Professional Documents
Culture Documents
Introduction to Computing
Midterm Exam
Score:
50
ST
1 Semester, Academic Year 2023-2024
General Instructions: Read each instruction carefully. Use BLACK PEN only in answering the exam, pencil or friction pen is
not allowed.
Write your answers on the space provided. STRICTLY NO ERASURES.
I. Identification
Direction: Fill each blank with the correct answer. Write your answer in the blank provided.
_____________________3. These are the instructions or programs that commands the computer what to do.
_____________________7. These were the first computers where users interacted using keyboards and monitors
which interfaced with an operating system, a significant leap up from the punch cards and printouts.
_____________________8. With this, it resulted to smaller and smaller computers, which were faster and more
energy efficient than their predecessors.
_____________________9. Calculating tool which is consists of beads affix on rods within a rectangular frame.
_____________________10. Device that accepts input, processes data, stores data, and produces output according
to a series of stored instructions.
_____1. Which operating system is known for its open-source nature and is commonly used in server environments?
_____4. Which of the following will you require to hear music on your computer?
a. video card b. monitor c. speaker d. mouse
_____6. It is software that manages computer hardware and provides services for applications.
_____7. What kind of technology does second generation computer computer use?
a. Transistor b. Keyboard c. Integrated Circuits (IC’s) d. Microprocessor
_____8. What are the steps of the Information Processing Cycle in order?
_____9. Which operating system is based on the Linux kernel and is known for its open-source nature?
a. Android b. IOS c. Windows d. Ubuntu
_____10. Which of the following is true regarding operating systems (OS) and their role in providing security features
to protect the system and its data?
a. Operating systems play a crucial role in providing security features to protect the system and its data.
b. Operating systems are primarily responsible for creating vulnerabilities in a system.
c. Operating systems do not have any impact on the security of a system.
d. Security features are solely the responsibility of third-party applications and not the operating system.
_____14. What does the acronym "GUI" stand for in the context of operating systems?
_____15. What is the booting process of a computer, and how does the operating system play a role in it?
a. The process of turning on a computer, and the operating system manages hardware resources.
b. The process of loading the operating system into the computer's memory, initiating system startup.
c. The process of shutting down a computer, and the operating system saves files.
d. The process of connecting to a network, and the operating system configures network settings.
IV. Essay.
Direction: Read the essay prompt or question carefully. (5pts. each)
1. Explore the dual impact of computer technology in society: its positive contributions, such as
improved communication and efficiency, alongside negative aspects like privacy concerns, job
displacement, and environmental issues. Suggest strategies to optimize benefits while addressing
drawbacks, considering both current trends and future possibilities.
2. Discuss the role of operating systems in modern computing environments, exploring their key
functions and responsibilities.
Prepared by: