0% found this document useful (0 votes)
61 views8 pages

GEE002

1. The document is a midterm examination for a course called "Living in the IT Era" taken by BPA 1st year students. 2. It contains 25 multiple choice questions testing knowledge of common IT terms like applications, online platforms, and different eras of the internet. 3. The questions cover topics ranging from types of computers and devices to software tools for collaboration, project management, and time tracking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views8 pages

GEE002

1. The document is a midterm examination for a course called "Living in the IT Era" taken by BPA 1st year students. 2. It contains 25 multiple choice questions testing knowledge of common IT terms like applications, online platforms, and different eras of the internet. 3. The questions cover topics ranging from types of computers and devices to software tools for collaboration, project management, and time tracking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

UNIVERSITY OF CALOOCAN CITY

College of Liberal Arts and Sciences


Bachelor in Public Administration
Brgy. 178, Congressional Rd. Caloocan City

GEE 002: LIVING IN THE IT ERA


MIDTERM EXAMINATION

Name of Examinee: Course & Yr.: BPA 1st-A Date:


Name of Examiner: COSME, RHENELYN JHOY J. Professor: Prof. Leopoldo De Jesus
c. Google Hangouts
Part 1. Choose the letter of the correct d. Class Tree
answer. (100 pts.) e. Skype
6. Learning platform that offers multiple
1. It is a type of computer software that
tools to make a classroom fun,
is typically used by end users and is
interactive and engaging.
created to perform a specific purpose
a. Quizizz
other than one related to the
b. Kids Academy
operation of the computer itself.
c. Google Hangouts
a. Codegym
d. Class Tree
b. Application
e. Skype
c. Hardware
7. An unified communications service
d. Onedrive
that allows members to initiate and
e. Media
participate in text, voice or video
2. An online Java programming course
chats, either one-on-one or in a
consisting of 80% practice and 20%
group.
of the essential Java theory.
a. Quizizz
a. Codegym
b. Kids Academy
b. Application
c. Google Hangouts
c. Hardware
d. Class Tree
d. Onedrive
e. Skype
e. Media
8. It refers to entities that offer their
3. A web and mobile app that lets
expertise to another party.
teachers communicate with students
a. Search engine Optizimation
and their parents.
b. Service Provider
a. Quizizz
c. Remote Backup
b. Kids Academy
d. Packet
c. Google Hangouts
e. Operating System
d. Class Tree
9. Is a tech term that refers to an
e. Skype
interface or piece of software where
4. The world's most popular messaging,
a user interacts or controls a
voice, and video chat application.
hardware, usually a computer.
a. Quizizz
a. Search engine Optizimation
b. Kids Academy
b. Service Provider
c. Google Hangouts
c. Remote Backup
d. Class Tree
d. Packet
e. Skype
e. Operating System
5. It is one of the most innovative and
10. A unit of transmission in data
engaging programs for young
communications.
learners.
a. Search engine Optizimation
a. Quizizz
b. Service Provider
b. Kids Academy
c. Remote Backup
1
d. Packet b. PDAs
e. Operating System c. Laptops
11. Data loss can result from accidental d. Gaming Console
deletion or corruption, network e. Desktop computer
slowdown, hacking incidents and 18. A term first used around 2004.
viruses, and natural disasters like a. Web 1.0
floods or fires. b. Web 2.0
a. Search engine Optizimation c. Web 3.0
b. Service Provider d. Technology Convergence
c. Remote Backup e. Social Media
d. Packet 19. Evolution of technological
e. Operating System developments.
12. It refers to the practice of improving a a. Web 1.0
website’s visibility in the search b. Web 2.0
engines’ results pages so that c. Web 3.0
customers who are searching for a d. Technology Convergence
company’s products and service can e. Social Media
easily find it. 20. Was described by Time Berners-Lee.
a. Search engine Optizimation a. Web 1.0
b. Service Provider b. Web 2.0
c. Remote Backup c. Web 3.0
d. Packet d. Technology Convergence
e. Operating System e. Social Media
13. Are the fastest and the most 21. Its webpages were static.
expensive computers. a. Web 1.0
a. Supercomputer b. Web 2.0
b. PDAs c. Web 3.0
c. Laptops d. Technology Convergence
d. Gaming Console e. Social Media
e. Desktop computer 22. Collection of internet based
14. Described as a Pc. communication tools.
a. Supercomputer a. Web 1.0
b. PDAs b. Web 2.0
c. Laptops c. Web 3.0
d. Gaming Console d. Technology Convergence
e. Desktop computer e. Social Media
15. Are tightly integrated computers. 23. A document collaboration software
a. Supercomputer for geographically dispersed
b. PDAs professionals who need constant and
c. Laptops secure access to shared files.
d. Gaming Console a. Livetimer
e. Desktop computer b. Wrike
16. These are portable computers. c. Nomadesk
a. Supercomputer d. Sidekick
b. PDAs e. Tagzania
c. Laptops 24. It is about your places.
d. Gaming Console a. Livetimer
e. Desktop computer b. Wrike
17. Is a computer device that outputs a c. Nomadesk
video signal. d. Sidekick
a. Supercomputer e. Tagzania
2
25. An online service used by b. Antivirus
professionals all over the world to c. Webpage
track their time. d. Web Servers
a. Livetimer e. Web Browser
b. Wrike 32. A piece of software that runs on a
c. Nomadesk computer and serves users raw
d. Sidekick elements comprising a website page
e. Tagzania when they make a query.
26. Like chrome DevTools, for your a. WAN
backend. b. Antivirus
a. Livetimer c. Webpage
b. Wrike d. Web Servers
c. Nomadesk e. Web Browser
d. Sidekick 33. Information must (--------).
e. Tagzania a. equated
27. An integrated online project b. viewpoint
management solution that helps you c. counterfeited
manage projects, teams and d. perm
businesses. e. media
a. Livetimer 34. The (--------) sell what the culture
b. Wrike buys.
c. Nomadesk a. equated
d. Sidekick b. viewpoint
e. Tagzania c. counterfeited
28. A term that refers to a group of d. perm
networked endpoints covering a large e. media
geographical area. 35. The early world gets the (------).
a. WAN a. equated
b. Antivirus b. viewpoint
c. Webpage c. counterfeited
d. Web Servers d. perm
e. Web Browser e. media
29. Is a type of application that enables 36. Selection is a (---------).
users to access the World Wide Web. a. equated
a. WAN b. viewpoint
b. Antivirus c. counterfeited
c. Webpage d. perm
d. Web Servers e. media
e. Web Browser 37. Anything in great demand will be (---).
30. An electronic document that is a. equated
composed of images, text, files and b. viewpoint
other database content. c. counterfeited
a. WAN d. perm
b. Antivirus e. media
c. Webpage 38. (--------) is equated with truer.
d. Web Servers a. Media
e. Web Browser b. medium
31. Software that is designed to detect, c. Newer
stop and remove viruses and other d. brain
kinds of malicious software. e. information
a. WAN 39. You are what you eat and so is your
3
(---------). b. Teleport
a. Media c. Tempo
b. medium d. Logmein
c. Newer e. Tripit
d. brain 47. It organizes your itinerary as you
e. information email it confirmation and changes.
40. (---------) presence creates the story. a. Zoho
a. Media b. Teleport
b. medium c. Tempo
c. Newer d. Logmein
d. brain e. Tripit
e. information 48. A cross between project management
41. Undead (----------) walks ever on. and time tracking.
a. Media a. Zoho
b. medium b. Teleport
c. Newer c. Tempo
d. brain d. Logmein
e. information e. Tripit
42. The (--------) selects the message. 49. A suite of online business applications
a. Media that are free for individuals and
b. medium some have a subscription fee for
c. Newer organizations.
d. brain a. Zoho
e. information b. Teleport
43. All (---------) are seen as controversial. c. Tempo
a. ideas d. Logmein
b. pursuit e. Tripit
c. truths 50. It creates code and publishes
d. age together.
e. information a. Zoho
44. The whole truth is a (--------). b. Teleport
a. ideas c. Tempo
b. pursuit d. Logmein
c. truths e. Tripit
d. age 51. A network of infected devices,
e. information connected to the Internet, used to
45. Who wrote the 12 Truths of commit coordinated cyber attacks
Information Age? without their owner’s knowledge.
a. Elon Musk a. Breach
b. Johny Bravo b. Botnet
c. Robert Harris c. Browser
d. Harry Style d. Brute Force Attack
e. Taylor Swift e. BYOD
46. It provides organizations and 52. A software application which
individuals with secure, easy-to-use presents information and services
and cost effective solutions for from the web.
remotely supporting, connecting and a. Breach
accessing digital information, b. Botnet
applications and Internet-enabled c. Browser
devices. d. Brute Force Attack
a. Zoho e. BYOD
4
53. A computational power to e. IT
automatically enter a huge number of 60. A collection of internet based
combination of values. communication tools.
a. Breach a. Assistive Media
b. Botnet b. Mobile Media
c. Browser c. ICT
d. Brute Force Attack d. Social Media
e. BYOD e. IT
54. An organisation’s strategy or policy 61. A popular free social networking site
that allows employees to use their with more than a billion users.
own personal devices for work a. Instagram
purposes. b. Facebook
a. Breach c. Twitter
b. Botnet d. Youtube
c. Browser e. Snapchat
d. Brute Force Attack 62. One of its principal features is that
e. BYOD pictures and messages are usually
55. An incident in which data, computer only available for a short time.
systems or networks are accessed or a. Instagram
affected in a non-authorised way. b. Facebook
a. Breach c. Twitter
b. Botnet d. Youtube
c. Browser e. Snapchat
d. Brute Force Attack 63. A photo and video sharing social
e. BYOD networking service.
56. A range of handheld device. a. Instagram
a. Assistive Media b. Facebook
b. Mobile Media c. Twitter
c. ICT d. Youtube
d. Social Media e. Snapchat
e. IT 64. A mathematical function that
57. An unextended term in unified protects information by making it
communications. unreadable by everyone except those
a. Assistive Media with the key to decode it.
b. Mobile Media a. Download Attack
c. ICT b. DoS
d. Social Media c. Encryption
e. IT d. EUD
58. Is the infrastructure and components e. Exploit
that enable modern computing. 65. May refer to software or data that
a. Assistive Media takes advantage of a vulnerability in a
b. Mobile Media system to cause unintended
c. ICT consequences.
d. Social Media a. Download Attack
e. IT b. DoS
59. A nonprofit organization founded in c. Encryption
1996. d. EUD
a. Assistive Media e. Exploit
b. Mobile Media 66. Collective term to describe modern
c. ICT smartphones, laptops and tablets
d. Social Media that connect to an organisation’s
5
network. allow the authentication and secure
a. Download Attack exchange of information.
b. DoS a. Arc Cloud
c. Encryption b. Credentials
d. EUD c. Certificate
e. Exploit d. Data at Rest
67. When legitimate users are denied e. Arc Secure
access to computer services (or 73. Describes data in persistent storage
resources), usually by overloading the such as hard disks, removable media
service with requests. or backups.
a. Download Attack a. Arc Cloud
b. DoS b. Credentials
c. Encryption c. Certificate
d. EUD d. Data at Rest
e. Exploit e. Arc Secure
68. The unintentional installation of 74. Is an unlimited free file storage
malicious software or virus onto a website.
device without the user's knowledge a. Blummy
or consent. May also be known as a b. Trailfire
drive-by download. c. Mybloop
a. Download Attack d. Pull Request
b. DoS e. Ispott
c. Encryption 75. Code review as a service.
d. EUD a. Blummy
e. Exploit b. Trailfire
69. Resources can include infrastructure, c. Mybloop
platform or software services. d. Pull Request
a. Arc Cloud e. Ispott
b. Credentials 76. Is a tool for quick access to your
c. Certificate favorite web services via your
d. Data at Rest bookmark toolbar.
e. Arc Secure a. Blummy
70. The protection of devices, services b. Trailfire
and networks — and the information c. Mybloop
on them — from theft or damage. d. Pull Request
a. Arc Cloud e. Ispott
b. Credentials 77. It is a proven mobile scavenger hunt
c. Certificate marketing platform used on a
d. Data at Rest highly-successful, award-winning,
e. Arc Secure global marketing campaign with
71. A user’s authentication information Microsoft and Coca-Cola.
used to verify identity – typically one, a. Blummy
or more, of password, token, b. Trailfire
certificate. c. Mybloop
a. Arc Cloud d. Pull Request
b. Credentials e. Ispott
c. Certificate 78. It helps you find the needle in the
d. Data at Rest haystack.
e. Arc Secure a. Blummy
72. A form of digital identity for a b. Trailfire
computer, user or organisation to c. Mybloop
6
d. Pull Request d. Seesaw
e. Ispott e. Vivi
79. A radio is the personalized internet 85. It supports both shared and
radio service that helps you find new one-to-one environments.
music based on your old and current a. Idoceo
favorites. b. Flipgrid
a. Metacafe c. Apple Classroom
b. Tall Street d. Seesaw
c. Vimeo e. Vivi
d. Pandora 86. A website and app that allows
e. Imeem teachers to facilitate video
80. Is a social network that enables users discussions.
to discover, interact and express a. Idoceo
themselves with media, including b. Flipgrid
music, video and photos, and form c. Apple Classroom
connections based on shared tastes d. Seesaw
and interests. e. Vivi
a. Metacafe 87. A powerful assistant for teachers.
b. Tall Street a. Idoceo
c. Vimeo b. Flipgrid
d. Pandora c. Apple Classroom
e. Imeem d. Seesaw
81. It is not just a video sharing but also a e. Vivi
hosting site that allows any and 88. It is primarily used as a way to
every video to be posted. communicate with families and keep
a. Metacafe them in the loop on the learning
b. Tall Street their child is doing at school.
c. Vimeo a. Idoceo
d. Pandora b. Flipgrid
e. Imeem c. Apple Classroom
82. It is a Social Recommendation d. Seesaw
Engine. e. Vivi
a. Metacafe 89. It focuses on important basics in the
b. Tall Street four main curriculum subjects of
c. Vimeo Reading, Math, World Around Us
d. Pandora (beginning science and social
e. Imeem studies), as well as Art & Colors,
83. It is a thriving community of people a. Khan Academy
who love to make and share videos. b. Edmodo
a. Metacafe c. Abcmouse.com
b. Tall Street d. Bookful
c. Vimeo e. Bookr Class
d. Pandora 90. A storytelling-based English teaching
e. Imeem app with animated stories and
84. The teacher's remote control in the games.
classroom and is designed to save a. Khan Academy
you as much time as possible, while b. Edmodo
being as engaging as possible. c. Abcmouse.com
a. Idoceo d. Bookful
b. Flipgrid e. Bookr Class
c. Apple Classroom 91. A small library of books and related
7
games enhanced with 3D graphics c. Wallet
and Augmented Reality (AR). d. HDD
a. Khan Academy 99. A small integrated circuit.
b. Edmodo a. CPU
c. Abcmouse.com b. Software
d. Bookful c. Microprocessor
e. Bookr Class d. Moderm
92. A free education app for both 100. One of the CEO of Apple
students and teachers. Computers, Inc.
a. Khan Academy a. Steve Harvey
b. Edmodo b. Rhenelyn Jhoy
c. Abcmouse.com c. Steve Jobs
d. Bookful d. Taylor Swift
e. Bookr Class e. Michael Jordan
93. A social learning app for students,
teachers, districts, and schools.
a. Khan Academy
b. Edmodo
c. Abcmouse.com
d. Bookful goodluck on your exam!
e. Bookr Class
94. Involve materials that usually ------
integrated to cellphones, watches,
etc. “Cheating goes against the goodness that
a. Mainframes will glorify Him. Dishonesty mars an
b. Computer Server individual’s integrity and reputation.” -
c. Wearable Computers Proverbs 10:9
d. Server
e. Virtual Reality
95. Used primarily by large organizations. “Whoever can be trusted with very little can
a. Mainframes also be trusted with much, and whoever is
b. Computer Server dishonest with very little will also be
c. Wearable Computers dishonest with much.” - Luke 16:10
d. Server
e. Virtual Reality
96. A central computer. ------
a. Mainframes
b. Computer Server “​​BREATHE IN, BREATHE THROUGH, BREATHE
c. Wearable Computers DEEP, BREATHE OUT.”
d. Server - Taylor Alison Swift, Labyrinth
e. Virtual Reality
97. It allows all connected users to share “I’M DAMNED IF I DO GIVE A DAMN WHAT
and store datas. PEOPLE SAY, NO DEAL / THE 1950S SHIT THEY
a. Mainframes WANT FROM ME.”
b. Computer Server - Taylor Alison Swift, Lavender Haze
c. Wearable Computers
d. Server "WE'RE HAPPY, FREE, CONFUSED AND
e. Virtual Reality LONELY AT THE SAME TIME. IT'S MISERABLE
98. It stores data. AND MAGIC.”
a. Flashdrive - Taylor Alison Swift, 22
b. Brain
8

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy