate a computer. A) System unit B) Mother board C) Central processing unit D) All of the above 47. Clock speed is measured in ____________. A) Megabytes B) Kilobytes C) Megahertz D) Gigahertz

Show more Read less
Institution
University Of South Africa
Course
CIC2601 - Computer Integration In The Classroom (CIC2601)











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
University of South Africa
Course
CIC2601 - Computer Integration In The Classroom (CIC2601)

Document information

Uploaded on
October 27, 2021
Number of pages
50
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cic2601

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ExcelAcademia2026 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2056
Member since
4 year
Number of followers
1648
Documents
7339
Last sold
2 days ago
EXCEL ACADEMIA TUTORS

At Excel Academia Tutoring, You will get solutions to all subjects in both assignments and major exams. Contact me for assistance. Good luck! Well-researched education materials for you. Expert in Nursing, Mathematics, Psychology, Biology etc. My Work has the Latest & Updated Exam Solutions, Study Guides and Notes (100% Verified Solutions that Guarantee Success)

3.7

337 reviews

5
139
4
74
3
62
2
19
1
43

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions