40 questions
I want to store the name, address and telephone number of all my friends. What should I use?
Database
Graphics Program
Web Browser
Word Processor
I am going to write a letter to my bank. Which piece of software do I need to use
Web Browser
Word Processor
Database
Speadsheet
they are usually called hand out to people for advertisment
website
letter heads
flyers
multimedia presentaion
All of these are advantages of internet banking, except
People can spend more time doing other things.
Can be done at anytime.
Requires you to have a computer and Internet access to use it.
The survey done by people can be check by
OCR
MICR
OMR
ICM
which thing proves that web site is secure
video
digital certificates
google link
by user it self
What type of processing is used to process bank cheques?
Online processing
Real-time processing
Batch processing
ATM’s keyboards are used to enter text.
true
false
which censor detects the heat and temperature.
light censor
temperate censor
infrared censors
humidity censors
internet telephony is also called
voip
vip
cipo
telecasting
Use to check temperature
barometer
humidity censor
thermometer
anemometer
burglar alarm using which censor
temp censor
sound censor
pressure censor
light censor
What happens in the Analysis Stage?
Look at the existing system and find areas to improve
Create the new system and test it
Place the new system into the company for use
Decide how well the new system is working
Which stage comes after Design?
Evaluation
Documentation
Development and Testing
Design
What happens in the Development and Testing Stage?
Plan the proposed system
Decide how well the new system is working
Place the new system into the company for use
Create the new system and test it
User Manuals and Technical guides are created in which stage of the System Analysis and Design?
Design
Documentation
Analysis
Evaluation
"I went to a company as a system analyst, sat down to see how the current system works. I did not talk to anyone." Which research method is described above?
Interview
Collecting Documents
Questionnaire
Observation
"My work is to go through the books of the company I am working for in order to establish what data is inputted into the system." What research method is described above?
Collecting Documents
Interviews
Observation
Questionnaire
"Sometimes, interviews include personal opinions rather than what happens in the organisation." Do you agree?
yes
no
"While at the supermarket, one of the workers gave me a handout containing questions that I had to answer and return. " Which research method is described above
Handouts
Receipt
Questionnaire
Evaluation
What is hacking?
People access computer system without permission
People access your car
People access your valet
none of the above
Why do people hack to computer system?
Not to commit fraud by stealing data
To cause damage to files are data by deleting or changing them
just for time pass
to put it in social media that they know hacking
What is bio metric authorization
your signature
Face scan
Phone scan
none of the above
Which method hackers use now a days to hack your account?
Calling customer like bank manager and getting their bank details and stealing money
Talk to them personally
visiting their home
none of the above
Which of these is a physical safety issue?
Malware
Trailing Wires
RSI
Eye Strain
Where should food and drinks be placed when working on the computer or equipment?
behind the computer/equipment
It doesn't matter; the computer will dry out really quickly.
to the side of the computer/equipment
away from the computer/equipment
When there is a glare on the computer screen what should the employee do?
Adjust the position of the monitor
Take a break
Change the brightness of the computer.
Adjust the chair position
You receive an e-mail from a well-known company & the name of the sender is misspell you should...
log in where requested to change your password
forward the e-mail to your friends
report it as a possible phishing scam
reply to e-mail, pointing out the misspelling
What does E-Safety mean?
How we can stay safe
How we can stay safe online
How we can stay safe when using any electronic item
Why should I be careful opening an email attachment from an unknown sender?
It may make me laugh
It's against the law
It could contain malware
It will be fine, open it anyway!
There are many microprocessor-controlled devices in the modern home. select three effects of these devices on people's lifestyles.
The use of robots will increase the amount of exercise.
People can become lazy if they rely on machines to perform all their tasks for them.
You have to be present when washing is being done so you can control the device
Mobile phones, laptops, netbooks, tables, etc., mean employees can do more work on the move and at home, which can mean that they have less time for family life.
Select one advantage of video conferencing over a face to face meeting
More personal
Travel time and costs are minimal
Can exchange paper documentation
No issue with time differences
What does MICR do?
Reads the magnetic ink on cheques
Read characters on a passport application
Reads the marks on a multi-choice test paper
Where you pay for goods
Voice Over Internet protocol (VOIP) is used for what?
Video Conferencing
Microprocessor
Creating a web site
Online databases
Which of the following is NOT malware?
Cookie
Virus
Trojan
Spyware
What is the first stage of the systems life cycle?
Analysis
Design
Evaluation
Implementation
Phishing generally refers to
scams through websites
scams through emails
scams through phone calls
scams through text messages
What's pharming?
scam through fake websites
scams through phone calls
scams through text messages
scams through emails
User ID and Password should be unique
True
False
A ______________ is a software program that is designed to copy itself from one computer to another, without human intervention.
Denial of Service (DoS) attack
Virus
Trojan Horses
Worm