0% found this document useful (0 votes)
50 views7 pages

El 14 - Revi

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views7 pages

El 14 - Revi

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

FINAL EXAMINATION

EL 14 – LIVING IN THE I.T. ERA


(REVIEWER)

It is the fastest, most powerful computer, and most expensive that are capable
of processing many trillions of instructions in a single second
a. Embedded Computer c. Supercomputer
b. Workstation d. Mainframe
It is the transmission of messages and files via a computer network
a. Email c. Yahoo
b. Email Program d. Gmail
It involves having a current knowledge and understanding of computers,
mobile devices, the web, and related technologies.

a. Internet Literacy c. Digital Literate


b. Digital Literacy d. Technology Literacy
Also called artificial intelligence, having machines decide for you seems to be a
daunting task and would probably make you think of robots and talking
computers, similar to Iron Man’s Jarvis.

a. Supercomputer c. Robots
b. Fifth Generation Computers d. Machine Learning
It is a computer small enough to fit in one hand.
a. Handheld Computer c. Wearable Devices
b. Mobile Phone d. Machine Learning
It is a visual representation of data and information, designed to communicate
quickly, simplify complex concepts, or present patterns or trends.
a. Graphs c. Pie/Line Charts
b. Presentation d. Infographics
A USB port, short for universal serial bus port, can connect up to __ different
peripheral devices together with a single connector.
a. 123 c. 127
b. 128 d. 129

It uses electrical components to provide a stable current flow and minimize the
chances of an overvoltage reaching the computer and other electronic
equipment.
a. Surge Protector c. UPS
b. AVR d. Voltage Protector
It is designed so that a user easily can carry it from place to place.
a. Embedded Computer c. Mobile Computer
b. Personal Computer d. Handheld Computer
It consists of electronic components that store instructions waiting to be
executed and the data needed by those instructions.
a. Hard Drive c. Storage Media
b. Storage Device d. Memory
It is a special-purpose computer that functions as a component in a larger
product.
a. Server c. Embedded Computer
b. Supercomputers d. Handheld Computer
It is a global library of information available to anyone connected to the
Internet
a. Web c. Internet
b. Website d. World Wide Web
It is an act of theft in which a person copies another person’s ideas, words, or
writings, etc. and pass them off as his or her own. Those who committed such
action may lead to serious legal and ethical defilements.
a. Plagiarism c. Exploitation
b. Copyright d. World Wide Web
It is someone who develops programs and apps or writes the instructions that
direct the computer or mobile device to process data into information.
a. Program Developer c. Developer
b. Software Developer d. Coder
According to _________, the “belongingness hypothesis” states that people have
a basic psychological need to feel closely connected to others, and that caring,
affectionate bonds from close relationships are a major part of human
behavior.
a. Zuppo c. Leary
b. Baumeister & Leary d. Baumeister
It is software that finds websites, webpages, images, videos, news, maps, and
other information related to a specific topic.
a. Portal c. Search Engine
b. Search Software d. Browser
It is an act of transmitting messages. It is a process in which information is
exchanged between individuals through verbal and non-verbal means.
a. Social Media c. Information
b. Communication d. Media
It is a program that extends the capability of a browser.
a. Extension c. Plug-in
b. Software Add-on d. Browser add-on
It is the practice of sharing or pooling computing resources, such as servers
and storage devices.
a. Virtualization c. Virtual Reality
b. Server Virtualization d. Virtual Computing
It is a large, expensive, powerful server that can handle hundreds or thousands
of connected users simultaneously.
a. Workstation c. Mainframe
b. Supercomputer d. Server
It can either be an insult, slur, or slander. Either written or spoken or even
through actions, it may lead to libel if the accusation is not true and without
any piece of evidence.
a. Libel c. Slander
b. Cyber-libel d. Cyber bullying
It stores domain names and their corresponding IP addresses.
a. Domain Server c. Domain Name Database
b. IP Address Server d. Domain Name Server
It is a computer that usually has a limited processing power that enables users
to send data to and/or receive information from a server, or host computer.
a. Terminal c. Server
b. Scanner d. Router
It is an input device that allows a user to control a small symbol on the screen
called the pointer.
a. Pointer c. Cursor
b. Mouse d. Pointing Device
It stores and delivers requested webpages to a computer via a browser.
a. Network Server c. Web Server
b. Internet Server d. Website Server
It is a computer dedicated to providing one or more services to other computers
or devices on a network.
a. Rack Server c. Router
b. Server d. Internet Modem
It is a personal computer designed to be in a stationary location, where all of
its components fit on or under a desk or table.
a. Desktop c. Mobile Phone
b. Laptop d. Personal Computer
User can pay bills, add minutes to phone plans, add money to prepaid cards,
and perform financial activities.
a. E-wallet Kiosk c. Ticket Kiosk
b. Kiosk d. Financial Kiosk
It is a collection of computers and devices connected together, often wirelessly,
via communications devices and transmission media.
a. Mainframe c. Workstation
b. Internet d. Network
It is an act in which one deals with a person dishonestly, unethically, and
dishonorably, in order to take advantage of the latter’s works and/ or
resources. This leads to unlawful actions.
a. Scam c. Virus
b. Exploitation d. Hacker
Generation of Computers were computers used very large scale integrated (VLSI)
circuits to build computers.
a. Second Generation of Computers c. Fourth Generation of Computers
b. First Generation of Computers d. Fifth Generation of Computers
It is the use of computers to simulate a real or imagined environment that
appears as a three-dimensional space.

a. Augmented Reality c. Metaverse Technology


b. Virtual Reality d. Machine Learning
It refers to the tools used in sending a message from the source to the
destination. Traditionally, for example, a professional send messages to the
audience, such as a news anchor delivering the news on TV and or radio.
a. Media c. Blog
b. Social Media d. Video log
It is a powerful multi-user computers that are capable of supporting a
hundreds or thousands of users simultaneously.

a. Mainframe c. Workstation
b. Supercomputer d. Server
It is a is software that finds websites, webpages, images, videos, news, maps,
and other information related to a specific topic.

a. Browser c. Search Engine


b. Search bar d. Internet
It refers to an environment that provides resources and services accessed via
the Internet.
a. Wi-Fi c. Cloud Computing
b. Internet Access d. Green Computing
It is a worldwide collection of computer networks that connects millions of
businesses, government agencies, educational institutions, and individuals
a. Wi-Fi c. Web
b. Internet Access d. Internet
It refers to an act of installing or copying a software into a computer in the absence of
an end-user licensing agreement (EULA), and/or producing a copy disregarding the
copyrights.
a. Information Piracy c. System Piracy
b. Software Piracy d. Violation of Piracy
It is a mobile computing device designed for single-player or multiplayer video
games.
a. Joystick c. Handheld Game Devices
b. Game Console d. Gamepads
It is a device, typically used in a home that streams digital media from a
computer or network to a television, projector, or some other entertainment
device.
a. Digitalized Player c. Media Player
b. Digital Media Player d. Online Media Player
TEST II – IDENTIFICATION. Write your answers in all capital letters. Strictly
no erasures, superimpositions, and alterations. Friction pens and other colors
of a pen aside from black pen are not allowed.

It is a security tool that detects and protects a personal computer and its data
from unauthorized intrusions.

It can assist you in becoming more effective and efficient while performing daily
activities at work, school, and home.

Using this adapter the computer automatically can recognize peripheral devices
as you install them.

It is a written guideline that helps determine whether a specification is


ethical/unethical or allowed/not allowed.

This speeds the processes of the computer because it stores frequently used
instructions and data.

It enhances functions of a mobile computer and/or provides connections to


peripheral devices.

It allows users to organize data in columns and rows and perform calculations
on the data.

It is a small text file that a web server stores on your computer.

It an object that can be tapped or clicked on a website contains a malicious


program.

It is defined as gaining unauthorized access to or obtaining confidential


information by taking advantage of the trusting human nature of some victims
and the naivety of others.
It is a program that identifies and fixes operating system problems, detects and
repairs drive problems, and includes the capability of improving a computer’s
performance.

It uses battery power to retain information when the power to the computer is
off.

It is a collection of individual related applications available together as a unit.

It allows users to create visual aids for presentations to communicate ideas,


messages, and other information to a group.

It is a type of program placed on a computer or mobile device without the


user’s knowledge that secretly collects information about the user and then
communicates the information it collects to some outside source while the user
is online.

It consists of electronic components that store instructions waiting to be


executed by the processor, data needed by those instructions, and the results
of processing the data.

It’s a tool that removes a program, as well as any associated entries in the
system files.

It is a security tool that detects and protects a personal computer and its data
from unauthorized intrusions.

It restricts access to specified websites.

It refers to the right of individuals and companies to deny or restrict the


collection, use, and dissemination of information about them.

You might also like