You are on page 1of 240

Question 1

Complete
Mark 1.00 out of 1.00

Flag question

Question text

The term portability refers to

Select one:
a. The amount of data that you can transfer to your computer
b. the speed of the device
c. How easy to carry / transport your computer
d. how shiny the device is

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is the process of copying and archiving the computer data so that it may be used to
restore its original data after a data loss event.

Select one:
a. Software Update
b. Defragmentation
c. Back-up
d. Disk Cleanup

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.

It is the first DRAM chip of the Intel


Company

1970
Answer:

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.

Question 5
Complete
Mark 1.00 out of 1.00

Flag question
Question text

Choose True if the Statement is True and False if the statement is False.

Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and accessible
from a public cloud storage provider.

Select one:
True
False

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Aspect Ratio is the distance between each pixel

Select one:
True
False

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.


Select one:
a. System Software
b. Application Software

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Application
Answer Layer serves as the window for users and applications process to access
the network services.

Question 9
Complete
Mark 1.00 out of 1.00

Remove flag

Question text

It is a category of Application Software that provide common capabilities needed to support


enterprise software systems.
Select one:
a. Field Names
b. Objects
c. Record
d. Normalization

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that simulates physical or abstract system for


research, training or entertainment purposes.

Select one:
a. Product Engineering Software
b. Enterprise Infrastructure Software
c. Simulation Software
d. Media Development Software
Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Honey Pot is a software application that scans your whole computer’s hard drives and
folders for possible malware or virus infections.

Select one:
True
False

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.

Select one:
a. Ransomware
b. Driver
c. Adware
d. Patch

Question 15
Complete
Mark 1.00 out of 1.00

Flag question

Question text

This port can be used to network and to connect to the Internet.

Select one:
a.
Ethernet Port
b.
Power Button
c.
USB Port
d.
Serial Port

Question 16
Complete
Mark 1.00 out of 1.00

Remove flag

Question text

It is the data type used by Oracle Databases.

Select one:
a. Memo Data Type
b. String Data Type
c. Text Data Type
d. CLOB Data Type

Question 17
Complete
Mark 1.00 out of 1.00

Remove flag

Question text

Which of the following is the reason to Denormalize a Table?

Select one:
a. Prevent Data Anomalies
b. Remove redundant information
c. Add additional related tables
d. Performance

Question 18
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What is software?

Select one:
a. the video card on the monitor
b. any collection of instructions telling the hardware what to do
c. the operating system
d. the monitor and computer case

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
Blue
Windows 8.1 (codename:Answer ) is an upgrade for Windows 8, a version of
Windows NT, a computer operating system released by Microsoft.

Question 20
Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.

Select one:
a. Keyboard
b. Monitor
c. Mouse
d. Computer Case

Question 21
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Why is it that computers use binary to read memory data?

Select one:
a. It's all they understand
b. It's quicker
c. Computers are made up of electronic switches
d. Computers only read 1's and 0's because it's all they can do

Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a model that provides end-to-end connectivity specifying how data should be


packetized, addressed, transmitted, routed and received at the destination. This model is
maintained by the IETF.

Select one:
a. OSI Model
b. Peer-to-Peer Model
c. Client-Server Model
d. TCP/IP Model

Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a server that translates the public IP Address into Domain Names

Select one:
a. DHCP Server
b. DNS Server
c. Router
d. Firewall

Question 24
Complete
Mark 1.00 out of 1.00
Flag question

Question text

What type of computers in a client-server system are client computers (most of the time).

Select one:
a.
Mainframe
b.
PDA
c.
Microcomputer
d.
Minicomputer

Question 25
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Serial Advanced Technology Attachment (SATA) Hard Disk is a standard electronic


interface used between a computer motherboard’s data paths or bus and the computer’s
disk storage devices.

Select one:
True
False
Question 26
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:
a. Application Software
b. System Software

Question 27
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Blackcomb
Windows 7 (codename:Answer ) is a personal computer operating system and
was released to manufacturing on July 22, 2009.

Question 28
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.

Select one:
True
False

Question 29
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Raw data are the unprocessed facts including text, numbers, images and sounds.

Select one:
True
False

Question 30
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Is a meta-network and constantly changing collection of thousands of individual networks


intercommunicating with a common protocol?

Select one:
a. Architecture
b. Connectivity
c. Protocol
d. Standards

Question 31
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.

Select one:
True
False

Question 32
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component

Question 33
Complete
Mark 1.00 out of 1.00

Remove flag

Question text

It is a graphical representation of the elements that make up the overall database design.

Select one:
a. Pie Chart
b. Data Model
c. Fishbone Diagram
d. Flow Chart

Question 34
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:
a. Application Software
b. System Software

Question 35
Complete
Mark 1.00 out of 1.00

Remove flag

Question text

Which of the following is not a Relational Database Management System?

Select one:
a. Oracle
b. PostgreSQL
c. MySQL
d. Python

Question 36
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

data link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.

Question 37
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.

Select one:
True
False

Question 38
Complete
Mark 1.00 out of 1.00

Remove flag
Question text

It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.

Select one:
a. Records
b. Data
c. Information
d. Database

Question 39
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Hardware are the equipment used to process the data and create useful information.

Select one:
True
False

Question 40
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Firewall is the process of converting a data or information into another form also known as
cipher text.

Select one:
True
False

Question 41
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that run applications for amusement, leisure, or as a


diversion.

Select one:
a. Content Access Software
b. Entertainment Software
c. Educational Software
d. Information Worker Software

Question 42
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Computing has 4 steps, they are:


Select one:
a.
prophase, metaphase, anaphase, telophase
b.
input, process, output, store
c.
state hypothesis, collect data, test, and conclude
d.
science, technology, engineering, math

Question 44
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

Designs the Punch Card System

1890
Answer:

Question 45
Complete
Mark 1.00 out of 1.00

Flag question
Question text

Security software is designed to protect computers from the variety of viruses and
unwanted intrusions

Select one:
True
False

Question 46
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Whistler
Windows XP (codename:Answer ) is a personal computer operating system
produced by Microsoft as part of the Windows NT Family of operating system.

Question 47
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What is Random Access Memory (RAM)

Select one:
a. Needs turning on of the computer to maintain data
b. All of the given
c. Memory available to use while the computer is running for the operating system,
programs, and processes.
d. The data is not written permanently in RAM (volatile memory)

Question 48
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Massachusetts Institute of Technology in 1960’s had a time sharing operating system they
MULTICS
calledAnswer .

Question 49
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.

Select one:
True
False

Question 50
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

American National Standards Institute


ANSI stands forAnswer .

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Expansion Slots is a mechanical components that provides mechanical and electrical


connections between a microprocessor and a printed circuit board (PCB).
Select one:

True

False

Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Netw ork
Answer Layer controls the operations of the subnet, deciding which physical path
the data takes.

Question 4
Complete

Mark 1.00 out of 1.00


Flag question

Question text

This is the most important program that runs on a computer


Select one:

a. Device Drivers

b. None of the Choices

c. Operating System

d. System Utility Software

Question 5
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:

a. Content Access Software

b. Information Worker Software

c. Entertainment Software

d. Educational Software
Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the way to arrange or configure a network.


Select one:

a. Local Area Network

b. Local Area Network

c. TCP/IP Model

d. Network Topology

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:

True
False

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:

True

False

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:

a. Enterprise Infrastructure Software


b. Product Engineering Software

c. Mobile Applications

d. Media Development Software

Question 11
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

Which of the following is the best example of a diagramming software?


Select one:

a. MS Paint

b. Microsoft Visio

c. Microsoft Word

d. Notepad++

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False
Information is the result of processing a raw data.
Select one:

True

False

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Session
Answer Layer allows session establishment between processes running on
different stations

Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:

a. Pharming
b. Malware

c. Phishing

d. Spyware

Question 17
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

What shape shows the representation of Table or Entity?


Select one:

a. Oval

b. Rectangle

c. Circle

d. Cylinder

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
It is used by the first IBM personal computer
as the Operating System

1981
Answer:

Question 19
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a combination of hardware and software, which enables information sharing between


computer devices.

Select one:

a. network

b. digital device

c. expansion board

d. peripheral

Question 20
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Which three components are most important in Gaming computer when it comes to
performance?

Select one:

a. Hard Disk Drive, BIOS, Monitor

b. Motherboard, USB Socket,

c. RAM, Hard Disk Drive, CPU

d. CPU, RAM, Graphics Card

Question 22
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. System Software
b. Application Software

Question 23
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The tem 'read/write time' refer to what?


Select one:

a. The amount of data you want to store on your computer

b. How long does one reasonably expect the storage media to last

c. How long it takes to read or write data to your computer

d. How long it takes a person to read/write a word document

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
One of the developer of the
ENIAC

1944
Answer:

Question 25
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Bell Labs
The use of UNIX spread around the country and initiallyAnswer gave it away free.

Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Processor is the heart and brain of the computer because without this computer cannot do
anything.
Select one:

True

False

Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a hacking activity wherein hackers make use of e-mail or other method to get secure
data from a person such as bank account number, username and password, security PIN
and or even credit card number.
Select one:

a. Malware

b. Spyware

c. Phishing

d. Pharming

Question 28
Complete

Mark 1.00 out of 1.00

Flag question
Question text

To increase the performance of my computer, I should add _______________.

Select one:

a. add more RAM

b. add more ROM

c. a faster battery

d. add a bigger hard drive

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the term used to describe an individual’s anonymity and how safe they feel in a website
location.
Select one:

a. Defragmentation

b. Disk Cleanup

c. Computer Privacy

d. Software Update

Question 30
Complete

Mark 1.00 out of 1.00


Remove flag

Question text

A system of tools that package up all three components into a single application so that we
can develop within.
Select one:

a. Database Management System

b. Management Information System

c. Spreadsheets

d. Record Management System

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a distributed communication framework of network process among service requestors,


clients and service providers.
Select one:

a. Client-Server Model

b. Peer-to-Peer Model

c. Business-to-Business Model

d. Machine-to-Machine Model
Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a software package that automatically renders advertisements in order to generate


revenue for its authors.
Select one:

a. Adware

b. Driver

c. Patch

d. Ransomware

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is used in developing hardware and software


products.
Select one:

a. Enterprise Infrastructure Software

b. Simulation Software
c. Product Engineering Software

d. Media Development Software

Question 34
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 35
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:

a. TCP/IP Model
b. Client-Server Model

c. Peer-to-Peer Model

d. OSI Model

Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text

This type of software includes a variety of PC utilities for managing and optimizing your
computer systems
Select one:

a. Device Drivers

b. Operating System

c. None of the Choices

d. System Utility Software

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Blu-ray Disc is the next generation optical disc that can hold high-definition video due to its
high capacity.
Select one:

True

False

Question 39
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the smallest grouping among the Internet Technologies.


Select one:

a. Wide Area Network

b. Local Area Network

c. Metropolitan Area Network

d. Personal Area Network

Question 40
Complete

Mark 1.00 out of 1.00

Remove flag

Question text
A collection of computers and network resources connected via a network over a
geographic area.
Select one:

a. Wide Area Network

b. Local Area Network

c. Home Network

d. Metropolitan Area Network

Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component
Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Information System is an integrated set of components for collecting, storing, and


processing data and for delivering information, knowledge and digital products.
Select one:

True

False

Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Who among the following is the father of Computer science?

Select one:

a. Charles Babbage

b. Simur Cray
c. Allen Turing

d. Augusta Adaming

Question 44
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The term durability refers to

Select one:

a. How sparkling the unit is

b.
How easy that device can be damaged

c. The amount of data that you can transfer to your computer

d.

the speed of the device

Question 45
Complete

Mark 1.00 out of 1.00

Flag question
Question text

It is a category of Application Software that provide common capabilities needed to support


enterprise software systems.
Select one:

a. Simulation Software

b. Enterprise Infrastructure Software

c. Product Engineering Software

d. Media Development Software

Question 46
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Software is a program that consists of step-by-step instructions that tells the computer how
to do its work.
Select one:

True

False

Question 47
Complete

Mark 1.00 out of 1.00


Flag question

Question text

A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:

a. Trojans

b. Rootkits

c. Worms

d. Key Loggers

Question 48
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Information Technology?

Select one:

a. A computer engineer

b. Technology allowing information to be used in the production of products & services

c. Technology which contains all of a business' important information

d.
A network which brings people together
Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Read-Only Memory is a memory chip that stores information or data in it and usually data
written to or programmed to a ROM by the manufacturer or the computer engineer.
Select one:

True

False

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is used primarily to access a content without


editing but may include software that allows for content editing.
Select one:

a. Information Worker Software

b. Educational Software
c. Entertainment Software

d. Content Access Software

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Random Access Memory (RAM)


Select one:

a. The data is not written permanently in RAM (volatile memory)

b. Needs turning on of the computer to maintain data

c. All of the given

d. Memory available to use while the computer is running for the operating system,
programs, and processes.

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Grace Hopper develops the first
computer language

1953
Answer:

Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:

a. Objects

b. Field Names

c. Record

d. Normalization

Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False
Procedure is the guidelines for people to follow when using the software, hardware and
data.
Select one:

True

False

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:

a. Entertainment Software

b. Content Access Software

c. Educational Software

d. Information Worker Software

Question 7
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.

It is the first DRAM chip of the Intel


Company

1970
Answer:

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text

How do you explain the CPU (Central Processing Unit) inside a computer?

Select one:

a. The part of the computer that plays sound

b. The power button on the computer

c. The brain of the computer

d. The pet of the computer


Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

One of the developer of the


ENIAC

1944
Answer:

Question 11
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of these governs the interaction process between the user and the operating system?

Select one:

a. User interface

b. Screen saver

c. Language translator

d. Platform

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Linus Torvalds
A college student in Finland,Answer , developed a version of UNIX as an
operating system for personal computer. He called it Linux.

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is used primarily to access a content without


editing but may include software that allows for content editing.
Select one:

a. Information Worker Software

b. Content Access Software

c. Entertainment Software

d. Educational Software

Question 14
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:

a. Patch

b. Ransomware

c. Adware

d. Driver

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

This is the another version of ENIAC that


is commercially available for business and
government

1946
Answer:
Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. System Software

b. Application Software

Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text

To increase the performance of my computer, I should add _______________.

Select one:

a. add more RAM


b. add a bigger hard drive

c. add more ROM

d. a faster battery

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a type of software application that is used for surveillance wherein attackers make use
of this to record or gather the keystroke made by the users of the infected computer.
Select one:

a. Key Loggers

b. Rootkits

c. Trojans

d. Worms

Question 19
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.
Application
Answer Layer serves as the window for users and applications process to access
the network services.

Question 20
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What happens if there isn't enough RAM available?


Select one:

a. Hard Drive Storage runs out of your computer

b. Your computer gets quicker

c. You won't get much wool from your sheep

d. Your computer slows down, as everything has to be loaded from the hard drive

Question 21
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A collection of computers and network resources connected via a network over a


geographic area.
Select one:
a. Local Area Network

b. Home Network

c. Wide Area Network

d. Metropolitan Area Network

Question 22
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Data link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:

True

False

Question 25
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

The First commercially available


portable computer by IBM

1975
Answer:

Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:

True

False

Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:

True

False

Question 28
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a category of Application Software that simulates physical or abstract system for
research, training or entertainment purposes.
Select one:

a. Product Engineering Software

b. Media Development Software

c. Simulation Software

d. Enterprise Infrastructure Software

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:

True

False

Question 30
Complete

Mark 1.00 out of 1.00


Flag question

Question text

This are set of rules that governs a communication or the exchange of information.
Select one:

a. Connectivity

b. Architecture

c. Protocol

d. Standards

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Information Technology is just a part of an Information System and Information Technology


is much more focus in the use of the said computer technology.
Select one:

True

False

Question 32
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and other
software that does malicious intent.
Select one:

a. Phishing

b. Malware

c. Spyware

d. Pharming

Question 34
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Expansion Slots is a mechanical components that provides mechanical and electrical


connections between a microprocessor and a printed circuit board (PCB).
Select one:

True

False

Question 35
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software
Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a simple toggling property in the column of the table in MySQL or SQL that make the
field required.
Select one:

a. Not Null

b. Blank

c. Not Empty

d. Required

Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The term durability refers to

Select one:

a. How sparkling the unit is


b.

the speed of the device

c.
How easy that device can be damaged

d. The amount of data that you can transfer to your computer

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 39
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What happens to the Main Memory / RAM data when we turn off the power?

Select one:

a. All data is backed up to the Hard Drive

b.
All data is lost

c. All data is saved to the Processor

d. All data is saved

Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:

a. Machine-to-Machine Model

b. Peer-to-Peer Model

c. Client-to-Server Model
d. Business-to-Business Model

Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a server that is used by IP Networks to dynamically distribute network configuration


parameters like IP address for interface and services.
Select one:

a. DNS Server

b. Router

c. DHCP Server

d. Firewall

Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the smallest grouping among the Internet Technologies.


Select one:

a. Metropolitan Area Network


b. Local Area Network

c. Wide Area Network

d. Personal Area Network

Question 44
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether that said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What shape shows the representation of Table or Entity?


Select one:

a. Cylinder

b. Rectangle

c. Circle

d. Oval

Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a software package that automatically renders advertisements in order to generate


revenue for its authors.
Select one:

a. Patch

b. Ransomware

c. Driver

d. Adware

Question 48
Complete

Mark 1.00 out of 1.00

Flag question
Question text

Choose True if the Statement is True and False if the statement is False.

Serial Advanced Technology Attachment (SATA) Hard Disk is a standard electronic


interface used between a computer motherboard’s data paths or bus and the computer’s
disk storage devices.
Select one:

True

False

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component


c. Storage Component

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

This type of software includes a variety of PC utilities for managing and optimizing your
computer systems
Select one:

a. Device Drivers

b. Operating System

c. None of the Choices


d. System Utility Software

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Why is it that computers use binary to read memory data?

Select one:

a. It's quicker

b. Computers only read 1's and 0's because it's all they can do

c. Computers are made up of electronic switches

d. It's all they understand

Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The term portability refers to


Select one:

a. How easy to carry / transport your computer

b. the speed of the device

c. The amount of data that you can transfer to your computer

d. how shiny the device is

Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Information is the result of processing a raw data.


Select one:

True

False

Question 5
Complete

Mark 1.00 out of 1.00

Flag question

Question text
What happens to the Main Memory / RAM data when we turn off the power?

Select one:

a.
All data is lost

b. All data is saved to the Processor

c. All data is backed up to the Hard Drive

d. All data is saved

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:

True

False

Question 7
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Honey Pot is a software application that scans your whole computer’s hard drives and
folders for possible malware or virus infections.
Select one:

True

False

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Control Unit performs two operations (arithmetic and logical).


Select one:

True

False

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Information Technology?

Select one:
a. Technology which contains all of a business' important information

b. Technology allowing information to be used in the production of products & services

c. A computer engineer

d.
A network which brings people together

Question 11
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:

True

False

Question 12
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False

Raw data are the unprocessed facts including text, numbers, images and sounds.
Select one:

True

False

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 14
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Which of the following is the reason to Denormalize a Table?


Select one:

a. Add additional related tables

b. Performance

c. Remove redundant information

d. Prevent Data Anomalies

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

When a file is saved for the first time

Select one:

a. A name must be given to identify it

b. All you need is a name if it isn't printed

c. A copy is printed out automatically


d. Don't need a tag

Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:

a. Machine-to-Machine Model

b. Peer-to-Peer Model

c. Business-to-Business Model

d. Client-to-Server Model

Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:

True

False

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the way to arrange or configure a network.


Select one:

a. Local Area Network

b. Local Area Network

c. Network Topology

d. TCP/IP Model

Question 19
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following statements is true?


Select one:

a.
Both computers have the same speed

b.
Minicomputer operates more efficiently than Microcomputer.

c.
The speeds of both of these machines cannot be compared to advanced speeds

d.
Microcomputer operate faster than minicomputer

Question 20
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. System Software

b. Application Software

Question 21
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that provide common capabilities needed to support


enterprise software systems.
Select one:

a. Product Engineering Software

b. Simulation Software

c. Enterprise Infrastructure Software

d. Media Development Software

Question 23
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:
a. Application Software

b. System Software

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 25
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a category of Application Software that run applications for amusement, leisure, or as a


diversion.
Select one:

a. Entertainment Software

b. Educational Software

c. Information Worker Software

d. Content Access Software

Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:

a. Information

b. Data

c. Records

d. Database
Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:

a. OSI Model

b. TCP/IP Model

c. Peer-to-Peer Model

d. Client-Server Model

Question 28
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a distributed communication framework of network process among service requestors,


clients and service providers.
Select one:

a. Peer-to-Peer Model

b. Client-Server Model
c. Business-to-Business Model

d. Machine-to-Machine Model

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is used primarily to access a content without


editing but may include software that allows for content editing.
Select one:

a. Information Worker Software

b. Entertainment Software

c. Content Access Software

d. Educational Software

Question 30
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is software?
Select one:

a. the monitor and computer case

b. the operating system

c. the video card on the monitor

d. any collection of instructions telling the hardware what to do

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Blu-ray Disc is the next generation optical disc that can hold high-definition video due to its
high capacity.
Select one:

True

False

Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False

Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:

True

False

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

It is used by the first IBM personal computer


as the Operating System

1981
Answer:

Question 34
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Information System is an integrated set of components for collecting, storing, and


processing data and for delivering information, knowledge and digital products.
Select one:

True

False

Question 35
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

One piece of information that you can use to identify exactly one record, with absolutel no
ambiguity.
Select one:

a. Natural Key

b. Primary Key

c. Foreign Key

d. Composite Key
Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:

a. Phishing

b. Malware

c. Pharming

d. Spyware

Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose Trueif the Statement is True and False if the statement is False

Information Technology involves the development, maintenance and use of computer


systems, software and networks for the processing and distribution of data.
Select one:
True

False

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that simulates physical or abstract system for


research, training or entertainment purposes.
Select one:

a. Simulation Software

b. Product Engineering Software

c. Media Development Software

d. Enterprise Infrastructure Software

Question 39
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Processor is the heart and brain of the computer because without this computer cannot do
anything.
Select one:

True

False

Question 40
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The term durability refers to

Select one:

a. The amount of data that you can transfer to your computer

b. How sparkling the unit is

c.

the speed of the device

d.
How easy that device can be damaged

Question 41
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:

a. Patch

b. Adware

c. Ransomware

d. Driver

Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the smallest grouping among the Internet Technologies.


Select one:

a. Metropolitan Area Network

b. Personal Area Network

c. Local Area Network

d. Wide Area Network


Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a server that is used by IP Networks to dynamically distribute network configuration


parameters like IP address for interface and services.
Select one:

a. Firewall

b. DNS Server

c. DHCP Server

d. Router

Question 44
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:

a. Enterprise Infrastructure Software

b. Media Development Software

c. Product Engineering Software

d. Mobile Applications

Question 46
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Aspect Ratio is the distance between each pixel


Select one:

True

False

Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A collection of computers and network resources connected via a network over a


geographic area.
Select one:

a. Metropolitan Area Network

b. Home Network

c. Local Area Network

d. Wide Area Network

Question 48
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and accessible
from a public cloud storage provider.
Select one:

True

False

Question 49
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:

a. C-sharp

b. Java

c. Perl Hypertext Pre-Processor


d. Structured Query Language

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

This is the another version of ENIAC that


is commercially available for business and
government

1946
Answer:

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:

True

False

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.

Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not a result a result of Duplicate Data?


Select one:
a. It slows down the system by taking up extra bandwidth across the network and extra disk
space on the server.

b. Your system will work well without any errors or bugs

c. It runs the risk of becoming inconsistent.

d. Difficult to maintain, requiring multiple reads and writes to update records and keep
thing in sync.

Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:

a. Entertainment Software

b. Content Access Software

c. Information Worker Software

d. Educational Software

Question 5
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

Build the first computer that does


simultaneous solving of equations

1937
Answer:

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:

a. Java

b. C-sharp

c. Perl Hypertext Pre-Processor


d. Structured Query Language

Question 7
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that provide common capabilities needed to support


enterprise software systems.
Select one:

a. Enterprise Infrastructure Software

b. Media Development Software

c. Simulation Software

d. Product Engineering Software

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a malicious codes that is attached to infected application programs or software which


will execute a different set of actions that will bring harm to your computer.
Select one:

a. Worms
b. Rootkits

c. Key Loggers

d. Trojans

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:

a. Patch

b. Adware

c. Ransomware

d. Driver

Question 11
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

It is the relationship of one data to another data.


Select one:

a. Cardinality

b. Uniqueness

c. Entity

d. Link

Question 12
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Netw ork
Answer Layer controls the operations of the subnet, deciding which physical path
the data takes.

Question 14
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.
Data Link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:

True

False

Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Institute of Electrical and Electronics Engineer


IEEE stands for Answer .
Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
Linux
Fedora is aAnswer based operating system developed and supported by the
Fedora Project as a partnership with Red Hat and volunteer contributors.

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 19
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:

True

False

Question 20
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

Which of the following are not included in the Database Development Life Cycle?
Select one:

a. Planning

b. Testing

c. Requirement Gathering

d. Logical Design

Question 21
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Transport
Answer Layer ensures that message are delivered error-free in sequence and
with no losses or duplications.

Question 22
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:

a. Mobile Applications

b. Media Development Software

c. Product Engineering Software

d. Enterprise Infrastructure Software

Question 23
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:

a. Machine-to-Machine Model

b. Client-to-Server Model

c. Peer-to-Peer Model

d. Business-to-Business Model

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

This is the most important program that runs on a computer


Select one:

a. System Utility Software

b. Operating System

c. None of the Choices

d. Device Drivers
Question 25
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 26
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

It is the fancy way of saying to join pieces of text together in a database.


Select one:
a. Joining

b. Plus

c. Concatenation

d. Adding

Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:

a. OSI Model

b. Client-Server Model

c. TCP/IP Model

d. Peer-to-Peer Model

Question 28
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Session
Answer Layer allows session establishment between processes running on
different stations

Question 30
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Aspect Ratio is the distance between each pixel


Select one:

True

False

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that simulates physical or abstract system for


research, training or entertainment purposes.
Select one:

a. Enterprise Infrastructure Software

b. Product Engineering Software

c. Media Development Software

d. Simulation Software

Question 32
Complete
Mark 1.00 out of 1.00

Flag question

Question text

A type of wireless transmission that uses electromagnetic waves to transmit data through
air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per
second.
Select one:

a. Infrared

b. Radio Frequency

c. Fiber-Optic

d. Satellite

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:

True
False

Question 34
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 35
Complete

Mark 1.00 out of 1.00

Flag question
Question text

Choose True if the Statement is True and False if the statement is False.

Laser Printers are printers that used the same technology as to photocopying machines. It
uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:

True

False

Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:

a. Field Names

b. Objects

c. Normalization

d. Record

Question 37
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
mobile operating s
AAnswer is a software that allows smartphones, tablet PCs and other devices
to run applications and programs.

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:

True

False

Question 39
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and other
software that does malicious intent.
Select one:

a. Malware

b. Phishing

c. Pharming

d. Spyware

Question 40
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that generates print and electronic media for other
to consume, most often in a commercial or educational settings.
Select one:

a. Simulation Software

b. Enterprise Infrastructure Software

c. Product Engineering Software


d. Media Development Software

Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Information Technology is just a part of an Information System and Information Technology


is much more focus in the use of the said computer technology.
Select one:

True

False

Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:

a. Information Worker Software


b. Educational Software

c. Entertainment Software

d. Content Access Software

Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that run applications for amusement, leisure, or as a


diversion.
Select one:

a. Information Worker Software

b. Content Access Software

c. Educational Software

d. Entertainment Software

Question 44
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.


Select one:

a. System Software

b. Application Software

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Serial Advanced Technology Attachment (SATA) Hard Disk is a standard electronic interface
used between a computer motherboard’s data paths or bus and the computer’s disk storage
devices.
Select one:

True

False

Question 46
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a server that translates the public IP Address into Domain Names


Select one:

a. Router

b. Firewall

c. DNS Server

d. DHCP Server

Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose Trueif the Statement is True and False if the statement is False

Information Technology involves the development, maintenance and use of computer


systems, software and networks for the processing and distribution of data.
Select one:

True

False

Question 48
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:

a. Phishing

b. Pharming

c. Malware

d. Spyware

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

It is the first DRAM chip of the Intel


Company

1970
Answer:
Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a model that provides end-to-end connectivity specifying how data should be


packetized, addressed, transmitted, routed and received at the destination. This model is
maintained by the IETF.
Select one:

a. TCP/IP Model

b. Client-Server Model

c. OSI Model

d. Peer-to-Peer Model

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is an additional type of Database that is useful in any database design because they help
support the business rules that you established while gathering the requirements for the
system.
Select one:
a. Information Table

b. Address Table

c. Data Table

d. Lookup Table

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:

True

False

Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.
Data link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.

Question 4
Complete

Mark 1.00 out of 1.00

Remove flag

Question text

What do you call the user groups that will need to interact with the new system?
Select one:

a. Actor

b. Staff

c. Vendor

d. Proponents

Question 5
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:
a. Content Access Software

b. Educational Software

c. Information Worker Software

d. Entertainment Software

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Information Technology?

Select one:

a.
A network which brings people together

b. Technology which contains all of a business' important information

c. Technology allowing information to be used in the production of products & services

d. A computer engineer

Question 7
Complete

Mark 1.00 out of 1.00

Remove flag

Question text
Which of the following is NOT a characteristic of Relational database?
Select one:

a. Each Column has a unique name

b. Values inside a table are atomic and cannot or should not be split apart into smaller
components

c. All values in a single column must be of the same type

d. Order of Either the columns or rows is very significant

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Session
Answer Layer allows session establishment between processes running on
different stations

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.
Select one:

a. Keyboard

b. Computer Case

c. Mouse

d. Monitor

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not a Relational Database Management System?


Select one:

a. PostgreSQL

b. Oracle

c. Python

d. MySQL

Question 11
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:

a. Phishing

b. Malware

c. Spyware

d. Pharming

Question 12
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

This is the another version of ENIAC that


is commercially available for business and
government

1946
Answer:
Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Random Access Memory (RAM)


Select one:

a. Memory available to use while the computer is running for the operating system,
programs, and processes.

b. The data is not written permanently in RAM (volatile memory)

c. All of the given

d. Needs turning on of the computer to maintain data

Question 14
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:

a. Database

b. Information
c. Data

d. Records

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of these governs the interaction process between the user and the operating system?

Select one:

a. Platform

b. Language translator

c. User interface

d. Screen saver

Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:

True

False

Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

One of the developer of the


ENIAC

1944
Answer:

Question 18
Complete

Mark 1.00 out of 1.00


Flag question

Question text

What happens if there isn't enough RAM available?


Select one:

a. Your computer gets quicker

b. You won't get much wool from your sheep

c. Hard Drive Storage runs out of your computer

d. Your computer slows down, as everything has to be loaded from the hard drive

Question 19
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

Designs the Punch Card System


1890
Answer:

Question 20
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Desktop Computer is a personal computer which can be moved easily and used in a variety
of locations.

Select one:

True

False

Question 21
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The term portability refers to

Select one:

a. how shiny the device is


b. The amount of data that you can transfer to your computer

c. How easy to carry / transport your computer

d. the speed of the device

Question 22
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Expansion Slots is a mechanical components that provides mechanical and electrical


connections between a microprocessor and a printed circuit board (PCB).
Select one:

True

False

Question 23
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:

a. Client-to-Server Model

b. Business-to-Business Model

c. Peer-to-Peer Model

d. Machine-to-Machine Model

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Co-Processor is a special set of circuits in a micro-processor chip that is designed to


manipulate numbers or perform some other specialized function more quickly than the
basic microprocessor circuits.
Select one:

True

False

Question 25
Complete

Mark 1.00 out of 1.00

Flag question
Question text

It is a type of software application that is used for surveillance wherein attackers make use
of this to record or gather the keystroke made by the users of the infected computer.
Select one:

a. Worms

b. Rootkits

c. Key Loggers

d. Trojans

Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component


c. Storage Component

Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:

True

False

Question 28
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
Blackcomb
Windows 7 (codename:Answer ) is a personal computer operating system and
was released to manufacturing on July 22, 2009.

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are not included in the Database Development Life Cycle?
Select one:

a. Logical Design

b. Testing

c. Requirement Gathering

d. Planning

Question 30
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It will be the guidepost that the database designer can always refer back to in order to make
sure that the development process is proceeding on course.
Select one:

a. Policy
b. Scopes and Limitations

c. Statement of the Problem

d. Mission Statement

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:

True

False

Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether that said program is a System Software or an Application Software.


Select one:

a. System Software

b. Application Software

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What shape shows the representation of Table or Entity?


Select one:

a. Circle

b. Rectangle

c. Oval

d. Cylinder

Question 34
Complete

Mark 1.00 out of 1.00

Flag question
Question text

Choose True if the Statement is True and False if the statement is False.

Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and accessible
from a public cloud storage provider.
Select one:

True

False

Question 35
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Internet Control Message Protocol


ICMP stands for Answer .

Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:

True

False

Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A type of wireless transmission that uses electromagnetic waves to transmit data through
air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per
second.
Select one:

a. Infrared

b. Satellite

c. Fiber-Optic

d. Radio Frequency

Question 38
Complete

Mark 1.00 out of 1.00

Flag question
Question text

It is a category of Application Software that run applications for amusement, leisure, or as a


diversion.
Select one:

a. Information Worker Software

b. Entertainment Software

c. Educational Software

d. Content Access Software

Question 39
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Firewall is the process of converting a data or information into another form also known as
cipher text.
Select one:

True

False

Question 40
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Raw data are the unprocessed facts including text, numbers, images and sounds.
Select one:

True

False

Question 42
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

Build the first computer that does


simultaneous solving of equations

1937
Answer:

Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Presentation
Answer Layer formats the data to be presented to application layer. It can be
viewed as the translator for the network

Question 44
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is the best example of a diagramming software?


Select one:

a. Microsoft Visio

b. MS Paint

c. Notepad++

d. Microsoft Word

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:

a. Entertainment Software

b. Educational Software

c. Information Worker Software

d. Content Access Software


Question 46
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a model that provides end-to-end connectivity specifying how data should be


packetized, addressed, transmitted, routed and received at the destination. This model is
maintained by the IETF.
Select one:

a. TCP/IP Model

b. Peer-to-Peer Model

c. Client-Server Model

d. OSI Model

Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Massachusetts Institute of Technology in 1960’s had a time sharing operating system they
MULTICS
calledAnswer .

Question 48
Complete

Mark 1.00 out of 1.00

Flag question

Question text

To increase the performance of my computer, I should add _______________.

Select one:

a. add a bigger hard drive

b. a faster battery

c. add more RAM

d. add more ROM

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:

a. Trojans

b. Rootkits

c. Worms
d. Key Loggers

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. System Software

b. Application Software

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following stores output from a computer:


Select one:

a. Central Processing Unit (CPU)

b. Flash Drive

c. Scanner

d. Keyboard

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Co-Processor is a special set of circuits in a micro-processor chip that is designed to


manipulate numbers or perform some other specialized function more quickly than the
basic microprocessor circuits.
Select one:

True

False

Question 3
Complete

Mark 1.00 out of 1.00

Flag question
Question text

Which of the following is the best example of a diagramming software?


Select one:

a. MS Paint

b. Microsoft Visio

c. Microsoft Word

d. Notepad++

Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Why is it that computers use binary to read memory data?

Select one:

a. Computers are made up of electronic switches

b. Computers only read 1's and 0's because it's all they can do

c. It's all they understand

d. It's quicker

Question 5
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:

a. Adware

b. Patch

c. Ransomware

d. Driver

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text

To increase the performance of my computer, I should add _______________.

Select one:

a. a faster battery

b. add more RAM

c. add a bigger hard drive

d. add more ROM


Question 7
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.
Select one:

a. Metropolitan Area Network

b. Local Area Network

c. Wide Area Network

d. Home Network

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.

It is the first DRAM chip of the Intel


Company

1970
Answer:

Question 10
Complete

Mark 1.00 out of 1.00

Flag question
Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 11
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether that said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 12
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a server that is used by IP Networks to dynamically distribute network configuration


parameters like IP address for interface and services.
Select one:

a. DNS Server

b. Router

c. DHCP Server

d. Firewall

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is used in developing hardware and software


products.
Select one:

a. Media Development Software

b. Enterprise Infrastructure Software

c. Simulation Software

d. Product Engineering Software


Question 14
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.
Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:

True

False

Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 17
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Shugart leads the creation of this
external storage

1971
Answer:

Question 19
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:

a. Worms

b. Rootkits

c. Trojans

d. Key Loggers

Question 21
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Expansion Slots is a mechanical components that provides mechanical and electrical


connections between a microprocessor and a printed circuit board (PCB).
Select one:

True

False

Question 22
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.
Select one:

a. Pharming

b. Malware

c. Phishing

d. Spyware
Question 23
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Bell Labs
The use of UNIX spread around the country and initiallyAnswer gave it away free.

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that run applications for amusement, leisure, or as a


diversion.
Select one:

a. Content Access Software

b. Entertainment Software

c. Educational Software

d. Information Worker Software

Question 25
Complete

Mark 1.00 out of 1.00


Flag question

Question text

These can be used for connecting almost any computer type including mice, keyboards,
printers, and digital cameras.

Select one:

a. Monitor Port

b. Audio Out

c. Audio In

d. USB Port

Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:

True
False

Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:

a. Structured Query Language

b. Java

c. C-sharp

d. Perl Hypertext Pre-Processor

Question 28
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:

True

False

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the fast-growing area of crime because more and more criminals are exploiting the
speed, convenience and anonymity of the internet to commit a diverse range of criminal
activities.
Select one:

a. Cyber Crime

b. Backup

c. Ethical Hacking

d. Disk Cleanup

Question 30
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is the term used to describe an individual’s anonymity and how safe they feel in a website
location.
Select one:

a. Defragmentation

b. Computer Privacy

c. Software Update

d. Disk Cleanup

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What happens to the Main Memory / RAM data when we turn off the power?

Select one:

a. All data is saved

b. All data is backed up to the Hard Drive

c. All data is saved to the Processor

d.
All data is lost

Question 32
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:

True

False

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

session
Answer Layer allows session establishment between processes running on
different stations

Question 34
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is a category of Application Software that is used primarily to access a content without


editing but may include software that allows for content editing.
Select one:

a. Content Access Software

b. Educational Software

c. Information Worker Software

d. Entertainment Software

Question 35
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

This hardware is commonly known as the Layer 3 Hardware because it uses logical
addresses to forward the information from the sender to its destination.
Select one:

a. DNS Server

b. Firewall

c. Router

d. DHCP Server

Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Identify whether the said program is a System Software or an Application Software.

Select one:

a. System Software

b. Application Software

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The tem 'read/write time' refer to what?


Select one:

a. How long does one reasonably expect the storage media to last

b. How long it takes to read or write data to your computer

c. How long it takes a person to read/write a word document

d. The amount of data you want to store on your computer

Question 39
Complete

Mark 1.00 out of 1.00


Flag question

Question text

What type of computers in a client-server system are client computers (most of the time).

Select one:

a.
Minicomputer

b.
Mainframe

c.
PDA

d.
Microcomputer

Question 40
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not a Relational Database Management System?


Select one:

a. Oracle
b. MySQL

c. PostgreSQL

d. Python

Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:

a. Data

b. Database

c. Information

d. Records

Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.


Select one:

a. Application Software

b. System Software

Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.

Question 44
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The term portability refers to


Select one:

a. the speed of the device

b. how shiny the device is

c. The amount of data that you can transfer to your computer

d. How easy to carry / transport your computer

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.

Select one:

a. Keyboard

b. Computer Case

c. Mouse

d. Monitor

Question 46
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Ubuntu
Answer is an open source Debian-based Linux distribution sponsored by
Canonical Ltd.

Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text

One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:

a. OSI Model

b. TCP/IP Model

c. Client-Server Model

d. Peer-to-Peer Model

Question 48
Complete

Mark 1.00 out of 1.00


Flag question

Question text

It is the process of copying and archiving the computer data so that it may be used to
restore its original data after a data loss event.
Select one:

a. Software Update

b. Disk Cleanup

c. Defragmentation

d. Back-up

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Random Access Memory (RAM)


Select one:

a. Needs turning on of the computer to maintain data

b. The data is not written permanently in RAM (volatile memory)

c. Memory available to use while the computer is running for the operating system,
programs, and processes.

d. All of the given


Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

This is the most important program that runs on a computer


Select one:

a. System Utility Software

b. None of the Choices

c. Operating System

d. Device Drivers

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

This port can be used to network and to connect to the Internet.

Select one:
a.
USB Port

b.
Power Button

c.
Serial Port

d.
Ethernet Port

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:

True

False

Question 3
Complete

Mark 1.00 out of 1.00


Flag question

Question text

What is software?

Select one:

a. any collection of instructions telling the hardware what to do

b. the operating system

c. the video card on the monitor

d. the monitor and computer case

Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 5
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a type of software application that is used for surveillance wherein attackers make use
of this to record or gather the keystroke made by the users of the infected computer.
Select one:

a. Key Loggers

b. Rootkits

c. Worms

d. Trojans

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:

a. Structured Query Language

b. Java

c. C-sharp

d. Perl Hypertext Pre-Processor

Question 7
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:

a. Phishing

b. Malware

c. Spyware

d. Pharming

Question 8
Complete

Mark 1.00 out of 1.00


Flag question

Question text

What happens to the Main Memory / RAM data when we turn off the power?

Select one:

a.
All data is lost

b. All data is saved

c. All data is saved to the Processor

d. All data is backed up to the Hard Drive

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.

It is the first DRAM chip of the Intel


Company

1970
Answer:

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Random Access Memory (RAM)


Select one:

a. All of the given

b. Needs turning on of the computer to maintain data

c. The data is not written permanently in RAM (volatile memory)

d. Memory available to use while the computer is running for the operating system,
programs, and processes.

Question 11
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a malicious codes that is attached to infected application programs or software which


will execute a different set of actions that will bring harm to your computer.
Select one:

a. Rootkits

b. Key Loggers
c. Worms

d. Trojans

Question 12
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

Grace Hopper develops the first


computer language

1953
Answer:

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a server that translates the public IP Address into Domain Names


Select one:

a. DNS Server

b. Router
c. DHCP Server

d. Firewall

Question 14
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Netw ork
Answer Layer controls the operations of the subnet, deciding which physical path
the data takes.

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A maintenance utility included in Microsoft Windows that is used to free up disk spaces on
the computer hard drive.
Select one:

a. Software Updates

b. Defragmentation

c. Disk Cleanup
d. Backup

Question 16
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is the best example of a diagramming software?


Select one:

a. Microsoft Visio

b. Microsoft Word

c. Notepad++

d. MS Paint

Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:

a. Patch
b. Ransomware

c. Adware

d. Driver

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a distributed communication framework of network process among service requestors,


clients and service providers.
Select one:

a. Business-to-Business Model

b. Machine-to-Machine Model

c. Client-Server Model

d. Peer-to-Peer Model

Question 19
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
Linux
Fedora is aAnswer based operating system developed and supported by the
Fedora Project as a partnership with Red Hat and volunteer contributors.

Question 20
Complete

Mark 1.00 out of 1.00

Flag question

Question text

One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:

a. OSI Model

b. Client-Server Model

c. TCP/IP Model

d. Peer-to-Peer Model

Question 21
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 22
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Who among the following is the father of Computer science?

Select one:

a. Charles Babbage

b. Allen Turing

c. Augusta Adaming

d. Simur Cray

Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is the main program running on a computer. It manages the memory and processes of the
computer, and all of its software and hardware.

Select one:

a.
Hardware

b.
Software

c.
Operating System

d.
Application Software

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False
Information Technology is just a part of an Information System and Information Technology
is much more focus in the use of the said computer technology.
Select one:

True

False

Question 25
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Information Technology?

Select one:

a. A computer engineer

b. Technology allowing information to be used in the production of products & services

c. Technology which contains all of a business' important information

d.
A network which brings people together

Question 26
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.

Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:

True

False

Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Computing has 4 steps, they are:

Select one:

a.
science, technology, engineering, math

b.
state hypothesis, collect data, test, and conclude

c.
input, process, output, store

d.
prophase, metaphase, anaphase, telophase

Question 28
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What do you call the user groups that will need to interact with the new system?
Select one:

a. Vendor

b. Proponents

c. Staff

d. Actor

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text

How do you explain the CPU (Central Processing Unit) inside a computer?

Select one:

a. The part of the computer that plays sound

b. The brain of the computer

c. The pet of the computer


d. The power button on the computer

Question 30
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is used in developing hardware and software


products.
Select one:

a. Simulation Software

b. Media Development Software

c. Enterprise Infrastructure Software

d. Product Engineering Software

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not a Relational Database Management System?


Select one:

a. Python
b. MySQL

c. PostgreSQL

d. Oracle

Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the way to arrange or configure a network.


Select one:

a. TCP/IP Model

b. Network Topology

c. Local Area Network

d. Local Area Network

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose Trueif the Statement is True and False if the statement is False
Information Technology involves the development, maintenance and use of computer
systems, software and networks for the processing and distribution of data.
Select one:

True

False

Question 34
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of these governs the interaction process between the user and the operating system?

Select one:

a. Platform

b. User interface

c. Language translator

d. Screen saver

Question 35
Complete

Mark 1.00 out of 1.00

Flag question
Question text

Fill in the Blanks: Write the correct word to complete the statement.

Whistler
Windows XP (codename:Answer ) is a personal computer operating system
produced by Microsoft as part of the Windows NT Family of operating system.

Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software

b. System Software

Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.

Laser Printers are printers that used the same technology as to photocopying machines. It
uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:

True

False

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text

This hardware is commonly known as the Layer 3 Hardware because it uses logical
addresses to forward the information from the sender to its destination.
Select one:

a. Firewall

b. Router

c. DHCP Server

d. DNS Server

Question 39
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Application
Answer Layer serves as the window for users and applications process to access
the network services.

Question 40
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is the reason to Denormalize a Table?


Select one:

a. Performance

b. Prevent Data Anomalies

c. Add additional related tables

d. Remove redundant information

Question 41
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Co-Processor is a special set of circuits in a micro-processor chip that is designed to


manipulate numbers or perform some other specialized function more quickly than the
basic microprocessor circuits.
Select one:

True

False

Question 42
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the process of copying and archiving the computer data so that it may be used to
restore its original data after a data loss event.
Select one:

a. Software Update

b. Back-up

c. Defragmentation

d. Disk Cleanup
Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following are not included in the Database Development Life Cycle?
Select one:

a. Requirement Gathering

b. Logical Design

c. Testing

d. Planning

Question 44
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Build the first computer that does
simultaneous solving of equations

1937
Answer:

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
mobile operating s
AAnswer is a software that allows smartphones, tablet PCs and other devices
to run applications and programs.

Question 46
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component

Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is NOT a characteristic of Relational database?


Select one:

a. Values inside a table are atomic and cannot or should not be split apart into smaller
components

b. Each Column has a unique name

c. All values in a single column must be of the same type

d. Order of Either the columns or rows is very significant

Question 48
Complete
Mark 1.00 out of 1.00

Flag question

Question text

A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:

a. Objects

b. Record

c. Normalization

d. Field Names

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Designs the Punch Card System

1890
Answer:

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
Blue
Windows 8.1 (codename:Answer ) is an upgrade for Windows 8, a version of
Windows NT, a computer operating system released by Microsoft.

Question 1
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.
Bell Labs
The use of UNIX spread around the country and initiallyAnswer gave it away free.

Question 2
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:

a. Ransomware

b. Adware

c. Patch

d. Driver

Question 3
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a server that is used by IP Networks to dynamically distribute network configuration


parameters like IP address for interface and services.
Select one:

a. DNS Server
b. DHCP Server

c. Firewall

d. Router

Question 4
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a software package that automatically renders advertisements in order to generate


revenue for its authors.
Select one:

a. Patch

b. Ransomware

c. Adware

d. Driver

Question 5
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a category of Application Software that is used primarily to access a content without
editing but may include software that allows for content editing.
Select one:

a. Information Worker Software

b. Content Access Software

c. Entertainment Software

d. Educational Software

Question 6
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the relationship of one data to another data.


Select one:

a. Link

b. Entity

c. Uniqueness

d. Cardinality

Question 7
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Who among the following is the father of Computer science?

Select one:

a. Simur Cray

b. Allen Turing

c. Augusta Adaming

d. Charles Babbage

Question 8
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.

Select one:

a. Application Software
b. System Software

Question 9
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.
Select one:

a. Home Network

b. Wide Area Network

c. Local Area Network

d. Metropolitan Area Network

Question 10
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.
Question 11
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.
Select one:

a. Malware

b. Pharming

c. Phishing

d. Spyware

Question 12
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which device is required to connect to internet?

Select one:

a.
Modem
b.
CD Drive

c.
NIC Card

d.
Joystick

Question 13
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Procedure is the guidelines for people to follow when using the software, hardware and
data.
Select one:

True

False

Question 14
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Which of the following stores output from a computer:

Select one:

a. Keyboard

b. Central Processing Unit (CPU)

c. Flash Drive

d. Scanner

Question 15
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is software?

Select one:

a. the operating system

b. the video card on the monitor

c. the monitor and computer case

d. any collection of instructions telling the hardware what to do

Question 16
Complete

Mark 1.00 out of 1.00


Flag question

Question text

What shape shows the representation of Table or Entity?


Select one:

a. Cylinder

b. Rectangle

c. Oval

d. Circle

Question 17
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Computing has 4 steps, they are:

Select one:

a.
science, technology, engineering, math

b.
state hypothesis, collect data, test, and conclude
c.
prophase, metaphase, anaphase, telophase

d.
input, process, output, store

Question 18
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:

True

False

Question 19
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify whether the said program is a System Software or an Application Software.


Select one:

a. System Software

b. Application Software

Question 20
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The term portability refers to

Select one:

a. The amount of data that you can transfer to your computer

b. the speed of the device

c. How easy to carry / transport your computer

d. how shiny the device is

Question 21
Complete

Mark 1.00 out of 1.00


Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Processor is the heart and brain of the computer because without this computer cannot do
anything.
Select one:

True

False

Question 22
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is not a Relational Database Management System?


Select one:

a. PostgreSQL

b. Python

c. MySQL

d. Oracle

Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.

Grace Hopper develops the first


computer language

1953
Answer:

Question 24
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component


b. Input and Output Component

c. Storage Component

Question 25
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the main program running on a computer. It manages the memory and processes of the
computer, and all of its software and hardware.

Select one:

a.
Application Software

b.
Hardware

c.
Software

d.
Operating System

Question 26
Complete

Mark 1.00 out of 1.00


Flag question

Question text

This are set of rules that governs a communication or the exchange of information.
Select one:

a. Connectivity

b. Standards

c. Architecture

d. Protocol

Question 27
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Which of these governs the interaction process between the user and the operating system?

Select one:

a. Language translator

b. Platform

c. Screen saver
d. User interface

Question 28
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What type of computers in a client-server system are client computers (most of the time).

Select one:

a.
PDA

b.
Minicomputer

c.
Microcomputer

d.
Mainframe

Question 29
Complete

Mark 1.00 out of 1.00

Flag question

Question text
Desktop Computer is a personal computer which can be moved easily and used in a variety
of locations.

Select one:

True

False

Question 30
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium

Question 31
Complete

Mark 1.00 out of 1.00

Flag question

Question text

A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:
a. Trojans

b. Key Loggers

c. Worms

d. Rootkits

Question 32
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the correct word to complete the statement.

Whistler
Windows XP (codename:Answer ) is a personal computer operating system
produced by Microsoft as part of the Windows NT Family of operating system.

Question 33
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:

True

False

Question 34
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.

Select one:

a. Mouse

b. Keyboard

c. Monitor

d. Computer Case

Question 35
Complete

Mark 1.00 out of 1.00

Flag question

Question text
A Type of Wireless Area Network that works within a very small area – your immediate
surroundings.
Select one:

a. Wide Area Network

b. Local Area Network

c. Metropolitan Area Network

d. Personal Area Network

Question 36
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.

Select one:

a. System Unit Component

b. Input and Output Component

c. Storage Component
Question 37
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:

a. Information Worker Software

b. Content Access Software

c. Entertainment Software

d. Educational Software

Question 38
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Graphical User Interface ( GUI) has made computers easier to use because:

Select one:

a. they became faster.


b. they used a mouse.

c. they used icons instead of commands.

d. they became smaller.

Question 39
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:

a. Media Development Software

b. Mobile Applications

c. Enterprise Infrastructure Software

d. Product Engineering Software

Question 40
Complete

Mark 1.00 out of 1.00

Flag question

Question text
It is a category of Application Software that simulates physical or abstract system for
research, training or entertainment purposes.
Select one:

a. Media Development Software

b. Simulation Software

c. Enterprise Infrastructure Software

d. Product Engineering Software

Question 41
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is a type of software that operates and controls a particular type of device that is attached
to a computer.
Select one:

a. System Utility Software

b. Operating System

c. None of the Choices

d. Device Drivers

Question 42
Complete

Mark 1.00 out of 1.00


Flag question

Question text

This is the most important program that runs on a computer


Select one:

a. Operating System

b. System Utility Software

c. None of the Choices

d. Device Drivers

Question 43
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False

Information is the result of processing a raw data.


Select one:

True

False

Question 44
Complete
Mark 1.00 out of 1.00

Flag question

Question text

A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:

a. Normalization

b. Field Names

c. Record

d. Objects

Question 45
Complete

Mark 1.00 out of 1.00

Flag question

Question text

The tem 'read/write time' refer to what?


Select one:

a. How long it takes a person to read/write a word document

b. How long does one reasonably expect the storage media to last

c. The amount of data you want to store on your computer

d. How long it takes to read or write data to your computer


Question 47
Complete

Mark 1.00 out of 1.00

Flag question

Question text

It is the fancy way of saying to join pieces of text together in a database.


Select one:

a. Joining

b. Concatenation

c. Plus

d. Adding

Question 49
Complete

Mark 1.00 out of 1.00

Flag question

Question text

What is Random Access Memory (RAM)


Select one:

a. All of the given


b. Memory available to use while the computer is running for the operating system,
programs, and processes.

c. The data is not written permanently in RAM (volatile memory)

d. Needs turning on of the computer to maintain data

Question 50
Complete

Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:

True

False

You might also like