0% found this document useful (0 votes)
82 views9 pages

Living in The IT Era Finals

Final Examination

Uploaded by

Venus Gelaga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views9 pages

Living in The IT Era Finals

Final Examination

Uploaded by

Venus Gelaga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Republic of the Philippines

Municipality of Sibonga
Sibonga Community College
Poblacion, Sibonga, Cebu 6020

Subject: Living in the IT Era


Final Exam
st
1 Semester 2024-2025
Complete Name: __________________________ Course & Year Level: ________________
Test I. Multiple Choice
Directions: Read each of the questions carefully. Encircle the letter corresponding correct answer.

1. Which of the following is NOT a defining characteristic of the Digital Age?


a) The widespread use of computers and the internet.
b) A rapid shift from traditional industries to computerization.
c) The rise of artificial intelligence.
d) The decline of social media platforms.

2. How does ICT contribute to social change?


a) It facilitates the flow of information, empowering marginalized communities.
b) It restricts access to information, hindering social progress.
c) It has minimal impact on social development activities.
d) It primarily benefits developed countries and has little impact on developing nations.

3. What is the main argument regarding the impact of digital technologies on employment?
a) Digital technologies will always lead to a net loss of jobs.
b) Digital technologies have no impact on employment levels.
c) Digital technologies may create new jobs while displacing others.
d) Digital technologies have mainly led to a decrease in middle-skill jobs.

4. Which of the following is NOT a benefit of teleworking (work from home)?


a) Improved time management and work-life balance.
b) Increased commuting times and reduced flexibility.
c) Higher job satisfaction among teleworkers.
d) Reduced time spent on in-home production.

5. What is a significant health risk associated with the extreme use of digital technologies?
a) Increased physical activity and reduced mental stress.
b) Reduced screen time and improved sleep patterns.
c) Mental health problems, particularly among children and teenagers.
d) Enhanced social interaction and reduced feelings of isolation.

6. How can ICT be used to enhance the education delivery system?


a) By limiting access to information and promoting traditional teaching methods.
b) By providing equal access to information and supporting open learning concepts.
c) By discouraging student autonomy and encouraging dependence on teachers.
d) By neglecting the needs of differently-abled learners.

7. What is the main benefit of using digital resources in classrooms?


a) To restrict student access to information and encourage reliance on textbooks.
b) To prepare students for a digital society and economy.
c) To discourage the use of technology in learning processes.
d) To limit opportunities for collaborative learning.

8. What is the role of ICT in business?


a) It hinders collaboration and knowledge sharing.
b) It increases barriers to starting a business.
c) It promotes traditional business models and discourages innovation.
d) It facilitates knowledge sharing, reduces business start-up costs, and enhances customer service.

9. How can ICT contribute to financial inclusion?


a) It limits access to financial services for marginalized communities.
b) It discourages the use of mobile financial services (m-commerce).
c) It promotes financial exclusion by creating digital divides.
d) It enables financial inclusion through m-commerce and digital platforms.

10. What is the main argument for the importance of understanding the features of ICT?
a) To restrict the use of ICT and maintain traditional social structures.
b) To promote technological dependence and hinder individual innovation.
c) To increase the potential benefits of ICT for societal development.
d) To limit the influence of ICT on social change and individual lives.

11. How has digital broadcasting changed the entertainment industry?


a) It has led to the decline of television and radio.
b) It has limited access to entertainment content.
c) It has made entertainment more accessible and diverse.
d) It has made entertainment less engaging and interactive.

12. Which of the following is an example of a digital entertainment platform?


a) Traditional radio broadcasting.
b) Netflix, a streaming service.
c) Print newspapers.
d) Traditional cinema theaters.

13. How has technology impacted the production and distribution of music?
a) It has made music less accessible to the public.
b) It has made music production and distribution more expensive.
c) It has made music production and distribution more accessible and affordable.
d) It has limited the range of musical genres available.

14. What is the impact of ICT infrastructure on social businesses?


a) It limits their reach and effectiveness.
b) It makes social impact more expensive and challenging.
c) It hinders their ability to connect with local communities.
d) It makes social impact more affordable, scalable, and accessible.

15. How does ICT affect health care delivery?


a) It hinders access to medical information and treatment options.
b) It promotes traditional healthcare practices and discourages innovation.
c) It provides new treatment options, improves data management, and enables telemedicine.
d) It limits the role of healthcare professionals and reduces patient-provider interaction.

16. What is the main concern regarding the exchange and use of medical data in the digital age?
a) The lack of data security and privacy concerns.
b) The abundance of data and the difficulty in managing it.
c) The lack of access to medical data for research purposes.
d) The over-reliance on technology in healthcare decision-making.

17. What is the key argument regarding the impact of the Digital Age on work-life balance?
a) It increases work-life imbalance by blurring the lines between work and personal time.
b) It enhances work-life balance by providing greater flexibility and control over work schedules.
c) It has no significant impact on work-life balance.
d) It leads to increased stress and burnout.

18. What is the main concern regarding the increasing use of digital technologies among children and teenagers?
a) The potential for increased physical activity and improved health.
b) The lack of access to digital technologies and the resulting digital divide.
c) The potential for addiction, mental health problems, and a decline in face-to-face interaction.
d) The lack of opportunities for creative expression and exploration.

19. Which of the following is a possible consequence of the increasing automation of jobs?
a) A significant increase in overall employment levels.
b) A reduction in the need for human labor in certain sectors.
c) A decrease in the demand for highly skilled workers.
d) A decline in the overall productivity of the economy.
20. What is the main implication of the observation that digital technologies have a greater labor-saving potential than
previous technologies?
a) It suggests that the digital transformation will have a minimal impact on employment.
b) It suggests that automation will have a greater impact on the labor market in the future.
c) It suggests that the demand for high-skill jobs will decrease.
d) It suggests that the digital transformation will lead to widespread unemployment.

21. What does IoT stand for?


A) Internet of Technology
B) Internet of Things
C) Internet of Telecommunication
D) Internet of Transactions

22. What is a key feature of IoT devices?


a) They are only used in offices.
b) They require constant human intervention.
c) They can collect and analyze data from their environment.
d) They do not connect to the internet.

23. Which of the following is NOT mentioned as an example of an IoT device?


a) Refrigerator
b) Smart watch
c) Traditional light bulb
d) Coffee maker

24. What is one benefit of IoT in the “smart home” context?


a) It allows for voice commands to control devices.
b) It increases household chores.
c) It requires all devices to be manually operated.
d) It eliminates the need for any devices.

25. How do IoT devices typically share the sensor data they collect?
a) By sending it to a printer.
b) By storing it on a USB stick.
c) By connecting to an IoT gateway or edge device.
d) By displaying it on a screen.

26. Which technology can enhance the capabilities of IoT?


a) Virtual Reality
b) Artificial Intelligence (AI)
c) Blockchain
d) Cybersecurity

27. What potential risk is associated with the growing IoT?


a) It reduces the need for technology.
b) It eliminates the use of electricity.
c) It removes the need for communication.
d) It could invite hackers and leak personal data.

28. What is the primary promise of the Internet of Things?


a) To put sensors on everything and create digital formats.
b) To make everyday tasks more complicated.
c) To reduce the number of devices in use.
d) To eliminate physical interactions with devices.

29. Which of the following describes an IoT ecosystem?


a) A collection of web-enabled smart devices that communicate with each other.
b) A single smart device that operates alone.
c) Only home appliances that are connected to the internet.
d) Devices that do not require internet connectivity.

30. Why is IoT considered important?


a) It complicates daily life.
b) It helps people live and work smarter.
c) It decreases the number of available jobs.
d) It disconnects people from technology.

31. What does the term “Internet of Things” (IoT) refer to?
A) A new type of social media
B) A collection of network-enabled devices that communicate and exchange data
C) A type of online shopping platform
D) A method for enhancing physical fitness

32. Which of the following devices is NOT mentioned as part of the IoT?
A) Smart refrigerator
B) Smart thermostat
C) Digital camera
D) Security camera

33. What is a primary benefit of IoT in smart homes?


A) Increased physical labor
B) Automation of chores and time-saving features
C) Decreased energy consumption
D) Enhanced social interactions

34. How do IoT devices typically collect and share data?


A) By requiring constant human input
B) Through embedded systems and sensors
C) By manual data entry
D) Via social media platforms

35. What potential risk is associated with the increasing prevalence of IoT devices?
A) Improved consumer behavior predictions
B) Enhanced data security
C) Unauthorized access and data leaks
D) Increased physical space requirements

36. What role do artificial intelligence (AI) and machine learning play in IoT?
A) They are not used in IoT applications
B) They replace the need for human interaction completely
C) They increase the size of the devices
D) They help in making data collection processes easier and more dynamic

37. In an IoT ecosystem, what typically happens to the data collected by devices?
A) It is sent to a cloud for analysis or analyzed locally
B) It is only stored locally without analysis
C) It is deleted immediately after collection
D) It is solely used for advertising purposes

38. What is the main concern regarding the future of IoT according to different perspectives?
A) It will always be beneficial and risk-free
B) It will reduce the number of available devices
C) It could either revolutionize life or lead to significant technological issues
D) It will limit connectivity options

39. What kind of devices can be considered part of the IoT?


A) Only large machinery
B) Any device with network connectivity
C) Only mobile phones
D) Traditional household appliances without connectivity

40. What is one of the promises of the Internet of Things?


A) It will eliminate all manual tasks
B) It will make physical surroundings accessible to digital computers
C) It will create more physical jobs
D) It will reduce the need for technology in daily life
41. What is the primary focus of the lesson?
a) Historical trends in technology
b) Current trends and emerging technologies
c) Future predictions for technology in 2050
d) The impact of technology on agriculture

42. What percentage of enterprise workloads is expected to be in the cloud by 2020, according to Forbes?
a) 50%
b) 60%
c) 70%
d) 83%

43. Which of the following is an advantage of cloud computing mentioned in the text?
a) Increased local storage
b) Higher costs for companies
c) Freedom of new products and services
d) More complicated installation processes

44. What is a key area that cloud computing helps organizations with?
a) Reducing employee productivity
b) Enhancing information technology infrastructure
c) Increasing physical storage needs
d) Simplifying access to shared technology

45. How has mobile phone ownership in America changed since 2011?
a) It has decreased
b) It has remained the same
c) It has increased by 35%
d) It has increased by 10%

46. What trend is observed regarding traditional Internet services?


a) More people are using broadband
b) Fewer individuals are using traditional Internet services
c) Smartphone usage has no effect on broadband usage
d) All individuals prefer traditional Internet services

47. What type of devices have become increasingly popular in both business and personal use?
a) Desktop computers
b) Laptops
c) Mobile phones and tablets
d) Game consoles

48. What is the effect of mobile computing on online usage?


a) Decrease in mobile traffic
b) Increase in the use of traditional services
c) Increase in mobile traffic
d) No change in online usage

49. What does the text suggest about the pace of advancements in information technology?
a) It is slowing down
b) It is constant
c) It is advancing rapidly
d) It is only happening in specific industries

50.What will organizations likely do to save on IT infrastructure according to the lesson?


a) Increase local storage
b) Adopt cloud services
c) Minimize mobile usage
d) Focus on traditional computing methods

51. What is the official title of Republic Act No. 10175?


a) Cybercrime Act of 2010
b) Cybercrime Prevention Act of 2012
c) Computer Security Act of 2012
d) Digital Safety Act of 2012

52. According to the Act, which of the following best defines “computer”?
a) A device only capable of processing text
b) Any device capable of performing logical, arithmetic, routing, or storage functions
c) Only desktop computers and laptops
d) A device solely used for communication purposes

53. Which term refers to the collection of tools and policies used to protect the cyber environment?
a) Cybersecurity
b) Data Protection
c) Cyber Defense
d) Information Security

54. What does “computer data” encompass as defined in the Act?


a) Only physical documents
b) Any representation suitable for processing in a computer system
c) Data that is not stored online
d) Only software programs

55. In the context of the Act, what is meant by “traffic data”?


a) Data related to internet speed
b) Computer data other than the content of the communication
c) Data related to the physical movement of devices
d) Only data about user locations

56. Who is classified as a “service provider” under the Act?


a) Only government entities
b) Any entity that provides communication capabilities through a computer system
c) Only companies that sell hardware
d) Entities that do not handle computer data

57. Which of the following is NOT considered a cybercrime offense as per the Act?
a) Illegal Access
b) Data Interference
c) Software Development
d) Illegal Interception

58. What constitutes “illegal access” under the Act?


a) Accessing a computer system with permission
b) Accessing any part of a computer system without right
c) Accessing a computer system for maintenance
d) Gaining access through a secure password

59. Which of the following actions is classified as “data interference”?


a) Viewing data without altering it
b) Deleting computer data intentionally or recklessly without right
c) Backing up data securely
d) Collecting data for analysis

60. What does the term “database” refer to in the context of the Act?
a) A simple list of names
b) A representation of information prepared for computer use
c) Only online storage systems
d) Any unorganized collection of data

61. What does the term “Netiquette” primarily refer to?


a) Internet security measures
b) Network etiquette
c) Online marketing strategies
d) Software development practices
62. According to the text, what is the Golden Rule of Netiquette?
a) Always use emoticons in your messages
b) Treat others with respect as you would like to be treated
c) Use slang to make communication casual
d) Avoid using punctuation in messages

63. What should you avoid using in professional communications according to Netiquette?
a) Full sentences
b) Emoticons like
c) Proper grammar
d) Standard spelling

64. What does typing in all capital letters signify in online communication?
a) Excitement
b) Emphasis
c) "Screaming"
d) Formality

65. How can one effectively emphasize words in an online message?


a) By typing it in all caps
b) Using italic or bold text
c) Adding multiple exclamation points
d) Using more slang

66. What is a recommended practice before sending an online message?


a) Sending it without review
b) Proofreading your messages
c) Using complex jargon
d) Adding music to the message

67. Why should you be cautious when sharing information online?


a) It can lead to misunderstandings
b) It may be public and seen by anyone
c) It could be misinterpreted
d) All of the above

68. What should you do before forwarding an email or chat message to someone else?
a) Change the subject line
b) Gain consent from all involved participants
c) Add your own comments
d) Send it immediately

69. Which of the following is NOT a suggested practice in professional online communication?
a) Using correct spelling and grammar
b) Avoiding confusing terms
c) Including personal anecdotes
d) Checking for errors before sending

70. What is the primary purpose of following Netiquette rules?


a) To make communication longer
b) To ensure effective and respectful online interactions
c) To avoid using technology
d) To enhance creativity in messaging

71. What is the definition of "capture" under RA 9995?


a) To take a photo or video of a person.
b) To record audio of a person.
c) To videotape, photograph, film, record by any means, or broadcast.
d) To share a photo or video of a person.

72. What does "private area of a person" refer to under RA 9995?


a) Any part of the body that is not visible to the public.
b) The genitals, public area, buttocks, or female breast of an individual.
c) The face and hands of an individual.
d) Any part of the body that is considered offensive.

73. What is the punishment for unauthorized access into or interference in a computer system under RA 8792?
a) A fine of One Hundred Thousand pesos and imprisonment of six months to three years.
b) A fine of Five Hundred Thousand pesos and imprisonment of one year to five years.
c) A fine of One Million pesos and imprisonment of five years to ten years.
d) A fine of Ten Million pesos and imprisonment of ten years to twenty years.

74. What is the definition of "Access Device" under RA 8484?


a) Any device that can be used to access the internet.
b) Any card, plate, code, account number, electronic serial number, personal identification number, or other
telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to
obtain money, good, services, or any other thing of value or to initiate a transfer of funds (other than a transfer
originated solely by paper instrument).
c) Any device that can be used to make a phone call.
d) Any device that can be used to access a computer.

75. What is the punishment for unauthorized copying or reproduction of protected material under RA 8792?
a) A fine of One Hundred Thousand pesos and imprisonment of six months to three years.
b) A fine of Five Hundred Thousand pesos and imprisonment of one year to five years.
c) A fine of One Million pesos and imprisonment of five years to ten years.
d) A fine of Ten Million pesos and imprisonment of ten years to twenty years.

76. What is the definition of "Counterfeit Access Device" under RA 8484?


a) Any access device that is used for illegal purposes.
b) Any access device that is counterfeit, fictitious, altered, or forged, or an identifiable component of an access device or
counterfeit access device.
c) Any access device that is damaged or broken.
d) Any access device that is not authorized for use.

77. What is the definition of "Broadcast" under RA 9995?


a) To make public, by any means, a visual image with the intent that it be viewed by a person or persons.
b) To send a message over the radio or television.
c) To distribute information to a large audience.
d) To publish a story in a newspaper or magazine.

78. What is the purpose of RA 9995?


a) To protect the privacy of individuals from photo and video voyeurism.
b) To regulate the use of access devices.
c) To promote electronic commerce.
d) To protect intellectual property rights.

79. What does the term "Hacking or crackling with" refer to under RA 8792?
a) The act of breaking into a computer system without authorization.
b) The act of copying or reproducing protected material without authorization.
c) The act of using a computer system to commit fraud.
d) The act of using a computer system to harass or threaten another person.

80. What is the definition of "Device Making or Altering Equipment" under RA 8484?
a) Any equipment that can be used to make or alter access devices.
b) Any equipment that can be used to access the internet.
c) Any equipment that can be used to make phone calls.
d) Any equipment that can be used to access a computer.

II. Fill in the blanks.

81. The Digital Age is also known as the _______ age.

82. The rapid shift from traditional industry to _______ has been a key feature of the Digital Age.

83. _______ is defined as a group of interrelated technologies for accessing, processing, and disseminating information.

84. Digital technologies have radically changed the way people _______ over a short period of time.
85. Mobile phones have become very useful in areas such as _______, entertainment, jobs and etc.

86. The emergence of the Internet and mobile phones has opened a fresh passageway for transforming the way we
_______.

87. Social change refers to a transformation of _______ and social organizations over time.

88. Digital broadcasting has completely changed the way we experience _______ and radio.

89. ICT helps to increase productivity in business by using social media platforms for _______.

90. The development of a society mostly depends on access to _______.

III. True or False. Write T if the statement is True and F if the statement is False. Write your answer on the space
provided.

_____91. Technological Determinism suggests that technology shapes culture and social structures.

_____92. According to the theory of Technological Determinism, society progresses mainly due to human actions rather
than technology.

_____93. Marshall McLuhan's concept "The Medium is the Message" emphasizes the importance of technology over
content in communication.

_____94. The stirrup did not significantly impact the ability of horse-riders to fight while mounted.

_____95. Social Constructivism argues that technology determines human actions.

_____96. Technological change refers to the modification of social, political, and administrative institutions only.

_____97. The growth of technical knowledge reduces the cost of production of goods and services.

_____98. In Schumpeter's distinction, invention is considered the economic fact while innovation is the scientific fact.

_____99. The process of technological change consists of three stages: formulation, application, and commercialization.

_____100. Technological innovation has no effect on military strategies and training.

Prepared by: Recommending Approval:

CARLO A. MANGUBAT, LPT PERLA B. SARCENO, MPA, Ed.D.


Instructor Dean of Academic Affairs

Noted by: Approved by:

JOSEPH C. BARULO ATTY. EDWARD MAGLUCOT, Ph.D.


Program Head College Administrator

You might also like