1. The document is a midterm examination for a course called "Living in the IT Era" taken by BPA 1st year students.
2. It contains 25 multiple choice questions testing knowledge of common IT terms like applications, online platforms, and different eras of the internet.
3. The questions cover topics ranging from types of computers and devices to software tools for collaboration, project management, and time tracking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
61 views8 pages
GEE002
1. The document is a midterm examination for a course called "Living in the IT Era" taken by BPA 1st year students.
2. It contains 25 multiple choice questions testing knowledge of common IT terms like applications, online platforms, and different eras of the internet.
3. The questions cover topics ranging from types of computers and devices to software tools for collaboration, project management, and time tracking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8
UNIVERSITY OF CALOOCAN CITY
College of Liberal Arts and Sciences
Bachelor in Public Administration Brgy. 178, Congressional Rd. Caloocan City
GEE 002: LIVING IN THE IT ERA
MIDTERM EXAMINATION
Name of Examinee: Course & Yr.: BPA 1st-A Date:
Name of Examiner: COSME, RHENELYN JHOY J. Professor: Prof. Leopoldo De Jesus c. Google Hangouts Part 1. Choose the letter of the correct d. Class Tree answer. (100 pts.) e. Skype 6. Learning platform that offers multiple 1. It is a type of computer software that tools to make a classroom fun, is typically used by end users and is interactive and engaging. created to perform a specific purpose a. Quizizz other than one related to the b. Kids Academy operation of the computer itself. c. Google Hangouts a. Codegym d. Class Tree b. Application e. Skype c. Hardware 7. An unified communications service d. Onedrive that allows members to initiate and e. Media participate in text, voice or video 2. An online Java programming course chats, either one-on-one or in a consisting of 80% practice and 20% group. of the essential Java theory. a. Quizizz a. Codegym b. Kids Academy b. Application c. Google Hangouts c. Hardware d. Class Tree d. Onedrive e. Skype e. Media 8. It refers to entities that offer their 3. A web and mobile app that lets expertise to another party. teachers communicate with students a. Search engine Optizimation and their parents. b. Service Provider a. Quizizz c. Remote Backup b. Kids Academy d. Packet c. Google Hangouts e. Operating System d. Class Tree 9. Is a tech term that refers to an e. Skype interface or piece of software where 4. The world's most popular messaging, a user interacts or controls a voice, and video chat application. hardware, usually a computer. a. Quizizz a. Search engine Optizimation b. Kids Academy b. Service Provider c. Google Hangouts c. Remote Backup d. Class Tree d. Packet e. Skype e. Operating System 5. It is one of the most innovative and 10. A unit of transmission in data engaging programs for young communications. learners. a. Search engine Optizimation a. Quizizz b. Service Provider b. Kids Academy c. Remote Backup 1 d. Packet b. PDAs e. Operating System c. Laptops 11. Data loss can result from accidental d. Gaming Console deletion or corruption, network e. Desktop computer slowdown, hacking incidents and 18. A term first used around 2004. viruses, and natural disasters like a. Web 1.0 floods or fires. b. Web 2.0 a. Search engine Optizimation c. Web 3.0 b. Service Provider d. Technology Convergence c. Remote Backup e. Social Media d. Packet 19. Evolution of technological e. Operating System developments. 12. It refers to the practice of improving a a. Web 1.0 website’s visibility in the search b. Web 2.0 engines’ results pages so that c. Web 3.0 customers who are searching for a d. Technology Convergence company’s products and service can e. Social Media easily find it. 20. Was described by Time Berners-Lee. a. Search engine Optizimation a. Web 1.0 b. Service Provider b. Web 2.0 c. Remote Backup c. Web 3.0 d. Packet d. Technology Convergence e. Operating System e. Social Media 13. Are the fastest and the most 21. Its webpages were static. expensive computers. a. Web 1.0 a. Supercomputer b. Web 2.0 b. PDAs c. Web 3.0 c. Laptops d. Technology Convergence d. Gaming Console e. Social Media e. Desktop computer 22. Collection of internet based 14. Described as a Pc. communication tools. a. Supercomputer a. Web 1.0 b. PDAs b. Web 2.0 c. Laptops c. Web 3.0 d. Gaming Console d. Technology Convergence e. Desktop computer e. Social Media 15. Are tightly integrated computers. 23. A document collaboration software a. Supercomputer for geographically dispersed b. PDAs professionals who need constant and c. Laptops secure access to shared files. d. Gaming Console a. Livetimer e. Desktop computer b. Wrike 16. These are portable computers. c. Nomadesk a. Supercomputer d. Sidekick b. PDAs e. Tagzania c. Laptops 24. It is about your places. d. Gaming Console a. Livetimer e. Desktop computer b. Wrike 17. Is a computer device that outputs a c. Nomadesk video signal. d. Sidekick a. Supercomputer e. Tagzania 2 25. An online service used by b. Antivirus professionals all over the world to c. Webpage track their time. d. Web Servers a. Livetimer e. Web Browser b. Wrike 32. A piece of software that runs on a c. Nomadesk computer and serves users raw d. Sidekick elements comprising a website page e. Tagzania when they make a query. 26. Like chrome DevTools, for your a. WAN backend. b. Antivirus a. Livetimer c. Webpage b. Wrike d. Web Servers c. Nomadesk e. Web Browser d. Sidekick 33. Information must (--------). e. Tagzania a. equated 27. An integrated online project b. viewpoint management solution that helps you c. counterfeited manage projects, teams and d. perm businesses. e. media a. Livetimer 34. The (--------) sell what the culture b. Wrike buys. c. Nomadesk a. equated d. Sidekick b. viewpoint e. Tagzania c. counterfeited 28. A term that refers to a group of d. perm networked endpoints covering a large e. media geographical area. 35. The early world gets the (------). a. WAN a. equated b. Antivirus b. viewpoint c. Webpage c. counterfeited d. Web Servers d. perm e. Web Browser e. media 29. Is a type of application that enables 36. Selection is a (---------). users to access the World Wide Web. a. equated a. WAN b. viewpoint b. Antivirus c. counterfeited c. Webpage d. perm d. Web Servers e. media e. Web Browser 37. Anything in great demand will be (---). 30. An electronic document that is a. equated composed of images, text, files and b. viewpoint other database content. c. counterfeited a. WAN d. perm b. Antivirus e. media c. Webpage 38. (--------) is equated with truer. d. Web Servers a. Media e. Web Browser b. medium 31. Software that is designed to detect, c. Newer stop and remove viruses and other d. brain kinds of malicious software. e. information a. WAN 39. You are what you eat and so is your 3 (---------). b. Teleport a. Media c. Tempo b. medium d. Logmein c. Newer e. Tripit d. brain 47. It organizes your itinerary as you e. information email it confirmation and changes. 40. (---------) presence creates the story. a. Zoho a. Media b. Teleport b. medium c. Tempo c. Newer d. Logmein d. brain e. Tripit e. information 48. A cross between project management 41. Undead (----------) walks ever on. and time tracking. a. Media a. Zoho b. medium b. Teleport c. Newer c. Tempo d. brain d. Logmein e. information e. Tripit 42. The (--------) selects the message. 49. A suite of online business applications a. Media that are free for individuals and b. medium some have a subscription fee for c. Newer organizations. d. brain a. Zoho e. information b. Teleport 43. All (---------) are seen as controversial. c. Tempo a. ideas d. Logmein b. pursuit e. Tripit c. truths 50. It creates code and publishes d. age together. e. information a. Zoho 44. The whole truth is a (--------). b. Teleport a. ideas c. Tempo b. pursuit d. Logmein c. truths e. Tripit d. age 51. A network of infected devices, e. information connected to the Internet, used to 45. Who wrote the 12 Truths of commit coordinated cyber attacks Information Age? without their owner’s knowledge. a. Elon Musk a. Breach b. Johny Bravo b. Botnet c. Robert Harris c. Browser d. Harry Style d. Brute Force Attack e. Taylor Swift e. BYOD 46. It provides organizations and 52. A software application which individuals with secure, easy-to-use presents information and services and cost effective solutions for from the web. remotely supporting, connecting and a. Breach accessing digital information, b. Botnet applications and Internet-enabled c. Browser devices. d. Brute Force Attack a. Zoho e. BYOD 4 53. A computational power to e. IT automatically enter a huge number of 60. A collection of internet based combination of values. communication tools. a. Breach a. Assistive Media b. Botnet b. Mobile Media c. Browser c. ICT d. Brute Force Attack d. Social Media e. BYOD e. IT 54. An organisation’s strategy or policy 61. A popular free social networking site that allows employees to use their with more than a billion users. own personal devices for work a. Instagram purposes. b. Facebook a. Breach c. Twitter b. Botnet d. Youtube c. Browser e. Snapchat d. Brute Force Attack 62. One of its principal features is that e. BYOD pictures and messages are usually 55. An incident in which data, computer only available for a short time. systems or networks are accessed or a. Instagram affected in a non-authorised way. b. Facebook a. Breach c. Twitter b. Botnet d. Youtube c. Browser e. Snapchat d. Brute Force Attack 63. A photo and video sharing social e. BYOD networking service. 56. A range of handheld device. a. Instagram a. Assistive Media b. Facebook b. Mobile Media c. Twitter c. ICT d. Youtube d. Social Media e. Snapchat e. IT 64. A mathematical function that 57. An unextended term in unified protects information by making it communications. unreadable by everyone except those a. Assistive Media with the key to decode it. b. Mobile Media a. Download Attack c. ICT b. DoS d. Social Media c. Encryption e. IT d. EUD 58. Is the infrastructure and components e. Exploit that enable modern computing. 65. May refer to software or data that a. Assistive Media takes advantage of a vulnerability in a b. Mobile Media system to cause unintended c. ICT consequences. d. Social Media a. Download Attack e. IT b. DoS 59. A nonprofit organization founded in c. Encryption 1996. d. EUD a. Assistive Media e. Exploit b. Mobile Media 66. Collective term to describe modern c. ICT smartphones, laptops and tablets d. Social Media that connect to an organisation’s 5 network. allow the authentication and secure a. Download Attack exchange of information. b. DoS a. Arc Cloud c. Encryption b. Credentials d. EUD c. Certificate e. Exploit d. Data at Rest 67. When legitimate users are denied e. Arc Secure access to computer services (or 73. Describes data in persistent storage resources), usually by overloading the such as hard disks, removable media service with requests. or backups. a. Download Attack a. Arc Cloud b. DoS b. Credentials c. Encryption c. Certificate d. EUD d. Data at Rest e. Exploit e. Arc Secure 68. The unintentional installation of 74. Is an unlimited free file storage malicious software or virus onto a website. device without the user's knowledge a. Blummy or consent. May also be known as a b. Trailfire drive-by download. c. Mybloop a. Download Attack d. Pull Request b. DoS e. Ispott c. Encryption 75. Code review as a service. d. EUD a. Blummy e. Exploit b. Trailfire 69. Resources can include infrastructure, c. Mybloop platform or software services. d. Pull Request a. Arc Cloud e. Ispott b. Credentials 76. Is a tool for quick access to your c. Certificate favorite web services via your d. Data at Rest bookmark toolbar. e. Arc Secure a. Blummy 70. The protection of devices, services b. Trailfire and networks — and the information c. Mybloop on them — from theft or damage. d. Pull Request a. Arc Cloud e. Ispott b. Credentials 77. It is a proven mobile scavenger hunt c. Certificate marketing platform used on a d. Data at Rest highly-successful, award-winning, e. Arc Secure global marketing campaign with 71. A user’s authentication information Microsoft and Coca-Cola. used to verify identity – typically one, a. Blummy or more, of password, token, b. Trailfire certificate. c. Mybloop a. Arc Cloud d. Pull Request b. Credentials e. Ispott c. Certificate 78. It helps you find the needle in the d. Data at Rest haystack. e. Arc Secure a. Blummy 72. A form of digital identity for a b. Trailfire computer, user or organisation to c. Mybloop 6 d. Pull Request d. Seesaw e. Ispott e. Vivi 79. A radio is the personalized internet 85. It supports both shared and radio service that helps you find new one-to-one environments. music based on your old and current a. Idoceo favorites. b. Flipgrid a. Metacafe c. Apple Classroom b. Tall Street d. Seesaw c. Vimeo e. Vivi d. Pandora 86. A website and app that allows e. Imeem teachers to facilitate video 80. Is a social network that enables users discussions. to discover, interact and express a. Idoceo themselves with media, including b. Flipgrid music, video and photos, and form c. Apple Classroom connections based on shared tastes d. Seesaw and interests. e. Vivi a. Metacafe 87. A powerful assistant for teachers. b. Tall Street a. Idoceo c. Vimeo b. Flipgrid d. Pandora c. Apple Classroom e. Imeem d. Seesaw 81. It is not just a video sharing but also a e. Vivi hosting site that allows any and 88. It is primarily used as a way to every video to be posted. communicate with families and keep a. Metacafe them in the loop on the learning b. Tall Street their child is doing at school. c. Vimeo a. Idoceo d. Pandora b. Flipgrid e. Imeem c. Apple Classroom 82. It is a Social Recommendation d. Seesaw Engine. e. Vivi a. Metacafe 89. It focuses on important basics in the b. Tall Street four main curriculum subjects of c. Vimeo Reading, Math, World Around Us d. Pandora (beginning science and social e. Imeem studies), as well as Art & Colors, 83. It is a thriving community of people a. Khan Academy who love to make and share videos. b. Edmodo a. Metacafe c. Abcmouse.com b. Tall Street d. Bookful c. Vimeo e. Bookr Class d. Pandora 90. A storytelling-based English teaching e. Imeem app with animated stories and 84. The teacher's remote control in the games. classroom and is designed to save a. Khan Academy you as much time as possible, while b. Edmodo being as engaging as possible. c. Abcmouse.com a. Idoceo d. Bookful b. Flipgrid e. Bookr Class c. Apple Classroom 91. A small library of books and related 7 games enhanced with 3D graphics c. Wallet and Augmented Reality (AR). d. HDD a. Khan Academy 99. A small integrated circuit. b. Edmodo a. CPU c. Abcmouse.com b. Software d. Bookful c. Microprocessor e. Bookr Class d. Moderm 92. A free education app for both 100. One of the CEO of Apple students and teachers. Computers, Inc. a. Khan Academy a. Steve Harvey b. Edmodo b. Rhenelyn Jhoy c. Abcmouse.com c. Steve Jobs d. Bookful d. Taylor Swift e. Bookr Class e. Michael Jordan 93. A social learning app for students, teachers, districts, and schools. a. Khan Academy b. Edmodo c. Abcmouse.com d. Bookful goodluck on your exam! e. Bookr Class 94. Involve materials that usually ------ integrated to cellphones, watches, etc. “Cheating goes against the goodness that a. Mainframes will glorify Him. Dishonesty mars an b. Computer Server individual’s integrity and reputation.” - c. Wearable Computers Proverbs 10:9 d. Server e. Virtual Reality 95. Used primarily by large organizations. “Whoever can be trusted with very little can a. Mainframes also be trusted with much, and whoever is b. Computer Server dishonest with very little will also be c. Wearable Computers dishonest with much.” - Luke 16:10 d. Server e. Virtual Reality 96. A central computer. ------ a. Mainframes b. Computer Server “BREATHE IN, BREATHE THROUGH, BREATHE c. Wearable Computers DEEP, BREATHE OUT.” d. Server - Taylor Alison Swift, Labyrinth e. Virtual Reality 97. It allows all connected users to share “I’M DAMNED IF I DO GIVE A DAMN WHAT and store datas. PEOPLE SAY, NO DEAL / THE 1950S SHIT THEY a. Mainframes WANT FROM ME.” b. Computer Server - Taylor Alison Swift, Lavender Haze c. Wearable Computers d. Server "WE'RE HAPPY, FREE, CONFUSED AND e. Virtual Reality LONELY AT THE SAME TIME. IT'S MISERABLE 98. It stores data. AND MAGIC.” a. Flashdrive - Taylor Alison Swift, 22 b. Brain 8