Midterm Examination 1a
Midterm Examination 1a
11. Which of the following is a way in which ICT a. Universal Automatic Calculator
allows people to participate in a wider, even b. Universal Native Input Automatic
worldwide, society? computer
c. Universal Native Input Automatic
a. Encryption methods can keep data safe
calculator
from unauthorized people, both while it is
d. Universal Automatic Computer
being stored or while it is being sent
electronically. 18. ENIAC stands for __________.
b. ICT allows people to access teaching
a. Electronic Numerical Integrator And
materials from all over the world.
Computer
c. ICT facilitates the ability to perform
b. Electronic Numerical Integrator And
'impossible' experiments' by using
Calculator
simulations.
c. Electronic Numerical Integrator Automatic
d. ICT creates new more interesting jobs.
Computer
12. What is one of the benefits of the internet in d. Electronic Numerical Integrator Automatic
communication? Calculator
a. The ability to communicate with anyone in 19. John Mauchly and J. Presper Eckert are the
the world inventors of __________ computer.
b. The ability to maintain privacy
a. UNIAC
c. The ability to avoid in-person interactions
b. ENIAC
d. The ability to be interrupted easily
c. EDSAC
13. What was the name of first computer d. Mark 1
designed by Charles Babbage?
20. Who invented the punch card?
a. Analytical Engine
a. Charles Babbage
b. Difference Engine
b. Semyon Korsakov
c. Colossus
c. Herman Hollerith
d. ENIAC
d. Joseph Marie Jacquard
14. Which was the first electronics digital
21. In the late __________, Herman Hollerith
programmable computing device?
invented data storage on punched cards
a. Analytical Engine
that could then be read by a machine.
b. Difference Engine
c. Colossus a. 1860
d. ENIAC b. 1900
c. 1890
15. EDVAC stands for __________.
d. 1880
a. Electronic Discrete Variable Automatic
22. Which electronic components are used in First
Calculator
Generation Computers?
b. Electronic Discrete Variable Automatic
Computer a. Transistors
c. Electronic Data Variable Automatic b. Integrated Circuits
Calculator c. Vacuum Tubes
d. Electronic Data Variable Automatic d. Microprocessor
Computer
23. Which electronic components are used in
16. Which was the first commercial computer? Second Generation Computers?
a. Mark 1 a. Transistors
b. Analytical Engine b. Integrated Circuits
c. Difference Engine c. Vacuum Tubes
d. Colossus d. Microprocessor
17. UNIVAC stands for __________.
3
24. Which electronic components are used in 30. Which of the following is a type of online fraud
Third Generation Computers? that involves the mass distribution of unsolicited
messages, advertising, or pornography to easily
a. Transistors
found internet addresses?
b. Integrated Circuits
c. Vacuum Tubes a. Malware
d. Microprocessor c. Trojan Horse
d. Worm
25. What is considered a best practice for
e. Spam
effective and efficient communication in college
and business environments? 31. It is one of the more common methods of both
sending information out and collecting it from
a. Using slang, acronyms, and text talk unsuspecting people.
b. Screaming in typed messages
c. Proofreading your messages before a. Spyware c. Adware
sending them b. Spam d. Malware
d. Sharing information online without consent 32. It is a set of rules for behaving properly online.
26. Why is proofreading your messages before a. Netiquette c. Computer Ethics
sending them a best practice? b. Computer Literacy d. Netizen
a. It is distracting and generally frowned 33. A type of malware that restricts access to your
upon in professional environments. computer or your files and displays a message
b. It is a way to draw emphasis to selected that demands payment for the restriction to be
words or phrases. removed.
c. It can lead to spelling and grammar errors. a. Spyware c. Adware
d. It is a way to make your communications b. Ransomware d. Malware
concise and free of any errors.
34. A means to point you to a malicious and
27. What can happen if you share information illegitimate website by redirecting the legitimate
online without consent? URL.
a. Your messages can be read by the public. a. Pharming c. Phishing
b. You may never know who might read or b. Spyware d. Spam
share what you post. 35. _______ are common threat to computer and
c. You may be sued for violating someone's the internet as a whole.
privacy.
d. Your messages will be automatically a. Viruses c. Worms
deleted after a certain time. b. Spam d. Spywares
28. What is a good practice when posting to 36. Action taken by someone to gain
unauthorized access to a computer.
discussion boards and social media sites?
a. Pharming c. Hacking
a. Always ask the post's author for
b. Cybersex d. Cyberbullying
permission before sharing it with others.
b. Use slang, acronyms, and text talk in your 37. Which the following statements is true about
posts. Web 1.0?
c. Share information online without gaining a. It provides a framework that allows data to
the consent of all involved participants. be shared and reuse to deliver web
d. Use all capital letters in your typed content specifically targeting the user.
messages.
b. Changing the web into a language that
29. Which of the following is a type of malware can be read and categorized by the
that can prevent you from accessing your system rather than humans
computer?
c. It is an old internet that only allows people
a. Pharming c. Phishing to read from the internet.
b. Ransomware d. Spam
4