100% found this document useful (1 vote)
710 views9 pages

INTRO TO COmputing Final Exam

This document is a final examination for a Bachelor of Science in Information Technology course at Occidental Mindoro State College in the Philippines. It consists of multiple choice questions testing knowledge of topics like the components of a web address, the history and invention of the Internet and World Wide Web, internet communication methods, computer security concepts like encryption and malware, and information privacy elements. It contains 43 multiple choice questions testing these technical computing concepts.

Uploaded by

arjeanette
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
710 views9 pages

INTRO TO COmputing Final Exam

This document is a final examination for a Bachelor of Science in Information Technology course at Occidental Mindoro State College in the Philippines. It consists of multiple choice questions testing knowledge of topics like the components of a web address, the history and invention of the Internet and World Wide Web, internet communication methods, computer security concepts like encryption and malware, and information privacy elements. It contains 43 multiple choice questions testing these technical computing concepts.

Uploaded by

arjeanette
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Republic of the Philippines

OCCIDENTAL MINDORO STATE COLLEGE


Rizal Street, San Jose, Occidental Mindoro
Website: www.omsc.edu.ph Email address: [email protected]
Tele/Fax: (043) 457-0305
Bachelor of Science in Information Technology

INTRODUCTION TO COMPUTING
Final Examination
1st
Semester, A.Y. 2023– 2024
Name:______________________________ Date:_____________________
Course/Year&Section:________________ Rating:___________________

TEST I: MULTIPLE CHOICE


Instruction: Read the questions carefully and choose the correct answer.

1. It is the most identifiable element of a web address.


a. The Protocol
b. The Path
c. The Domain name
d. Top-Level Domain
2. It is a worldwide system of interconnection of computer networks and also known
as Interconnected Networks.
a. The Web
b. Uniform Resource Identifier
c. The Protocol
d. The Internet
3. What does ARPANET means?
a. Advanced Research Projects Agency Network
b. Advantage Reconnect Protocol Agent Networking
c. Advance Reach Protect Agency Network
d. None of the above
4. Who invented the World Wide Web?
a. Charles Darwin
b. Tim Berners-Lee
c. Charles Babbage
d. None of the above
5. A kind of address that is unique and used to identify to each resources on the web.
a. HTML
b. The Path
c. The Protocol
d. URI
6. What is the meaning of HTML?
a. HyperTool Mail Language
b. Hypertext Media Language
c. Hypertext Markup Language
d. HyperTension Markup Language
7. It tells your browser how to communicate with a website’s server, in order to send
and retrieved information.
a. The Path
b. Name of the website
c. Top level domain
d. The Protocol
8. It directs the browser to a specific page on the website
a. Hypertext Markup Language
b. The Protocol
c. The Path
d. Name of the website
9. It was designed for communication between web browser and web server.
a. HTTP
b. HTML
c. URI
d. URL
10. It is the information retrieval service of the Internet and gives users to access to a
vast array of documents that are connected to each other using hypertext or
hypermedia links.
a. WWW (World Wide Web)
b. URI: Uniform Resource Identifier
c. HTML: HyperText Markup Language
d. URL (Uniform Resource Locator
11. It is electronic connections that link related pieces of information.
a. Hypermedia
b. Hyperlink
c. Hypertext
d. None of the above
12. The documents feature links to images, sounds, animations, and movies.
a. Hypermedia
b. Hyperlink
c. Hypertext
d. None of the above
13. It allows the user to select a word or phrase from text and thereby access other
documents that contain additional information in pertaining to that word or phrase.
a. Hypermedia
b. Hyperlink
c. Hypertext
d. None of the above
14. Are computer programs that store and transmit documents to other computers on
the network.
a. Client computers
b. Servers
c. Workstation computers
d. None of the above
15. It is referred to as the sharing of information, ideas, or simply words over the
World Wide Web, or the Internet
a. Network
b. Communication
c. Internet communication
d. Internet
16. How many types of Internet Communication?
a. 8
b. 6
c. 4
d. 7
17. Are specifically directed to people who have questions or want to start an idea or
thought through group discussions.
a. Chat rooms
b. Blog
c. Email
d. Forums
18. This is more likely to be performed when engaging with a person officially, be it
conducting a business, heeding for certain requests, or just simply saying “Hi!”.
a. Instant messaging
b. Chat rooms
c. Email
d. Social Media Sites
19. Are programs that request documents from a server as the user ask for them.
a. Server
b. Clients
c. Internet Communication
d. None of the above
20. The markup or formatting language for the web. With ______ you can create your
own Website.
a. URI
b. URL
c. HTTP
d. HTML
21. When was the World Wide Web was invented?
a. 1999
b. 1989
c. 1888
d. 1889
22. Tim Berners’Lee laid out his vision for what would become the web in a document
called “_______” in March 1989.
a. Information System: The Proposal
b. Information Security: A proposal
c. Information Management: A proposal
d. None of the above
23. TCP means?
a. Transfer Control Protocol
b. Transcript Collage Practice
c. Through Collapse Pin
d. None of the above
24. This is a network that links computers around the world.
a. Browser
b. Webpage
c. Homepage
d. Internet
25. What is the best statement that describe the Internet?
a. A home network
b. Found only at computer shop
c. The largest computer network in the world
d. Holds a bulk of information
26. It is the protection to an automated information system in order to attain the
applicable objectives of preserving the integrity, availability, and confidentiality of
information system resources including hardware, software, firmware,
information/data, and telecommunications.
a. Computer Security
b. Computer Privacy
c. Information System
d. All of the above
27. One of the key objective of computer security that basically about preserving
authorized restriction on information access and disclosure, including means for
protecting personal privacy and proprietary information.
a. Confidentiality
b. Integrity
c. Availability
28. One of the key objective of computer security that basically about guarding against
improper information modification or destruction, including ensuring information
non-repudiation and authenticity
a. Confidentiality
b. Integrity
c. Availability
29. One of the key objective of computer security which assures that systems work
promptly and services is not denied to authorized users.
a. Confidentiality
b. Integrity
c. Availability
30. It is the common technique for masking contents
a. OSI Security Architecture
b. CIA Triad
c. Computer Security
d. Encryption
31. The most sophisticated types of threats to computer systems are presented by
programs that exploit vulnerabilities in computing systems
a. Malicious software
b. Malware
c. Activeware
d. All of the bove
32. Type of malware which also known as trapdoor
a. Backdoor
b. Logic Bomb
c. Trojan Horses
d. Worm
33. It is a code embedded in some legitimate programs that is set to “explode” when
certain conditions are met.
a. Backdoor
b. Logic Bomb
c. Trojan Horses
d. Worm
34. A computer program that can run independently and can propagate a complete
working version of itself onto hosts on a network
a. Backdoor
b. Logic Bomb
c. Trojan Horses
d. Worm
35. Type of malware that is used to send large volumes of unwanted e-mail.
a. Keylogger
b. Rootkit
c. Spammer programs
d. Flooder
36. Type of malware that is used to Captures keystrokes on a compromised system.
a. Keylogger
b. Rootkit
c. Spammer programs
d. Flooder
37. Software that collects information from a computer and transmits it to another
system
a. Spyware
b. Adware
c. Virus
d. Downloader
38. Type of malware that replicate itself into other executable code when executed
a. Spyware
b. Adware
c. Virus
d. Downloader
39. What phase of computer virus if it is in IDLE?
a. Triggering phase
b. Execution phase
c. Propagation phase
d. Dormant phase
40. What phase of computer virus if the function is performed?
a. Triggering phase
b. Execution phase
c. Propagation phase
d. Dormant phase
41. What phase of computer virus if it place a copy of itself into other programs or into
certain system areas on the disk
a. Triggering phase
b. Execution phase
c. Propagation phase
d. Dormant phase
42. What phase of computer virus if it is activated to perform the function for which it
was intended.
a. Triggering phase
b. Execution phase
c. Propagation phase
d. Dormant phase
43. Key elements of information privacy which defined as the ability to describe the
boundaries and ownership or access rights to information
a. Separateness
b. Restricted access
c. Beneficial use
d. Security
44. Key elements of information privacy which implies that only data owners or parties
explicitly authorized to receive the information are able to benefit from its use.
a. Separateness
b. Restricted access
c. Beneficial use
d. Security
45. Key elements of information privacy which refers to the ability to protect the
identified data.
a. Separateness
b. Restricted access
c. Beneficial use
d. Security
46. It is digital information sent from a Web server and stored on the hard drive of an
individual’s computer by the browser software or network application
a. Web bugs
b. Web apps
c. World Wide Web
d. Web cookies
47. It is hidden images that can be covertly added to any web page; e-mail, or Microsoft
Word, Excel, or Power point file and used to collect information about user
behavior
a. Web bugs
b. Web apps
c. World Wide Web
d. Web cookies
48. What kind of methods in digital rights management where you can only download a
file after paying for it
a. Restricting ability to acquire the content
b. Restricting the playback or viewing of the content
c. Restricting access to sharing the content once it has been acquired
d. Restricting access to saving the content in other formats
49. What kind of methods in digital rights management where you cannot print or copy
text from a protected PDF version of a book
a. Restricting ability to acquire the content
b. Restricting the playback or viewing of the content
c. Restricting access to sharing the content once it has been acquired
d. Restricting access to saving the content in other formats
50. It is one of the legal and ethical issues in computing which prevents the users from
installing more copies than they are entitled to
a. End User Agreement
b. Product Activation
c. Copyright Law
d. Intellectual Property
51. Example of operational system that operated directly by shop floor worked of front
line staff, which provide the key data required to support the management of
operations.
a. Transaction processing System
b. Decision Support System
c. Management Information System
52. _________ are management-level systems that are used by middle managers to help
ensure the smooth running of the organization in the short to medium term.
a. Transaction processing System
b. Decision Support System
c. Management Information System
53. Sales management systems, Inventory control systems and Budgeting systems are
example of __________.
a. Transaction processing System
b. Decision Support System
c. Management Information System
54. What system help executives and senior managers analyze the environment in
which the organization operates, to identify long-term trends, and to plan
appropriate courses of action.
a. Executive Information System
b. Decision Support Systems
c. Transaction processing System
55. The following are examples of Decision Support System, Except;
a. Group Decision Support Systems (GDSS)
b. Computer Supported Co-operated Works (CSCW)
c. Decision Support Systems
56. What are the three fundamental roles of Information Systems?
a. Operations, controls and decisions
b. Operations, Support and decisions
c. Process, Input and output
57. What components of Information System that you can physically touch
a. Hardware
b. Software
c. People
58. ________ processed electronic signals that represents either a one (“on”) or a zero
(“off”).
a. Digital Device
b. Digital Divide
c. Software
59. The “on” state is represented by the presence of an electronic signal; and the “____”
state is represented by the absence of an electronic signal.
a. Absent
b. Off
c. Power
60. A group of eight bits is called _____
a. Byte
b. binary digit
c. Group of numbers
61. What components of Information System is created through the process of
programming.
a. Hardware
b. Software
c. People
62. __________are interrelated components working together to collect, process, store,
and disseminate information to support decision making, coordination, control,
analysis, and visualization in an organization.
a. Information System
b. Executive Information System
c. Decision Support Systems
63. It allow office employees to complete their daily work
a. Productive Software
b. Utility software
c. Programming software
64. It is raw bits and pieces of information with no context.
a. Data
b. Information
c. Knowledge
65. It is numeric, the result of a measurement, count, or some other mathematical
calculation.
a. Quantitative data
b. Qualitative data
c. Information
Test II – True or False. Choose TRUE if the statement is correct and FALSE if not.

66. Database is an organized collection of related information.


a. TRUE
b. FALSE
67. A process is a series of steps undertaken to achieve a desired outcome or goal.
a. TRUE
b. FALSE
68. The first personal computers could process 8 bits of data at once
a. TRUE
b. FALSE
69. Modern PCs can now process 64 bits of data at a time.
a. TRUE
b. FALSE
70. Programming software is software whose purpose is to make more software.
a. TRUE
b. FALSE
71. Data is not that useful.
a. TRUE
b. FALSE
72. Monitoring and controlling the activities of employees is a core function of
information systems.
a. TRUE
b. FALSE
73. A third fundamental role for information systems is management support in making
decisions.
a. TRUE
b. FALSE
74. Transaction Processing System are operational-level systems at the bottom of the
pyramid.
a. TRUE
b. FALSE
75. Management Information Systems are management-level systems that are used by
middle managers to help ensure the smooth running of the organization
a. TRUE
b. FALSE
Prepared by:
Introduction To Computing Instructors

You might also like