OFFERS! offer image Get Expert-crafted assignments
Save 51%

iCMA41 Assessment Questions 2026 | The Open University

Looking for Plagiarism-Free Answers for Your US, UK, Singapore, New Zealand, and Ireland College/University Assignments?

Talk to an Expert
Published: 31 Mar, 2026
Category Assignment Subject Education
University The Open University Module Title iCMA41 Assessment
Academic Year 2026

iCMA41 Assessment Questions 

Question 1

Tries remaining: 3 Marked out of 1.00

Which three of these statements about netiquette are correct?

Select one or more:

  • You must not continue posting to a forum thread if a moderator has asked you to stop.
  • People are always willing to work out what response you’re looking for, so you can include several comments on different topics in one long forum posting.
  • When posting to a forum, you should use a concise subject line and keep your messages concise.
  • Emotions can be easily misunderstood in forum messages when you can’t see body language.
  • Online behaviour known as 'lurking' is not acceptable in a forum.

Question 2

Tries remaining: 3 Marked out of 1.00

Here is a list of glossary definitions from Part 1. The glossary is available in the Resources section of the module website.

Select the correct term from the dropdown menu to match each definition.

A term referring to any created content that is not subject to copyright.

A range of technologies used by copyright owners to control how the content they produce is used.

Using the work of others to gain some form of benefit without formally acknowledging that the work came from someone else. 

A temporary fix to a bug or security problem in a particular piece of software (such as a web browser or an operating system).

Question 3

Tries remaining: 3 Marked out of 1.00

Which of these statements about Good Academic Practice (GAP) are false?

Select one or more:

  • I should give a reference to the source of any third-party material that I include in my own work.
  • I can use quotations from other people’s work sparingly, so long as I acknowledge the source.
  • I can use information from the Web without acknowledging its source.
  • Rewriting material in my own words in my assignments helps to show that I have understood it.
  • I can copy and paste chunks of text from TM111 into my assignments without giving a reference.

Question 4

Tries remaining: 3 Marked out of 1.00

Drag the correct term into the appropriate space.

1. In a ransomware attack, the user is prevented from accessing their computer, e.g. bylocking the computer screen or by blocking access to computer files until money is paid.

2. This type of malicious software can easily make copies of itself, and those copies can spread via an internet connection so that the worm can consume all of a computer’s processing resources in running itself.

3. Designed to spread quickly and easily from one computer to another via internet connections and removable storage devices, the virus attaches itself to other software on your computer and activates when that software is run.

4.It appears to be innocuous software, such as a screensaver, but a Trojan may be secretly causing damage, for example, by copying personal information, such as bank details.

5. These are all forms of malware.

Question 5

Tries remaining: 3 Marked out of 1.00

A random email generator is a computer program used to harvest people’s email addresses by combining common surnames with online email accounts. The general term for unsolicited emails or text messages sent to large numbers of people is spam. 

Messages called hoaxes are designed to mislead people, for example, by encouraging them to spread untrue information or to delete particular files on their computers, which may cause them to crash. A particular kind of message known as phishing aims to persuade users to disclose private information such as their credit card details and PIN. 

In spear phishing, clever tactics are used to target a specific individual or an organisation seeking access to sensitive informationusually for financial gain or to carry out espionage.

Question 6

Tries remaining: 3 Marked out of 1.00

Choose the correct term from the list to identify the technology.

An example of a first-generation programmable computer.colossus

The microprocessor in a fourth-generation personal computer contains this cpu.
The largest type of second generation computers mainframe.
Used as switches in third generation computersic.
Used as switches in second generation computerstransistor.

Question 7

Tries remaining: 3 Marked out of 1.00

Match the prefix and the abbreviation to the power of 10.

iCMA41

Question 8

Tries remaining: 3 Marked out of 1.00

Convert the following binary numbers to their decimal equivalents.

Drop and drag the answers in the correct places:

iCMA41 Assessment

Question 9

Tries remaining: 3 Marked out of 1.00

Convert the decimal number 215 to a binary number.

Drag either 0 or 1 into the table below: 128 64 16 4 2 1

Question 10

Tries remaining: 3 Marked out of 1.00

A storage device has a memory capacity of 9 megabytes (MB)

(a) How many bytes of data can be stored on this device?

Answer 1: 9437184 bytes

(b) How many bits of data is this?

Answer 2 75497472 bits 

Note: You should not use scientific notation in your answers to this question. Your answers should not include spaces, commas or full-stops.

Question 11

Tries remaining: 3 Marked out of 1.00

Drag and drop the correct terms into the text

Computers are designed to perform one or more specialised tasks as part of another device that might contain electrical and mechanical components. A form of computing that allows transmission of data, voice and video wirelessly across communication networks using a portable device is known as Mobile computing. An area of computer science that is interested in the development and implementation of computer technologies when they have been integrated into everyday objects and environments is called ubiquitous computing.

In cloud computing, networked remote computers are used to process and store data and run applications.

A form of ubiquitous computing, calm computing, involves technology that supports our daily activities but is more or less imperceptible.

Question 12 

Tries remaining: 3 Marked out of 1.00

This question relates to the Assessment guide for TM111.

(a)The University requires that you submit the written part of your assignments in a certain file format.

What is this format?

  • a PDF format
  • a Microsoft Word compatible file, that is a .doc or .docx or .rtf file
  • any word processor file. Choose 1 option only.

(b) To pass TM111, you need to achieve a weighted average score of 40% or more across all your assessments, and you must also achieve a threshold or minimum score on TMA03.

What is the threshold or minimum score that you must achieve on TMA03 to pass TM111?

Answer 2: Enter numbers only into the box. at least 30%

Order Custom Answer for iCMA41 Assessment 

Order Non-Plagiarised Assignment

Need expert help with your iCMA41 Assessment? We provide AI-free and plagiarism-free Assignment Help. Our team of professional writers delivers top-quality assignments that are original and crafted without AI tools, ensuring the highest academic standards. We also offer a free list of assignment samples answers, written by experts, to guide your work. Get your assignment checked with an AI and plagiarism report for complete peace of mind. Contact us today for reliable, expert assignment help UK and boost your grades!

Workingment Unique Features

Hire Assignment Helper Today!


Latest Free Samples for University Students

QUALIFI L5 BUS503 Business Development Assignment

Category: Assignment

Subject: Business Management

University: Qualifi

Module Title: BUS503- Business Development

View Free Samples

CII M92 – Insurance business and finance Coursework Assignment Answers

Category: CII Assignments

Subject: business

University: _______

Module Title: CII M92 – Insurance business and finance

View Free Samples

ECE5004 Professional Practicum 1: Early Childhood Education and Care Practicum Report Sample

Category: Assignment

Subject: Healthcare

University: New Zealand School of Education

Module Title: ECE5004 Professional Practicum 1: Early Childhood Education and Care

View Free Samples

BSBWHS414 Contribute to WHS Risk Management Assessment Answers Solution PDF

Category: Assignment

Subject: Management

University: _____

Module Title: BSBWHS414 Contribute to WHS Risk Management

View Free Samples

BSBWHS413 – Contribute to the implementation and maintenance of WHS consultation and participation processes Assessment Answer

Category: Assignment

Subject: Management

University: ________

Module Title: BSBWHS413 – Contribute to the implementation and maintenance of WHS consultation and participation processes

View Free Samples
Online Assignment Help in UK