You are on page 1of 11

JOSE MARIA COLLEGE Foundation Inc.

Philippine - Japan Friendship Highway, Sasa, Davao City

COLLEGE OF BUSINESS EDUCATION


Bachelor of Science in Accountancy

Semi-Final Examination
IT Application Tools in Business
Instructor: EDILBERTO S. SARITA, CPA

Name: Abigail D. Rosos Score:


Course & Year: BSA-1 Permit No. 11704

I. Multiple Choices. From among the choices, identify the most appropriate answer
on the blank provided. Please write the corresponding letter of the correct
answer on the blank space provided.

1. ___C___ Software in computer.


A. Increase the speed of central processing unit
B. Information System
C. Enhances the capabilities of the hardware machine
D. None of the above

2. __A____What is the responsibility of the logical unit in the CPU of a


computer.
A. To compare numbers
B. To produce result
C. To control flow of information
D. None of the above

3. ___B__ Instructions and memory address are represented by.


A. Character code
B. Binary codes
C. Binary word
D. None of the above

4. ___A___ Brain of computer system.


A. Central Processing Unit
B. Control Unit
C. Arithmetic Logic Unit
D. Accounting Information System

5. ___D___Which of the following is not a hardware?


A. Computer Printer
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

B. Computer Monitor
C. Mouse
D. Internet browser

6. ___C___Which of the following is not an operating system?


A. DOS
B. Linux
C. OpenOffice.org
D. Windows 10

7. ___A___What type of computer application is used for calculations. It


presents tables of values arranged in rows and columns that can be
manipulated mathematically using both basic and complex arithmetic
operations and functions
A. Spreadsheet calculation program
B. Antivirus software
C. MS Word
D. None of the Above

8. ___B___ is designed to help you quickly find the commands that you
need to complete a task. Commands are organized in logical groups,
which are collected together under tabs.
A. Quick Access
B. The Ribbon
C. Arithmetic Logic Unit (ALU)
D. None of the Above

9. ___A___ known as the Father of Computer.


A. Charles Babbage
B. Joseph Marie Jacquard
C. Herman Hollerith
D. None of the Above

10. ___A___The place to keep the items that you need to access quickly, but
want to be immediately available regardless of which of the Ribbon’s tabs
you’re working on
A. Quick Access Toolbar
B. The Ribbon
C. File Menu
D. None of the above
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

11. ___B___The number of columns for MS Excel version 2007 and later.
A. 16,385
B. 16,384
C. 16,386
D. None of the above

12. ___C___The number of rows for MS Excel version 2007 and later.
A. 1,048,577 B. 1,048,578
C. 1,048,576
D. None of the above

13. ___A___ shortcut key to select the entire cells in MS Excel.


A. Ctrl+A
B. Ctrl+S
C. Ctrl+Z
D. None of the above

14. ___C___is a shortcut key to negate a single action in MS Excel even if


such record is already and currently saved.
A. Ctrl + A
B. Ctrl + S
C. Ctrl+Z
D. None of the above

15. __C____What is the important contribution of the Atanasoff-Berry


Computer (ABC) developed in 1841.
A. First Digital-Electronic Computer in the US
B. Marked the First Time a computer can store information in main
memory
C. Both A and B
D. None of the above

16. ___A___is not a component of a Computer System


A. Data Unit
B. Input Unit
C. Output Unit
D. None of the above

17. ___B___this unit contains devices with the help of which we enter data
into computer
A. Data Unit
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

B. Input Unit
C. Output Unit
D. None of the above

18. ___D__Which is not a component of a Central Processing Unit (CPU) A.


Control Unit
B. ALU(Arithmetic Logic Unit)
C. Memory Unit
D. None of the above

19. Storage of data happens in the ___B___ component


A. Input Unit
B. Central Processing Unit (CPU)
C. Output Unit
D. None of the above

20. ____D____ is the backbone of computers. It is responsible for


coordinating
tasks between all components of a computer system
A. Input Unit
B. Control Unit
C. Output Unit
D. None of the above

21. ____D____ Roles of computers in Business


A. Communication
B. Research
C. Accounting
D. All of the above

22. _____D___ is not among the negative effects in using the computers
A. Addiction
B. Plagiarism
C. Cyber Crime
D. None of the above

23. ____D____ is an electronic device that takes input from the user and
processes these data under the control of a set of instructions (called
program) and transform these data into an information
A. Computer Printer
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

B. Computer Monitor
C. Mouse
D. Computer

24. ____C____ a part in the Central Processing Unit (CPU) where data
entered by the user using input devices, are stored in this unit of CPU. This
data will now remain here until other components of CPU process it. This unit
of CPU uses a set of pre-programmed instructions to further transmit this data
to other parts of the Computer.
A. Computer Unit
B. Computer Monitor
C. Memory Unit
D. None of the above

25. ____A____ a part of the CPU performs arithmetic operations. It does


basic mathematical calculations like addition, subtraction, division,
multiplication, etc. Further, it can even perform logical functions like the
comparison of data
Computer Unit
A. Arithmetic Logic Unit (ALU)
B. Memory Unit C. Input Unit
D. None of the above

26. ___B___ who wrote the world's first computer program in 1848.
A. Joseph Marie Jacquard
B. Ada Lovelace
C. Charles Babbage
D. None of the above

27. ___B___ a company established by Herman Hollerith in 1890.


A. Microsoft Corporation
B. International Business Machines Corporation (IBM)
C. Hewlett-Packard Corporation
D. None of the above

29.___C___ a system designed by Herman Hollerith in 1890 that helped to


calculate the US Census. The machine saved the US government several
years of calculations and the taxpayers money approximately $5 million.
A. Accounting Information System
B. Budgeting System
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

C. Punch-Card System

30.___A___ an electro-mechanical device designed to decipher Nazi codes


during World War II.
A. Turing-Welchman Bombe
B. Sarita-Welchman Bombe
C. Turing-Welch Bombe
D. None of the above

31.___C___ a computer considered as the world's earliest digital computer


developed by Konrad Zuse in 1841.
A. Z1 B. Z2
C. Z3
D. Z4
32.____C__ what is the important contribution of the Atanasoff-Berry
Computer (ABC) developed in 1841.
A. First Digital-Electronic Computer in the US
B. Marked the First Time a computer can store information in main
memory
C. Both A and B
D. None of the above

33.___A___ This machine is the first "automatic, general-purpose, electronic,


decimal, digital computer which was designed and built by John Mauchly and
J. Presper Eckert
A. Electronic Numerical Integrator and Calculator (ENIAC)
B. Automatic Numerical Integrator and Calculator (ANIAC)
C. Both A and B
D. None of the above

34. ___C___ the first commercial computer for business and government
applications which is developed and built by John Mauchly and J.
Presper
Eckert
A. Automatic Numerical Integrator and Calculator (ANIAC)
B. Electronic Numerical Integrator and Calculator (ENIAC)
C. Universal Automatic Computer (UNIVAC)
D. None of the above

35. ___A___ developed the first computer language, which eventually


becomes known as COBOL, which stands for Common, Business-
Oriented
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

Language that turned her dubbed as the "First Lady of Software"


A. Grace Hopper
B. Margaret Hamilton
C. Ada Lovelace
D. None of the above

36. A team of IBM engineers led by ____A____ invents the "floppy disk,"
enabling data to be shared among different computers
A. Alan Shugart
B. Bill Gates
C. Steve Wozniak
D. None of the above

37. ___A_____developed Transmission Control Protocol and Internet


Protocol, or TCP/IP, a communications model that set standards for how
data could be transmitted between multiple networks that became the
modern Internet.
A. Robert Kahn and Vinton Cerf
B. Bill Gates
C. Steve Wozniak
D. None of the above
38. ____A____invented the World Wide Web (WWW)
A. Tim Berners-Lee
B. Nikola Tesla
C. Steven Wozniak
D. None of the above

39. ____B____founded the Microsoft Corporation in 1975


A. Nikola Tesla
B. Bill Gates and Paul Allen
C. Steve Wozniak and Steve Jobs
D. None of the above

40. ____C____founded the Apple Computer in 1976


A. Nikola Tesla
B. Bill Gates and Paul Allen
C. Steve Wozniak and Steve Jobs
D. None of the above

41. _____B___developed the Google Search Engine in 1996 at Stanford


University
A. Bill Gates
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

B. Sergey Brin and Larry Page


C. Steve Jobs
D. None of the above

42. ____A____The year when Wi-Fi, the abbreviated term for "wireless
fidelity" was developed, initially covering a distance of up to 300 feet (91
meters).
A. 1999 B. 1998
C. 1996
D. None of the above

43. ____A____is a type of computer program like Windows 10, Linux,


macOS, Android and the like that is designed to run a computer's
hardware and application programs.
A. System Software
B. Utility Software
C. Application Software
D. None of the above

44. ____A____is a computer program that operates or controls a particular


type of device that is attached to a computer or automaton like printers’
driver and the like.
A. Device Driver or Software
B. System Software
C. Application Software
D. None of the above

45. ____C____is software designed to help analyze, configure, optimize or


maintain a computer.
A. System Software
B. Application Software
C. Utility Software
D. None of the above

46. ____B____is a computer software package that performs a specific


function directly for an end user.
A. System Software
B. Application Software
C. Utility Software
D. None of the above
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

47. ____A____is a technology which uses computers to gather, process,


store, protect, and transfer information.
A. Information Technology
B. Artificial Intelligence
C. Audio-Visual Technology
D. None of the above

48. ____A____is a temporary memory medium or container for personal


computers and other electronic devices to make the programs or
applications or software to run and the data to be processed.
A. Random Access Memory (RAM)
B. Read-Only Memory (ROM)
C. Video Memory
D. None of the above

49. ___B_____is a type of storage medium that permanently stores data on


personal computers (PCs) and other electronic devices. It contains the
programming needed to start a PC, which is essential for boot-up; it
performs major input/output tasks and holds programs or software
instructions.
A. Random Access Memory (RAM)
B. Read-Only Memory (ROM)
C. All of the above
D. None of the above

50. ____C____is the program a computer's microprocessor uses to start the


computer system after it is powered on. It also manages data flow
between the computer's operating system (OS) and attached devices,
such as the hard disk, video adapter, keyboard, mouse and printer.
A. Operating System
B. Input Device Program or Application
C. Basic Input / Output System (BIOS)
D. None of the above

II. Essay.

Provide short but substantive/concise answer to the following questions:

1) Enumerate the Four (4) Cyber Security Domains as provided


by Debra Herrmann, Complete Guide to Security and
Privacy Metrics and by your own words discuss each of
them (25 points)
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

According to Debra Herman, there are 4 cyber security


domains: the physical security, personnel security, IT
security, and operational security.

Physical security- is the protection of hardware, software and


data from physical threats to avoid losing asset and
disruptions to operations.

Personnel Security- a cyber protection to decrease the


likelihood and impact of accidental and intentional alteration
or exploitation of their legitimate access to organization’s
facilities, assets, systems or people for illicit gain or to cause
harm.

IT Security- A cybersecurity that helps prevent the


undesirable impact of malicious threats and potential
security breaches such as ransomware, spyware and
viruses. It helps maintain integrity and confidentiality of
sensitive information.

Operational Security- A cybersecurity that prevents


confidential information to fall into wrong hands. It avoids the
likeliness of accidental or unintentional theft, release,
destruction, misuse and sabotage of system resources
throughs securing the system state at all times.

2) State the Jose Maria College’s INSTITUTIONAL


STRATEGIC GOALS (15 points)

Jose Maria College’s commitment to excellence is reflected


in its five-arching goals, articulated below:

1. Produce globally competitive graduates that shall


exemplify the values of the institution.
2. Increase subscribed academic programs.
3. Upgrade human resource and employee productivity
4. Establish quality in its operations.
JOSE MARIA COLLEGE Foundation Inc.
Philippine - Japan Friendship Highway, Sasa, Davao City

5. Strengthen research and community extension activities


aligned with educational and accreditation standards.

3) State the Jose Maria College’s INSTITUTIONAL


OUTCOMES (10 points)

1. Professional Competence- Demonstrate proficiency in


their respective area of specialization in consonance with
regulatory and global standards.
2. Leadership Skills- execute sustainable leadership in the
practice and engagement in the work (consistent
education).
3. Value Oriented- Exhibit exemplified learning with passion
for people, creations, and resources (quality education).

You might also like