Search Header Logo

INFORMATION TECHNOLOGY: PAPER II

Authored by tinashe mutyaso

Information Technology (IT)

9th Grade

INFORMATION TECHNOLOGY: PAPER II
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Give the most appropriate term for each of the following expressions: 1.1 A program which converts source code into machine code, line by line. 1.2 The part of the machine cycle which translates the instruction into CPU commands. 1.3 A form of network transmission where packets are transmitted to all nodes on the network rather than a specific device. 1.4 A memory management technique where secondary storage can be used as if it were main memory. 1.5 Reorganising the data stored on an HDD into contiguous blocks. 1.6 The portion of a packet which contains the data being transmitted. 1.7 An older communications technology which simultaneously transmits voice and data over public telephone networks using copper cable. 1.8 Software which protects a computer against malicious programs.

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

For each of the terms in Column A below, you should select the most correct definition in Column C, matching the letter to the question number. You should merely write down the appropriate letter in Column B. An example is shown as Question 2.0, using 'W' as the correct answer. Column A Column B Column C 2.0 W 2.1 SSD A A motherboard path which connects the CPU and main memory 2.2 Register B A computer interface used to connect storage devices 2.3 CMOS C A portion of the CPU used to store the current instruction 2.4 IO Range D A semiconductor chip which stores instructions to load the basic computer hardware on start-up 2.5 Virtual memory E A software license which allows free use of software 2.6 Compiler F A list of the available IRQs a device can use 2.7 BIOS G A form of cloud storage 2.8 Freemium H Converting and executing source code line by line 2.9 SATA I A semiconductor chip which stores computer configuration data 2.10 FSB J An interface which allows hot swappable devices to connect with the motherboard K Software used to convert source code into object code L A storage device which has no mechanical parts M A technology which allows segments of memory to be stored in pages on a hard drive N A buffer used to speed up a slow input-output device O A software license which allows free use of restricted features of software P The temporary storage of hard drive data in RAM to increase secondary storage access speed

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

The business owners will need various computer hardware items for the fitness centre. To reduce start-up costs, they have purchased a second-hand server with the following specifications: • Intel Xeon CPU 8 cores 3.3 Ghz • 2 CPU slots (1 filled) • 20 MB L3 cache • DDR3 RAM • 8 RAM slots • 3 x 2 TB HDD • Supported RAM chips: 2 GB, 4 GB, 8 GB, 16 GB and 32 GB • 4 × USB 3 slots • Intel onboard graphics card 3.1 Give an example of ONE device which will connect to a server via USB. 3.2 The specification doesn't state how much RAM there is on the motherboard. What is the maximum amount of RAM which can be installed using: RAM chip capacity Total amount of RAM 2 GB 32 GB

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

For questions 4.1 to 4.5, you need to select the most correct answer from the options A–D. An answer grid is at the bottom of this page for your answers. You merely need to write down the appropriate letter for your answer. 4.1 DHCP ... A is a protocol used to setup transmission security. B is a protocol used to allocate IP addresses to devices. C is a protocol to allow data transfer on mobile networks. D is a protocol used to link URLs and IP addresses. 4.2 Thin clients ... A are only used on cabled networks. B are used to reduce server processing requirements. C are devices with minimal processing ability. D are commonly used in most school networks. 4.3 MAC addresses ... A uniquely identify network cards. B uniquely identify nodes on a network. C uniquely identify switch ports. D None of the above. 4.4 Ethernet ... A is a commonly used LAN protocol. B uses ARP (Address Resolution Protocol) to identify devices. C allows for different transmission speeds on the same network. D All of the above. 4.5 Video on demand ... A can only be offered on a cabled network. B eliminates the constraint of static broadcast schedules. C always uses the UDP protocol for transmission. D is usually offered as a free service.

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the function of a wireless access point?

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

What is meant by the term 'encrypted' when referring to network traffic?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the purpose of a firewall in a network?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?