Uploaded by Hh Gh

Answer Key Computer Skills CT 101-Book Activities 1443

advertisement
Answer Key – All Chapters
Computer Skills (CT 101) Book Activities
SESSION
2-COMPUTER APPLICATIONS
I
II
I
II
3-TEXT PROCESSING
I
II
III
4-SPREADSHEETS
1. INTRODUCTION TO COMPUTING AND ITS APPLICATIONS
1-INTRODUCTION TO
COMPUTING
CHAPTER
APPLY/
ACTIVITY NO.
I
II
QUESTION NO.
CORRECT ANSWER
PAGE No.
1
2
3
4
5
1
2
3
4
5
1
2
3
4
5
1
2
3
4
5
Computer
31
Hardware, Software
Software
31
31
Network
31
Minicomputer
B) Motherboard
A) CPU
31
31
31
C) ALU
D) CU
31
31
B) Secondary
31
A) Program
A) Two
C) System Software
44
44
44
D) All of the above
D) All of the above
Operating system
Multi-user operating system
CLI
MacOS
Android
44
44
44
44
44
44
44
6
Windows10
44
1
2
3
4
5
A
B
C
D
E
F
1
2
3
4
5
1
2
3
4
5
1
2
3
4
5
Quick Access Toolbar
Ribbon
Work Area
Insertion Point
Smart Lookup
CTRL+N
CTRL+S
CTRL+O
CTRL+W
F12 key
CTRL+P
C) Clipboard
B) Styles
58
58
58
58
58
58
58
58
58
58
58
59
59
C) Insert
59
A) Page Layout
B) References
Microsoft Excel
Ribbon
Formula Bar
Freeze Panes
Password
A) Logical
C) Text
B) Math & Trig
D) PROPER
A) LEN
59
59
76
76
76
76
76
76
76
77
77
77
1- Overview of Data
Communication and
Network
SESSION
APPLY/
ACTIVITY NO.
CORRECT ANSWER
PAGE No.
Verbal Questions
94
Group Activity
94
1
C - Full-duplex
94
2
A - Protocol
94
3
C - Jitter
94
4
C - PAN
94
5
D - Ethernet cable
94
1
Practical Activity
B) RAM
108
108
2
C) ROM
108
3
4
5
6
7
8
A) HDD
B) Optical Storage
C) CD-RW
B) Bit
B) Data Compression
B) 1024
108
108
108
108
108
108
Class Activity
130
1
C) Frequency
130
2
C) Data restore
130
3
QUESTION NO.
I
II
III
3- Local Data
Backup and
Restore
2- Data Storage
I
4-Remote
Data Backup
and Restore
2.DATA COMMUNICATION AND BACKUP
CHAPTER
II
I
II
B) Differential backup
130
I
Practical Activity
145
II
Practical Activity
145
III
Practical Activity
145
IV
Practical Activity
145
SESSION
2-VISUALIZATION OF
NUMERICAL DATA
3-VISUALIZING
4-DATA DASHBOARDS NON-NUMERICAL
DATA
3.DATA VISUALIZATION
1- INTRODUCTION TO DATA
VISUALIZATION
CHAPTER
APPLY/
ACTIVITY NO.
QUESTION NO.
CORRECT ANSWER
PAGE No.
I
a
b
c
Group Activity
Group Activity
156
156
Group Activity
156
A
Data visualization
156
B
Explanatory
156
C
D
Audience
Numerical data
156
156
II
III
I
II
III
E
Non- numerical
156
A
B
True
False
156
156
C
True
156
D
A
B
1
True
Group Activity
Group Activity
Band Chart
156
169
169
169
2
3
4
histogram
Pie chart
Heat map
169
169
169
1
2
3
4
False
True
True
True
Practical activity
Practical activity
Group Activity
169
169
169
169
181
181
181
A
True
181
B
C
D
True
True
True
Online Practical Activity
181
181
181
199
1
2
3
4
1
2
3
4
KPI
Operational
Strategic
Analytical
True
True
True
True
199
199
199
199
199
199
199
199
I
II
III
IV
I
II
III
APPLY/
ACTIVITY NO.
1- INTRODUCTION TO ALGORITHMS
SESSION
QUESTION NO.
CORRECT ANSWER
PAGE No.
1
2
3
4
1
2
3
4
5
a
b
c
d
e
Algorithms
Flowchart
211
211
Programming Language
211
Diamond
211
is a graphical representation of steps for solution of a problem
is used to represent the start step
211
is used for input and output steps
211
is used for a decision-making step
211
is used to connect two different parts of a flowchart
Step 1- c
211
Step 2- d
Step 3- e
Step 4- b
211
211
211
Step 5- a
Practical activity
211
211
I
II
III
IV
1
2
3
4
1
2
3
4
211
211
coding
223
Computer Program
223
Binary code
223
Integrated Development and Learning Environment
223
is often referred to as coding.
223
is the natural language of electronic devices
is the extension of Python.
223
is a raw text file, written on very simple editors.
223
translate the entire program to a file and execute the whole file
223
Practical activity
223
Practical activity
223
3-Building your First Program
All practical activities.
230
4-Variables, Statements and Operators
All practical activities.
240
5-Conditional Logic
All practical activities.
248
6-Loops and Functions
All practical activities.
257
7-File Input/ Output (File I/O)
All practical activities.
266
2-INTRODUCTION TO
PROGRAMMING
4.ALGORITHMS AND PROGRAMMING
CHAPTER
I
II
5
III
IV
223
SESSION
2- ACCESS
CONTROL
3- AN INTRODUCTION TO
CRYPTOGRAPHY
4- AN INTRODUCTION TO 4- AN INTRODUCTION TO
CRYPTOGRAPHY PART II CRYPTOGRAPHY PART II
5.INFORMATION SECURITY
1- AN OVERVIEW OF
INFORMATION SECURITY
CHAPTER
APPLY/
ACTIVITY NO.
IA
B
C
II
I
II
I
II
III
QUESTION NO.
CORRECT ANSWER
PAGE No.
1
2
3
4
5
6
1
2
3
4
5
1
2
3
1
2
3
4
1
2
1
2
3
4
5
a
b
c
d
Practical Activities
Practical Activities
278
278
Practical Activities
278
Practical Activities
278
Practical Activities
278
Practical Activities
D) All of the above
278
279
C) Fabrication
279
A) Integrity
A) Confidentiality
279
279
C) Awareness-Based Protection
279
Class Activity
Class Activity
Class Activity
C) Cognitive Password
290
290
290
290
B) One-factor authentication
D) Authorization
A) One-Time Password
290
290
290
Practical Activity
Practical Activity
C) Symmetric Key
C) Cryptography
A) True
C) Encryption
A) True
303
303
303
303
303
303
303
Practical Activity
304
Practical Activity
Practical Activity
Practical Activity
304
304
304
a
Practical Activity
313
b
Practical Activity
313
c
Practical Activity
313
d
Practical Activity
313
e
Practical Activity
313
f
Practical Activity
313
1
Hash Function
313
2
Digital Signature
313
3
Digital Certificate
313
4
VeriSign
313
I
II
Download