You are on page 1of 5

REVISION FE IMF202

INFORMATION TECHNOLOGY FOR BUSINESS (IMF202)

FINAL EXAMINATION REVISION CHAPTER 5 TO 9

REVISION CHAPTER 5: SYSTEM SOFTWARE

1. System software consists of the programs that control or maintain the operations of the
computer. Identify and explain 2 types of system software.
2. Describe 12 functions or activities of an operating system.
3. Give 5 examples of server operating systems.
4. Give 5 examples of embedded operating systems.
5. What is utility program? Discuss 10 functions of utility program.
6. One of the operating system functions is to start and shut down a computer. Define the term
booting and explain 2 types of booting.
7. Filters are programs that remove or block certain items from being displayed. Name 4 Internet
filter programs.

REVISION CHAPTER 6: APPLICATION SOFTWARE

1. What are 4 categories of application software?


2. What are 7 forms through which software is available?
3. How do operating system and utility programs work with application software?
4. What are the key features of widely used business programs?
5. Application software is available in a variety of forms. Differentiate between Shareware and
Freeware and give 1 example for each form.
6. Word processing software allows users to create and manipulate documents. Identify 18
features of word processing software.
7. One of the main reasons people use computers is to communicate and share information with
others. Give 4 examples of application software for communication.

1
REVISION FE IMF202

REVISION CHAPTER 7: INTERNET & WEB

1. Define the following terms:


a. Internet
b. Domain name
c. Web server
d. IP address
e. DNS server
2. List down 13 types of websites that can be found in World Wide Web. Give one example of
website for each types.
3. Internet is a global computer network provide a variety of information and communication
facilities, consisting of interconnected networks using standardized communication protocols.
Describe 5 services you can find from the Internet.
4. Discuss how web pages use graphics, animation, audio, video, virtual reality, and plug-ins.
5. Briefly explain the following Internet Services:
a. File Transfer Protocol (FTP)
b. Instant Messaging (IM)
c. Voice over IP (VoIP)
6. Explain 5 criteria for evaluating a web site’s content and accuracy.
7. List down 10 netiquette rules that should follows by all social network users.
8. What is e-commerce? Briefly explain the 3 types of e-commerce.
9. List down step in using search engine to search information.

2
REVISION FE IMF202

REVISION CHAPTER 8: COMMUNICTION & NETWORK

1. Define the following terms:


a. Internet
b. Extranet
c. Firewall
2. Explain the 5 components in data communication system.
3. List down 3 types of transmission media normally used in communication channel.
Differentiate those 3 types.
4. Topology is the physical layout of network. Explain a d draw the following network topology:
a. Bus topology
b. Star topology
c. Ring topology
5. What are various wireless Transmission Media? Briefly explain each type.
6. What are the advantages of using network and how are LANs, MANs, and WANs different?

3
REVISION FE IMF202

REVISION CHAPTER 9: PRIVACY, SECURITY AND ETHICS

1. Define the following categories of perpetrators:


a. Hacker
b. Cracker
c. Script kiddie
d. Corporate spies
e. Unethical employees
f. Cyberextortionist
g. Cyberterrorist
2. Complete the following table with information about types of security risks.
Type of Security Risks Description of Risks Safeguard
Internet & Network
Attacks
Unauthorized access and
use
Hardware Theft &
Vandalism
Software Theft

Information Theft

System Failure

4
REVISION FE IMF202

3. Match the following cases with the types of cybercrime or issues given below:

Honeypots Cyberterrorist Firewalls Adware Ethics

Virtual Private
Encryption Intellectual property Malware Password
Network

a. CASE A
Hardware and software that protects a network’s resources from intrusion by users on
another network such as the internet.
b. CASE B
It is a vulnerable computer that is set up to attract an intruder to break into it.
c. CASE C
Dina is surfing her a website, searching for some information and suddenly a pop-up
window appears promoting an online advertisement.
d. CASE D
Two commonly cited examples include the recipes for Coca Cola and for the KFC “original
recipe”.
e. CASE E
The standards that determine whether an action is good or bad.
4. Viruses attack computers in a variety of ways. Define 3 common signs of virus infection and
give 3 examples of popular antivirus.
5. List down 5 health risks related to technology or computer usage.
6. What are issues related to Green Computing?
7. What are issues surrounding Information Privacy?

You might also like