You are on page 1of 7

1.

Programs that enable users to perform specific tasks on a computer, such as writing letters or
playing games
A. Internet address
B. Portable computer
C. Application software
D. Virtualization
2. A programmable, electronic device that accepts data input, performs processing operations on that
data, and outputs and stores the results
A. Output
B. Web server
C. Computer network
D. Computer
3. To start up a computer
A. Input
B. Boot
C. Data
D. Netbook
4. The knowledge and understanding of basic computer fundamentals
A. Supercomputer
B. Computer literacy
C. World Wide Web (WWW)
D. Computer network
5. The physical parts of a computer system, such as the keyboard, monitor, printer, and so forth
A. Storage
B. Username
C. Hardware
D. Internet
6. Information overload
Cost
Data inaccuracy
Software unreliability
A. Digital piracy
B. Advantages of computer use
C. Carpal tunnel syndrome
D. Disadvantages if computer use
7. Aided globalization and the resulting outsourcing of jobs, as well as structural unemployment (the
obsolescence of certain jobs)
A. Carpal tunnel syndrome
B. Examples if unethical behaviour
C. Computer technology
D. Computer ethics
8. The field of study concerned with the fit between people and their work environments
A. Ergonomics
B. Digital piracy
C. Automation
D. Outsourcing
9. 1. Hands, wrists, elbow, eyes, back, neck, etc
2. Take frequent breaks
3. Practice proper posture while using computers
A. Health Risks
B. Computer crimes
C. Other limitations
D. Data security
10. Personal and private information can be obtained by others if not protected properly
A. Privacy Violations
B. Other limitations
C. Waste time/energy
D. Impact on Environment
11. competition; supplier; buyer; threat of new entrants; threat of substittes
A. Moore's Law
B. Expert System - def (4 parts) & pros and cons
C. integrated circuit
D. IT & Porter's Five Forces
12. run public key system in reverse
A. backbone network
B. Cryptography (2 ways)
C. integrated circuit
D. Digital signature
13.1). sender & receiver must authenticate each other before sending any real data
2). all 'real' data must flow encrypted through the web
3). no integrated info can be for intruder's advantage
A. Compatibility regarding how a new technology is more valuable (2 points)
B. Requirements for transmitting sensitive info through the web (3 points)
C. Arguments FOR Net Neutrality
D. Bitcoin features (5 points)
14. 1. price as high as possible without making it profitable for entrants
2. limit price is lower than monopoly price
3. signal you're willing to cut price if necessary
4. discourage entry
A. IT & Porter's Five Forces
B. Requirements for transmitting sensitive info through the web (3 points)
C. 4 Strategies for existing market leader of digital goods
D. Moore's Law
15. 32 bit number given to each device connected to the internet, represented by 4 number segments
separated by dots.
A. IP address
B. Transistor
C. Fair Use
D. internet
16.A professional who finds out the requirements for the business unit and then translates those
requirements into documentation that the programmers can work with.
A. Data Integration
B. Business Analyst
C. ASCII (American Standard Code for Information Interchange)
D. Byte
17. Power of information now moved to desktop computers so individual workers could control data,
words, and images. PCs were not as widespread in the home yet.
a. Match-Index Function
b. Central Processing Unit (CPU)
c. Personal Computing Devices
d. Pivot Table Report Filter
18. An electronic device operating under the control of instructions stored in its own memory that can
accept, manipulate, and store data
a. Supercomputer
b. A Table
c. Volatility
d. Computer
19.A computer that is portable and can be used while traveling
a. Minicomputer
b. Smartphone
c. Laptop
d. RAM
20.The critical point in a situation that leads to a new and irreversible development.
A. Tipping Point
B. Finance Control
C. Decision Making
D. Control Unit
21. Are applications in the computer that enables the user to use them to perform certain
functions.For example, Microsoft or Websites
a. Hardware
b. Information
c. Software
d. Computer
22. Are the physical tangible parts of the computer. These components completes the computer
structure. For example, Keyboard, Screen, Monitor, mouse or the hard drives
a. Computer
b. Hardware
c. Software
d. Information and Communication Technology
23. a structured set of data held in a computer, especially one that is accessible in various ways.
A. Internet
B. Pop Ups
C. Database
D. Hardware
24. involving or relating to the use of computer technology.
a. Email
b. Software
c. Drones
d. Digital
25. Drones
unmanned aircraft used for spying and locating enemies
a. Digital
b. Hardware
c. Drones
d. Internet

TEST I (1-23 Items) Choose the correct answer in the table below.

Outsourcing Digital piracy Public Layer of Global Ignorance Information and


Computing Project Communication
Technology
Information Software Baby (Computer) Smartphone Computer
Windows desktop Automation Unemployed Finger print scanner Hardware
Internet address Computer crimes Computer Virus POP ups ASCII (American
Standard Code for
Information
Interchange)

Notebook computer Management Search Engine RISC (reduced Cheating


Information System instruction set
(MIS) computer chip)

1. A fully functioning portable computer that opens to reveal a screen and a keyboard; also called a
laptop computer

2. An address that identifies a computer, person, or


Web page on the Internet, such as an IP address, domain name, or e-mail address

3. The background work area displayed on the screen for computers running Microsoft Windows

4. Data that has been processed into a meaningful form

5. The instructions, also called computer programs, that are used to tell a computer what it should
do

6. Subcontracting of portions of a job to a third party to reduce cost, time & energy

7. unauthorized reproduction and distribution of computer based media

8. Replacement of people by machines and computers

9. Computers replace humans

10. Hackers, identity theft, other negative activities

11. Limits the number of instructions the CPU can execute to increase processing speed.

12. Mainframe computers were used for businesses rather than personal use. Thus, the power of
information was controlled by select few individuals such as corporate managers.

13. first computer to run a program stored in removable memory.

14. A mobile phone that performs a lot of the same functions of a computer
15. Hans and Ola want people to realize that things are changing and changing for the good in a lot
of areas that were misconceived as bad due to ignorance. They hope that the test that they
have created will be used in interviews and job recruiting, so that employers hire people who
are invested in knowing what is going on in the world.

16. Is the study of computer components such as software and hardware

17. Is the electronic device that is able to encode,process,store and retrive information

18. It consists of several software and hardwares

19. A software program you can use to find Web sites, Web pages, and Internet files.

20. Cheating act dishonestly or unfairly in order to gain an advantage, especially in a game or
examination.

21. A machine used to detect fingerprints and record them

22. a software program capable of reproducing itself and usually capable of causing great harm to
files or other programs on the same computer

23. an unexpected browser window, especially one generated for the purpose of advertising.

24. A general name for the business function and academic discipline covering the application of
people, technologies, and procedures to solve business problems. → Management Information
System (MIS)

25. A character encoding standard for electronic communication. Standard characters are
represented in Binary format for computers to read. → Virtualization

TEST III : TRUE OR FALSE. Write the word TRUE if the statement is correct and FALSE if the statement is
incorrect.

1. A document, typically containing hyperlinks to other documents, located on a Web server and
available through the World Wide Web → Web page

2. Electronic messages sent from one user to another over the Internet or other
network → Electronic mail (e-mail)

3. A collection of computers and other hardware devices that are connected together to share
hardware, software, and data, as well as to communicate electronically with one another → Computer
literacy
4. A computer that is continually connected to the Internet and hosts Web pages that are
accessible through the Internet → Web site

5. A mobile device based on a mobile phone → Smartphone

6. Moral dilemmas relating to computer usage → Computer technology

7. Learning using computers, designed to benefit students without requiring that they are at a
specific location in a specific time → Outsourcing

8. Use surge protectors


Don't plug several devices into the same outlet
Place hardware where it can't fall/be damaged
Provide adequate space for air circulation
Securely fasten cables, cords and wires → Ergonomics

9. Social interaction, become addicted, less involvement in school/community → Other limitations

10. Stored information accessed by unauthorized people → Computer crimes

11. 1. person to person communication


2. availability of trading partners or contents
3. complementary assets → Network Effect sources

12. 1. US government can prevent powerful online service providers such as Comcast, Verizon from
controlling internet traffic in a way that suits their own financial interests.
2. prevent cable-TV providers who also sell high-speed internet service from luring customers away from
internet only services. → 2 Issues with Crowd-Sourcing

13. The U.S. regulatory body for internet usage: Federal Communication Commission; rivals,
agencies, Federal Trade Commission.
1. edge-providers: Google, FB, Netflix, etc.
2. infrastructure provider: engineering groups
3. D.C. based advocacy group: ISPs, backbone companies → Data Analytics (technical & practical)

14. confidentiality
authenticity
non-repudiation → 4 Issues with Information Security

15. 1. ISPs may lose incentives to invest in new projects and expanding to new areas
2. Broadband hogs, such as Netflix now paying a fee, won't have to. → Arguments FOR Net Neutrality

16. A computer input device that uses a set of keys to put data into the computer. → keyboard

17. Reducing costs, improving customer satisfaction, creating competitive advantage, generating
growth, streamlining a supply chain, or global expansion → Common IT project goals.

18. Number of bits the CPU can process at any one time → Cloud Storage
19. A general name for the business function and academic discipline covering the application of
people, technologies, and procedures to solve business problems. → Management Information System
(MIS)

20. A character encoding standard for electronic communication. Standard characters are
represented in Binary format for computers to read. → Virtualization

KEEP SAFE ALWAYS!

You might also like