Professional Documents
Culture Documents
1. Question 1. ________ can be used in a lot of ways. They are used in education, health and medicine, Points: 2
recreation and entertainment,
a. Computers
b. Internet
c. Net
2. Question 2. Computers are also used in the field of _______. Information now can be digitized, and Points: 2
electronic devices to help patients have been developed. People who are hard of hearing can now have
hearing instruments that can be adjusted to precise measurements using computers.
a. Medicine
b. Education
c. Aesthetic
3. Question 3. The ________ also uses computer. Records are computerized for faster transactions. Traffic Points: 2
control is also done using computers.
a. Government
b. Entertainment
c. Medicine
4. Question 4. While we work using some _________ applications, we will be asked what file name we wish to Points: 0
save our files as and where to save them.
a. MS Office
b. Software
c. Hardware
5. Question 5. The ________ option in the File menu can help us assign a file name for our work. Points: 2
a. Save As
b. File
c. Menu
6. Question 6. ________ folder section can help us find a place to save our file. Points: 2
a. Browse
b. Save
c. File
7. Question 7. ______________ help us easily find the file we need. It should tell us what the file is about even Points: 2
before we open the file.
c. File Name
c. File Names
9. Question 9. The first letter of each word is capitalized, with no spaces in between words. Points: 2
a. Camel case
b. All caps
c. Caps lock
10. Question 10. Is the sorting, naming and maintaining of computer files. It aims to organize and classify Points: 2
computer data to remove unwanted files.
a. File Management
b. Management
c. Files
a. Folder creation
b. Subfolder creation
c. Creation
12. Question 12. _________ is short for malicious software. It is a code created with malicious intent. It is Points: 2
designed to damage, destroy, steal, or inflict bad action on data, hosts, or networks.
a. Malware
b. Virus
c. Worm
13. Question 13. A ____________ is a type of malware that propagates by inserting a copy of itself and Points: 2
becoming part of another program.
a. Computer virus
b. Computer Worm
c. Computer threats
14. Question 14. __________ is a stand-alone software and does not require a host program to spread. It enters a Points: 2
computer and takes advantage of file-transport or informational transport features on the system that allows it
to travel on its own.
a. Computer worm
b. Computer virus
c. Computer threat
15. Question 15. A ________ is another type of malware that was named after the wooden horse that the Greeks Points: 2
used to infiltrate the city of Troy. It is a software that looks real, but it activates and attacks the host when
loaded. It irritates the user with pop-ups, deletes files, steals data, and spreads viruses.
a. Trojan
b. Computer worm
c. Computer virus
16. Question 16. The short term for malicious code is ___________________. Points: 2
a. malware
b. virus
c. worm
17. Question 17. The ________________ was an agency for missile research. Points: 2
c. CSNET
18. Question 18. With as little time possible spent and under the same language and protocol, the first computer Points: 2
was created in __________.
a. 1970
b. 1969
c. 1997
19. Question 19. In 1972, the first e-mail program was developed by __________. Points: 2
a. Grey Thomas
b. Ray Tomlinson
c. Red Billing
20. Question 20. The ____________ was introduced for computers to communicate with each other. Points: 2
c. NASA
True or False
Tick True if the statement is correct and tick False if it is wrong.
21. Question 21. Avoid “flaming” (online screaming) or sentences typed in ALL CAPS. Points: 2
true
false
true
false
23. Question 23. Do contribute to worthless information on the Internet by sending or responding to mass Points: 2
postings of chain letters, rumors, etc.
true
false
true
false
25. Question 25. A browser or web browser is a software application used to locate, retrieve, and display content Points: 2
on the World Wide Web. It is used for information retrieval as well.
true
false
26. Question 26. In 2010, Facebook announced that it has 400 million active users. Points: 2
true
false
27. Question 27. In 1996, Nokia released the first cell phone with access to Internet. In 1999, Wireless Fidelity or Points: 2
Wi-Fi was standardized.
true
false
28. Question 28. In 1998, Archie, the first search engine was created, the US government gave the green light for Points: 2
commercial activities to take place over the Internet.
true
false
29. Question 29. In 1997, the National Science Foundation released a program called Computer Science Network Points: 0
(CSNET) 56 that allowed computers to network without government interference.
true
false
30. Question 30. The Internet is probably the most important development of all time. Points: 2
true
false