You are on page 1of 6

EAST WEST MINDANAO COLLEGE INC.

Kamasi, Ampatuan Maguindanao


Living in the IT era
Prelim Examination -1st S.Y. 2020-2021
Name:____________________________Course & Year:_____
Date:_____ Score:_____

GENERAL INSTRUCTIONS:
 NO MODULE PRESENTED, NO EXAM
 NO ERASURES (CORRECTION FLUID/TAPE)
 READ CAREFULLY AND FOLLOW THE INSTRUCTIONS

Multiple Choice: Circle the letter that corresponds to your answer. Do not share
your answer with your classmates.

1. It refers to a technology that support activities involving information , such as


gathering, processing, storing, and presenting data.
a. communication b. Information
c. Information Technology d. Information and communication technology
2. It is the technique of making a apparatus, a process or a system operate
automatically, it include a broad range of technology connecting computers
system to other system.
a. automation b. Connection c. Network d. Server
3. It is a type of an input device that lets you select options from on- screen
menus.
a. kerboard b. Mouse c. Trackball d. Scanner
4. It is like a personal computer but it has more powerful microprocessor and
higher quality monitor.
a. mainframe b. Minicomputer c.supercomputer d.workstation
5. It is one of the ethical issues of ICT that occurs when a person’s ideas words or
writing and pass it off as his or her own.
a. exploitation b. Libel c. Piracy d. Plagiarism
6. This occurs when a person deals with another person dishon, and dishonestly,
unethically, and dishonourably, in order to take advantage of the latter’s work
and resources .
a.exploitation b. Libel c. Piracy d. Plagiarism
7. It is period in human history characterized by the shift from traditional industry
that the industrial revolution brought through industrialiation, to an economy
based on informationcomputerization.
a.digital age b.Information age c. Internet of things d.techno-prenuership
8. It was considered as the first generation computer that could store only limited
or small amounts of information.
a. ARPANET b. EDVAC c. ENIAC d. VLSI
9. It refers to processed information that helps fulfil people’s daily tasks.
a. communication b. Information c. Knowledge d. Technology
10. It is referred to as the enclosure composed of the main elements of a
computer used to administer data.
a. digital camera b. Personal computer c. Storage devices d. System unit
11. It refers to the interconnection of information technology devices within the
range of an individual person, normally, within the range of ten meters.
a.LAN b.MAN c.PAN d.WAN
12. It is refers to the pathway composed of cables and connectors used to carry
data between computer’s peripheral devices.
a.binaryl number system b. Decimal number system
c. Hexadecimal number system d. Octal number systems
13. It refers to the pathway composed of cables and connectors used to carry
data between computer’s peripheral devices.
a. address b. Control bus c. data bus d. System bus
14. It is used primarily for direct hardware manipulation and direct access to
specialized processor instruction. It is also used to addressed critical performance
issues .
a. assembly language b. Human language
c. Machine language d. Programming language
15. It is a type of bus that is used by the CPU to specify address for instruction,
files, and other devices within the computer system.
a. address bus b. Control bus c. Data bus d. System bus
16. The CPU sends a _____ via the control bus,stopping the data to be sent
through the data bus, and often seen as an error message prompt.
17. It is the method that the internet uses to store domain names and their
corresponding IP addresses.
a AD DS b. DHCP c. DNS d. FTP
18. It is the tool used to access the internet.
a. web browser b. Web community c. Web page d. Website
19. This refers to a c ollection of related web pages and associated items, such as
documents and pictures stored in a webserver.
a. . web browser b. Web community c. Web page d. Website
20. It allows the user to write a letter, design a flyer, and create other types of
documents.
a. Microsoft word b. Notepad c. Wizard d. Word processor
21. This refers to the process of broadcasting original content on internet.
a. Hosting b. Navigating c. Paging d. Publishing
22. It is a set of instructions and operations for a computer to perform certain
task.
a. host b. Interpreter c. Program d. Programmer
23. It is a programming language that provides little or no abstraction from a
computer’s instruction set architecture.
a. computer language b. High-level language
c. human language d. Low level – language
24. It is a not –for-profit networking consortium in the U.S which aims to improve
the internet, such as relieving bottlenecks in the current architecture.
a. domain b. Infrastructure c. internet d. Schema
25. It is a programming language that enables programmer to write programs
that are more or less independent of a particular type of computer.
a. computer language b. high-level language
c. human language d. Low level language
26. It allows a user to execute financial transaction via the internet.
a. E- learning b. Online banking c. loT d. IT automation
27. It refers to the voluminous amount of data from traditional and digital source
that could be mind for valuable insights on human behaviour such as trends,
pattern, and associations, in turn boosting business intelligence.
a. Big data b. IT Automation c. Digibanker d. Learning management system
28. Data are considered facts;therefore;processed data are consider as:
a. information b. Files c. Documents d. Junk files
29. It is a stand- alone malware that replicates itself in order to spread to other
computers.
a. worm b. Virus c. Ransom ware d. Spyware
30. It is a type of malware that can block access to a victim data.
a. virus b. Ransom ware c. Spy ware d. Worm
31. An IT trend which uses machine learning
a. IoT and smarthome technology b. Artificial intelligence
c. Big Data d. Automation
32. Which method of automatic is apple’s siri an example of?
a. automated assistant b. process automation
c. Smart Machines c. IT support management
33. When you enter a room, the light turns on automatically without turning on
any light switch, what type of sensor is used
In the scenario?
a. infrared sensor c. Pressure sensor
b. touch sensor d. proximity sensor
34. Which type of sensor is often used to detect any burglar intrusion?
a. infrared sensor c. Temperature sensor
b. touch sensor d. Level sensor
35. IoT implementation is challenging. One problem area has something to do
with an enterprise dealing with production, manufacturing , ordering, and
supplying goods. This type of issue is considered under:
a. connectivity b. system requirement c. Security d. Services
36. Unlike other organizational resources , information is similar to them in terms
of the following except:
a. transportable b. compressible c. Diffusive d. Expandable
37. When compared to other resources, information is similar to them in terms of
the following except:
a. its cost can be controlled with the help of accounting techniques.
b. can be substituted
c. It is available in a standard type, grade and price.
d. has a life cycle.
38. Mr. Cruz recently found out his email was hacked and said that hacker has
been sending spam email to all his contacts. Which of the following regulations
need to be enforced in this issue?
a. content control c. Privacy control
b. defamation control d. Copyright control
39. Ms. Ana has a blog which she updates with photos and videos of her day-to-
day activities. She recently received a personal massage demanding that the
picture of certain images she took in an art museum be removed from her site.
Which of the following regulation did she not follow.
a. content control c. privacy control
b. defamation control d.copyright control
40. MPE3 files fall under the category of:
a. digital rghts b. patent rights c. Copyrights d. Trademarks
41. Ms. Liza recently subscribed to a cable TV provider and bought a smart TV
along with it her smart TV gives her the capability to record shows she might miss
every now and then. Which control issue can be in this case?
a. convergence c. Volume
b. scale d. Unprecedented individual empowerment
42. Ms. Jane is an active facebook user. She recently posted a picture of herslf
with her friends getting drunk during a party. Her boss saw it on her profile and
said it was very unprofessional and asked her to take it down. She did but , her
friends uploaded the same picture and tagged her, making her pictures stillappear
on her profile. Which control issue is shown in the case?
a. convergence c. volume
b. scale d. unprecedented individual empowerment
43. These are also called conceptual resources.
a. tangible resources c. Complex resources
b. non- tangible resources d. Simple resources
44. Information that is important and useful when it is needed is considered:
a. reliable b. accessible c. Complex resources d. Simple resources
45.A movie being sold in different formats and medium such as in DVDs, Google
play, itunes , etc. Means that the movies is considered as:
a. non-rivalrous c .not exhibiting high degrees of transparency
b. non-exclusive d. Having zero-marginal cost
46. A profile created by internet users to establish their social identify in online
communities.
a. internet profile b. online identity c. Internet identity d. Internet persona
47. A distinctive sign used by an individual, business organization, or other legal
entity to identify the products or services to consumers.
a. patent b.trademark c. Service mark d. Copyright
48. A set of exclusive rights granted by a state to the creator of an orginal work or
their assignee for a limited period of time in exchange for profile disclosure of the
work, and includes the right to copy, distribute, and adapt the work.
a. patent b. trademark c. Service mark d. Copyright
49. A series of alphanumeric characters acting as a key to denote that the
product or software is original.
a. master key b. serial keys c. Product key d. Software key
50. This is done to hide sensitive information from unauthorized users.
a. content scrambling system c. Tag embedding
b. scrambling d. metadata

You might also like