Living in The IT Era

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

NIKO B.

GUMBAN

BSIT IIB

MODULE 1

Multiple Choice: circle the answer that correspand to your answer.

1. It refers to a technology that support activities involving information,such as gathering, processing,


storing and presenting data.

a. Communication

b. Information

c. Information Technology

d. Information and communication technology

2. It refers to processed information that helps fullfil people's daily task.

a. Communication

b. Information

c. Knowledge

d. Technology

3. It is the technique of making an apparatu, a process, or a system operate automatically. It includes a


broad range of technooogies connecting computer system to other system.

a. Automation

b. Connection

c. Network

d. Server

4. It was considered the First-generation computer that could store only limited or small amount of
information.

a. Advanced Research project Agency Netwrok(ARPANET)


b. Electronic Discrete Variable Automaitc Computer(EDVAC)

c. Electronic Numeric Integrator and Calculator(ENIAC)

d. Very large-scale integrated(VLSI) cirvuit computer

5. It is a type of an input device yhat lets you select option on-screen menus.

a. Keyboard

b. Mouse

c. Trackball

d. Scanner

6. It is reffered to as athe enclosure composed of the main element of a computer used to administer
data.

a. Digital camera

b. Personal computer

c. Stoarge device

d. System unit

7. It is like a personal computer but it has a more powerfull microprocessor and higher-quality monitor.

a. Mainframe

b. Minicomputer

c. Supercomputer

d. Workstation

8. It is one of the ethical issues in ICT that occurs when person copies to another person's ideas, words,
or wiritings, and pass them of as his or her own.

a. Exploitation

b. Libel

c. Piracy

d. Pliagiarism
9. This occurs when a persons deals with another person dishonestly, unethicaly, and dishonorably in
order to take advantage of the latters work/s and resource.

a. Exploitation

b. Libel

c. Piracy

d. Pliagiarism

10. It is the period in human history characterized by the shift from traditional industry that he industrial
revolution brought through industrialization to an economy based on information computerization.

a. Digitgal age

b. Information age

c. Internet and things

d. Technoprenuership

MODULE 2

MULtiple Choice: Circle the letter that correspand to your answer.

1. It is a method of representing numbers that has 2 asd its base and uses only the digits 0 and 1; each
succesive degits represents a power of 2.

a. Binary number system

b. Decimal number system

c. Hexademical number system

d. Octal number system

2.It refers to the inter connection of information technology devices with in the range of individual
person, normally, within the range of 10 meters.

a. Local area network(LAN)

b. Metropolitan area network(MAN)


c. Personal area network(PAN)

d. Wide area network(WAN)

3. It refers to the pathway composed of cables and connectors used to carry data between a computers
peripherals devices.

a. Address bus

b. Control bus

c. Data bus

d. System bus

4. It is a type of bus that is used by the cpu to specify a physical address for instruction, files, and other
device within the computer system.

a. Address bus

b. Control bus

c. Data bus

d. System bus

5. The CPu sends a ___ via the control bus, stopping the data to be sent through the data bus, and often
seen as an error message promt.

a. halt instruction

b. system platforms

c. validation message

d. wired communication

6. This is a broad term that incorporates all pocedures and forms of connecting and communicating
between two or more devices using a wireless signal.

a Processed communication

b. Wired communication

c. Wireless communcation

d. WIFI
7. It host application software installed in system.

a. Ethernet

b. Bluetooth

c. Fire wire

d. Platforms

8. It is a type of connector for transmitting audio/video data compatible with computers, projectors, and
digital televisions.

a. Asynchronus transfer mode(ATM)

b. High-definition Multimedia Interface(HDMI)

c. Serial advance technology attachment(SATA)

d. Video Graphic Array(VGA)

9. It involves the use of computer or electric device in delivering instructions to students.

a. Electronic commerce

b. Electronic learning

c. Text-to-speech programs

d. Video conferencing

10. It is geographically distributed private telecommunications network that interconnects multiple area
networks (LANs).

a. Metropolitans area network

b. Storage/System area network

c. Wireless local area network

d. Wide are network

MODULE 3
Multiple Choice: Circle the letter that correspand to your answer.

1. It is used priamrily for direct hardwork manipulation and direct access to speacialized processor
instruction.It is also used to address critical performance issues.

a. Assembly language

b. Human language

c. Machine language

d. Programming language

2. It is the method that the internet uses to store domain names and thier correspanding IP address.

a. AD DS

b. DHCP

c. DNS

d. FTP

3. It is the tool to access internet.

a. Web browser

b. Web community

c. Web page

d. Website

4. This refers to a collection of related web pages and assciated items, such as document and pictures,
stored in a web server.

a. Web browser

b. Web community

c. Web navigator

d. Website

5. It allows the user to write a letter, design a flyer, and creates other type of documents.
a. Microsoft Word

b. Notepad

c. Wizards

d Word Proccessor

6. This refers to the proccess of broadcasting original content on the internet.

a. Hosting

b. Navigating

c. Paging

d. Publishing

7. It is a set of instructiopn and operation for a computer to prform certain tastk.

a. Host

b. Interpreter

c. Program

d. Programmer

8. It is a not-for-profit networking consortium in the U.S which aims to improve the internet, such as
relieving bottle neck in the current architecture.

a. Domain

b. Infastructure

c. Internet2

d. Schema

9. It is a programming language that provides little or abstraction from a computer's instruction set
architecture.

a. Computer language

b. High-level language

c. Human language
d. Low-level language

10. It is a programming language that enables a programmer to write programs that are more or less
independent of a particular type of a computer.

a. Computer language

b. High-level language

c. Human language

d. Low-level language

MODULE 4

MULTIPLE CHOICE: Circle the letter that corresponds to your answer.

1. Unlike the other organizational resources information can be described as follow, except:

A. Trasnportable

B. Compressible

C. Diffusive

D. Expandable

2. When compared to other resources information is similar to them in terms of following except.

A. Each cost can be controlled with the help of accounting techniques

B. Can be substituted

C. Is available in a standard type, grade, and price

D. Has a life cycle

3. Mr. Puti recently found out his email was hacked and said that the hacker has been sending spam
emails to all his contacts. Which of the following regulations needs to be enforced in this issue?

A. Content control

B. Defamation control
C. Privacy control

D. Copyright control

4. Ms. Dilaw has a blogq which she updates with photos and videos of her day-to-day activities. She
recently received a personal message to me demanding that the picture of a certain images she took in
an art museum be removed from her site. Which of the following regulations did she not following
issue?

A. Content control

B. Defamation D.

C. Privacy control

d. Copyright control

5. MP3 files fall under the category of:

A. Digital rights

B. Patent rights

C. Copyrights

D. Trademarks

6. Ms. berde recently subscribed to a cable TV provider in bought a smart TV along with it. Her smart TV
gives her the capability to record shows that she might miss every now and then. Which control issue
could be found in this case?

A. converse

B. Scale

C. Volume

D. Unprecedented individual empowerment

7. Ms. Bughaw is an active Facebook user. She recently posted a picture of herself with her friends
getting drunk during a party. Her boss saw it on her profile and said it was very unprofessional and ask
her to take it down. She did but her friends Uploaded the same picture and tagged her, making her
picture still appear on her profile. Which control issue is shown in this case?

A. Convergence

B. Scale
C. Volume

D. Unprecedented individual empowerment

8. This are also called conceptual resources.

A. Tangible resources

B. Non-tangible resources

C. Complex resources

D. Simple resources

9. Information that is important and useful when it is needed is considered?

A. Reliable

B. Accessible

C. Relevant

D. Complete

10. A movie being sold in different formats in mediums such as in DVDs, Google Play, iTunes etc. means
that the movie is considered as:

A. Non-revalrous

B. Non-exclusive

C. Not exhibiting high degrees of transparency

D. Having zero-marginal cost

You might also like