GEC E3 Midterm Exam For BSBIO
GEC E3 Midterm Exam For BSBIO
Name:____________________________________
Class Schedule (Time & Days):_________________ Instructor: _____________________
3. Why is it important to be cautious about sharing your travel plans on social media?
a. It helps your friends track your adventures more easily.
b. It can attract potential burglars who know your home is vacant.
c. It encourages others to plan similar trips.
d. It enhances your social media popularity.
4. How can you help educate others about recognizing misinformation and disinformation?
a. Share conspiracy theories to raise awareness.
b. Share information without explaining its context or credibility.
c. Share tips on critical thinking, fact-checking, and reliable sources
d. Encourage others to blindly accept information from any source
5. What security challenge is associated with IoT devices?
a. They are typically immune to hacking attempts.
b. They often lack robust security features, making them vulnerable to cyberattacks.
c. They can only be controlled manually.
d. They are not connected to the internet.
6. Who was the French merchant and inventor credited with inventing a loom that uses
punched wooden cards to automatically weave fabric designs?
7. What is the primary purpose of DNS (Domain Name System) in computer networking?
a. To encrypt internet traffic for security
b. To provide email services
c. To translate URLs into IP addresses
d. To block access to certain websites
8. It is a system of interconnected public webpages accessible through the Internet.
9. In which historical period or era did the rise of the internet play a significant role in the
evolution of technology?
a. Digital Age
b. Classical and Medieval Periods
c. Renaissance and Industrial Revolution
Republic of the Philippines
CATANDUANES STATE UNIVERSITY
College of Information and Communications Technology
Virac, Catanduanes
11. This sensor is able to detect objects within a certain range, even if the object is not physically
touching the sensor yet.
12. Which of the following is a type of network commonly used within a single home or small
office, connecting devices like computers, printers, and smartphones?
14. This generation is known for being diverse, technologically savvy, and socially sensitive.
15. It a small computer that is based on a microprocessor integrated circuit, often known as a
chip.
16. Who are the inventors of DNS, the “phone book of the internet”?
a. Tim Berners-Lee and Vint Cerf
b. Bill Gates and Steve Jobs
c. Robert E. Kahn and Leonard Kleinrock
d. Paul Mockapetris and Jon Postel
17. What are some of the profound impacts of the Internet and World Wide Web (WWW) on
society?
a. Increased reliance on traditional media sources.
b. Reduced global connectivity and communication.
c. Easier access to information, global communication, and online collaboration.
d. Limited access to educational resources.
18. How has Information Technology (IT) influenced culture?
a. It has had no impact on culture.
b. It has resulted in the homogenization of cultures.
c. It has facilitated the spread of global culture and cultural exchange.
d. It has led to the isolation of cultures from one another.
19. What are some of the key capabilities of IoT (Internet of Things) technology?
a. Enhancing physical security
b. Predictive maintenance for machinery
c. Real-time monitoring and data collection
d. All of the above
20. What does the Cybercrime Prevention Act aim to protect individuals and organizations from?
___________2. What did humans use as simple tools for hunting and survival in the Prehistoric and
Ancient Times? (Write 1 only)
___________5. It is a malware that encrypts a victim's data and demands a ransom for decryption.
___________6. In Classical and Medieval Periods, what are the writing systems that have been
developed? (Write 1 only)
___________7. In the 15th century, what invention did Johannes Gutenberg make?
___________8. The main function of this is to enter the data in the computer
___________9. It is hardware devices that have the capability to measure an event, object, or any
physical quality that is happening.
___________10. This sensor can detect the level of liquids, fluids, grainy or granular materials, such
as powders, etc.
Direction: For each statement, write "True" if you believe it is correct and "False" if you think it is
incorrect.
Write True if the statement is correct and write False if the statement is incorrect. (10pts)
___________2. Ultrasonic sensor is often used for security purposes detects infrared light. It is
commonly used along with an infrared light source.
___________4. Analog computers are built with various components such as gears, levers, with
electrical component.
____________5. Communication is the process in which one computer or devices transfers data,
instructions, and information to another computer(s).
____________9. Cyberbullying laws and regulations vary by country and jurisdiction, so what's
considered cyberbullying in one place may not be in another.
____________10. World Wide Web is a collection of web pages and related content that is identified
by a common domain name and published on at least one web server.
2. What would you do in the event that someone compromised or hacked your work
computer?
Prepared by:
KEY TO CORRECTION
CC102-COMPUTER PROGRAMMING 1
Midterm Exam
1st Semester /S.Y. 2022-2023
1. b 8. d 15. b
2. a 9. a 16. d
3. b 10. d 17. c
4. c 11. a 18. c
5. b 12. b 19. d
6. d 13. b 20. c
7. c 14. c