0% found this document useful (0 votes)
54 views10 pages

Prof Quarm Ugbs 102 Pasco-2019

This document is an examination paper for the University of Ghana's course UGBS 102: Introduction to Computing in Business for the academic year 2018/2019. It consists of multiple-choice questions and fill-in-the-blank questions covering various topics in computing and business applications. The exam is structured into two sections, with a total of 100 marks available.

Uploaded by

kwakyebrancolee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views10 pages

Prof Quarm Ugbs 102 Pasco-2019

This document is an examination paper for the University of Ghana's course UGBS 102: Introduction to Computing in Business for the academic year 2018/2019. It consists of multiple-choice questions and fill-in-the-blank questions covering various topics in computing and business applications. The exam is structured into two sections, with a total of 100 marks available.

Uploaded by

kwakyebrancolee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

' CAIVLPUS: STUDENT ID:

..
G‘
u ·

UNIVERSITY OF GHANA
(All rights reserved)

SECOND SEMESTER EXAIVHNATION: 2018/2019

BA/BSc. BUSINESS ADMINISTRATION

UGBS 102: INTRODUCTION TO COMPUTING IN BUSINESS (3 CREDITS)

ANSWER ALL QUESTION S IN BOTH SECTIONS

TIME ALLOVVED: 2 hours 30 minutes

SECTION A [50 Marks]

l. Which of the following is not a Business Software?


a. Word processing
b. Spreadsheet
c. Presentation

d. Personal Finance

2. The difference between non-volatile memory and storage is that the memory

is and storage is
a. Temporary, permanent
b. Permanent, temporary

c. Slow, fast
d, None of the above

3. Which of the following holds the ROM, CPU, RAM and expansion cards?

a. Hard disk
b. Floppy disk

c. Mother board
. d. None of the above

4. The language that the computer can understand and execute is called
a. Machine language
b. Application software
c. System program

d. None of the above A

5. Actual execution of instructions in a computer takes place in


a. ALU

b. Control Unit
c. Storage unit
d. None of the above

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 1 of 10


6. Which of the following does not represent an I/O device?
a. Speaker which beeps
b. , Joystick
·
c. Plotter
d. ALU

7. The communication line between the CPU, memory and peripherals is called a
a. Bus
b. Line
c. Media
d. None of these N

8. One thousand bytes represent a


a. Megabyte
b. Gigabyte
c. Kilobyte
d. Terabyte

9. A computer can be defined as an electronic device that can (choose the most precise

deiinition)
a. carry out arithmetical operation
b. carry out logical function
c. accept and process data using a set of stored instructions
I
d. present information on a VDU

10. ASCH code is a/an bit code.


a. 1

b. 2
c. 7
d. 8

· ll. The digital system usually operated on system.


a. binary
b. decimal
I
c. octal _
d. hexadecimal

12. What is true about supercomputers


a. they can Ht on a single small chip
b. they are found at thousands of places around the world
c. they cost only few thousand cedis

d. they can process billions of operations in a second

13. The linking of computers with a communication system is called


a. networking
b. pairing
c. interfacing
d. assembling

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 2 of 10



14. The heart of a computer is
a. CPU
b. Memory
c. I/O Unit
d. Disks

15. A computer consists of

a. a central processing unit


b. a memory

c. input and output units


d. All the above

16. Memories in which any location can be reached in a iixed (and short) amount of time
after specifying its address is called
a. sequential-access memory
b. random-access memory
c. secondary memory
d. mass storage

17. Modern computers do not work with decimal numbers. Instead, they process binary
numbers i.e., groups of Os and ls because

a. electronic devices are most reliable when designed for two state (binary)
operation
b. memory is only possible for binary numbers
c. with decimal numbers, the circuits are complex and costly
d. with decimal numbers, processing speed is slow

18. Stored instructions and data in digital computers consist of


a. alphabets
b. numerals
c. characters
d. bits

19. The basic operation performed by a computer is


a. arithmetic operations
b. logical operations
c. storage and retrieval operations
d. all the above

20. The analog computer deals directly with


a. number or codes
b. measured values of continuous physical magnitude
c. signals in the form of 0 or 1
d. signals in discrete values from 0 to 9

2l. If you want to improve the performance of your PC, you need to upgrade the
a. CPU

b. Monitor

c. Keyboard

d. Printer

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 3 of 10


22. Memory stores - h
a. the operating system
b. application programs
c. the data being processed by the application programs
d. all of the above · -·
23. Which of the following is example of an Operating System?
a. MS DOS
b. MS Access
c. Spreadsheets

d. Photoshop

24. Which of the following is part of the system unit?


a. Monitor
b. Motherboard
c. Keyboard .
d. None of the above

109
25. What unit of storage is used to represent bytes?
a. Kilobyte

b. Terabyte
c. Megabyte
d. Gigabyte

26. The processor’s controls the timing of all the computer operations.
a. system clock - ·
b. register
c. machine cycle
d. arithrnetic logic unit (ALU)


27. How many bytes are in the term "Introduction to computing” exclude the quotation
marks.
a. 23
b. 24
c. 25
d. 26

28. The interprets each instruction issued by a program and then


initiates the appropriate action to carry out the instruction.

a. arithmetic logic unit (ALU)

b. control unit
c. system unit

d. memory

29. You must instruct the to start the application software.

a. utility program
b. memory ·
c. operating system
d. processor

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 4 of 10



30. The jargon for navigating on the Internet is called
a. clicking
b. selecting
c. surfing
d. analysing

31. The process of a computer receiving information from a server on the Internet is known
as
a. downloading
b. pulling
c. transferring
d. uploading

32. HTML stands for


a. Hyper Text Make up Language
b. Hyper Terminal Markup Language
c. Hyper Text Markup Language
d. Higher Text Markup Language

33. A letter, digit, or special character is represented by a code in a


a. bit
b. byte

c. kjlobyte
d. megabyte

34. are the four general operations that are performed in each machine cycle.
a. fetch, execute, store and decode
b. decode, execute, store and fetch
c. decode, fetch, store and execute
d. fetch, decode, execute and store

35. Which of the following computers is not a mobile computer?

a. Notebook computers

b. Laptop computers
c. Tablet PCs

d. None of the above

36. Which of the following is not an E-commerce model?

a. B2B

b. B2C
c. C2C

d. None of the above

37. Several other services run on the Internet aside the world wide web (www). Which of

the following is not an Intemet Service?


a. Email

b. Mailing list
c. Instant messaging

d. Computer Soüware

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 5 of 10



38. is«a web site that offers a variety of Intemet services from a single,
V
convenient location.

a. Informational
b. Business/Marketing
c. Portal -
d. Blog

39. All these are criteria for evaluating a Web Site’s content except
a. Content
b. Affiliation

c. Currency

d. Subjectivity

40. Registers are small high-speed circuits used to store data, instructions and memory
addresses.
a. True
‘ ‘
b. False _

4l. Freeware software is copyrighted sonware that is distributed on the honor system;
consumers should either pay for it or uninstall it aner the trial period.
a. True -
b. False

42. Which of these is not a common type of malware?

a. Trojan horse

b. Worms
c. Rootkit

d. Cracking

43. is a technique intruders use to make their network or Internet


transmission appear legitimate to a victim computer or network.

a. Bomet

b. Spoofing
c. Back door

d. Denial of Service Attack

44. To mitigate against sonware then, many manufacturers incorporate

process into their programs to ensure the software is not installed on more computers
than legally licensed.
a. license

b. protection

c. activation
d. firewall

45. is the process of converting data that is readable by humaus into encoded
characters to prevent unauthorized access.
a. Algorithm
b. Cipher Text

c. Encryption

d. Decryption

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 6 of 10



46. Which of the following is used to guarantee whether a user or a website is legitimate?
a. Digital signature
b. Encryption

c. Digital certiücate

d. Secure site

47. The backup technique where all data is backup whenever a change is made is known

as .
a. Full backup

b. Lncremental backup
c. Differential backup

d. Continuous data protection (CDP)

48. Which of the following is not a type of a computer network?


a. Local Area Network (LAN)

b. Wide Area Network (WAN)

c. Personal Area Network (PAN)


d. None of the above

49. All these are network topologies except


a. Ring network
b. Star network

c. Bus network

d. Standard network

50. All these are communications devices except


a. Modem

b. Wireless Access Point (WAP)


c. Router

d. Keyboard

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 7 of 10


‘i


SECTION B [50 Marks]

ANSWER ALL QUESTIONS BY FILLING THE GAPS IN THIS SECTION

QUESTION 1 _

a) Any illegal act involving the use of a computer or related devices is generally referred

to as a whilst is an online or

Intemet-based illegal act.

[4 Marks]

b) uses values that change very smoothly whilst



jumps from one value to the next in a step by step sequence.

[4 Marks]

c) classifies Web pages in an organized set of categories

whilst finds information related to a specific topic.



[4 Marks]

d) In computing systems,.a/an is a small program that tells the

operating system how to communicate with a specific device.

[2 Marks]

QUESTION 2

a) Alice has 1000 small images with 40 KB size each and 22 video files with each
having a size of 55MB. How much space, in flash drive, do they take up overall in
MB?

[4 Marks]

b) Assuming it takes 15 MB to download a 1-minute high definition video. What data

size will you need to download a 99~minute high defmition video? Convert the data
size (outcome) to bit.

[4 Marks]

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 8 of 10


' c) Convert 111010101 1 1 10011 into its decimal equivalent.

[4 Marks]

cl) Convert 1090 (in decimal) into its binary equivalent.

[4 Marks]

QUESTION 3

a) Application Software comes in a variety of forms. Brietly explain each of these forms
as followsz

i. Packaged Software:

[2 Marks]

ii. Custom Software:

[2 Marks]

iii. Open Source Software:

[2 Marks]

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 9 of 10



iv. Shareware:

[2 Marks]

v. Freeware:

E
[2 Marks]

b) Briefly explairr how each of these cybercriminals operate.

i. Hacker:

. . [2 Marks]


eii. Cracker:

[2 Marks]

iii. Corporate Spies:


[2 Marks]

iv. Cybercxtortionist:

[2 Marks]

v. Cyberterrorist:

[2 Marks]

Examiners: Dr. Awuni Emmanuel and Dr. Owusu Acheampong Page 10 of 10

You might also like