Quiz: Do You Really Know About Information Technology?

44 Questions | Attempts: 113
Share

SettingsSettingsSettings
Quiz: Do You Really Know About Information Technology? - Quiz

.


Questions and Answers
  • 1. 

    Aircraft engineers, developers, and designers use _________ to design, test computer controlled-instruments to monitor aircraft systems and navigate their planes.

    • A.

      Computer Aided Design

    • B.

      Word Processor

    • C.

      Spreadsheet

    Correct Answer
    A. Computer Aided Design
  • 2. 

    In medicine, which of the following are the uses of computers?

    • A.

      Monitor vital signs

    • B.

      Check heart beats

    • C.

      Design a machine

    • D.

      Records patient's profile

    Correct Answer(s)
    A. Monitor vital signs
    B. Check heart beats
    D. Records patient's profile
  • 3. 

    Doctors use ___________ scans to see cross-sectional slices of human bodies.

    • A.

      Computer Aided Design

    • B.

      Online Medicine

    • C.

      Computer Aided Tomography

    Correct Answer
    C. Computer Aided Tomography
  • 4. 

    Which of the following are different uses of computers in banks?

    • A.

      ATM Machines

    • B.

      Deposits and Withdrawal

    • C.

      Emails

    • D.

      Point of sale

    Correct Answer(s)
    A. ATM Machines
    B. Deposits and Withdrawal
    C. Emails
  • 5. 

    What is ATM?

    • A.

      Automatic Teller Machine

    • B.

      Automation Teller Machine

    • C.

      Automated Teller Machine

    Correct Answer
    C. Automated Teller Machine
  • 6. 

    Which of the following are the uses of computers in TV and Movies?

    • A.

      Sriptwriters use wordprocessors to write scripts.

    • B.

      Directors use a computer to create animation.

    • C.

      Computer-controlled mixers are used to mix sound and audio

    • D.

      Use to create programs

    Correct Answer(s)
    A. Sriptwriters use wordprocessors to write scripts.
    B. Directors use a computer to create animation.
    C. Computer-controlled mixers are used to mix sound and audio
  • 7. 

    In a factory, which of the following are applications of computers?

    • A.

      Used for welding, painting, and in the assembly of cars

    • B.

      Control the quality of the production

    • C.

      Fills empty bottles of soft drinks

    • D.

      Automated checking of the attendance of workers

    Correct Answer(s)
    A. Used for welding, painting, and in the assembly of cars
    B. Control the quality of the production
    C. Fills empty bottles of soft drinks
    D. Automated checking of the attendance of workers
  • 8. 

    With ___________, a new class of multi-user software, the users can share and work on the same documents simultaneously.

    • A.

      Internet

    • B.

      Groupware

    • C.

      Shareware

    Correct Answer
    B. Groupware
  • 9. 

    _________ is a type of office software used to type reports and memos.

    • A.

      MS-Word

    • B.

      MS-Powerpoint

    • C.

      MS-Excel

    Correct Answer
    A. MS-Word
  • 10. 

    _________ is an office software that is used for designing presentations.

    • A.

      MS-Excel

    • B.

      MS-Powerpoint

    • C.

      MS-Word

    Correct Answer
    B. MS-Powerpoint
  • 11. 

    Users using a groupware that works simultaneously even they are not in the same room is called ________.

    • A.

      Workware

    • B.

      Workgroups

    • C.

      Groupworks

    Correct Answer
    B. Workgroups
  • 12. 

    The software that is used for workgroups is _______.

    • A.

      MS-Project

    • B.

      MS-Word

    • C.

      MS-Powerpoint

    • D.

      MS-Excel

    Correct Answer
    A. MS-Project
  • 13. 

    Check as many as you can that say true about MS-Excel.

    • A.

      It can be used for recording

    • B.

      It can analyze budgets and accounts

    • C.

      It can create charts

    • D.

      It can be used for design and drawing

    Correct Answer(s)
    A. It can be used for recording
    B. It can analyze budgets and accounts
    C. It can create charts
  • 14. 

    _________________ is the office of the future in which magnetic and optical archives will replace cabinets.

    • A.

      Future office

    • B.

      Digital office

    • C.

      Paperless office

    Correct Answer
    C. Paperless office
  • 15. 

    Which of the following holds true about a paperless office?

    • A.

      Users use printer for reports

    • B.

      User use email for communication

    • C.

      People use e-books instead of printed books

    • D.

      People use journals for recording

    Correct Answer(s)
    B. User use email for communication
    C. People use e-books instead of printed books
  • 16. 

    The manager uses __________ to help them in planning, directing, organizing, and controlling the company's different activities.

    • A.

      Manger's Input System

    • B.

      Management Info System

    • C.

      Management Input System

    Correct Answer
    B. Management Info System
  • 17. 

    Computers can also be used for education. The software used for this is called ________.

    • A.

      Computer Aided Design

    • B.

      Computer Teacher's Tool

    • C.

      Computer Aided Instruction

    Correct Answer
    C. Computer Aided Instruction
  • 18. 

    Which of the following is true about Computer Aided Instruction?

    • A.

      It contains simulation which students can explore and learn

    • B.

      Students need to go to a physical room so start a class

    • C.

      Teachers need to be present always in order to have a class

    Correct Answer
    A. It contains simulation which students can explore and learn
  • 19. 

    ___________ is an application in schools that allows students to learn even beyond the walls of the school, or even without having the student go to school.

    • A.

      Distant learning

    • B.

      CAI

    • C.

      Tutorial

    Correct Answer
    A. Distant learning
  • 20. 

    Check as many as you can in the choices below that say true about Distance Learning?

    • A.

      It uses computer technology to extend learning beyond the walls of the classroom.

    • B.

      Students can chat with other students from different parts of the world to share knowledge and exchange ideas.

    • C.

      Teachers have to be always present in order to start a class.

    • D.

      Students must be in the classroom to learn and share knowledge.

    Correct Answer(s)
    A. It uses computer technology to extend learning beyond the walls of the classroom.
    B. Students can chat with other students from different parts of the world to share knowledge and exchange ideas.
  • 21. 

    _________ is the first step to good computer security.

    • A.

      Security Guard

    • B.

      Antivirus

    • C.

      Awareness

    Correct Answer
    C. Awareness
  • 22. 

    A __________ is anything that can cause harm to your computer resources.

    • A.

      Virus

    • B.

      Threat

    • C.

      Malware

    Correct Answer
    B. Threat
  • 23. 

    Which of the following is True about Threats?

    • A.

      It steals or destroys your computer resources

    • B.

      It can steal and use your identity

    • C.

      Its a crime in the new Cybercrime Law

    • D.

      Antivirus can do all to avoid threats

    Correct Answer(s)
    A. It steals or destroys your computer resources
    B. It can steal and use your identity
    C. Its a crime in the new Cybercrime Law
  • 24. 

    ____________ is when someone uses your identify by stealing and using your name, SS ID, or using your personal information.

    • A.

      Shoulder Surfing

    • B.

      Identify Theft

    • C.

      Snagging

    Correct Answer
    B. Identify Theft
  • 25. 

    Pedro's modus is to act as if he withdraws in an ATM Machine. He falls in line and secretly videotaping someone who withdraws in the ATM trying to get the PIN. What is Pedro doing?

    • A.

      Dumpster Diving

    • B.

      Shoulder Surfing

    • C.

      Social Engineering

    Correct Answer
    B. Shoulder Surfing
  • 26. 

    Anna received an email informing her that she won a lottery in the amount of 1 million pesos. The email instructs her to reply with her Credit Card Number and PIN in order for the amount to be sent to her. Anna was confused, yet excited knowing that winning that huge amount of money is once in a lifetime, and yet she doesn't remember anything betting in a lottery. Does Anna experience a Threat? What Threat?

    • A.

      Yes

    • B.

      No

    • C.

      Social Engineering

    • D.

      Identity Theft

    Correct Answer(s)
    A. Yes
    C. Social Engineering
  • 27. 

    Check as many as you can that is true about Computer Viruses.

    • A.

      It is a computer program created by programmers.

    • B.

      It has destructive power.

    • C.

      It can replicate itself.

    • D.

      It can travel in a network or through storage devices.

    Correct Answer(s)
    A. It is a computer program created by programmers.
    B. It has destructive power.
    C. It can replicate itself.
    D. It can travel in a network or through storage devices.
  • 28. 

    Which of the following is true about an antivirus?

    • A.

      It search and destroys a virus

    • B.

      It automatically scans an inserted USB device

    • C.

      It displays a warning message if a virus is found

    • D.

      It is also a program created by programmers

    Correct Answer
    A. It search and destroys a virus
  • 29. 

    Which of the following are true about an antivirus?

    • A.

      It displays a warning message if a virus is found.

    • B.

      It automatically scans an inserted USB device.

    • C.

      It search and destroys a virus.

    • D.

      It is also a program created by programmers

    Correct Answer(s)
    A. It displays a warning message if a virus is found.
    B. It automatically scans an inserted USB device.
    C. It search and destroys a virus.
    D. It is also a program created by programmers
  • 30. 

    Which of the following are types of viruses?

    • A.

      Trojan

    • B.

      Worm

    • C.

      Logic Bomb

    • D.

      Cookies

    Correct Answer(s)
    A. Trojan
    B. Worm
    C. Logic Bomb
  • 31. 

    _________ is a type of program that is used to spy, track, monitor online activities.

    • A.

      Online Virus

    • B.

      Online Spying Tools

    • C.

      Webmaster Tools

    Correct Answer
    B. Online Spying Tools
  • 32. 

    A cookie is a program that runs in a webserver and asks your web browser to place it in the computer.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 33. 

    Spyware is a type of unsolicited email that enters your inbox.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 34. 

    A Spam collects and records secretly resources from your computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 35. 

    Spam usually offers products or services that we want and need.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 36. 

    ______ is an illegal act of accessing the computer resources of some people without their knowledge or permission.

    • A.

      Programming

    • B.

      Hacking

    • C.

      Sniffing

    Correct Answer
    B. Hacking
  • 37. 

    A hacker employs a technique known as ___________ where he tries to guess the password of a hapless victim.

    • A.

      Programing

    • B.

      IP Spoofing

    • C.

      Sniffing

    Correct Answer
    C. Sniffing
  • 38. 

    Anna received an email informing her that she is one of the few selected as the recipient of a Free VISA given by the US Government. It then instructs her to send the password of her email in order to receive the award. Anna was excited knowing that she will be given a free VISA to travel in the US. It has long been her dream to do so. She gave her password to the sender. Is this an example of hacking? If yes, what type of hacking technique is used?

    • A.

      Yes

    • B.

      No

    • C.

      Sniffing

    • D.

      Phishing

    Correct Answer(s)
    A. Yes
    D. Phishing
  • 39. 

    Which of the following are true about Cyber Crime?

    • A.

      It is a fraudulent act

    • B.

      Stealing of hardware and software

    • C.

      Unauthorized use of Credit Card in buying online

    • D.

      Hacking and online vandalism

    Correct Answer(s)
    A. It is a fraudulent act
    B. Stealing of hardware and software
    C. Unauthorized use of Credit Card in buying online
    D. Hacking and online vandalism
  • 40. 

    ____________ is about designing an ultra-tiny chips and electrical conductors. 

    • A.

      Nanotechnology

    • B.

      Nanorobot

    • C.

      Nanocomputers

    Correct Answer
    A. Nanotechnology
  • 41. 

    In __________, photons can travel on optical fibers or thin films to store and process data.

    • A.

      Holographic Storage

    • B.

      Protonic Memory

    • C.

      Optical Computers

    • D.

      Nanocomputers

    Correct Answer
    C. Optical Computers
  • 42. 

    It is a future technology that uses embedded protons which remain where they are when the power turns off, thus preserving data.

    • A.

      Photonic Memory

    • B.

      Optical Computers

    • C.

      Holographic Storage

    Correct Answer
    A. Photonic Memory
  • 43. 

    _________ is an act of attacking the mission-critical information technology infrastructure and government network system of a particular country.

    • A.

      Virus

    • B.

      Firewall

    • C.

      Cyberterrorism

    Correct Answer
    C. Cyberterrorism
  • 44. 

    A firewall is another tool to countermeasure Threats in your computer system. Which of the following are different types of firewalls?

    • A.

      Router

    • B.

      Software

    • C.

      Server

    Correct Answer(s)
    A. Router
    B. Software
    C. Server

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 10, 2012
    Quiz Created by
    Anthzila
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.