Está en la página 1de 10

SRI LANKA INSTITUTE of ADVANCED TECHNOLOGICAL

EDUCATION

Electrical and Electronic


Engineering
Instructor Manual
Training
Unit

Test Unit

Information Technology 1
Theory

No: EE 120

Test Unit
Information Technology 1
Theoretical Part
No.: EE 120

Edition:

2009
All Rights Reserved

Editor:

MCE Industrietechnik Linz GmbH & Co


Education and Training Systems, DM-1
Lunzerstrasse 64 P.O.Box 36, A 4031 Linz / Austria
Tel. (+ 43 / 732) 6987 3475
Fax (+ 43 / 732) 6980 4271
Website: www.mcelinz.com

EE 120
Information Technology 1

Theoretical Test

Information Technology 1
TEST 1

1. Name the four categories in which the Computers are divided.

2. Describe the difference between hardware and software.

3. What is the function of the CPU?

4. What is the big board located at the base of the computer (to which everything is
plugged into) called and what does it hold?

5. What is the function of a modem?

6. Name 5 Output Devices.

7. What is a database and what are database programs commonly used for?

8. Describe the meaning of Ergonomic.

Information Technology 1
TEST 2

1.

Name 10 examples of Database Management Systems.

2.

What is the most recognized and used hierarchical database?

3.

Name 5 well-kwon Network Databases

4.

Name the first who proposed and formulated the relational model for Database
Management

5.

What does an operating system do?

6.

Name 5 Operating Systems

7.

Describe the Task Management

8.

What is a network and what are some of the advantages of using a network?

9.

What is a client/server network?

10.

What are the two security standards that specify the way that data is encrypted
on a wireless network and which one is more secure?

Information Technology 1
TEST 1 Solution

1.

Computers are divided into four categories by size, cost, and processing ability.
They are supercomputer, mainframe, minicomputer, and microcomputer, more
commonly known as a personal computer. Personal computer categories
include desktop, network, laptop, and handheld.

2.

Computer hardware is those parts of the computer that you can actually see
and touch (eg. CPU, mouse, printer, monitor, etc). Software is a set of
electronic instructions that tell a computer what to do. You cannot see or touch
the software but you can see and touch the packaging the software comes in

3.

The CPU processes instructions, performs calculations and manages the flow
of information through a computer system, i.e. it communicates with input,
output and storage devices to perform certain tasks.

4.

The really big board located at the base of the computer (to which everything is
plugged into) is called the motherboard, because it carries the microprocessor
and memory chips, as well as other internal components that enable the
system to function. A motherboard is the main circuit board of the computer. All
electrical components plug into the motherboard.

5.

A modem allows a computer to send and receive information through a


telephone line. A modem translates computer information into a form that can
transmit over telephone lines.
A modem also translates the information it receives into a form a computer can
understand. We can distinguish between two types of modems, internal and
external.

6.

Monitors, Printers, Speakers, Head phones and Web Cameras

7.

A database stores and manages a collection of information related to a


particular subject or purpose. A database program helps to manage large
collections of information and commonly used to manage mailing lists, phone
directions, product listings and payroll information.
Commonly used database programs include Microsoft Access, Corel Paradox
and FileMakerPro.

8.

Ergonomics is the science of fitting the job to the worker and adapting the work
environment to the needs of humans. An overall goal of ergonomics is to
promote health and safety and to optimize productivity.

Information Technology 1
TEST 2 Solution

1.

Adabas, Adapter Sever Enterprise, Alpha Five, Coputhink`s View Wise, CSQL,
Daffodil DB, Data Ease, File Maker, Firebird, Glom, IBM DB2, IBM UniVerse,
Ingres, Informix, Microsoft Visual Fox Pro, MonetDB, MySQL, Open Link
Virtuoso, Open Office Org.Base, Oracle Database, Par Accel, PostgreSQL,
Progress, SQL Anywhere, SQLite, Teradata, Unisys OS 2200 databases, Kexi,
WX2, Mark Logic, Microsoft Access, Microsoft SQL Server

2.

IMS from IBM

3.

Digital Equipment Corporation DBMS-10, Digital Equipment Corporation


DBMS-20, Digital Equipment Corporation VAX DBMS, Honeywell IDS
(Integrated Data Store), IDMS (Integrated Database Management System),
Oracle CODASYL DBMS, Raima Data Manager (RDM) Embedded, RDM
Server, Turbo Image, Univac DMS-1100

4.

E.F.Codd in 1969

5.

An operating system is what controls and coordinates the use of the computer
hardware among the application programs, or software, for the user. Without
an operating system, complex computers would be a useless heap of metal.

6.

MS-DOS, Windows 3.1, Windows 95/98/Me, Windows NT, Windows 2000,


Windows XP, Unix, Linux, Mac OS X

7.

Task management is the process of managing a task (or task portfolio) through
its life cycle including planning, testing, tracking and reporting

8.

A network is a group of connected computers that allow people to share


information and equipment. Computers connected to a network can share
equipment such as a printer, file server or scanner. Sharing equipment allows

companies to save money since several people on the network can use the
same equipment. It also allows you to easily share information with other
people which is especially useful when working together on a project and there
is a need to access the same files and this improves efficiency.

9.

A client/server network provides a highly efficient way to connect computers


and is ideal for larger companies and when sharing large amounts of
information between computers. All the files on a client/server network are
stored on the server, which makes the files easy to manage, back up and
protect. A client/server network can connect computers using the same or
different operating systems such as Windows XP and Mac OS

10.

To help protect data transmitted on a wireless network, there are two security
standards that specify the way that data is encrypted when transmitted over a
network: 1) Wired Equivalent Privacy (WEP) and 2) Wireless Protected Access
(WPA). WPA offers much more security than WEP.

KEY TO EVALUATION

PER CENT

MARK

88 100

75 87

62 74

50 61

0 49

10

También podría gustarte