Free Ict Revision

CPA Foundation

Free ICT Revision Questions and Answers

You can check each answer during or view all answers after the quiz. To check an answer to a text question during the quiz,please note you have to put an answer in the answer box first.

0%
Created by Avatar Placeholderrevision4exams .com

CPA Foundation

Free ICT revision questions and answers-CPA Foundation

Tail Spin

1 / 40

Category: CPA Foundation-Information and Communications Technology

1. Hight three(3) elements of a computer file.

2 / 40

Category: CPA Foundation-Information and Communications Technology

2. Highlight six(6) basic types of ecommerce.

3 / 40

Category: CPA Foundation-Information and Communications Technology

3. TRUE or FALSE: A hardware firewall is installed inside the individual system.

4 / 40

Category: CPA Foundation-Information and Communications Technology

4. Which of the following is/are not factors to consider when choosing an online data storage?

5 / 40

Category: CPA Foundation-Information and Communications Technology

5. Disk analysis software, Disk defragmentation software, Compression tools, and File management software are examples of:

6 / 40

Category: CPA Foundation-Information and Communications Technology

6. TRUE or FALSE: Social networking sites are linked to an increased risk of mental health problems like depression, anxiety, and loneliness.

7 / 40

Category: CPA Foundation-Information and Communications Technology

7. TRUE or FALSE: Information technology (IT) can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support decision-making and control in an organization.

8 / 40

Category: CPA Foundation-Information and Communications Technology

8. TRUE or FALSE: ICT enhances the quality of care, increases patient security and data protection, and reduces operating and administrative costs in the healthcare sector.

9 / 40

Category: CPA Foundation-Information and Communications Technology

9. In Network topology, ____________ network topology consists of a parent-child hierarchy in which star networks are interconnected via bus networks, and nodes branch out linearly from one root node, and two connected nodes only share one mutual connection.

10 / 40

Category: CPA Foundation-Information and Communications Technology

10. TRUE or FALSE: If you create an ad-hoc network between two computers in Windows 7 or 8, you create a peer-to-peer network between them.

11 / 40

Category: CPA Foundation-Information and Communications Technology

11. Auxiliary storage is any storage that is made available to the system through input/output channels Which of the following is not an auxiliary storage device?

12 / 40

Category: CPA Foundation-Information and Communications Technology

12. TRUE or FALSE: An app is a piece of software designed for a single purpose or a single function, whereas, an application is a piece of software that performs a variety of related functions.

13 / 40

Category: CPA Foundation-Information and Communications Technology

13. Highlight six (6) services provided by the Operating System to the users.

14 / 40

Category: CPA Foundation-Information and Communications Technology

14. Highlight six(6) characteristics of programming languages.

15 / 40

Category: CPA Foundation-Information and Communications Technology

15. Which of the following statements about digital social media marketing is/are not true?

16 / 40

Category: CPA Foundation-Information and Communications Technology

16. Highlight four(4) differences between mainframes and supercomputers.

17 / 40

Category: CPA Foundation-Information and Communications Technology

17. Outline five(5) examples of m-commerce application

18 / 40

Category: CPA Foundation-Information and Communications Technology

18. Highlight six (6) services provided by the Operating System to the users.

19 / 40

Category: CPA Foundation-Information and Communications Technology

19. Define Rapid Application Development and outline five(5) advantages.

20 / 40

Category: CPA Foundation-Information and Communications Technology

20. Outline the four(4) steps followed in risk management

21 / 40

Category: CPA Foundation-Information and Communications Technology

21. Highlight four(4) advantages Digital two-way radio technologies such as Digital Audio Broadcasting (DAB) and Digital Mobile Radio (DMR) have over analog systems.

22 / 40

Category: CPA Foundation-Information and Communications Technology

22.

TRUE or FALSE: A code of ethics clarifies the acceptable standards of
behavior for a professional group.

23 / 40

Category: CPA Foundation-Information and Communications Technology

23. Virtual reality in education is being adopted to give students a fresh perspective and real-life experience of the things they are studying without even being there directly. Highlight three (3)applications of virtual reality in education.

24 / 40

Category: CPA Foundation-Information and Communications Technology

24. Distinguish computer hardware from computer software.

25 / 40

Category: CPA Foundation-Information and Communications Technology

25. Distinguish between a modem and a multiplexer as used in computer networks.

26 / 40

Category: CPA Foundation-Information and Communications Technology

26. List six (6) high-potential threats of AI use.

27 / 40

Category: CPA Foundation-Information and Communications Technology

27. The fraudulent acquisition and use of personal identification details or financial details of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases is referred to as :

28 / 40

Category: CPA Foundation-Information and Communications Technology

28. Describe the term knowledge-based systems in the context of information systems and provide two(2) examples.

29 / 40

Category: CPA Foundation-Information and Communications Technology

29. TRUE or FALSE: Open source code is usually stored in a public repository and shared publicly,and anyone can access the repository to use the code independently or contribute improvements to the design and functionality of the overall project.

30 / 40

Category: CPA Foundation-Information and Communications Technology

30. Differentiate between data security and data privacy.

31 / 40

Category: CPA Foundation-Information and Communications Technology

31. In reference to information systems, (i) .______ helps in automating the general official works (e.g. managing and organizing documents), whereas (ii). ________works as an expert consultant and provides expert advice to users(e.g. control and diagnostic system).

32 / 40

Category: CPA Foundation-Information and Communications Technology

32. Highlight eight(8) features of requirement elicitation.

33 / 40

Category: CPA Foundation-Information and Communications Technology

33. List eight(8) types of digital marketing categories.

34 / 40

Category: CPA Foundation-Information and Communications Technology

34.

Define the following terms.
i. Internet of Things(iOT).
ii. Information value chain
iii. The digital divide
iv. Workflow management software

35 / 40

Category: CPA Foundation-Information and Communications Technology

35. Information systems can be classified into tactical management, operational management, and strategic management. Technical management is :

36 / 40

Category: CPA Foundation-Information and Communications Technology

36. The lower-level managers use operations support systems, which fall into three categories. Outline the three(3) categories.

37 / 40

Category: CPA Foundation-Information and Communications Technology

37. TRUE or FALSE: Because of the widespread use of mobile technology, people nowadays don’t meet in person but rather tweet or comment on social media sites.

38 / 40

Category: CPA Foundation-Information and Communications Technology

38. The (i) ____generation computers used machine language, whereas the (ii).____generation computers could understand high-level languages such as COBOL

39 / 40

Category: CPA Foundation-Information and Communications Technology

39. A multi-user operating system handles and controls multiple users attached to a single computer. Which of the following statements is /are true about a multi-user operating system?

40 / 40

Category: CPA Foundation-Information and Communications Technology

40. Outline five data security risks.

Your score is

Please share with your friends and colleagues

Thankyou

LinkedIn Facebook Twitter
0%

Exit

Free ICT revision

You can access more Information & communications technology  revision materials (questions & answers) through our affordable offer here

To access revision materials (questions & answers) on all CPA Foundation subjects,please follow the links below:

For 3 months  ( per 1 subject)

For 6 months ( 6 subjects)

For 12 Months (6 subjects)

How to revise for exams in 1 day!