ICT aitu
What is not an asynchronous communication
phone conversation
Lossless
preserves the original audio (WAV, FLAC, AIFF)
E government functions
pushing information over the internet, two way communication between the agency and user, governance and conducting transactions
What is ICT?
refers to technologies that provide access to information through technologies
Cyber means
relating to the culture of computers, information technology, and virtual reality
What's the disadvantage of e-commerce?
rely on other customer reviews of products
Typically, the client _______ information from a server.
requests
Data Analysis Application
retail, health care, manufacture, banking, logistics
What is Communication?
sending and receiving of information(the transfer of information)
Main requirements for a service
service provider, receiver and delivery channel
Disdvantages of e-government:
- Distrust of government, Cost
Advantages of e commerce
- buying/selling 24/7 from a computer, not limited to a geographical location, easier to find uncommon or special products, low operational costs without a physical storefront, easy to start and manage a business
Which one is a top-level domain name (TLD)?
.kz
Example of IP address
192.168.10.254 (each number must be between 0 and 255)
In what year was the first website launched?
1991
Which statement is false?
A smart home can't detect harmful gasses
Intelligence
AI
Characters set standards
ASCII, Unicode, EBCDIC
Which is a video container?
AVI
Which statement is true about how the internet and the web affect economies?
Anyone anywhere can start an online business.
Is the environment is everything inside or outside of the system?
Anything outside of the system
Which is part of the five layers of the simplified layer model?
Application, Transport, Network, Data, Physical
What does ALU stand for?
Arithmetic logic unit
E-learning happens over a duration (for example, a week)
Asynchronous
Categories of E commerce
B2B, B2C, B2G, C2C, G2C, G2B
A database is a component of the _____________
Backend
What is the scale of a LAN?
Building (WiFi, Ethernet)
B2B
Business to business
B2C
Business to consumer
B2G
Business to government
E government interaction
C2G, G2G, G2C, G2E, G2B
Which of the following is not refers to software component?
CPU
A computer must include which physical components?
CPU, Memory, Input/output devices, Long-term storage, such as a hard drive
The number of instances of an entity from a relation that can be associated with the relation:
Cardinality
What is an example linear multimedia?
Cinema
What is the scale of a MAN?
City (DSL)
Types of distributed processing systems are
Client-Server Computing, Cloud Computing, Peer-to-Peer Computing
What is the most common form of network architecture on the internet?
Client-server
a client requesting information from a server is a
Client-server architecture
CLI stands for
Command Line Interface
Describe synchronous communication
Communicating at the same time
What is the primary focus of ICT?
Communication
Which attributes are further divided in a tree-like structure?
Composite attributes
C2C
Consumer to consumer
What is the scale of a WAN?
Country (Large ISP)
Protocol between computers on local and internet area networks
IP/TCP
Virtualized hardware system can be used in...
IaaS
Advantages of DBMS
Improved data sharing, security, access, decision making and minimized data inconsistency
Which sectors use the Internet?
Education, Communication, Banking, Transportation, Commerce
Application of Computers
Education, Science research, Banking and etc
Benefits of e-learning:
Engages learners who have difficulty attending face-to-face lectures, Different learning modes for those who struggle with lectures
What is the primary purpose of standards?
Ensure that our systems work universally
A person, place, thing, or event about which data will be collected and stored:
Entity
A book is text that links to other text -
False
A computer network must have more than 2 devices to be called a network. -
False
A smart grid is based on the distribution model using centralized power generation
False
Data science is a component of data analysis
False
Do all packets use the same path when traveling over the internet?
False
E-services are required to be automated
False
Each column in a relation contains values from the different domains
False
HCI focuses on beautification or adding features to user interfaces
False
I can safely use pirated software or software downloaded from nonofficial sources because my antivirus software will protect me.
False
Internet service providers (ISPs) connect websites to the internet.
False
Languages that the hardware uses are called high-level languages
False
Lossless audio is a simplified audio format (removes sound ranges humans cannot hear)
False
Malware can only infect a computer if the user gives the malware permission to run.
False
Networks are simple and can easily be described without using a networking model.
False
Real-time operating systems are not needed because today's computers are very fast
False
The goal of HCI is to create systems for humans to use even if they are difficult and complicated
False
The internet and WWW have had only positive impacts on society. There are negative impacts.
False
The internet remains the same. The internet you use today will be the same internet that you will use in 20 years.
False
The links in a system must be real, not virtual or intangible
False
The power grid allows someone to buy or sell electricity to the grid
False
We live in a disconnected world. The internet or WWW is not important.
False
How does using ICT in education support learning?
Formal learning outside of the classroom, Access to educational content online, Watching educational videos, Collaborating(working together one) online, Submit Assignments online through an LMS
A web browser is a component of the ____________
Frontend
What scale of a network is the internet?
Global
G2B
Government to business
G2C
Government to consumer
GUI stands for
Graphical User Interface
Which is a video codec?
H.264
Codec format
H.264, MPEG-4 AVC, WMV, WMA, ASF
What protocol do the web browser and web service use?
HTTP
What protocol does the web use?
HTTP
What do hackers and cybercriminals do for a living?
Hack and steal for a living
Data storage device
Hard Drive
Data storage device
Hard drive
Which of these is not a major type of cloud computing usage?
Hardware as a service
From an architectural perspective, a computer system is a self-contained system that has:
Hardware, Software, Data, Communication
What describes the cybercrimes category of "Offensive Content or harassment"?
Hate speech or Harassing someone through cyberspace
HVAC stand for
Heating, ventilation, and air conditioning
What are the three components of HCI?
Human, Computer, Interaction
The difference between ICT and IT
ICT focuses on communication, and IT focuses on information
ICT Focuses on Telecommunication
Information, Communication, Technologies
IaaS stands for
Infrastructure as a Service
What are the main components of IPO?
Input, Output, Storage mechanism
How does the environment interact with the system?
Interfaces
Common ICT technologies
Internet (wired or wireless), Radio Communication, Cellular network
What does IoT stand for?
Internet of Things
Why is TCP/IP such an important web protocol?
It guarantees delivery. It guarantees that data arrives intact, which creates a duplicate of the original file
Image format
JPEG, Exif, TIFF, RAW, PNG, GIF, BMP, WEBP
What is a common image file format?
JPG
Computer Languages
Java, SQL, C, JavaScript
Examples of input/output devices are:
Keyboard, Microphone, Network card of Wifi
What is an attribute or collection of attributes that uniquely identifies an entity among entity set?
Keys
What LMS stands for
Learning Management System
Select the disadvantages of MCC (Select three answers)
Limited bandwidth, Network Availability, Security risks
From what term comes "Malware"
MALicious softWARE
Container format
MP4, MKV, OGG, AVI, MOV, QT
Multimedia standards
MPEG-2, MPEG-4, MP3, DVD-ROM
Which is a common cyber threat?
Malware, Data Leaks, Open WiFi Networks, Unsolicited Email
Typically, how do clients and servers interact
Many-to-one (many clients to one server)
What does MCC stand for in cloud computing?
Mobile Cloud Computing
Examples of LMS
Moodle
Advantages of e-government:
More services offered to citizens cheaply, Increased citizen participation, Government transparency
The maximum amount of RAM that can be installed is limited by
Motherboard
Which attributes are depicted by a double ellipse?
Multi-value attributes
What is NOT true of a network?
Networks usually do not have internal connections
Are technology makers required to follow the standards?
No
Will a user always know if they are running malicious software?
No
A single-tasking operating system ...
Only allows a single process or task to run at a time
Examples of processes
Outputting data, Logical decision making, Manipulating data
What is the function of the application layer?
Provides application services to users and programs
Which items are a form of technology?
Quill pen, Radio, Paper, Smartphones
What RAM stands for
Random Access Memory
All computer colors are created by mixing which colors
Red, green, blue (RGB)
In relational model, data is stored in tables called __________
Relations
What best describes a command line interface?
Requires a user to type in command only using text
Which items describe cloud computing?
Requires internet access, Processing happens on both the client and the server, Users access cloud computer through a web browser
Which makes the person an easy target?
Responding to spam
Protocol between storage and computer
SATA
Which is true of telecommunications?
Send all types of data over significant distances by electronic means
What does cloud computing include?
Server, Applications, Software platforms, Storage
Limitations of asynchronous e-learning:
Students feel isolated
What is a set of components that are linked together to form what we think if as a single unit
System
What is a major branch of computer software?
System Software
What does an operating system interface with?
System hardware (CPU, Memory), Application software, An incorrect answer, File system, Network interface card
An operating system is ...
System software
How does TCP handle lost data or packets during transit?
TCP knows what packet was lost. So, it will request only the lost packet.
The difference between memory and storage is that the memory is__________ and storage is_________
Temporary, permanent
What is referred to as the global computer network?
The Internet
What is technology?
The application of scientific knowledge for Practical purposes
What is a consequence if an ICT technology does not meet the standards of the ICT industry?
The equipment might not work with other ICT technologies
What came first, the internet or the web?
The internet
Why might a cybercriminal go after a difficult target?
The target has something of great value (such as the blogger who announced to the world that they had over $200,000 in bitcoins)
What was the purpose of ARPANET? -
To share research information
What is the function of the physical layer?
Transmit data by an electric voltage, radio frequencies, or light over a physical medium.
A component of system can include sub-systems.
True
A network that uses different network topologies is called a hybrid network.
True
A smart grid will lower power costs for consumers
True
A system is made up of a set of components that are linked together to form what we think of as a single unit
True
A system must be recognizable as a single unit
True
A video game is an example of nonlinear multimedia.
True
An animation is a sequential series of still images that create an illusion of motion
True
An operating system is system software that acts as an interface between the user and the computer hardware and provides common services for computer programs
True
Cloud computing is internet-based computing.
True
Connectivity is one of the characteristics of IoT
True
Cybersecurity is measures taken to protect a computer against unauthorized access or attack
True
Data analysis helps to provide better customer service
True
Distributed processing systems is a type of architecture that describes how a system distributes the information throughout the various components for processing, analyzing, and storing
True
E-business is another word for e-commerce
True
E-services need to have a delivery channel
True
E-services require a transaction to occure
True
Each row in a relation contains a unique value
True
Ensuring data quality is one of the challenges in data analysis
True
HCI is the interaction between humans and computers
True
HVAC systems control humidity level over the internet.
True
Information is meaningful data that leads to knowledge
True
Most operating systems we use are multi-tasking; multi-user, and multi-processing
True
One of the goals of smart grid is to share electricity to reduce dependencies on fossil fuels
True
One purpose of computer system hardware is to provide input and output.
True
Protocols are sets of rules.
True
The Input-Process-Output Model (IPO) is a fundamental design of computer system architecture.
True
The WWW created distribution networks (e.g., information is no longer concentrated in a few locations).
True
The data component contains facts and observations about the system
True
The main e-government function is to make information available online for citizens, businesses, and others to access easily
True
The purpose of a programming language is to help programmers write software
True
The two major branches of computer software are system software and application software
True
There are more than 1 billion websites on WWW.
True
Your cybersecurity goal is to make it as difficult as possible for cybercriminals to access your data.
True
What URL stands for
Uniform Resource Locator
What describes the cybercrimes category of of "Selling Illicit Goods"?
Using a computer to sell illegal goods
What describes specialized applications?
Usually requires a high degree of skill to use
What is the scale of a PAN?
Vicinity (e.g., Bluetooth)
How does a learning management system(LMS) centralize the online learning process and recourses?
View grades of submitted assignments, Contains assignments and instructions, Contains the course recourses, Accessible anytime
How has the internet and www NOT impacted our lives?
We have access to online markets, We can have an active relationship with someone who is far away, We have easy access to knowledge, We can transfer money electronically
What is a typical form of how mobile devices communicate?
WiFi
Protocols developed to meet new demands
XML, RSS, SIP
Do standards ensure that the technologies will work together? -
Yes
Does ICT bring change to society?
Yes, ICT changes every ascept our lives. We rely on ICT technologies
Can teachers use ICT technologies to support traditional learning?
Yes, a teacher can use ICT to provide learning in addition to a lecture
Client server architecture
a client requesting information from a server
Peer-to-peer computing is when
a client sends the request to all computers on the network. Any computer can act as a client or server
Process is
a sequence of the steps taken to reach a specific result
Who maintains the DBMS and is responsible for administering the database?
administrators
Find the correct answer for a description of the protocol
an equipment that provides the connection in the network
What is environment?
anything outside the border
Two primary categories of software element
application and operating systems
Action
automation of devices to change something (change temperature due to climate)
One category of application software is ...
basic applications
Machine Language types
binary (0 and 1), Octal (8), Hex (16)
What are brief, precise, and unambiguous descriptions of operations in an organization?
business rules
C2G
citizen and government
Two main video parts
codec and container
The HCI component that examines how the mind processes information
cognitive psychology
Challenges of Data Analysis
collecting the data, storing the data, ensuring data quality, having the knowledge and tools necessary to make sense of the data
What is a database?
collection of related data and its metadata organized in a structured format
Synchronous communication
communicate at the same time
Which term responsible for the sending and receiving information
communication
Asynchronous communication
communication at the different time
What converts human instructions to machine languages
compilers and interpreters
Things
complex of devices (sensors and etc)
Categories of Computer Crimes
computer as a Tool, as the Target, Selling Illicit Goods and Offensive content or Harassment
Peer-to-Peer computing
computers are treated as equals
Communication
connection of devices
Connectivity
connection to a network
What manages interaction between end users and database?
database management system
DBMS stands for
database management systems
What is NOT an example of mobile technology?
desktop computer
Peer-to-Peer computing disadvantages
difficult to locate services, synchronize versions of files or software, secure network
Peer-to-Peer computing advantages
easy to set up, no need for a server, sharing files between PC.
What is computer?
electronic device that manipulate information, which is data, it stores retrieves and processes the data
Anything outside the border
environment
The HCI component that creates the graphical or visual elements that the people use to interface with the device
fine arts design
Application software is a software ...
for the user
What is Internet
global computer network
G2B
government and businesses
G2C
government and citizens
G2E
government and employees
G2G
government and other government agencies
Data Analysis benefits
improved decision making, better customer service, efficient operations, effective marketing
Disadvantages of DBMS
increased costs, maintaining currency, management complexity, frequent upgrade, replacement cycles
A computer is an electronic machine that performs calculations based on a set of what?
instruction
What is a database system?
integrated system of hardware, software, people, procedures, and data
Nonlinear
interactive (user control)
The fundamental properties and the patterns of relationships, connections, constrains, and linkages among the components and between the system and its environment are known collectively as the __ of the system
interface
What is malware
it's any software that infects and damages a computer system without the owner's knowledge or permission
Codec
it's compressor and decompressor algorithm of the video
Information is meaningful data that leads to
knowledge
Multimedia category
linear and nonlinear
Audio file format types
lossless and lossy
Difference between low-level language and high-level language
low-level closer to how computer talks and high level to how human talks
What is information
meaningful data that leads to knowledge
Cybersecurity
measures taken to protect a computer against unauthorized access or attack
Linear
no user control
If you are talking to a group, you are communicating
one-to-many
Types of communication
one-to-many, one-to-one
Cyberspace
online world of computer networks
E service
short for electronic service
Lossy
simplifies the data, removes sound ranges humans cannot hear (MP3, AAC)
What is Virtualization
software-based computer system
IT department core functions
stores the data, protects the data, provides technical support, ensures connectivity, keeps technology current in the organization, etc.
Domain levels and example
sub domain, second level domain, top level domain (example astanait.edu.kz: astanait(sub level) edu(second level) .kz(top level))
Modes of e learning
synchronous and asynchronous
What is OS
system software that acts as an interface between the user and computer hardware
Computer as a Target
targeting computer or system (Viruses, malwares)
Limitations of synchronous e learning
technology may not work, students have to meet at a fixed time
The software component ...
tells the hardware what data to process
Primary methods of communication
text, voice, video
Container
the holder of the video file and components
What is boundary
the separation between environment and system
An IP address is __________.
the unique address of a computer on a network
What is Interface
the way that the user communicates with the computer
Computer as a Tool
to target individuals through spam, fraud and etc (these scammers are not technical experts)
The communication component ...
transports the data to the hardware
Disadvantages of e commerce
unable to examine products personally, rely on other customer review, requires a way to transfer money electronically, possibility of credit card number theft, receive defective product, slow delivery, difficult to return products
Steps of data analysis
understanding the problem, data collection, data cleaning, data exploration and analysis, interpretation of results.
What is domain
unique name that identifies a website
What is IT
use of computers to store, retrieve, transmit and manipulate data, or information
What is the example of synchronous communication
video call
E-commerce has three different categories of who to conduct business with. Which doesn't belong to those categories?
warehouses
What WWW stand for
world wide web
What is the most common type of network topology used today?
Star
What three things must a computer do?
Store data, Retrieve data, Process data
How does the client-server model work?
A client requests data from the server
Who controls the ICT standards?
An international group of organizations and businesses
What is unique about a mesh network?
Any device becomes a router and relays the message until it reaches its destination
ICT characteristics
Data storage, data retriever, data transmission, data manipulating
Characteristics of IoT
Data, Things, Communication, Intelligence, Action, Ecosystem, Connectivity
Which attributes are depicted by a dashed ellipse?
Derived attributes
What action does NOT use basic software?
Designing a bridge using West Point Bridge Designer
DNS stands for
Domain Name System
What is the golden rule of HCI?
People should come first
What is NOT an Asynchronous Communication?
Phone conversation
What describes how data is to be represented and stored (files, indices, etc.)?
Physical database schema
What describes IoT?
Physical devices around the world that connect to the internet to collect and share data
What the three basic layers of a networking model?
Physical, Application, Transport
Phases of database development
Planning, Analysis, Detailed system design, Implementation, Maintenance
PaaS stands for
Platform as a Service
Display standards
Postscript, MPEG-2, JPEG, PNG
_____________ automatically controls lighting, temperature, and entertainment systems
Smart home
SaaS stands for
Software as a Service
What does SaaS stand for in cloud computing?
Software as a Service
What is NOT a purpose of system software?
Software for the user
Who do cybercriminals prefer to target?
Someone who clicks links in emails
Characteristics of Computers
Speed, Math and logic operations, Accuracy, Storage, Automation and etc