0% found this document useful (0 votes)
40 views

Midterm Examination 1a

The document is a midterm examination for a course on living in the information era. It consists of 30 multiple choice questions that assess understanding of topics like: 1) The impacts of information and communication technology (ICT), both positive like increased social interaction and job opportunities, and negative like job loss and reduced personal interaction. 2) Examples of how ICT has changed jobs and daily life, through automation, outsourcing, social media use, and more. 3) Online privacy and security issues like identity theft, scams, strong passwords, and encryption. 4) The history of computers and pioneering figures like Babbage, Hollerith, Mauchly, and Eckert.

Uploaded by

Edson Louis Para
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Midterm Examination 1a

The document is a midterm examination for a course on living in the information era. It consists of 30 multiple choice questions that assess understanding of topics like: 1) The impacts of information and communication technology (ICT), both positive like increased social interaction and job opportunities, and negative like job loss and reduced personal interaction. 2) Examples of how ICT has changed jobs and daily life, through automation, outsourcing, social media use, and more. 3) Online privacy and security issues like identity theft, scams, strong passwords, and encryption. 4) The history of computers and pioneering figures like Babbage, Hollerith, Mauchly, and Eckert.

Uploaded by

Edson Louis Para
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1

MIDTERM EXAMINATION c. Use a VPN


Living In the It Era d. Share personal information with strangers
online
INSTRUCTIONS: Read each statement carefully
and shade the letter of the correct answer on the 6. What is the most common reason for online
answer sheet provided. identity theft?
1. What are the negative impacts of Information a. Using the same password for multiple
and Communication Technology (ICT)? accounts
b. Clicking on suspicious links in emails
a. Increased social interaction and physical
c. Sharing personal information on social
activity
media
b. Job loss and reduced personal interaction
d. All of the above
c. Improved health and cost-effectiveness
d. Competition and job export 7. What is the best way to avoid online scams?
2. Which of the following is an example of job loss a. Be cautious of unsolicited emails and
caused by ICT? phone calls
b. Use strong passwords and two-factor
a. A worker on a supermarket checkout
authentication
using a bar-code scanner to detect goods
c. Trust strangers online without verifying
b. A data processor working for a company
their identity
that outsources work to other countries
d. All of the above
c. An assembly line worker being replaced
by a robot 8. What is one of the primary benefits of the
d. A manual worker being replaced by a internet in terms of job opportunities?
worker who can do the same amount of
work in less time a. Access to job postings
b. The ability to network with potential
3. Which of the following is an example of employers
reduced personal interaction caused by ICT? c. The ability to automate tasks
d. The ability to work remotely
a. A person using social media to connect
with others 9. What is one way in which ICT can improve
b. A person using a chatbot to get customer security?
support
c. A person using a virtual assistant to a. Encryption methods can keep data safe
schedule appointments from unauthorized people, both while it is
d. A person using a self-service kiosk to being stored or while it is being sent
check in for a flight electronically.
b. ICT allows people to participate in a wider,
4. Which of the following is an example of even worldwide, society.
reduced physical activity caused by ICT? c. ICT facilitates the ability to perform
'impossible' experiments' by using
a. A person using a treadmill desk to work
simulations.
while walking
d. ICT creates new more interesting jobs.
b. A person using a virtual reality headset to
play a game 10. Which of the following is NOT a benefit of
c. A person using a video conferencing tool ICT?
to attend a meeting
d. A person using a smartwatch to track their a. ICT allows people to participate in a wider,
daily activity even worldwide, society.
b. ICT solves or reduces some security
5. What is the best way to protect your online problems
privacy? c. ICT facilitates the ability to perform
'impossible' experiments' by using
a. Use strong passwords and two-factor
simulations.
authentication
d. ICT creates new more interesting jobs.
b. Avoid using social media
2

11. Which of the following is a way in which ICT a. Universal Automatic Calculator
allows people to participate in a wider, even b. Universal Native Input Automatic
worldwide, society? computer
c. Universal Native Input Automatic
a. Encryption methods can keep data safe
calculator
from unauthorized people, both while it is
d. Universal Automatic Computer
being stored or while it is being sent
electronically. 18. ENIAC stands for __________.
b. ICT allows people to access teaching
a. Electronic Numerical Integrator And
materials from all over the world.
Computer
c. ICT facilitates the ability to perform
b. Electronic Numerical Integrator And
'impossible' experiments' by using
Calculator
simulations.
c. Electronic Numerical Integrator Automatic
d. ICT creates new more interesting jobs.
Computer
12. What is one of the benefits of the internet in d. Electronic Numerical Integrator Automatic
communication? Calculator
a. The ability to communicate with anyone in 19. John Mauchly and J. Presper Eckert are the
the world inventors of __________ computer.
b. The ability to maintain privacy
a. UNIAC
c. The ability to avoid in-person interactions
b. ENIAC
d. The ability to be interrupted easily
c. EDSAC
13. What was the name of first computer d. Mark 1
designed by Charles Babbage?
20. Who invented the punch card?
a. Analytical Engine
a. Charles Babbage
b. Difference Engine
b. Semyon Korsakov
c. Colossus
c. Herman Hollerith
d. ENIAC
d. Joseph Marie Jacquard
14. Which was the first electronics digital
21. In the late __________, Herman Hollerith
programmable computing device?
invented data storage on punched cards
a. Analytical Engine
that could then be read by a machine.
b. Difference Engine
c. Colossus a. 1860
d. ENIAC b. 1900
c. 1890
15. EDVAC stands for __________.
d. 1880
a. Electronic Discrete Variable Automatic
22. Which electronic components are used in First
Calculator
Generation Computers?
b. Electronic Discrete Variable Automatic
Computer a. Transistors
c. Electronic Data Variable Automatic b. Integrated Circuits
Calculator c. Vacuum Tubes
d. Electronic Data Variable Automatic d. Microprocessor
Computer
23. Which electronic components are used in
16. Which was the first commercial computer? Second Generation Computers?
a. Mark 1 a. Transistors
b. Analytical Engine b. Integrated Circuits
c. Difference Engine c. Vacuum Tubes
d. Colossus d. Microprocessor
17. UNIVAC stands for __________.
3

24. Which electronic components are used in 30. Which of the following is a type of online fraud
Third Generation Computers? that involves the mass distribution of unsolicited
messages, advertising, or pornography to easily
a. Transistors
found internet addresses?
b. Integrated Circuits
c. Vacuum Tubes a. Malware
d. Microprocessor c. Trojan Horse
d. Worm
25. What is considered a best practice for
e. Spam
effective and efficient communication in college
and business environments? 31. It is one of the more common methods of both
sending information out and collecting it from
a. Using slang, acronyms, and text talk unsuspecting people.
b. Screaming in typed messages
c. Proofreading your messages before a. Spyware c. Adware
sending them b. Spam d. Malware
d. Sharing information online without consent 32. It is a set of rules for behaving properly online.
26. Why is proofreading your messages before a. Netiquette c. Computer Ethics
sending them a best practice? b. Computer Literacy d. Netizen
a. It is distracting and generally frowned 33. A type of malware that restricts access to your
upon in professional environments. computer or your files and displays a message
b. It is a way to draw emphasis to selected that demands payment for the restriction to be
words or phrases. removed.
c. It can lead to spelling and grammar errors. a. Spyware c. Adware
d. It is a way to make your communications b. Ransomware d. Malware
concise and free of any errors.
34. A means to point you to a malicious and
27. What can happen if you share information illegitimate website by redirecting the legitimate
online without consent? URL.
a. Your messages can be read by the public. a. Pharming c. Phishing
b. You may never know who might read or b. Spyware d. Spam
share what you post. 35. _______ are common threat to computer and
c. You may be sued for violating someone's the internet as a whole.
privacy.
d. Your messages will be automatically a. Viruses c. Worms
deleted after a certain time. b. Spam d. Spywares

28. What is a good practice when posting to 36. Action taken by someone to gain
unauthorized access to a computer.
discussion boards and social media sites?
a. Pharming c. Hacking
a. Always ask the post's author for
b. Cybersex d. Cyberbullying
permission before sharing it with others.
b. Use slang, acronyms, and text talk in your 37. Which the following statements is true about
posts. Web 1.0?
c. Share information online without gaining a. It provides a framework that allows data to
the consent of all involved participants. be shared and reuse to deliver web
d. Use all capital letters in your typed content specifically targeting the user.
messages.
b. Changing the web into a language that
29. Which of the following is a type of malware can be read and categorized by the
that can prevent you from accessing your system rather than humans
computer?
c. It is an old internet that only allows people
a. Pharming c. Phishing to read from the internet.
b. Ransomware d. Spam
4

d. Is focused on the ability for people to a. Wiki c. Blog


collaborate and share information online b. Social Network d. Video Sharing
via social media. Sites
38. The following are examples of web 1.0 46. An organization that provides services for
EXCEPT: accessing, using or participating in the internet.
a. HTML/Portals c. Directories a. IPS c. ISP
b. Page views d. Web Bots b. DNS d. IP Address
39. Any website that includes a shopping cart and 47. The following are disadvantages of Web 1.0
a way for you to provide credit card information to except:
make a purchase fall into this category.
a. Read only web
a. Business Website
b. Limited User Interaction
b. Media Website
c. Dividing the web into usable directories
c. Entertainment Website
d. Lack of Standards
d. eCommerce Website
48. Which of the following is not an example of
40. These websites have the primary goal of DNS?
either providing educational materials to visitors
or providing information on an educational a. www.facebook.com
institution to them. b. www.pup.edu.ph
a. Educational Website c.Learning Website c. www.academia.edu
b. TESDA d. SkillShare d. 192.168.1.1
41. Any website where various users are able to 49. A hardware device that acts as the traffic cop
collaborate on content and make their own for network signals arriving at your home or
tweaks and changes as they see fit. business from your ISP.
a. Web Portal c. eCommerce a. Byte
b. Wiki d. Personal Website b. Router
42. This type of website is simpler to build than a c. Internet Service Provider
business website and more focused on a
particular task: collecting work samples. d. Software Update
a. Brochure Website c. eCommerce 50. A term that applies to programs/applets
(macros and intelligent agents) used on the
b. Portfolio Website d. Personal Website Internet.
43. They often involve a login and personalized a. Web Bot c. Bit
views for different users that ensure the
information that’s accessible is most useful to b. Search Engines d. HTML
their particular needs.
Essay
a. Wiki c. Infopreneur Website
51-60. At the back of your answer sheet, write a
b. Web Portal d. Brochure Website short essay describing web form evolution, from
Web 1.0 to Web 3.0
44. The following are examples of video sharing
websites EXCEPT:
a. Youtube c. Facebook
b. Twitter d. Spotify
45. A discussion or informational website
published on the world wide web consisting of
discrete, often informal diary-style text entries
5

You might also like