Answer Key – All Chapters Computer Skills (CT 101) Book Activities SESSION 2-COMPUTER APPLICATIONS I II I II 3-TEXT PROCESSING I II III 4-SPREADSHEETS 1. INTRODUCTION TO COMPUTING AND ITS APPLICATIONS 1-INTRODUCTION TO COMPUTING CHAPTER APPLY/ ACTIVITY NO. I II QUESTION NO. CORRECT ANSWER PAGE No. 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 Computer 31 Hardware, Software Software 31 31 Network 31 Minicomputer B) Motherboard A) CPU 31 31 31 C) ALU D) CU 31 31 B) Secondary 31 A) Program A) Two C) System Software 44 44 44 D) All of the above D) All of the above Operating system Multi-user operating system CLI MacOS Android 44 44 44 44 44 44 44 6 Windows10 44 1 2 3 4 5 A B C D E F 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 Quick Access Toolbar Ribbon Work Area Insertion Point Smart Lookup CTRL+N CTRL+S CTRL+O CTRL+W F12 key CTRL+P C) Clipboard B) Styles 58 58 58 58 58 58 58 58 58 58 58 59 59 C) Insert 59 A) Page Layout B) References Microsoft Excel Ribbon Formula Bar Freeze Panes Password A) Logical C) Text B) Math & Trig D) PROPER A) LEN 59 59 76 76 76 76 76 76 76 77 77 77 1- Overview of Data Communication and Network SESSION APPLY/ ACTIVITY NO. CORRECT ANSWER PAGE No. Verbal Questions 94 Group Activity 94 1 C - Full-duplex 94 2 A - Protocol 94 3 C - Jitter 94 4 C - PAN 94 5 D - Ethernet cable 94 1 Practical Activity B) RAM 108 108 2 C) ROM 108 3 4 5 6 7 8 A) HDD B) Optical Storage C) CD-RW B) Bit B) Data Compression B) 1024 108 108 108 108 108 108 Class Activity 130 1 C) Frequency 130 2 C) Data restore 130 3 QUESTION NO. I II III 3- Local Data Backup and Restore 2- Data Storage I 4-Remote Data Backup and Restore 2.DATA COMMUNICATION AND BACKUP CHAPTER II I II B) Differential backup 130 I Practical Activity 145 II Practical Activity 145 III Practical Activity 145 IV Practical Activity 145 SESSION 2-VISUALIZATION OF NUMERICAL DATA 3-VISUALIZING 4-DATA DASHBOARDS NON-NUMERICAL DATA 3.DATA VISUALIZATION 1- INTRODUCTION TO DATA VISUALIZATION CHAPTER APPLY/ ACTIVITY NO. QUESTION NO. CORRECT ANSWER PAGE No. I a b c Group Activity Group Activity 156 156 Group Activity 156 A Data visualization 156 B Explanatory 156 C D Audience Numerical data 156 156 II III I II III E Non- numerical 156 A B True False 156 156 C True 156 D A B 1 True Group Activity Group Activity Band Chart 156 169 169 169 2 3 4 histogram Pie chart Heat map 169 169 169 1 2 3 4 False True True True Practical activity Practical activity Group Activity 169 169 169 169 181 181 181 A True 181 B C D True True True Online Practical Activity 181 181 181 199 1 2 3 4 1 2 3 4 KPI Operational Strategic Analytical True True True True 199 199 199 199 199 199 199 199 I II III IV I II III APPLY/ ACTIVITY NO. 1- INTRODUCTION TO ALGORITHMS SESSION QUESTION NO. CORRECT ANSWER PAGE No. 1 2 3 4 1 2 3 4 5 a b c d e Algorithms Flowchart 211 211 Programming Language 211 Diamond 211 is a graphical representation of steps for solution of a problem is used to represent the start step 211 is used for input and output steps 211 is used for a decision-making step 211 is used to connect two different parts of a flowchart Step 1- c 211 Step 2- d Step 3- e Step 4- b 211 211 211 Step 5- a Practical activity 211 211 I II III IV 1 2 3 4 1 2 3 4 211 211 coding 223 Computer Program 223 Binary code 223 Integrated Development and Learning Environment 223 is often referred to as coding. 223 is the natural language of electronic devices is the extension of Python. 223 is a raw text file, written on very simple editors. 223 translate the entire program to a file and execute the whole file 223 Practical activity 223 Practical activity 223 3-Building your First Program All practical activities. 230 4-Variables, Statements and Operators All practical activities. 240 5-Conditional Logic All practical activities. 248 6-Loops and Functions All practical activities. 257 7-File Input/ Output (File I/O) All practical activities. 266 2-INTRODUCTION TO PROGRAMMING 4.ALGORITHMS AND PROGRAMMING CHAPTER I II 5 III IV 223 SESSION 2- ACCESS CONTROL 3- AN INTRODUCTION TO CRYPTOGRAPHY 4- AN INTRODUCTION TO 4- AN INTRODUCTION TO CRYPTOGRAPHY PART II CRYPTOGRAPHY PART II 5.INFORMATION SECURITY 1- AN OVERVIEW OF INFORMATION SECURITY CHAPTER APPLY/ ACTIVITY NO. IA B C II I II I II III QUESTION NO. CORRECT ANSWER PAGE No. 1 2 3 4 5 6 1 2 3 4 5 1 2 3 1 2 3 4 1 2 1 2 3 4 5 a b c d Practical Activities Practical Activities 278 278 Practical Activities 278 Practical Activities 278 Practical Activities 278 Practical Activities D) All of the above 278 279 C) Fabrication 279 A) Integrity A) Confidentiality 279 279 C) Awareness-Based Protection 279 Class Activity Class Activity Class Activity C) Cognitive Password 290 290 290 290 B) One-factor authentication D) Authorization A) One-Time Password 290 290 290 Practical Activity Practical Activity C) Symmetric Key C) Cryptography A) True C) Encryption A) True 303 303 303 303 303 303 303 Practical Activity 304 Practical Activity Practical Activity Practical Activity 304 304 304 a Practical Activity 313 b Practical Activity 313 c Practical Activity 313 d Practical Activity 313 e Practical Activity 313 f Practical Activity 313 1 Hash Function 313 2 Digital Signature 313 3 Digital Certificate 313 4 VeriSign 313 I II