CIC2601_ Exam PACK.
CIC2601 - Compiled Exams & Assignments (Questions & Answers). Computer Integration In The Classroom. Networked computers contain a (n) ____________ to connect directly to a network. A) Modem B) Conversion card C) Network interface card D) Analog/digital interface card 3. ___________ Signals are signals that are comprised of a continuous electrical wave. A) Analog B) Bidirectional C) Digital D) Modem 4. Tutorials are ____________ . A) Answers to questions that people frequently ask about an application B) The electronic equivalent of a user manual, which is usually integrated into an application software package C) Step-by-step instructions using real-life examples to show how to use an application D) Automated assistants that help complete a task by asking questions and performing actions based on the answers 5. ________ is the process of obtaining a program instruction or data item from memory. A) Fetching B) Storing C) Decoding D) Executing 6. Storage devices can function as a source of ______________. A) Input and processing B) Output and processing C) Input and output D) All of the above 7. To work with a saved file, the file must be removed from __________ . A) Storage and placed in memory B) Memory and placed in storage C) Storage and placed in ROM D) ROM and placed in storage Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 8. _____________ is a digital media application that accepts input from the user and performs some action in response A) Interactive digital media B) A hyperlink C) An interactive link D) Computer-based training 9. Computer based models of real-life situations are called __________ . A) MPEGs B) Computer based training C) Simulations D) Hyperlinks 10. One advantage of computer based training is that it _______________. A) Allows for flexible training B) Provides delayed feedback C) Increases training costs D) All of the above 11. The best strategy for technology ___________ is to put the technology into the hands of trained teachers,to make the technology accessible and to let the teachers decide how best to use the technology in their classrooms at the point of instruction A) Integration B) Awareness C) Literacy D) Perspective 12. The internet is used by teachers to ___________ . A) Access information such as learning support material B) Communicate with colleagues in any part of the world C) Publish information such as lesson places on websites D) All of the above 13. Which one of the following statements is not true concerning most antivirus programs ? A) It can protect a computer against unauthorised access by a learner B) It can detect a virus on a flash drive (memory stick) that a learner inserts in a computer C) It can repair infected files D) It can detect a virus in an e-mail sent by a teacher to a colleague 14. Software licences are agreements that ____________. A) Provide specific conditions for use of software B) Users must accept before using software C) Outline the rights to use software D) All of the above 15. _______ is the process of converting readable data into readable characters. A) Cipher text B) Plain text C) Encryption D) Callback Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 16. An area of computer ethics frequently discussed includes ___________. A) The confidentiality of information B) Copyright issues C) Software theft D) All of the above 17. School computer labs are used to teach learners technological skills or subject-specific skills that are ______________ the rest of the curriculum. A) Integrated with B) Connected to C) Combined with D) Isolated from 18. A collection of related webpages that can be accessed electronically is called a ________. A) Website B) Homepage C) Web server D) Web browser 19. A _______,which is similar to a book cover or a table of contents, provides information about the purpose and the content of a collection of web pages. A) Website B) Homepage C) Web server D) Web browser 20. The role of technology committee at a school is to help make decisions on __________. A) What new technologies are to be purchased B) Where technologies will be placed C) All of the above D) None of the above 21. A(n) _____ projects the image that appears on a computer screen onto a large screen. A) NTSC converter B) Data projector C) LCD projector panel D) Digital light processing (DPL) projector 22. Information literacy means ____________. A) Knowledge and understanding of computers and their uses B) The ability to gather information from multiple sources C) The ability to use computers D) The ability to use other technologies 23. ________________ is data that is organised ,useful and has meaning. A) Software B) Input C) Output D) Information Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 24. A process in which 2 or more devices transfer data, instructions and information is known as ____________ . A) A communication channel B) A communication network C) Communications D) Communication software 25. All of the following are types of non-impact printers except _____________ printers. A) Dot-matrix B) Ink-jet C) Laser D) Thermal 26. To __________ involves developing the document by entering the text or numbers, designing graphics and performing other tasks using an input device. A) Edit B) Insert C) Format D) Create 27. The ability to understand how to match appropriate technology to learning objectives, goals and outcomes is referred to as __________. A) Computer literacy B) Integration literacy C) Information literacy D) Technology literacy 28. The process of making changes to the document’s existing content is referred to as _________. A) Formatting B) Copying C) Editing D) Creating 29. Three popular embedded operating systems include _________. A) Blackberry OS, Windows 7, and Mac OS x B) Mac OS X Lin, Google android and Windows 7 C) Apple IOS, Google android and Blackberry OS D) All of the above 30. _________ consists of programs that control the operations of the computer and its devices. A) The operating system B) System software C) Application software D) Windows 7 31. A(n) ____ combines text graphics and other visual cues to make software easier to use. A) Operating system B) User interface C) Graphical user interface D) System software Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 32. Spell checkers in many word processing programs allow the user to check the spelling of _________. A) A whole document B) A single word C) Sing words as you type them D) All of the above 33. Using ____ software an individual can create newsletters, brochures and advertisements postcards and greeting cards letterheads and business cards banners calendars and logos. A) CAD B) GUI C) URL D) DTP 34. One type of system software, the operating system _________. A) Contains instructions that coordinate a computer’s activities B) Is only important when a computer processes information C) Is not loaded into memory when a computer is first turned on D) Is loaded into memory from a floppy disk each time a computer is turned on 35. A compact disc-rewritable (CD- RW) is an erasable disc users can __________ . A) Write to different parts of the disc, one after the other B) Write to each part of the disc only one time C) Not erase the content of the disc D) Write to the disc multiple times 36. A single user licence typically includes the condition that ____________. A) Users may install the software on only one computer B) Users may make one backup copy of the software C) Users may not give copies to friends D) All of the above 37. A _________ virus replaces the program that is used to start the computer system with a modified, infected version of the start-up program A) Boot sector B) File C) Trojan horse D) Marco 38. A ________ virus hides within or is designed to look like a legitimate program. A) Boot sector B) File C) Trojan horse D) Macro 39. A security system consisting of hardware and or software that prevents unauthorised access to data and information on a network is called a ______________ . A) Proxy B) Firewall C) Blocker D) Defender Downloaded by: Izak1996 | Distribution of this document is illegal S - The study-notes marketplace 40. A person who tries to break into a computer system is called a _________ . A) Cracker B) Hacker C) Cookie D) Both A and B 41. A single point is about ________ in height. A) 10/72 of an inch B) 1/72 of an inch C) 10 5 pts D) 15” 42. Memory stores ____________. A) The operating system and other system software B) Application programs for specific tasks C) The data being processed y application programs D) All of the above 43. A(n) ____________ motivates students to want to learn, guides the student learning process, and promotes a learning atmosphere and an appreciation for the subject. A) Facilitator of teaching B) Facilitator of learning C) Instructional facility D) Instructional educator 44. The most important advantage of using a computer lab is that all learners are provided with _______________ using computer technology. A) Special needs software B) Musical experience C) Reference software D) Hands-on experience 45. A well-designed web site is determined by _______________. A) The way the site is arranged B) How content is delivered to the user C) The way it uses instructional design principles D) All of the above 46. The ____________ interprets and carries out the basic instructions that operate a computer. A) System unit B) Mother board C) Central processing unit D) All of the above 47. Clock speed is measured in ____________. A) Megabytes B) Kilobytes C) Megahertz D) Gigahertz
Written for
- Institution
- University of South Africa
- Course
- CIC2601 - Computer Integration In The Classroom (CIC2601)
Document information
- Uploaded on
- October 27, 2021
- Number of pages
- 50
- Written in
- 2021/2022
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- cic2601
-
cic2601 computer integration in the classroom
-
computer integration in the classroom
-
cic2601 exams pack