Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=CDACC ICT Technician Level 6 : Demonstrate Digital Literacy past paper March 2021

Database security refers to the various measures organizations take to ensure
their databases are protected from internal and external threats. Database security includes
protecting the database itself, the data it contains, its database management system, and the
various applications that access it. What are the seven (7) Database Security Best practices
that an organization must perform to ensure its data is protected from both internal and
external threats?

    Viewed:  200  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. What is Digital Literacy? (1Mark) A. The ability to find, evaluate, utilize, share, and create contents using information technologies and the Internet. B. The use of an Internet connection to access the information needed. C. The use of digital technology, communication, tools and/or networks to access, manage, integrate, evaluate, create and communicate information in order to function in a know
2. What is the full form of WWW in web address? (1 Mark) A. World Wide Web B. Worldwide word C. Worldwide wood
3. One of the following is not a classification of computers by their basic operating principle? A. Analog computers B. Hybrid computers C. Digital computers D. Super computers
4. Desktop publishing software (DTP) is used to create documents like? (1Mark) A. slides B. printing papers C. Query report D. None of the above
5. Which of the following is not a computer hardware? (1 Mark) A) Malware B) Monitor C) Compact disk D) Hard disk
6. The process of transferring files from a computer on the internet to your computer is called? (1 Mark) A. Uploading B. Forwarding C. FTP D. Downloading.
7. One of the following is not a method of preventing spyware from infecting your computer. (1 Mark) A. Don’t download suspicious-looking email attachments Systematic sampling B. Don’t click on online pop-ups. C. Protect Your Personal Information D. Don’t open links received in text messages from unknown numbers
8. The following are mouse actions except? (1 Mark) A. Left click B. Double click C. Forward click D. Right click
9. The following is an application of joystick as an input device. (1 Mark) A. Video games. B. Training simulators. C. Controlling robots. D. All of the above.
10. We can make use of the wild card entries such as ___ in Windows Explorer
11. A computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. What are the five methods a computer user can use to prevent his/her computer from being infected with viruses?
12. The computer will be of no use unless it is able to communicate with the User. What are the five input devices a computer can use to bring information INTO the computer?
13. Indexes are used to quickly locate data without having to search every row in a database table every time a database table is accessed. What are the five types of indexing a data analyst can use to quickly locate data in a database?
14. What are five functions of Operating System in computer System?
15. Network configuration is the process of setting a network's control, flow and operation to support the network communication of an organization. What are the five types of network configurations that are available for an Organization?
16. A toolbar as used with desktop publishers (DTP) is a collection of controls (buttons, Icons and other links) assembled as a group on the ribbon or a window pane on the working area that helps the computer user to insert text, graphics and other links to the working area. Which are the six types of toolbar for DTP package?
17. How would you define the following terms as used in Understanding the Basic Concepts of ICT? i) Technology ii) Information and Communication Technology Literacy or ICT Literacy iii) Educational technology iv) Digital learning
18. Computing machines can be classified in many ways and these classifications depend on their functions and definitions. What are the five classifications of computers based on their capacity?
19. Innovations in information technology is impacting various fields of society and policy makers are acting on issues involving economic productivity, privacy protection, and affordability of and access to information. How has ICT impacted the following areas of society? i) Education. ii) Workplace
20. The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection. Based on a recent survey of Internet traffic, internet is widely being used in Education institutions, cyber, homes and almost all organizations that have automated their operations. What are the ten (10) uses of in
21. An operating system (OS) is software that starts up a computer and keeps it running and responding to your commands. What are the six (6) essential commands every Windows user must know?
22. Database security refers to the various measures organizations take to ensure their databases are protected from internal and external threats. Database security includes protecting the database itself, the data it contains, its database management system, and the various applications that access it. What are the seven (7) Database Security Best practices that an organization must perform to
23. In Publisher, you have different options for importing text into a publication. The option that you choose depends on how much text you want to import and what you want to do with the text after it is imported. How would you import the following texts into a publication? (5mrks) i. Import a selected text or a chart from a document created in another program. ii. Convert a Microsoft office word
24. Hacking is the gaining of unauthorized access to data in a system or computer. It is a major threat to any business that has automated its operations. Businesses and government corporations are losing a lot of money on a daily basis to hackers. What are the seven measures you should undertake to prevent hacking of your online account, phone, tablet or personal computer?
25. A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. What are the three (3) types of computer networks that might be useful in workplace?


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com