Final Exam January 2024
Sign in to Google to save your progress. Learn more
Email *
What is digital literacy? *
1 point
Which of the following best describes all-in-one computer?
*
1 point
A set of coded instructions that tell a computer or device what tasks to perform is referred to as the following EXCEPT
*
1 point
Which of the following is NOT a technique used to steal personal information?
*
1 point
_____ is a term that refers to the large and complex data sources that defy traditional data processing methods.
*
1 point
Which of the following are the examples of mobile devices?

i. Tablet
ii. Smartphone
iii. e-reader
iv. Desktop
*
1 point
The following are green computing efforts EXCEPT
*
1 point
A server is ______________ .
*
1 point
A _____ is a personal computer designed to be in a stationary location, where all of its components fit on or under a desk.
*
1 point
The examples of game controllers are ____ .

i. Plotter
ii. Gamepad
iii. Wheel
iv. Joystick
*
1 point
The following are computer outputs EXCEPT
*
1 point
MICR reader is a _______ .
*
1 point
Which of the following printer is suitable to print posters?
*
1 point
"A key that will alternate views or turn a feature 'on' or 'off' each time you press it". The
statement refers to _________ .
*
1 point
Capacity is the number of _____ a storage medium can hold.
*
1 point
Computers and mobile devices contain two (2) types of memory _____ memory does not lose its contents when the computer's power is turned off.
*
1 point
_____ is copyrighted and distributed at no cost for a trial period.
*
1 point
Choose the CORRECT match.
*
1 point
Firefox, Edge and Safari are the examples of ____ .
*
1 point
Which of the following is NOT a graphic format used on the Web?
*
1 point
A digital graphic is ____ .
*
1 point
The app that allows you to track your workouts is ___ .
*
1 point
Columns and rows in a spreadsheet collectively are called a(n) ____ .
*
1 point
The function of _____ is to monitor the battery usage.
*
1 point
Siri is a feature of ___________.
*
1 point
Which of the following is FALSE? *
1 point
Which of the following statement is CORRECT about Chrome OS?
*
1 point
One of the operating systems functions is to ____ .
*
1 point
Dania was messaging her friend via WhatsApp on her laptop. Her friend asked her to check the group project sent to her on WhatsApp. Dania downloaded the Microsoft Word file and opened it to review. The Microsoft Word file is known as ____ .
*
1 point
____ is NOT a desktop operating system.
*
1 point
Which of the following is a Web browser?

i. Mozilla Firefox
ii. Safari
iii. Opera
iv. Microsoft Edge
*
1 point
Choose the appropriate TLDs for military organisations.
*
1 point
Which of the following best describes web server?
*
1 point
Which of the following statement is CORRECT about blog?
*
1 point
A hashtag (#) allows users to ____ .
*
1 point
When a computer or device connects to a _____ , it is said to be online.
*
1 point
Long Term Evolution (LTE) is a network standard that defines _______ .
*
1 point
The following statements are true about communication systems components, EXCEPT
*
1 point
Internet is classified as a ___________ .
*
1 point
Debit card uses the ____ protocol to transmit data.
*
1 point
Choose the CORRECT Network Topology based on the picture below
*
1 point
Captionless Image
The following statements discuss on a backup method.

• This method provides great flexibility.
• Users choose which folders and files to be included in a backup.
• The least manageable of all backup methods.
• Difficult to manage individual file backups.

Determine which backup method fits the descriptions above.
*
1 point
The descriptions belom refer to ______.
*
1 point
Captionless Image
A period of time during which an individual refrains from using technology is referred to as ____ .
*
1 point
_____ are the moral guidelines that govern the use of computers, mobile devices, information systems and related technologies.
*
1 point
Which of the following statements is INCORRECT about password?
*
1 point
In the encryption process, the unencrypted, readable data is called ____ .
*
1 point
A group of compromised computers or mobile devices connected to a network and are used to attack other networks, usually for nefarious purposes, are called a ____ .
*
1 point
The following statements related to information privacy are true EXCEPT
*
1 point
Which of the following is NOT a biometric security?
*
1 point
Which of the following is NOT related to a value proposition of FinTech?
*
1 point
Which of the following is NOT the potential problem in Cloud Computing?
*
1 point
Editing documents or photos, sending email messages, and managing finances are common consumer tasks of _____ applications.
*
1 point
All of the following are threats to cloud computing EXCEPT
*
1 point
Which of the following is NOT the risk associated with Fin Tech?
*
1 point
Trading in bitcoins gives the following benefits EXCEPT
*
1 point
Fin Tech has a bright prospect because of the following reasons EXCEPT
*
1 point
Which of these is not a major type of cloud computing usage?
*
1 point
Which of the following statements are CORRECT regarding the advantages banks have over FinTech?

i) There are history and trust that exist between banks and their customers.
ii) Banks have large market capitalization.
iii) Banks are more susceptible to turbulence and market volatility.
iv) Banks have large sales forces and customer service infrastructure.
*
1 point
The emergence of FinTech is attributed to the following factors EXCEPT
*
1 point
Submit
Clear form
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy