0% found this document useful (0 votes)
19 views

MST Final Exam

Uploaded by

anamae.amorin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

MST Final Exam

Uploaded by

anamae.amorin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

COLLEGE OF COMPUTER STUDIES

FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

MULTIPLE CHOICE: CHOOSE THE CORRECT ANSWER

Section A: History and Components of the Internet

1. What does the term "Internet" stand for?

a. Internal Network

b. Interconnected Network

c. International Network

d. Intelligent Network

2. When did ARPA start the experimental computer network?

a. 1965

b. 1969

c. 1972

d. 1982

3. Who is recognized as one of the "fathers of the Internet"?

a. Steve Jobs

b. Bill Gates

c. Vinton Gray Cerf

d. Tim Berners-Lee
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

4. Which university created the first “free net” in 1986?

a. Harvard University

b. Case Western Reserve University

c. Stanford University

d. MIT

5. What year did the US government allow business agencies to connect to the internet?

a. 1985

b. 1989

c. 1991

d. 1995

6. What does a server do?

a. Provides services to another computer program and its users

b. Connects multiple devices within a network

c. Manages user passwords

d. Stores only multimedia files


COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

7. Which type of server acts as an intermediary between an endpoint device and another server?

a. Mail Server

b. Web Server

c. Proxy Server

d. Policy Server

8. What is an IP address?

a. A type of domain name

b. A software for network security

c. A numerical label assigned to each device on a network

d. A program used for web browsing

9. Which of the following is NOT a web browser?

a. Google Chrome

b. Mozilla Firefox

c. Microsoft Word

10. Which domain name extension is used for educational institutions?

a. .com

b. .org

c. .edu

d. .net
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

Section B: Uses and Netiquette

11. Which of the following is NOT a use of the Internet?

a. Sending and receiving emails

b. Video teleconferencing

c. Gardening

d. Social networking

12. What does "Netiquette" refer to?

a. Network technology

b. Network etiquette

c. Network security

d. Network economy

13. What should you avoid using in professional communications according to netiquette?

a. Formal language

b. Emoticons

c. Text talk and acronyms

d. Correct spelling
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

14. What is considered "screaming" in typed messages?

a. Using all capital letters

b. Using bold text

c. Using italics

d. Using different colors

15. Before sending a message, what is one of the key steps according to netiquette?

a. Deleting unnecessary files

b. Proofreading your message

c. Changing the font

d. Adding attachments

Section C: Cybercrime and Ethics

16. Which act addresses legal issues concerning online interactions and internet use in the Philippines?

a. RA 10175

b. RA 10173

c. RA 10627

d. RA 9775
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

17. What is the term for unauthorized use of copyrighted material?

a. Plagiarism

b. Copyright infringement

c. Hacking

d. Phishing

18. What is cyberbullying?

a. Using electronic communication to bully a person

b. Stealing personal information online

c. Distributing malware

d. Downloading pirated software

19. What is the penalty for child pornography under the Anti-Child Pornography Act of 2009?

a. Php 200,000 fine

b. 6-12 years of imprisonment

c. 12-20 years of imprisonment

d. Community service
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

20. What does "phishing" aim to do?

a. Infect computers with viruses

b. Steal personal and financial information

c. Install ransomware

d. Monitor home security systems

Section D: Internet Threats

21. Which type of malware restricts access to your computer and demands payment to remove the
restriction?

a. Virus

b. Worm

c. Ransomware

d. Spyware

22. What is a Trojan horse?

a. A virus disguised as legitimate software

b. A form of phishing

c. A spam email

d. A security software
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

23. Which type of online fraud redirects users to malicious websites?

a. Phishing

b. Pharming

c. Hacking

d. Spamming

24. What is spyware designed to do?

a. Protect personal information

b. Infect your computer with viruses

c. Collect personal information without consent

d. Block unwanted ads

25. What is Wi-Fi eavesdropping?

a. Capturing personal information over an unsecure Wi-Fi network

b. Sending spam emails over Wi-Fi

c. Installing malware via Wi-Fi

d. Blocking Wi-Fi signals

Section E: Computer Ethics


COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

26. What is the Golden Rule in netiquette?

a. Use proper grammar

b. Do unto others as you would have others do unto you

c. Avoid using all caps

d. Share expert knowledge

27. What should you do if you see a mistake online according to netiquette?

a. Publicly criticize the person

b. Ignore it

c. Respond in a private email

d. Share it with others

28. Which rule of computer ethics emphasizes respecting other people's privacy?

a. Rule 1

b. Rule 5

c. Rule 8

d. Rule 10
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

29. What does the term "cyber" refer to?

a. The culture of computers, information, technology, and virtual reality

b. The legal aspects of internet use

c. The rules of online etiquette

d. The use of emails and instant messaging

30. What is considered illegal access under cybercrime activities?

a. Logging into your own email

b. Unauthorized access to computer systems

c. Using a public Wi-Fi network

d. Downloading free software

Section F: Cybersecurity Measures

31. How can you protect your computer from ransomware?

a. Pay the ransom

b. Contact a reputable computer technician

c. Ignore the threats

d. Remove all software


COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

32. What should you regularly do to lessen the impact of a ransomware infection?

a. Change your passwords

b. Use antivirus software

c. Back up your data

d. Update your operating system

33. Which type of malware is designed to spread without attaching to files or programs?

a. Virus

b. Worm

c. Trojan horse

d. Spyware

34. What is spam primarily used for?

a. Protecting personal information

b. Sending unsolicited messages

c. Enhancing computer performance

d. Monitoring online activity


COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

35. How can you detect if your computer is infected with a virus?

a. Programs run faster than usual

b. System and programs crash constantly

c. Files are duplicated

d. New software is automatically installed

Section G: Internet Services

36. What is an Internet Service Provider (ISP)?

a. A device for connecting computers

b. An organization that provides internet access

c. A type of web browser

d. A computer security program

37. Which ISP provides internet access to a specific geographic area?

a. Global ISP

b. Regional ISP

c. Local ISP

d. National ISP
COLLEGE OF COMPUTER STUDIES
FOUNDATION UNIVERSITY
Dumaguete City

MST104
FINAL EXAMINATION
Name: ________________________________ Score: ______________

38. What does the Domain Name System (DNS) function as?

a. A security protocol

b. The phonebook of the internet

c. A web browser

d. An email server

39. Which of the following is an example of a commercial domain name?

a. www.harvard.edu

b. www.redcross.org

c. www.amazon.com

d. www.philhealth.gov.ph

40. What is a mail server responsible for?

a. Central storage of data files

b. Receiving and forwarding emails

c. Serving requested HTML pages

d. Providing business logic for applications

You might also like