CIC2601 Assignment 5 (ANSWERS) 2024 - DISTINCTION GUARANTEED
Well-structured CIC2601 Assignment 5 (ANSWERS) 2024 - DISTINCTION GUARANTEED. (DETAILED ANSWERS - DISTINCTION GUARANTEED!)..... Question 1 Complete Mark 1.00 out of 1.00 Question 2 Complete Mark 1.00 out of 1.00 QUIZ Word processing software is used to create, edit and format documents that mostly consist of text. Select one: True False Which one of the following is NOT an example of social a networking site. a. Twitter b. Facebook c. Wikipedia d. Instagram Question 3 Complete Mark 1.00 out of 1.00 Question 4 Complete Mark 1.00 out of 1.00 Question 5 Complete Mark 1.00 out of 1.00 The development of computer technology and advancement in mobile technology plays a huge role in how each one of usworks, lives, plays, and learns. Select one: True False The terms World Wide Web and Internet are interchangeable. Select one: True False Viruses like those described in the accompanying fi gure commonly infect computers through e-mail attachments. Select one: True False Question 6 Complete Mark 1.00 out of 1.00 Question 7 Complete Mark 1.00 out of 1.00 Question 8 Complete Mark 1.00 out of 1.00 The predecessor of word processing is the typewriter. Select one: True False Teachers always must protect the identity of their students on student and teacher Web pages. Select one: True False A database is a collection of information or data organised in a specifi c way. Select one: True False Question 9 Complete Mark 1.00 out of 1.00 Question 10 Complete Mark 1.00 out of 1.00 Question 11 Complete Mark 1.00 out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False Operating systems are the software needed to run your electronic device (computer, tablet or mobile phone). Select one: True False _______ apps are add-on programs for a variety of mobile devices including smartphones and tablets. a. Mobile b. Cloud c. System d. Utility Question 12 Complete Mark 1.00 out of 1.00 Question 13 Complete Mark 1.00 out of 1.00 It focuses on knowledge, understanding of, and use of computers. a. Computer literacy b. Information literacy c. Integration literacy d. Educational literacy __________ is system software that contains instructions that coordinate all the hardware of a computer and allow you toinstall and use application software. a. Operating System b. Application software c. Mobile application d. Drivers’ application Question 14 Complete Mark 0.00 out of 1.00 Question 15 Complete Mark 1.00 out of 1.00 _________ consists of a protocol, domain name, path and a web page name. a. Website b. Search engine c. Uniform resource locator d. Address bar A _______ is a collection of related data—the electronic equivalent of a fi le cabinet. a. Gallery b. Database c. Spreadsheet d. Presentation Question 16 Complete Mark 1.00 out of 1.00 Question 17 Complete Mark 1.00 out of 1.00 Fair use guidelines allow teachers to use any copyrighted works for educational purposes without any restrictions. Select one: True False ____ is the use of a computer or data for unapproved or possibly illegal activities. a. Access control b. Unauthorized use c. Unauthorized access d. Biometric trespass Question 18 Complete Mark 1.00 out of 1.00 Question 19 Complete Mark 1.00 out of 1.00 A _______ store is typically a website that provides access to specifi c mobile apps that can be downloaded either for anominal fee or free of charge. a. Cloud b. App c. QR d. Electronic _________ is the person carrying out the activity. a. Object b. Subject c. Tools or mediation d. Division of labour Question 20 Complete Mark 1.00 out of 1.00 Question 21 Complete Mark 1.00 out of 1.00 Question 22 Complete Mark 1.00 out of 1.00 An antivirus program like the one in the accompanying fi gure also is called a serum. Select one: True False As with word processing and spreadsheet software, database software includes wizards that allow teachers and students tocreate databases for use as address books and directories of parents and students. Select one: True False ____ is the use of a computer system without permission. a. Access controls b. Unauthorized use c. Unauthorized access d. Biometric trespass Question 23 Complete Mark 1.00 out of 1.00 Question 24 Complete Mark 1.00 out of 1.00 Question 25 Complete Mark 1.00 out of 1.00 Teachers and administrators can overcome integration barriers with effective leadership, proper training, planning, and acommitment to enhancing teaching and learning using technology. Select one: True False A ____ is the most widely used pointing device because it takes full advantage of a graphical user interface. a. Mouse b. Keyboard c. Graphics tablet d. Joystick Any illegal act involving a computer generally is referred to as a computer crime. Select one: True False Question 26 Complete Mark 1.00 out of 1.00 Question 27 Complete Mark 1.00 out of 1.00 Question 28 Complete Mark 0.00 out of 1.00 System software consists of programs that control the computers and its devices’ operations. Select one: True False There are very few ways to integrate educational technology with only one computer in your classroom. Select one: True False To help organize a presentation, small versions of all the slides can be viewed in the presentation view. Select one: True False Question 29 Complete Mark 1.00 out of 1.00 Question 30 Complete Mark 1.00 out of 1.00 Question 31 Complete Mark 1.00 out of 1.00 A ____ port is used to connect up to 127 different peripheral devices with a single connector. a. DVD b. VCR c. USB d. CPU Application software is those that we download to perform a specifi c task. Select one: True False Formulas in MS Excel always begin with... a. # b. % c. = d. + Question 32 Complete Mark 1.00 out of 1.00 Question 33 Complete Mark 1.00 out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False The results of presentation graphics software programs normally are viewed as ____. a. Macros b. Audience handouts c. Slides d. Notes pages Question 34 Complete Mark 1.00 out of 1.00 Question 35 Complete Mark 1.00 out of 1.00 _______ are used to create text-based documents. a. Databases b. Presentation programs c. Spreadsheets d. Word processors Integration literacy a. Combine with teaching and learning strategies b. Use technology to search for and make sense of online information c. Knowledge, understanding of and use of computers d. Enhance learning. Question 36 Complete Mark 1.00 out of 1.00 Question 37 Complete Mark 1.00 out of 1.00 Many desktop computer keyboards have a numeric keypad located on the left side of the keyboard. Select one: True False All of the following are true concerning viruses like those described in the accompanying fi gure EXCEPT ____. a. viruses are potentially damaging computer programs. b. a virus is a segment of a programs. c. many viruses are generated by chance. d. damage caused by a virus is called the virus payload. Question 38 Complete Mark 1.00 out of 1.00 Question 39 Complete Mark 1.00 out of 1.00 _______ organize, analyze, and graph numeric data such as budgets and fi nancial reports. a. Spreadsheet programs b. Word processor c. Databases d. Presentation programs __________ is the illegal and unethical representation of some other person’s work and ideas as your own without givingcredit to the original source. a. Plagiarism b. Copyright c. Ethics d. Phishing Question 40 Complete Mark 1.00 out of 1.00 Question 41 Complete Mark 1.00 out of 1.00 __________ are the guidelines according to which users use computers and information systems. a. Computer ethics b. Protocol c. Security risks d. Computer literacy Research shows that using technology in the classroom motivates students, encourages them to become problem solvers,and creates new avenues to explore information. Select one: True False Question 42 Complete Mark 1.00 out of 1.00 Question 43 Complete Mark 1.00 out of 1.00 __________ is an illegal action involving special knowledge of computer technology. a. Cybercrime b. Computer Ethics c. Virus d. Privacy Offi ce suites are also known as _______ suites. a. Lotus b. Utility c. Productivity d. Symphony Question 44 Complete Mark 0.00 out of 1.00 Question 45 Complete Mark 1.00 out of 1.00 Question 46 Complete Mark 1.00 out of 1.00 Unauthorized access is the use of a computer system or data for unapproved purposes. Select one: True False Most viruses like those described in the accompanying fi gure are harmless pranks that cause no permanent damage. Select one: True False Which ONE of the following acronyms is often used in software licensing? a. GNU b. WLAN c. WWW d. LAN Question 47 Complete Mark 1.00 out of 1.00 Question 48 Complete Mark 1.00 out of 1.00 Question 49 Complete Mark 1.00 out of 1.00 _______ are programs that combine a variety of visual objects to create attractive, visually interesting presentations. a. DBMS b. Desktop publishers c. Spreadsheets d. Presentation graphics Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Question 50 Complete Mark 1.00 out of 1.00 Learning by utilizing electronic technologies to access educational curriculum outside of a traditional classroom is called a. E-learning b. M-learning c. Paperless classroom d. Technology-integrated lesson CIC2601-24-Y Welcome Message Assessment 5 Question 1 Not yet answered Marked out of 1.00 Question 2 Not yet answered Marked out of 1.00 QUIZ Word processing software is used to create, edit and format documents that mostly consist of text. Select one: True False Which one of the following is NOT an example of social a networking site. a. Twitter b. Facebook c. Wikipedia d. Instagram Clear my choice Question 3 Not yet answered Marked out of 1.00 Question 4 Not yet answered Marked out of 1.00 Question 5 Not yet answered Marked out of 1.00 The development of computer technology and advancement in mobile technology plays a huge role in how each one of usworks, lives, plays, and learns. Select one: True False The terms World Wide Web and Internet are interchangeable. Select one: True False Viruses like those described in the accompanying fi gure commonly infect computers through e-mail attachments. Select one: True False Question 6 Not yet answered Marked out of 1.00 Question 7 Not yet answered Marked out of 1.00 Question 8 Not yet answered Marked out of 1.00 The predecessor of word processing is the typewriter. Select one: True False Teachers always must protect the identity of their students on student and teacher Web pages. Select one: True False A database is a collection of information or data organised in a specifi c way. Select one: True False Question 9 Not yet answered Marked out of 1.00 Question 10 Not yet answered Marked out of 1.00 Question 11 Not yet answered Marked out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False Operating systems are the software needed to run your electronic device (computer, tablet or mobile phone). Select one: True False _______ apps are add-on programs for a variety of mobile devices including smartphones and tablets. a. Mobile b. Cloud c. System d. Utility Clear my choice Question 12 Not yet answered Marked out of 1.00 Question 13 Not yet answered Marked out of 1.00 It focuses on knowledge, understanding of, and use of computers. a. Computer literacy b. Information literacy c. Integration literacy d. Educational literacy Clear my choice __________ is system software that contains instructions that coordinate all the hardware of a computer and allow you toinstall and use application software. a. Operating System b. Application software c. Mobile application d. Drivers’ application Clear my choice Question 14 Not yet answered Marked out of 1.00 Question 15 Not yet answered Marked out of 1.00 _________ consists of a protocol, domain name, path and a web page name. a. Website b. Search engine c. Uniform resource locator d. Address bar Clear my choice A _______ is a collection of related data—the electronic equivalent of a fi le cabinet. a. Gallery b. Database c. Spreadsheet d. Presentation Clear my choice Question 16 Not yet answered Marked out of 1.00 Question 17 Not yet answered Marked out of 1.00 Fair use guidelines allow teachers to use any copyrighted works for educational purposes without any restrictions. Select one: True False ____ is the use of a computer or data for unapproved or possibly illegal activities. a. Access control b. Unauthorized use c. Unauthorized access d. Biometric trespass Clear my choice Question 18 Not yet answered Marked out of 1.00 Question 19 Not yet answered Marked out of 1.00 A _______ store is typically a website that provides access to specifi c mobile apps that can be downloaded either for anominal fee or free of charge. a. Cloud b. App c. QR d. Electronic Clear my choice _________ is the person carrying out the activity. a. Object b. Subject c. Tools or mediation d. Division of labour Clear my choice Question 20 Not yet answered Marked out of 1.00 Question 21 Not yet answered Marked out of 1.00 Question 22 Not yet answered Marked out of 1.00 An antivirus program like the one in the accompanying fi gure also is called a serum. Select one: True False As with word processing and spreadsheet software, database software includes wizards that allow teachers and students tocreate databases for use as address books and directories of parents and students. Select one: True False ____ is the use of a computer system without permission. a. Access controls b. Unauthorized use c. Unauthorized access d. Biometric trespass Clear my choice Question 23 Not yet answered Marked out of 1.00 Question 24 Not yet answered Marked out of 1.00 Question 25 Not yet answered Marked out of 1.00 Teachers and administrators can overcome integration barriers with effective leadership, proper training, planning, and acommitment to enhancing teaching and learning using technology. Select one: True False A ____ is the most widely used pointing device because it takes full advantage of a graphical user interface. a. Mouse b. Keyboard c. Graphics tablet d. Joystick Clear my choice Any illegal act involving a computer generally is referred to as a computer crime. Select one: True False Question 26 Not yet answered Marked out of 1.00 Question 27 Not yet answered Marked out of 1.00 Question 28 Not yet answered Marked out of 1.00 System software consists of programs that control the computers and its devices’ operations. Select one: True False There are very few ways to integrate educational technology with only one computer in your classroom. Select one: True False To help organize a presentation, small versions of all the slides can be viewed in the presentation view. Select one: True False Question 29 Not yet answered Marked out of 1.00 Question 30 Not yet answered Marked out of 1.00 Question 31 Not yet answered Marked out of 1.00 A ____ port is used to connect up to 127 different peripheral devices with a single connector. a. DVD b. VCR c. USB d. CPU Clear my choice Application software is those that we download to perform a specifi c task. Select one: True False Formulas in MS Excel always begin with... a. # b. % c. = d. + Clear my choice Question 32 Not yet answered Marked out of 1.00 Question 33 Not yet answered Marked out of 1.00 Microsoft Offi ce is a product from Microsoft that bundles word processing , spreadsheet, presentation, database, and emailsoftware together. Select one: True False The results of presentation graphics software programs normally are viewed as ____. a. Macros b. Audience handouts c. Slides d. Notes pages Clear my choice Question 34 Not yet answered Marked out of 1.00 Question 35 Not yet answered Marked out of 1.00 _______ are used to create text-based documents. a. Databases b. Presentation programs c. Spreadsheets d. Word processors Clear my choice Integration literacy a. Combine with teaching and learning strategies b. Use technology to search for and make sense of online information c. Knowledge, understanding of and use of computers d. Enhance learning. Clear my choice Question 36 Not yet answered Marked out of 1.00 Question 37 Not yet answered Marked out of 1.00 Many desktop computer keyboards have a numeric keypad located on the left side of the keyboard. Select one: True False All of the following are true concerning viruses like those described in the accompanying fi gure EXCEPT ____. a. viruses are potentially damaging computer programs. b. a virus is a segment of a programs. c. many viruses are generated by chance. d. damage caused by a virus is called the virus payload. Clear my choice Question 38 Not yet answered Marked out of 1.00 Question 39 Not yet answered Marked out of 1.00 _______ organize, analyze, and graph numeric data such as budgets and fi nancial reports. a. Spreadsheet programs b. Word processor c. Databases d. Presentation programs Clear my choice __________ is the illegal and unethical representation of some other person’s work and ideas as your own without givingcredit to the original source. a. Plagiarism b. Copyright c. Ethics d. Phishing Clear my choice Question 40 Not yet answered Marked out of 1.00 Question 41 Not yet answered Marked out of 1.00 __________ are the guidelines according to which users use computers and information systems. a. Computer ethics b. Protocol c. Security risks d. Computer literacy Clear my choice Research shows that using technology in the classroom motivates students, encourages them to become problem solvers,and creates new avenues to explore information. Select one: True False Question 42 Not yet answered Marked out of 1.00 Question 43 Not yet answered Marked out of 1.00 __________ is an illegal action involving special knowledge of computer technology. a. Cybercrime b. Computer Ethics c. Virus d. Privacy Clear my choice Offi ce suites are also known as _______ suites. a. Lotus b. Utility c. Productivity d. Symphony Clear my choice Question 44 Not yet answered Marked out of 1.00 Question 45 Not yet answered Marked out of 1.00 Question 46 Not yet answered Marked out of 1.00 Unauthorized access is the use of a computer system or data for unapproved purposes. Select one: True False Most viruses like those described in the accompanying fi gure are harmless pranks that cause no permanent damage. Select one: True False Which ONE of the following acronyms is often used in software licensing? a. GNU b. WLAN c. WWW d. LAN Clear my choice Question 47 Not yet answered Marked out of 1.00 Question 48 Not yet answered Marked out of 1.00 Question 49 Not yet answered Marked out of 1.00 _______ are programs that combine a variety of visual objects to create attractive, visually interesting presentations. a. DBMS b. Desktop publishers c. Spreadsheets d. Presentation graphics Clear my choice Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Integrating technology effectively into the curriculum requires planning, time, dedication, and resources. Select one: True False Question 50 Not yet answered Marked out of 1.00 Learning by utilizing electronic technologies to access educational curriculum outside of a traditional classroom is called a. E-learning b. M-learning c. Paperless classroom d. Technology-integrated lesson
Connected book
- 2005
- 9780131421165
- Unknown
Written for
- Institution
- University of South Africa (Unisa)
- Course
- Computer Integration in the classroom (CIC2601)
Document information
- Uploaded on
- September 25, 2024
- Number of pages
- 46
- Written in
- 2024/2025
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cic2601