0% found this document useful (0 votes)
93 views6 pages

GEC E3 Midterm Exam For BSBIO

The document is a midterm exam for a class on living in the IT era. It contains multiple choice, identification, true/false, and essay questions testing knowledge of topics like IT definitions, networking, sensors, cybersecurity, and the impacts of technology.

Uploaded by

Randy Fin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views6 pages

GEC E3 Midterm Exam For BSBIO

The document is a midterm exam for a class on living in the IT era. It contains multiple choice, identification, true/false, and essay questions testing knowledge of topics like IT definitions, networking, sensors, cybersecurity, and the impacts of technology.

Uploaded by

Randy Fin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Republic of the Philippines

CATANDUANES STATE UNIVERSITY


College of Information and Communications Technology
Virac, Catanduanes

GEC-E3 – LIVING IN THE I.T. ERA


Midterm Exam
1st Semester /S.Y. 2023-2024

Name:____________________________________
Class Schedule (Time & Days):_________________ Instructor: _____________________

Test I. Multiple Choice (20 pts.)


Direction: Choose the letter that corresponds to the given sentence and encircle the letter of your
choice.
1. Which of the following best defines Information Technology (IT)?
a. The study of ancient civilizations.
b. The use of computers and telecommunications to store, retrieve, transmit, and
manipulate data.
c. The process of manufacturing physical products.
d. The exploration of outer space.
2. The internet and telecommunications technologies have linked individuals all over the world,
allowing for quick contact and information sharing.

a. Global Connectivity c. Social Media


b. Online Learning d. Remote Work and Learning

3. Why is it important to be cautious about sharing your travel plans on social media?
a. It helps your friends track your adventures more easily.
b. It can attract potential burglars who know your home is vacant.
c. It encourages others to plan similar trips.
d. It enhances your social media popularity.
4. How can you help educate others about recognizing misinformation and disinformation?
a. Share conspiracy theories to raise awareness.
b. Share information without explaining its context or credibility.
c. Share tips on critical thinking, fact-checking, and reliable sources
d. Encourage others to blindly accept information from any source
5. What security challenge is associated with IoT devices?
a. They are typically immune to hacking attempts.
b. They often lack robust security features, making them vulnerable to cyberattacks.
c. They can only be controlled manually.
d. They are not connected to the internet.
6. Who was the French merchant and inventor credited with inventing a loom that uses
punched wooden cards to automatically weave fabric designs?

a. Vannevar Bush c. Steve Jobs


b. Alan Turing d. Joseph Marie Jacquard

7. What is the primary purpose of DNS (Domain Name System) in computer networking?
a. To encrypt internet traffic for security
b. To provide email services
c. To translate URLs into IP addresses
d. To block access to certain websites
8. It is a system of interconnected public webpages accessible through the Internet.

a. Web Page c. Web Server


b. Website d. World Wide Web (WWW)

9. In which historical period or era did the rise of the internet play a significant role in the
evolution of technology?
a. Digital Age
b. Classical and Medieval Periods
c. Renaissance and Industrial Revolution
Republic of the Philippines
CATANDUANES STATE UNIVERSITY
College of Information and Communications Technology
Virac, Catanduanes

d. Prehistoric and Ancient Times


10. In Political and Geopolitical Impact, technology has enabled the spread of misinformation
and disinformation, influencing political discourse and elections.

a. Cybersecurity Threats c. AI Ethics


b. Data Privacy d. Information Warfare

11. This sensor is able to detect objects within a certain range, even if the object is not physically
touching the sensor yet.

a. Proximity Sensor c. Temperature Sensor


b. Gas/Smoke Sensor d. Touch Sensor

12. Which of the following is a type of network commonly used within a single home or small
office, connecting devices like computers, printers, and smartphones?

a. Wide Area Network (WAN) c. Metropolitan Area Network (MAN)


b. Local Area Network (LAN) d. Global Area Network (GAN)

13. Who is credited with inventing the telephone?

a. Thomas Edison c. Samuel Morse


b. Alexander Graham Bell d. Benjamin Franklin

14. This generation is known for being diverse, technologically savvy, and socially sensitive.

a. Baby Boomers c. Generation Z


b. Generation X d. Millennials

15. It a small computer that is based on a microprocessor integrated circuit, often known as a
chip.

a. Minicomputers c. Mainframe Computers


b. Microcomputers d. Analog Computers

16. Who are the inventors of DNS, the “phone book of the internet”?
a. Tim Berners-Lee and Vint Cerf
b. Bill Gates and Steve Jobs
c. Robert E. Kahn and Leonard Kleinrock
d. Paul Mockapetris and Jon Postel
17. What are some of the profound impacts of the Internet and World Wide Web (WWW) on
society?
a. Increased reliance on traditional media sources.
b. Reduced global connectivity and communication.
c. Easier access to information, global communication, and online collaboration.
d. Limited access to educational resources.
18. How has Information Technology (IT) influenced culture?
a. It has had no impact on culture.
b. It has resulted in the homogenization of cultures.
c. It has facilitated the spread of global culture and cultural exchange.
d. It has led to the isolation of cultures from one another.
19. What are some of the key capabilities of IoT (Internet of Things) technology?
a. Enhancing physical security
b. Predictive maintenance for machinery
c. Real-time monitoring and data collection
d. All of the above
20. What does the Cybercrime Prevention Act aim to protect individuals and organizations from?

a. Physical theft b. Online harassment


Republic of the Philippines
CATANDUANES STATE UNIVERSITY
College of Information and Communications Technology
Virac, Catanduanes

c. Cyberattacks d. Natural disasters

Test II. Identification (10 pts.)


Direction: Identity what is being asked on the following question. (10pts)

___________1. It is defined as the connection of two computer systems.

___________2. What did humans use as simple tools for hunting and survival in the Prehistoric and
Ancient Times? (Write 1 only)

___________3. What physical infrastructure makes the Internet work?

___________4. It describes how one should act online.

___________5. It is a malware that encrypts a victim's data and demands a ransom for decryption.

___________6. In Classical and Medieval Periods, what are the writing systems that have been
developed? (Write 1 only)

___________7. In the 15th century, what invention did Johannes Gutenberg make?

___________8. The main function of this is to enter the data in the computer

___________9. It is hardware devices that have the capability to measure an event, object, or any
physical quality that is happening.

___________10. This sensor can detect the level of liquids, fluids, grainy or granular materials, such
as powders, etc.

Test III. True or False (10 pts.)

Direction: For each statement, write "True" if you believe it is correct and "False" if you think it is
incorrect.

Write True if the statement is correct and write False if the statement is incorrect. (10pts)

___________1. Hardware components are intangible things.

___________2. Ultrasonic sensor is often used for security purposes detects infrared light. It is
commonly used along with an infrared light source.

___________3. Cyber Crime Prevention Act, also known as R.A. 10175.

___________4. Analog computers are built with various components such as gears, levers, with
electrical component.

____________5. Communication is the process in which one computer or devices transfers data,
instructions, and information to another computer(s).

____________6. Intranets are private networks within organizations.

____________7. Sensors can be classified as analog or digital.

____________8. Automated customer service is not an example of Automated Assistants.

____________9. Cyberbullying laws and regulations vary by country and jurisdiction, so what's
considered cyberbullying in one place may not be in another.

____________10. World Wide Web is a collection of web pages and related content that is identified
by a common domain name and published on at least one web server.

Test IV. Essay (10 pts.)

1. (5 pts) What is the relevance of ICT in your chosen course?


Republic of the Philippines
CATANDUANES STATE UNIVERSITY
College of Information and Communications Technology
Virac, Catanduanes

2. What would you do in the event that someone compromised or hacked your work
computer?

Prepared by:

CESAR M. RAMIREZ, JR. CHERRY ANN B. TAYAM JOHN DENLI J. NAZARENO


Instructor I Instructor I Instructor I

ANGIE M. MENDOZA ANGELICA T. DELLUZA


Instructor I Instructor I
Noted:

MARIA ANTONIA E. ROJAS, Ph.D


Department Chairperson, Computing Programs
Republic of the Philippines
CATANDUANES STATE UNIVERSITY
College of Information and Communications Technology
Virac, Catanduanes

KEY TO CORRECTION
CC102-COMPUTER PROGRAMMING 1
Midterm Exam
1st Semester /S.Y. 2022-2023

Test I) Multiple Choice

1. b 8. d 15. b
2. a 9. a 16. d
3. b 10. d 17. c
4. c 11. a 18. c
5. b 12. b 19. d
6. d 13. b 20. c
7. c 14. c

Test II) Identification

1. network 6. hieroglyphics, cuneiform


2. wood, stone, bone 7. printing press
3. switch, router, server, hub 8. input device
4. netiquette 9. sensors
5. ransomware 10. level sensor

Test III) True or False

1. False 5. True 9. True


2. False 6. True 10. False
3. True 7. True
4. False 8. False

Test IV) Essay


Republic of the Philippines
CATANDUANES STATE UNIVERSITY
Virac,Catanduanes

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy