You are on page 1of 2

Western Institute of Technology Final Examination Set A

Common Computer Subjects 2nd Semester SY 2019-2020__De


Department: _______________________________ Class Schedule: _______________
Comp1 (Living in the IT Era) Date: __________________________
Name: ______________________________________________ Instructor: ______________________
Year & Section: ________________________________________ Score: _________________________

I. Multiple Choice: Circle the letter of your answer (10pts)


1. Act of using someone intellectual property without consent 6. Considered as the brain of computer
A. Copyright infringement A. AI
B. Hacking B. ALU
C. Plagiarism C. CPU
D. Software piracy D. CU
2. Anyone who interacts or communicates with computer 7. Device that holds instruction or information for future use
A. Hardware A. Input
B. Software B. Output
C. System unit C. Storage
D. User D. System unit
3. Box-like case that contains the electronic components of 8. Etiquette guidelines when using the internet
computer A. Ethics
A. CPU B. Morals
B. Hard disk C. Netiquette
C. Monitors D. Rules
D. System unit 9. Hardware use to enter instruction or information to
4. Collection of data used for automated system computer
A. AI A. Input device
B. Database B. Output device
C. Information C. Storage device
D. Robotics D. System Unit
5. Complex machine capable of learning 10. Non-profit networking consortium in the US internet 2
A. AI A. Internet
B. ALU B. Internet 2
C. Automation C. Web sites
D. CPU D. World Wide Web

II. Classification (30pts)


A. Classify the following device. Write (A) Input, (B) Output or (C) for Storage in the space provided (15pts)
_____1. CD _____6. Hard disk _____11. Mouse
_____2. CRT _____7. Keyboard _____12. Printer
_____3. DVD _____8. LCD _____13. Scanner
_____4. Flash drive _____9. Microphone _____14. Speaker
_____5. Floppy disk _____10. Monitor _____15. Trackpad

B. Classify the following resources. Write (A) Physical or (B) Conceptual in the space provided (15pts)
_____1. Building _____6. Information _____11. Personnel
_____2. Business Name _____7. Inventory _____12. Plant
_____3. Employee _____8. Land _____13. Trade secrets
_____4. Equipment _____9. Machine _____14. Trademarks
_____5. Goodwill _____10. Money _____15. Vehicles

III. Simple Recall (15pts)


____________________________1 ACM
____________________________2 ATM
____________________________3 BSA
____________________________4 CAN
____________________________5 CPU
____________________________6 CSS
____________________________7 DNS
____________________________8 DRM
____________________________9 DVD
____________________________10 GAN
____________________________11 GUI
____________________________12 ICT
____________________________13 IDI
____________________________14 IOT
____________________________15 IPR

Page 1 of 2
Prepared by: Recommended by: Approved by:

Mr. Jocel C. Lagnason Mr. Anrem J. Balontong Engr. Ronnie M. Cabalum


Course Chair Head Dean
Name: ___________________________ Course: Comp1 Exam: Pre-final Examination
IV. Identification : Identify what is ask and write your answer in the space provided(20pts)
_____________________1 Assets that are tangible and easily identified
_____________________2 Automated assistant that helps you complete task by asking questions
_____________________3 Collection of related web pages
_____________________4 Device that have the capability to measure an event, object or any physical quantity
_____________________5 Distinct types of intangible assets of which exclusive rights are recognized
_____________________6 Distinctive sign used by company to identify products or services
_____________________7 Endpoint of communication in operating system
_____________________8 Hardware component that transmit information from one or more people
_____________________9 Hide sensitive information from authorized access
_____________________10 Host of application software installed in the
_____________________11 Implementation of IBM open cloud architecture base on open source platform
_____________________12 Knowledge obtain from reading, investigation, study or research
_____________________13 Malicious programs that initial appears to be useful
_____________________14 Non-tangible assets and valuable for what they represent
_____________________15 Period in human history characterized by the shift from traditional to IT based economy
_____________________16 Person who gain unauthorized access to data or computer system
_____________________17 Person who writes blog
_____________________18 Person who writes computer program
_____________________19 Process in which the information is exchange between individual in any means
_____________________20 Program designed to display advertisement

V. Enumeration (25pts)
A. Challenges of IoT (5)
Security
Development
Services
Connectivity
Power requirements

B. Computer networks (5)


PAN
MAN
LAN
CAN
WAN

C. Examples of Malware (5)


Virus
Trojan
Worm
Adware
Spyware

D. Examples of Sensor (5)


Temperature
Touch
Level
Gas
Ultrasonic

E. Google search tricks (5)


Use quotes for exact phrases
Use asterisk to specify unknown variables
Use minus to eliminate result containing certain word
Use versus
Use define:

Page 2 of 2
Prepared by: Recommended by: Approved by:

Mr. Jocel C. Lagnason Mr. Anrem J. Balontong Engr. Ronnie M. Cabalum


Course Chair Head Dean

You might also like