LIVING IN THE IT ERA Flashcards

(101 cards)

1
Q
  1. What was the name of first computer designed by Charles Babbage?
    a. Analytical Engine
    b. Difference Engine
    c. Colossus
    d. ENIAC
A

a. Analytical Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which was the first electronics digital programmable computing device?
    a. Analytical Engine
    b. Difference Engine
    c. Colossus
    d. ENIAC
A

d. ENIAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. John Mauchly and J. Presper Eckert are the inventors of __________
    a. UNIAC
    b. ENIAC
    c. EDSAC
    d. Ferranti Mark 1
A

b. ENIAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Who invented the punch card?
    a. Charles Babbage
    b. Semen Korsakov
    c. Herman Hollerith
    d. Joseph Marie Jacquard
A

c. Herman Hollerith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. In the late __________, Herman Hollerith invented data storage on punched cards that could then be read by a machine.
    a. 1860
    b. 1900
    c. 1890
    d. 1880
A

d. 1880

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which electronic components are used in First Generation Computers?
    a. Transistors
    b. Integrated Circuits
    c. Vacuum Tubes
    d. VLSI Microprocessor
    e. ULSI Microprocessor
A

c. Vacuum Tubes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which electronic components are used in Second Generation Computers?
    a. Transistors
    b. Integrated Circuits
    c. Vacuum Tubes
    d. VLSI Microprocessor
    e. ULSI Microprocessor
A

a. Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which electronic components are used in Third Generation Computers?
    a. Transistors
    b. Integrated Circuits
    c. Vacuum Tubes
    d. VLSI Microprocessor
    e. ULSI Microprocessor
A

b. Integrated Circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which electronic components are used in Fourth Generation Computers?
    a. Transistors
    b. Integrated Circuits
    c. Vacuum Tubes
    d. VLSI Microprocessor
    e. ULSI Microprocessor
A

d. VLSI Microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which electronic components are used in Fifth Generation Computers?
    a. Transistors
    b. Integrated Circuits
    c. Vacuum Tubes
    d. VLSI Microprocessor
    e. ULSI Microprocessor
A

e. ULSI Microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. ENIAC Computer belongs to __________.
    a. First Generation Computers
    b. Second Generation Computers
    c. Third Generation Computers
    d. Fourth Generation Computers
A

a. First Generation Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. __________ is used as a programming language in first generation computers?
    a. FORTRAN
    b. COBOL
    c. BASIC
    d. Machine Language
A

d. Machine Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which is not true about Second Generation of Computer?
    a. Stored data in magnetic media
    b. Bigger, cheaper, faster
    c. Faster and more reliable than first generation systems
    d. Generated heat though a little less
A

b. Bigger, cheaper, faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. All are the characteristics of a Third Generation Computer except:
    a. Used parallel processing
    b. Output was visualized on the monitors
    c. Slightly smaller, cheaper, faster
    d. Do not used motherboards
A

d. Do not used motherboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which characteristic below does not define Fourth Generation Computer?
    a. Used CPUs which contained thousands of transistors
    b. smaller and fitted on a desktop, laps and palms
    c. very fast
    d. expensive
A

d. expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The microprocessor that advances the use of graphics and music on PCs.
    a. fortran microprocessor
    b. pentium microprocessor
    c. Intel microprocessor
    d. python microprocessor
A

b. pentium microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. They are from Bell Laboratories who invented the transistor. They discovered how to make an electric switch with solid materials and no need for a vacuum, except:
    a. William Shockley
    b. John Bardeen
    c. Walter Brattain
    d. Joseph Marie Jacquard
A

d. Joseph Marie Jacquard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. They develop the Google search engine at Stanford University.
    a. William Shockley and John Page
    b. Walter Brin and Larry Book
    c. Sergey Brin and Larry Page
    d. William Brin and Joseph Page
A

c. Sergey Brin and Larry Page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The first portable computer with the familiar flip form factor
    a. Gavilan SC
    b. Gavilan Mac Pro
    c. Gavialn SD
    d. Gavilan PG
A

a. Gavilan SC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The computer which features advanced audio and video capabilities.
    a. Gavilan SD
    b. Amiga 1000
    c. Altair 8080
    d. Radio Shock TRS
A

b. Amiga 1000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The person behind the first computer mouse created in 1964
    a. Douglas Engelbart
    b. Jack Kilby
    c. Robert Noyce
    d. Grace Hopper
A

a. Douglas Engelbart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. It is used to store the operating system of a computer and allows data to be shared among computers invented by Allan Shugart and his team in 1971.
    a. Intel microprocessor
    b. USB
    c. Floppy Disk
    d. OS
A

c. Floppy Disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. He develops Ethernet for connecting multiple computers and other hardware.
    a. Robert Metcalfe
    b. Douglas Engelbart
    c. Robert Noyce
    d. Grace Hopper
A

a. Robert Metcalfe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The following are all personal computers existed in 1974-1977, except:
    a. Scelbi
    b. Mark-8 Altair
    c. IBM 500
    d. Radio Shack’s TRS-180
A

c. IBM 500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
24. It is the world's first minicomputer a. Gavilan SC b. Mark 8- Altair c. Altair 808 d. Radio Shack's TRS-180
c. Altair 808
3
25. The first computerized spreadsheet program used by the accountants in 1978 a. VisiCalc b. Altair 8080 c. VisCalc d. Altair 8800
a. VisiCalc
3
26. A personal computer that has an Intel chip, two floppy disks and an optional color monitor. a. Altair 8080 b. Radio Shack's TRS 80 c. Acorn d. IBM
d. IBM
3
27. A small chip that can function as an amplifier, oscillator, timer, microprocessor, or even computer memory. a. transistor b. Vacuum tubes c. integrated circuits d. none of the above
c. integrated circuits
3
28. It was the first important algorithmic language designed in 1957 by an IBM team led by John Backus a. Cobol b. C++ d. Fortran d. Algol
d. Algol
3
29. The central concept of the modern computer was based on his ideas. a. Charles Babbage b. Allan Turing c. France Marie Jacquard d. Herman Hollerith
b. Allan Turing
3
30. The computer that allows non-geeks could write programs and a computer do what they wished. a. TRS 80 b. Altair 808 c. Acorn d. IBM
a. TRS 80
3
Does Industrial Technology stand for IT?
FALSE
3
Telephone comes first before Telegraph
FALSE
3
UNIVAC comes first before ENIAC.
FALSE
4
The Internet Era started in the 1960s - present.
FALSE
4
In what era was writing systems discovered and used for recording and preserving knowledge? A. Prehistoric - Antiquity Era B. Ancient Mesopotamia - Middle Age Era C. 15th Century D. Late 19th - 20th Century
B. Ancient Mesopotamia - Middle Age Era
4
Who invented the first practical wireless telegraphy system in Italy 1895, laying the foundation for radio? a. Philo Farnsworth b. Albert Einstein c. Guglielmo Marconi d. Johannes Gutenberg
c. Guglielmo Marconi
4
What played an important role in media production, distribution, and consumption, automating tasks personalizing content, and creating new forms of interactive experiences during the Convergence and the Future? a. Virtual reality (VR) b. Smartphones c. Augmented reality (AR) d. Artificial Intelligence (AI)
d. Artificial Intelligence (AI)
4
Who invented the printing press during the printing revolution in the 15th century that allowed mass production of books, making information more accessible and affordable? a. Philo Farnsworth b. Albert Einstein c. Guglielmo Marconi d. Johannes Gutenberg
d. Johannes Gutenberg
4
In the early days, Charles Babbage had made the device, but he was confused about how to give instructions to the machine, and then Ada Lovelace wrote the instructions for the analytical engine. When did this happen? a. 1949 b. 2002 c. 1957 d. 1883
d. 1883
5
It is a general-purpose, procedural programming language and the most popular programming language till now. a. C b. Java c. Cobol d. Basic
a. C
6
. ALGOL stands for a. ALGOrithmitic Love b. ALGOready Lifestyle c. ALGOrithmic Language d. ALGOretro Lifeguard
c. ALGOrithmic Language
6
The first programming language to have a code block like “begin” that indicates that your program has started and “end” means you have ended your code. a. COBOL b. BASIC c. ALGOL d. FORTRAN
c. ALGOL
7
Businesses cannot use media to reach a global audience; they can only rely on traditional advertising
FALSE
8
One of the key roles of media in education is offering access to educational resources and informative programs
TRUE
9
Media only provides entertainment and does not help people stay connected with friends and family
FALSE
10
Media provides resources for personal growth, skill development, and motivational content.
TRUE
11
What Are the Younger Generation particularly engaged in the Digital Age? a. Mobile Devices b. Sports c. Make-Up d. Playing
a. Mobile Devices
11
What are the examples in Digital Media? a. Social media b. TV c. Radio d. Washing Machine
a. Social media
12
What are the main purposes in the digital age? a. To connect people, provide easy access to information, foster communication, and create new opportunities for learning, entertainment, and business. b. To make things harder for people to access information. c. To change people in a cave. d. None of the above
a. To connect people, provide easy access to information, foster communication, and create new opportunities for learning, entertainment, and business.
13
Which of the following is a key characteristic of the rise of digital media in the modern age? a. Traditional TV and radio are becoming more popular than digital media. b. Younger generations are spending more time interacting with digital screens. c. Google and Facebook/Meta have decreased their influence in the digital media landscape. d. Digital media platforms like Netflix are no longer relevant.
b. Younger generations are spending more time interacting with digital screens.
14
It is a serious phenomenon involving unwanted, hostile behavior by individuals to gain control over others, often resulting in personal trauma as a serious phenomenon involving unwanted, hostile behavior by individuals to gain control over others, often resulting in personal traumas. A. Cybercrime B. Cyberbullying C. Cyber security D. Cyber punk
B. Cyberbullying
15
a systematic approach to designing, delivering, managing, and improving IT services to meet business needs and ensure customer satisfaction? A. Project Management B. Blockchain C. IT Service Management D. Artificial Intelligence
C. IT Service Management
16
It means delivering computing resources (servers, storage, databases, networking, etc.) over the internet, allowing users to access them on-demand and pay-as-they-go, instead of owning and managing their own physical infrastructure. A. Cloud Computing B. Cyber Security C. Project Management D. Artificial Intelligence
A. Cloud Computing
17
It is one of the popular media sites where people search for information and learning opportunities. A. Youtube B. Facebook C. Twitter D. Instagram
A. Youtube
18
It became a primary source of information, allowing consumers to gain insights and opinions from others before making their choices. A. Online Reviews B. Ratings C. Live Selling D. Blogs
A. Online Reviews
18
Which term refers to the ethical and responsible handling of personal data, including when and how it is collected and shared? A. Data Security B. Data Privacy C. Cyber Security D. Cyberbullying
B. Data Privacy
19
Which term focuses on protecting data from unauthorized access, theft, or corruption using tools like encryption and password management? A. Data Privacy B. Data Security C. Spyware D. Cyber Security
B. Data Security
20
Which data privacy law was introduced in 2018 to protect EU citizens' personal data? A. CCPA B. HIPAA C. GDPR D. COPPA
C. GDPR
20
What is the primary purpose of the Children’s Online Privacy Protection Act (COPPA)? A. To protect financial nonpublic personal information B. To restrict how companies collect and use data C. To protect children's data (ages 12 and under) D. To fortify HIPAA and safeguard private health information
C. To protect children's data (ages 12 and under)
21
Which law requires agencies to protect data and was introduced in 2002? A. Sarbanes-Oxley Act (SOX) B. Federal Information Security Management Act (FISMA) C. ISO 27001 D. California Consumer Privacy Act (CCPA)
B. Federal Information Security Management Act (FISMA)
22
What is one major positive impact of Information Technology (IT) on communication? A) It makes communication slower but more secure B) It enables instant and efficient communication through emails, messaging, and video calls C) It limits communication to only in-person interactions D) It prevents people from accessing information globally
B) It enables instant and efficient communication through emails, messaging, and video calls
23
How does automation contribute to cost reduction in businesses? A) By requiring more human workers to handle machines B) By replacing inefficient processes with technology, reducing labor and operational costs C) By increasing expenses on robotic maintenance and AI systems D) By forcing companies to hire additional IT specialists
B) By replacing inefficient processes with technology, reducing labor and operational costs
24
Which of the following is NOT a type of automation? A) Industrial Automation B) Home Automation C) Traditional Manual Labor D) Business process Automation(BPA)
C) Traditional Manual Labor
25
What is a negative impact of IT in terms of privacy? A) Increased data security and reduced hacking risks B) Greater control over personal information C) Higher risk of data breaches and personal information leaks D) Reduced dependence on the internet for sensitive transactions
C) Higher risk of data breaches and personal information leaks
25
Which of the following is an example of industrial automation? A) A chatbot assisting customers online B) A robotic arm assembling cars in a factory C) A smart thermostat adjusting room temperature D) A doctor diagnosing a patient through telemedicine
B) A robotic arm assembling cars in a factory
25
What is a primary concern for individuals using online banking services? a. Lack of availability of banks in rural areas b. Risks of cyberattacks, fraud, and data breaches c. Confusing website navigation d. Higher fees compared to traditional banking
b. Risks of cyberattacks, fraud, and data breaches
25
Which type of malware is capable of locking users out of their files or systems and demanding a payment for restoration? a. Spyware b. Ransomware c. Trojan d. Adware
b. Ransomware
25
What is one challenge teachers face while using an LMS? a. Providing feedback and addressing technical issues b. Lack of interest from students c. Difficulty in accessing online learning platforms d. Limited availability of course materials
a. Providing feedback and addressing technical issues
25
RA 10175 is also known as the _____. A. E-Commerce Law B. Anti-hacking Law C. Cybercrime Prevention Act of 2012 D. Online Privacy Act
C. Cybercrime Prevention Act of 2012
25
How can adware negatively impact a business? a. It encrypts files and demands a ransom. b. It slows down systems and compromises sensitive data. c. It prevents access to marketing tools. d. It automatically removes advertisements from websites.
b. It slows down systems and compromises sensitive data.
26
What makes medical records a valuable target for cybercriminals? a. Their low level of encryption compared to financial data b. Their value being higher than credit card information c. Their accessibility to unauthorized users d. Their ability to be shared freely
b. Their value being higher than credit card information
27
What is the primary purpose of RA 10175? A. To regulate internet speed in the country B. To address legal issues concerning online activities C. To promote free access to the internet D. To mandate the development of e-commerce platforms
B. To address legal issues concerning online activities
28
Which of the following is NOT classified as a cybercrime under RA 10175? A. Cyber libel B. Hacking C. Cyber security auditing D. Cybersex
C. Cyber security auditing
29
Cyber libel refers to: A. Spreading fake news B. Publishing defamatory content on the internet C. Unauthorized use of copyrighted material D. Sending unsolicited emails
B. Publishing defamatory content on the internet
29
What does Section 4 of RA 10175 primarily address? A. Definition of terms B. Punishable Acts under the law C. Jurisdiction over cybercrimes D. Penalties for violations
B. Punishable Acts under the law
29
Which agency is primarily responsible for enforcing RA 10175? A. National Bureau of Investigation (NBI) B. Department of Justice (DOJ) C. Department of Information and Communications Technology (DICT) D. Philippine National Police (PNP)
D. Philippine National Police (PNP)
30
Under RA 10175, what is the penalty for hacking (illegal access to a computer system)? A. Imprisonment of 6 months to 3 years and a fine of ₱100,000 to ₱500,000. B. Imprisonment of 6 to 12 years and a fine of ₱200,000 to ₱500,000. C. Imprisonment of 12 to 20 years and a fine of ₱1,000,000 to ₱2,000,000. D. Imprisonment of 1 to 6 months and a fine of ₱50,000.
B. Imprisonment of 6 to 12 years and a fine of ₱200,000 to ₱500,000.
31
What is the minimum imprisonment period for a person convicted of identity theft under RA 10175? A. B. 6 months C. 6 years D. 12 years
C. 6 years
32
Under RA 10175, identity theft is classified as one of the cybercrime offenses. What specific penalty does the law impose for this crime, and how is the fine calculated? A. Imprisonment of 6 to 12 years and a fine based on the damage caused or ₱200,000, whichever is higher. B. Imprisonment of 12 to 20 years and a fine of ₱500,000 regardless of the damage caused. C. Imprisonment of 3 to 6 years and a fine proportional to th
A. Imprisonment of 6 to 12 years and a fine based on the damage caused or ₱200,000,
33
What is identity theft? A. The act of stealing a person's physical belongings B. The practice of impersonating someone online for fun C. Stealing someone’s personal information to access resources or benefits in their name D. A legal method of changing one's identity
C. Stealing someone’s personal information to access resources or benefits in their name
34
RA 10175 was signed into law by which Philippine president? A. Gloria Macapagal Arroyo B. Benigno Aquino III C. Rodrigo Duterte D. Ferdinand Marcos Jr.
B. Benigno Aquino III
35
When was the term "identity theft" first coined? A. 1546 B. 1964 C. 1990 D. 2005
B. 1964
36
Which of the following is an example of identity theft? A. Someone using your Social Security number to open a credit card account B. Losing your wallet and getting a replacement ID C. Forgetting your online banking password D. Changing your email address
A. Someone using your Social Security number to open a credit card account
37
How do cybercriminals typically steal personal information? A. Phishing scams B. Dumpster diving C. Skimming devices D. All of the above
D. All of the above
38
What is an example of biometric identity theft? A. Using someone’s credit card details to make a purchase B. Stealing someone’s fingerprints to bypass security systems C. Creating a fake identity using real and false information D. Using someone’s Social Security number to file taxes
B. Stealing someone’s fingerprints to bypass security systems
39
What is a warning sign of identity theft? A. Receiving IRS notices about tax returns you didn’t file B. Receiving promotional emails from online stores C. Being asked for your password when logging into your email D. Your phone battery draining quickly
A. Receiving IRS notices about tax returns you didn’t file
40
Which of the following is a key aspect of cybersecurity? A. Network Security B. Watching online videos C. Posting personal details on social media D. Ignoring software updates
A. Network Security
41
Using the same password for all your online accounts is a good practice because it makes it easier to remember. A. True B. False C. Maybe D. Sometimes
B. False
42
Public Wi-Fi networks are safe to use for online banking and entering sensitive information. A. True B. False C. Maybe D. Sometimes
B. False
43
Updating your software regularly helps protect your device from security vulnerabilities. A. True B. False C. Maybe D. Sometimes
A. True
44
Which type of hacker is considered ethical and helps improve cybersecurity by identifying vulnerabilities in a system? A. Black Hat Hacker B. White Hat Hacker C. Script Kiddie D. Hacktivist
B. White Hat Hacker
45
What is the main goal of a Black Hat Hacker? A. To enhance system security B. To expose security flaws without permission but without harm C. To gain unauthorized access for malicious purposes D. To conduct political or social activism through hacking
C. To gain unauthorized access for malicious purposes
46
Which of the following best describes a DDoS (Distributed Denial of Service) attack? A. Encrypting a victim’s data and demanding payment to unlock it B. Sending fake emails to trick people into revealing personal information C. Overloading a website or server with excessive traffic to crash it D. Using pre-made hacking tools without deep technical knowledge
C. Overloading a website or server with excessive traffic to crash it
47
A hacker who breaks into a system without permission but does not intend to cause harm is called a: A. White Hat Hacker B. Gray Hat Hacker C. Black Hat Hacker D. Script Kiddie
B. Gray Hat Hacker
48
What is the main difference between a copyright and a patent? A. Copyright protects ideas, while a patent protects expressions of ideas B. Copyright protects creative works, while a patent protects inventions C. Copyright lasts forever, while a patent expires in 5 years D. Copyright requires government registration, while patents do not
B. Copyright protects creative works, while a patent protects inventions
49
Which of the following statements about trade secrets is TRUE? A. Trade secrets require official registration for protection B. Trade secrets have an expiration date like patents C. Trade secrets remain protected as long as they are kept confidential D. Trade secrets must be publicly disclosed before enforcement
B. Trade secrets have an expiration date like patents
49
What are the three main requirements for an invention to be patented? A. Simple, common, and accessible B. Novel, useful, and non-obvious C. Expensive, complex, and secret D. Old, traditional, and widely used
B. Novel, useful, and non-obvious
50
Which type of intellectual property protection automatically applies as soon as a work is created? A. Trademark B. Copyright C. Patent D. Trade Secret
B. Copyright
51
Why do trademarks need to be distinctive and unique? A. To prevent competitors from copying similar brand elements B. To make registration cheaper C. To limit the number of trademarks a company can own D. To avoid needing legal protection
A. To prevent competitors from copying similar brand elements
52
How long does a typical patent last before it expires? A. 5 years B. 10 years C. 20 years D. Forever
C. 20 years