Вы находитесь на странице: 1из 4

Lourdes College, Inc

GEEL 11 Living in the IT Era


Preliminary Exams BUSAC
Name: _______________________________ Course and Year: ___________ Date ________Score ____

Multiple Choice: Circle the letter that corresponds to your answer. Defend your answers in a separate
paper. Do not share your answer with your classmates.

1. It refers to a technology that supports activities involving information, such as gathering, processing,
storing, and presenting data.
a. Communication b. Information
c. Information technology d. Information and communication technology

2. It is the technique of making an apparatus, a process, or a system operate automatically. It includes a


broad range of technologies connecting computers systems to other systems.
a. automation b. connection c. Network d. Server

3. It is a type of an input device that lets you select options from on-screen menus.
a. Keyboard b. Mouse c. Trackball d. scanner

4. It is like a personal computer but it has more powerful microprocessor and higher-quality monitor.
a. mainframe b. minicomputer c. supercomputer d. workstation

5. It is one of the ethical issues of ICT that occurs when a person copies another person’s ideas, words or
writings and pass it off as his or her own.
a. exploitation b. Libel c. Piracy d. Plagiarism

6. This occurs when a person deals with another person dishonestly, unethically, and dishonorably, in
order to take advantage of the latter’s works and resources.
a. exploitation b. Libel c. Piracy d. Plagiarism

7. It is the period in human history characterized by the shift from traditional industry that the industrial
revolution brought through industrialization, to an economy based on information computerization.
a. digital age b. Information age c. Internet of Things d. techno-preneurship

8. It was considered as the first generation computer that could store only limited or small amounts of
information.
a. ARPANET b. EDVAC c. ENIAC d. VLSI

9. It refers to processed information that helps fulfill people’s daily tasks.


a. communication b. information c. knowledge d. technology

10. It is referred to as the enclosure composed of the main elements of a computer used to administer
data.
a. digital camera b. personal computer c. storage devices d. system unit

11. It refers to the interconnection of information technology devices within the range of an individual
person, normally, within the range of ten meters.
a. LAN b. MAN c. PAN d. WAN

12. It is a method of representing numbers that has 2 as its base and uses only the digits 0 and 1; each
successive digit represents a power of 2.
a. Binary number system b. Decimal number system
c. Hexadecimal number system d. octal number systems

13. It refers to the pathway composed of cables and connectors used to carry data between computer’s
peripheral devices.
Lourdes College, Inc
GEEL 11 Living in the IT Era
Preliminary Exams BUSAC
a. address bus b. control bus c. data bus d. system bus
14. It is a type of bus that is used by the CPU to specify a specific address for instructions, files, and other
devices within the computer system.
a. address bus b. control bus c. data bus d. system bus

15. The CPU sends a ______ via the control bus, stopping the data to be sent through the data bus, and
often seen as an error message prompt.
a. halt instructions b. systems platforms
c. validation message d. wired communications

16. It is used primarily for direct hardware manipulation and direct access to specialized processor
instructions. It is also used to address critical performance issues.
a. assembly language b. human language
c. Machine language d. programming language

17. It is the method that the internet uses to store domain names and their corresponding IP addresses.
a. AD DS b. DHCP c. DNS d. FTP

18. It is the tool used to access the internet.


a. Web browser b. web community c. web page d. website

19.this refers to a collection of related web pages and associated items, such as documents and pictures,
stored in a webserver.
a. Web browser b. web community c. web page d. website

20. It allows the user to write a letter, design a flyer, and create other types of documents.
a. Microsoft Word b. Notepad c. wizard d. word processor

21. This refers to the process of broadcasting original content on the internet.
a. Hosting b. Navigating c. Paging d. publishing

22. It is a set of instructions and operations for a computer to perform certain tasks.
a. Host b. Interpreter c. Program d. Programmer

23. It is a not-for-profit networking consortium in the U.S. which aims to improve the internet, such as
relieving bottlenecks in the current architecture.
a. Domain b. Infrastructure c. Internet2 d. Schema

24. It is a programming language that provides little or no abstraction from a computer’s instruction set
architecture.
a. computer language b. high-level language
c. human language d. low level language

25. It is a programming language that enables a programmer to write programs that are more or less
independent of a particular type of computer.
a. computer language b. high-level language
c. human language d. low level language

26. It allows a user to execute financial transactions via the internet.


a. E-learning b. Online banking c. IoT d. IT Automation

27. It refers to the voluminous amount of data from traditional and digital sources that could be mined
for valuable insights on human behavior such as trends, patterns, and associations, in turn boosting
business intelligence.
Lourdes College, Inc
GEEL 11 Living in the IT Era
Preliminary Exams BUSAC
a. Big Data b. IT Automation c. Digibanker d. learning management system.

28. Data are considered facts; therefore; processed data are considered as:
a. information b. files c. documents d. junk files

29. It is a stand-alone malware that replicates itself in order to spread to other computers.
a. worm b Virus c. Ransomware d. Spyware

30. It is a type of malware that can block access to a victims data.


a. Virus b. Ransom wear c. Spyware d. worm

31. An IT trend which uses machine learning


a. IoT and SmartHome technology| b. Artificial Intelligence
c. Big Data d. Automation

32. Which method of automation is Apple’s Siri an example of?


a. automated assistant b. Process Automation
c. Smart Machines d. IT support management

33. When you enter a room, the light turns on automatically without turning on any light switch. What
type of sensor is used in the scenario?
a, Infrared sensor b. Touch sensor c. pressure sensor d. proximity sensor

34. Which type of sensor is often used to detect any burglar intrusion?
a. Infrared sensor b. Touch sensor c. Temperature sensor d. level sensor

35. IoT implementation is challenging. One problem area has something to do with an enterprise
dealing with production, manufacturing, ordering, and supplying goods. This type of issue is considered
under:
a. Connectivity b. System requirement c. Security d. services

36. Unlike other organizational resources, information can be described as follows, except:
a. transportable b. compressible c. diffusive d. expandable

37. When compared to other resources, information is similar to them in terms of the following except:
a. its cost can be controlled with the help of accounting techniques.
b. can be substituted
c. it is available in a standard type, grade and price.
d. has a life cycle.

38. Mr. Pernia recently found out his email was hacked and said that the hacker has been sending spam
emails to all his contacts. Which of the following regulations needs to be enforced in this issue?
a. content control b. defamation control c. privacy control d. copyright control

39. Ms. Bualat has a blog which she updates with photos and videos of her day-to-day activities. She
recently received a personal message demanding that the pictures of certain images she took in an art
museum be removed from her site. Which of the following regulations did she not follow.
a. content control b. defamation control c. privacy control d. copyright control

40. MP3 files fall under the category of:


a. digital rights b. patent rights c. copyrights d. trademarks

41. Ms. Tomawis recently subscribed to a cable TV provider and bought a smart TV along with it. Her
smart TV gives her the capability to record shows she might miss every now and then. Which control
issue can be found in this case?
Lourdes College, Inc
GEEL 11 Living in the IT Era
Preliminary Exams BUSAC
a. Convergence b. Scale c. volume d. unprecedented individual empowerment.

42. Ms. Aldeza is an active Facebook user. She recently posted a picture of herself with her friends
getting drunk during a party. Her boss saw it on her profile and said it was very unprofessional and asked
her to take it down. She did, but, her friends uploaded the same picture and tagged her, making her
pictures still appear on her profile. Which control issue is shown in this case?
a. convergence b. scale c. volume d. unprecedented individual empowerment.

43. These are also called conceptual resources.


a. tangible resources b. non-tangible resources c. complex resources d. simple resources

44. Information that is important and useful when it is needed is considered:


a. reliable b. accessible c. complex resources d. simple resources

45. A movie being sold in different formats and mediums such as in DVDs, Google Play, itunes, etc.
means that the movie is considered as:
a. non-rivalrous b. non-exclusive
c. not exhibiting high degrees of transparency| d. having zero-marginal cost.

46. A profile created by internet users to establish their social identity in online communities.
a. internet profile b. online identity c. internet identity d. internet persona

47. A distinctive sign used by an individual, business organization, or other legal entity to identify the
products or services to consumers.
a. patent b. trademark c. service mark d. copyright

48. A set of exclusive rights granted by a state to the creator of an original work or their assignee for a
limited period of time in exchange for profile disclosure of the work, and incudes the right to copy,
distribute, and adapt the work.
a. patent b. trademark c. service mark d. copyright

49. A series of alphanumeric characters acting as a key to denote that the product or software is
original.
a, master key b. serial keys c. product key d. software key

50. This is done to hide sensitive information from unauthorized users.


a. content scrambling system b. tag embedding
c. scrambling d. metadata

“chance favors the prepared mind”

Вам также может понравиться