1.
Aircraft engineers, developers, and designers use _________ to design, test computer controlled-instruments to monitor aircraft systems and navigate their planes.
Correct Answer
A. Computer Aided Design
2.
In medicine, which of the following are the uses of computers?
Correct Answer(s)
A. Monitor vital signs
B. Check heart beats
D. Records patient's profile
3.
Doctors use ___________ scans to see cross-sectional slices of human bodies.
Correct Answer
C. Computer Aided Tomography
4.
Which of the following are different uses of computers in banks?
Correct Answer(s)
A. ATM Machines
B. Deposits and Withdrawal
C. Emails
5.
What is ATM?
Correct Answer
C. Automated Teller Machine
6.
Which of the following are the uses of computers in TV and Movies?
Correct Answer(s)
A. Sriptwriters use wordprocessors to write scripts.
B. Directors use a computer to create animation.
C. Computer-controlled mixers are used to mix sound and audio
7.
In a factory, which of the following are applications of computers?
Correct Answer(s)
A. Used for welding, painting, and in the assembly of cars
B. Control the quality of the production
C. Fills empty bottles of soft drinks
D. Automated checking of the attendance of workers
8.
With ___________, a new class of multi-user software, the users can share and work on the same documents simultaneously.
Correct Answer
B. Groupware
9.
_________ is a type of office software used to type reports and memos.
Correct Answer
A. MS-Word
10.
_________ is an office software that is used for designing presentations.
Correct Answer
B. MS-Powerpoint
11.
Users using a groupware that works simultaneously even they are not in the same room is called ________.
Correct Answer
B. Workgroups
12.
The software that is used for workgroups is _______.
Correct Answer
A. MS-Project
13.
Check as many as you can that say true about MS-Excel.
Correct Answer(s)
A. It can be used for recording
B. It can analyze budgets and accounts
C. It can create charts
14.
_________________ is the office of the future in which magnetic and optical archives will replace cabinets.
Correct Answer
C. Paperless office
15.
Which of the following holds true about a paperless office?
Correct Answer(s)
B. User use email for communication
C. People use e-books instead of printed books
16.
The manager uses __________ to help them in planning, directing, organizing, and controlling the company's different activities.
Correct Answer
B. Management Info System
17.
Computers can also be used for education. The software used for this is called ________.
Correct Answer
C. Computer Aided Instruction
18.
Which of the following is true about Computer Aided Instruction?
Correct Answer
A. It contains simulation which students can explore and learn
19.
___________ is an application in schools that allows students to learn even beyond the walls of the school, or even without having the student go to school.
Correct Answer
A. Distant learning
20.
Check as many as you can in the choices below that say true about Distance Learning?
Correct Answer(s)
A. It uses computer technology to extend learning beyond the walls of the classroom.
B. Students can chat with other students from different parts of the world to share knowledge and exchange ideas.
21.
_________ is the first step to good computer security.
Correct Answer
C. Awareness
22.
A __________ is anything that can cause harm to your computer resources.
Correct Answer
B. Threat
23.
Which of the following is True about Threats?
Correct Answer(s)
A. It steals or destroys your computer resources
B. It can steal and use your identity
C. Its a crime in the new Cybercrime Law
24.
____________ is when someone uses your identify by stealing and using your name, SS ID, or using your personal information.
Correct Answer
B. Identify Theft
25.
Pedro's modus is to act as if he withdraws in an ATM Machine. He falls in line and secretly videotaping someone who withdraws in the ATM trying to get the PIN. What is Pedro doing?
Correct Answer
B. Shoulder Surfing
26.
Anna received an email informing her that she won a lottery in the amount of 1 million pesos. The email instructs her to reply with her Credit Card Number and PIN in order for the amount to be sent to her. Anna was confused, yet excited knowing that winning that huge amount of money is once in a lifetime, and yet she doesn't remember anything betting in a lottery. Does Anna experience a Threat? What Threat?
Correct Answer(s)
A. Yes
C. Social Engineering
27.
Check as many as you can that is true about Computer Viruses.
Correct Answer(s)
A. It is a computer program created by programmers.
B. It has destructive power.
C. It can replicate itself.
D. It can travel in a network or through storage devices.
28.
Which of the following is true about an antivirus?
Correct Answer
A. It search and destroys a virus
29.
Which of the following are true about an antivirus?
Correct Answer(s)
A. It displays a warning message if a virus is found.
B. It automatically scans an inserted USB device.
C. It search and destroys a virus.
D. It is also a program created by programmers
30.
Which of the following are types of viruses?
Correct Answer(s)
A. Trojan
B. Worm
C. Logic Bomb
31.
_________ is a type of program that is used to spy, track, monitor online activities.
Correct Answer
B. Online Spying Tools
32.
A cookie is a program that runs in a webserver and asks your web browser to place it in the computer.
Correct Answer
A. True
33.
Spyware is a type of unsolicited email that enters your inbox.
Correct Answer
B. False
34.
A Spam collects and records secretly resources from your computer.
Correct Answer
B. False
35.
Spam usually offers products or services that we want and need.
Correct Answer
B. False
36.
______ is an illegal act of accessing the computer resources of some people without their knowledge or permission.
Correct Answer
B. Hacking
37.
A hacker employs a technique known as ___________ where he tries to guess the password of a hapless victim.
Correct Answer
C. Sniffing
38.
Anna received an email informing her that she is one of the few selected as the recipient of a Free VISA given by the US Government. It then instructs her to send the password of her email in order to receive the award. Anna was excited knowing that she will be given a free VISA to travel in the US. It has long been her dream to do so. She gave her password to the sender. Is this an example of hacking? If yes, what type of hacking technique is used?
Correct Answer(s)
A. Yes
D. Phishing
39.
Which of the following are true about Cyber Crime?
Correct Answer(s)
A. It is a fraudulent act
B. Stealing of hardware and software
C. Unauthorized use of Credit Card in buying online
D. Hacking and online vandalism
40.
____________ is about designing an ultra-tiny chips and electrical conductors.
Correct Answer
A. Nanotechnology
41.
In __________, photons can travel on optical fibers or thin films to store and process data.
Correct Answer
C. Optical Computers
42.
It is a future technology that uses embedded protons which remain where they are when the power turns off, thus preserving data.
Correct Answer
A. Photonic Memory
43.
_________ is an act of attacking the mission-critical information technology infrastructure and government network system of a particular country.
Correct Answer
C. Cyberterrorism
44.
A firewall is another tool to countermeasure Threats in your computer system. Which of the following are different types of firewalls?
Correct Answer(s)
A. Router
B. Software
C. Server