Midterm Examination - IT Era
Midterm Examination - IT Era
1. What does ICT stand for? 7. The first generation of computers used:
A. Information and Communication A. Transistors
Technology B. Microchips
B. Internet and Communication Technology C. Vacuum tubes
C. International Communication Tool D. Circuit boards
D. Information and Computing Technology
8. Which company developed the first
2. Which of the following is NOT a component commercially successful personal computer?
of ICT? A. Microsoft
A. Software B. IBM
B. Hardware C. Apple
C. Network D. Google
D. Paper files
9. Which of the following is considered the first
3. The process of converting information into mechanical computer?
digital form is called: A. ENIAC
A. Digitalization B. The Analytical Engine
B. Encryption C. UNIVAC
C. Compression D. The Commodore 64
D. Digitization
10. What invention revolutionized the second
4. What is the main goal of ICT in education? generation of computers?
A. Replace traditional classrooms A. Transistors
B. Enhance the quality of teaching and B. Microprocessors
learning C. Integrated circuits
C. Eliminate the need for teachers D. Vacuum tubes
D. Provide entertainment for students
III. The Web and the Internet
5. ICT has transformed businesses by enabling:
A. Slower communication 11. The Internet is best described as:
B. Remote work and e-commerce A. A series of connected web pages
C. Higher operational costs B. A global network of networks
D. Face-to-face interactions only C. A collection of email servers
D. A platform for streaming media
II. History of Computers
12. The first webpage was created by:
6. The "father of computers," Charles Babbage, A. Bill Gates
designed: B. Steve Jobs
A. The Difference Engine C. Tim Berners-Lee
B. The personal computer D. Mark Zuckerberg
B. Creating fake websites for fun
13. What is the primary function of a search C. A type of programming language
engine? D. A method of improving computer security
A. Store personal data
B. Rank websites by popularity 20. What is the purpose of computer ethics?
C. Index and retrieve web pages A. To determine the legality of software
D. Create online accounts B. To guide appropriate and responsible use
of technology
14. Which of the following is a widely used web C. To develop antivirus programs
browser? D. To limit the use of the Internet
A. Windows Explorer
B. Google Chrome V. Digital Technology and Social Change
C. Adobe Photoshop
D. Microsoft Word 21. How has social media transformed
communication?
15. What does HTML stand for? A. By reducing the use of the Internet
A. Hypertext Markup Language B. By enhancing global connectivity and
B. High-Tech Machine Language information sharing
C. Home Text Message Line C. By increasing face-to-face interactions
D. Hyper Text Media Language D. By eliminating written communication
IV. Netiquette and Computer Ethics 22. What is the digital divide?
A. The gap between those who have access to
16. Which of the following is a key principle of digital technologies and those who do not
netiquette? B. A new online shopping platform
A. Send spam emails C. The difference between wired and wireless
B. Use all caps in emails networks
C. Be respectful and polite online D. A term for outdated computers
D. Share confidential information freely
23. One major effect of technology on society is:
17. Piracy refers to: A. Increased economic disparity
A. Legally downloading software B. The improvement of healthcare and
B. Copying or distributing copyrighted education through innovation
material without permission C. A reduction in workplace efficiency
C. Writing code for open-source software D. The end of global communication
D. Creating personal websites
24. What is remote work, and how is it
18. Which of the following is considered a form enabled?
of cyberbullying? A. Working only in traditional office settings
A. Sending friendly messages B. Working from any location via digital tools
B. Posting harmful or derogatory comments and the Internet
online C. A method of working without computers
C. Sharing open educational resources D. A form of labor-intensive outdoor work
D. Participating in online forums
25. Which of the following technologies has
19. What is phishing? contributed to the rise of online education?
A. A scam involving fraudulent emails to steal A. Landline phones
personal information B. Cloud computing and video conferencing
C. Personal diaries B. Internet traffic only
D. Vinyl records C. A method for fixing computers
D. A platform for streaming videos
VI. IT Culture and Society
32. An example of an IoT device is:
26. What is a digital native? A. A washing machine connected to the
A. Someone born before the invention of Internet
computers B. A regular desktop computer
B. Someone who is uncomfortable using C. A traditional wristwatch
technology D. A notebook
C. An individual born during or after the
introduction of digital technologies 33. What is one main concern about IoT
D. A person who avoids using the Internet devices?
A. Their size
27. IT culture is often associated with: B. Their susceptibility to privacy breaches
A. Isolation and separation C. Their inability to connect to the Internet
B. Globalization and interconnectedness D. The lack of available products
C. A decrease in global communication
D. Lack of technological progress 34. Which of the following technologies is most
commonly associated with IoT?
28. Which of the following is a social challenge A. Artificial intelligence
posed by digital technology? B. Smart devices connected via the Internet
A. Digital addiction C. Digital marketing
B. Faster communication D. Social media platforms
C. Reduced access to information
D. Improved global relations 35. The primary advantage of IoT is:
A. Reduced connectivity between devices
29. The term "cybersecurity" refers to: B. Increased automation and real-time data
A. The protection of Internet-connected access
systems from cyberattacks C. Limited device functionality
B. Preventing online shopping D. Decreased access to information
C. Slowing down computer performance
D. Creating websites VIII. Emerging Technologies and Trends
30. Which of the following best describes the 36. Artificial intelligence (AI) is:
impact of digital technology on business? A. The simulation of human intelligence by
A. Reduced efficiency machines
B. Increased global reach and operational B. A type of mobile app
efficiency C. A form of computer virus
C. Increased cost of communication D. The study of organic life
D. Decreased customer interaction
37. Block chain is mainly used in:
VII. Internet of Things (IoT) A. Cloud storage
B. Cryptocurrencies like Bitcoin
31. The Internet of Things (IoT) refers to: C. Internet advertising
A. The network of physical objects embedded D. Data compression
with sensors and software that connect to the
Internet
38. A significant advantage of block chain C. Share files between computers
technology is: D. Block spam messages
A. Complete privacy
B. Secure, decentralized record-keeping 45. The General Data Protection Regulation
C. Limited access to users (GDPR) is related to:
D. Its ability to store physical items A. Digital copyright laws
B. Protecting personal data and privacy in the
39. Augmented reality (AR) refers to: European Union
A. A virtual world created for games C. International trade agreements
B. The enhancement of the real world D. Online shopping regulations
through computer-generated images
C. A type of social media network X. Cloud Computing
D. A form of artificial intelligence
46. What is cloud computing?
40. A key feature of 5G technology is: A. Storing files on your local computer
A. Slower data transmission speeds B. Using remote servers to store, manage,
B. Higher speeds and lower latency than and process data
previous networks C. Downloading software from the Internet
C. A lack of connectivity in rural areas D. Creating virtual documents
D. The replacement of cloud storage
47. Which of the following is an advantage of
IX. Cybersecurity and Data Privacy cloud computing?
A. High cost for small businesses
41. A strong password should include: B. Access to data from anywhere with an
A. Only letters Internet connection
B. A combination of letters, numbers, and C. Complete offline access to stored data
symbols D. Restricted sharing of information
C. Your name and birthdate
D. Simple, easy-to-remember phrases 48. Which of the following is a common cloud
service provider?
42. Which of the following is NOT a type of A. Netflix
malware? B. Google Cloud
A. Virus C. Facebook
B. Spyware D. WhatsApp
C. Firewall
D. Trojan horse 49. What does VPN stand for?
A. Virtual Private Network
43. A firewall is used to: B. Virtual Personal Node
A. Spread viruses C. Verified Protocol Network
B. Prevent unauthorized access to a network D. Visual Private Navigation
C. Store files in the cloud
D. Build websites 50. What is the term for software that is free to
use and modify?
44. Phishing is a technique used to: A. Proprietary software
A. Steal sensitive information by pretending B. Open-source software
to be a trustworthy entity C. Closed-source software
B. Send promotional emails D. Trial ware
ANSWER KEY: 45. B
46. B
1. A 47. B
2. D 48. B
3. D 49. A
4. B 50. B
5. B
6. A
7. C
8. B
9. B
10. A
11. B
12. C
13. C
14. B
15. A
16. C
17. B
18. B
19. A
20. B
21. B
22. A
23. B
24. B
25. B
26. C
27. B
28. A
29. A
30. B
31. A
32. A
33. B
34. B
35. B
36. A
37. B
38. B
39. B
40. B
41. B
42. C
43. B
44. A