Do You Really Know About Information Technology?

45 Questions | Total Attempts: 86

Settings
Please wait...
Information Technology Quizzes & Trivia

The final exam is right around the corner, and there is no better way to test your readiness that to take up a set of tests designed to see just how much you understood from your IT 101 class. The trivia below is set to do just that so give it a try and be sure to share it with the rest of your classmate. All the best and keep a lookout for others like it.


Questions and Answers
  • 1. 
    Aircraft engineers, developers and designers use _________ to design, test computer controlled-instruments to monitor aircraft systems and navigate their planes.
    • A. 

      Computer Aided Design

    • B. 

      Word Processor

    • C. 

      Spreadsheet

  • 2. 
    In medicine, which of the following are uses of computers?
    • A. 

      Monitor vital signs

    • B. 

      Check heart beats

    • C. 

      Design a machine

    • D. 

      Records patient's profile

  • 3. 
    Doctors use ___________ scans to see cross-sectional slices of human bodies.
    • A. 

      Computer Aided Design

    • B. 

      Online Medicine

    • C. 

      Computer Aided Tomography

  • 4. 
    Which of the following are different uses of computer in banks?
    • A. 

      ATM Machines

    • B. 

      Deposits and Withdrawal

    • C. 

      Emails

    • D. 

      Point of sale

  • 5. 
    What is ATM?
    • A. 

      Automatic Teller Machine

    • B. 

      Automation Teller Machine

    • C. 

      Automated Teller Machine

  • 6. 
    Which of the following are the uses of computer in TV and Movies?
    • A. 

      Sriptwriters use wordprocessors to write scripts.

    • B. 

      Directors use computer to create animation.

    • C. 

      Computer controlled mixers are used to mix sound and audio

    • D. 

      Use to create programs

  • 7. 
    In a factory, which of the following are applications of computers?
    • A. 

      Used for welding, painting and in the assembly of cars

    • B. 

      Control the quality of the production

    • C. 

      Fills empty bottles of softdrinks

    • D. 

      Automated checking of the attendance of workers

  • 8. 
    With ___________, a new class of multi-user software, the users can share and work on the same documents simultaneously.
    • A. 

      Internet

    • B. 

      Groupware

    • C. 

      Shareware

  • 9. 
    _________ is a type of office software used to type reports and memos.
    • A. 

      MS-Word

    • B. 

      MS-Powerpoint

    • C. 

      MS-Excel

  • 10. 
    _________ is an office software that is used for designing presentations.
    • A. 

      MS-Excel

    • B. 

      MS-Powerpoint

    • C. 

      MS-Word

  • 11. 
    Users using a groupware that works simultaneously even they are not in the same room is called ________.
    • A. 

      Workware

    • B. 

      Workgroups

    • C. 

      Groupworks

  • 12. 
    The software that is used gor workgrpups is _______.
    • A. 

      MS-Project

    • B. 

      MS-Word

    • C. 

      MS-Powerpoint

    • D. 

      MS-Excel

  • 13. 
    Check as many as you can that say true about MS-Excel.
    • A. 

      It can be used for recording

    • B. 

      It can analyze budgets and accounts

    • C. 

      It can create charts

    • D. 

      It can be used for design and drawing

  • 14. 
    _________________ is the office of the future in which magnetic and optical archives will replace cabinets.
    • A. 

      Future office

    • B. 

      Digital office

    • C. 

      Paperless office

  • 15. 
    Which of the following tholds true about a paperless office?
    • A. 

      Users use printer for reports

    • B. 

      User use email for communication

    • C. 

      People use e-books instead of printed books

    • D. 

      People use journals for recording

  • 16. 
    The manager use __________ to help them in planning, directing, organizing and controlling the company's different activities.
    • A. 

      Manger's Input System

    • B. 

      Management Info System

    • C. 

      Management Input System

  • 17. 
    Computer can also be used for education.  The software used for this is called ________.
    • A. 

      Computer Aided Design

    • B. 

      Computer Teacher's Tool

    • C. 

      Computer Aided Instruction

  • 18. 
    Which of the following is true about Computer Aided Instruction?
    • A. 

      It contains simulation which students can explore and learn

    • B. 

      Students need to go to a physical room so start a class

    • C. 

      Teachers need to be present always in order to have a class

  • 19. 
    ___________ isan application in schools that allows students to learn even beyond the walls of the school, or even without having the student go to school.
    • A. 

      Distant learning

    • B. 

      CAI

    • C. 

      Tutorial

  • 20. 
    Check as many as you can in the choices below that says true about Distance Learning?
    • A. 

      It uses computer technology to extend learning beyond the walls of the classroom

    • B. 

      Students can chat with other students from different parts of the world to share knowledge and exchange ideas.

    • C. 

      Teachers have to be always present in order to start a class.

    • D. 

      Students must be in the classroom to learn and share knowledge.

  • 21. 
    _________ is the first step to good computer security.
    • A. 

      Security Guard

    • B. 

      Antivirus

    • C. 

      Awareness

  • 22. 
    A __________ is anything that can cause harm to your computer resources.
    • A. 

      Virus

    • B. 

      Threat

    • C. 

      Malware

  • 23. 
    Which of the following is True about Threats?
    • A. 

      It steals or destroys your computer resources

    • B. 

      It can steal and use your identity

    • C. 

      Its a crime in the new Cybercrime Law

    • D. 

      Antivirus can do all to avoid threats.

  • 24. 
    ____________ is when somene use you identiy by stealing and using your name, SS ID or using your personal information.
    • A. 

      Shoulder Surfing

    • B. 

      Identify Theft

    • C. 

      Snagging

  • 25. 
    Pedro's modus is to act as if he withdraws in an ATM Machine.  He falls in line and secretly videotaping someone who withdraws in the ATM trying to get the PIN.  What is Pedro doing?
    • A. 

      Dumpster Diving

    • B. 

      Shoulder Surfing

    • C. 

      Social Engineering

  • 26. 
    Anna received an email informing her that she won a lottery in the amount of 1 million pesos.  The email instructs her to reply with her Credit Card Number and PIN in order for the amount to be sent to her.  Anna was confused, yet excited knowing that winning that huge amount of money is once in a lifetime, and yet she doesn't remember anything betting in a lottery.  Does Anna experienced a Threat? What Threat?
    • A. 

      Yes

    • B. 

      No

    • C. 

      Social Engineering

    • D. 

      Identity Theft

  • 27. 
    • A. 

      It is a computer program created by programmers.

    • B. 

      It has destructive power.

    • C. 

      It can replicate itself.

    • D. 

      It can travel in a network or through storage devices.

  • 28. 
    Which of the following is true about an antivirus?
    • A. 

      It search and destroys a virus

    • B. 

      It automatically scans an inserted USB device

    • C. 

      It displays a warning message if a virus is found

    • D. 

      It is also a program created by programmers

  • 29. 
    Which of the following are true about an antivirus?
    • A. 

      It displays a warning message if a virus is found.

    • B. 

      It automatically scans an inserted USB device.

    • C. 

      It search and destroys a virus.

    • D. 

      It is also a program created by programmers

  • 30. 
    Which of the following are types of viruses?
    • A. 

      Trojan

    • B. 

      Worm

    • C. 

      Logic Bomb

    • D. 

      Cookies

  • 31. 
    _________ is a type of program that is used to spy, traack, monitor online activities.
    • A. 

      Online Virus

    • B. 

      Online Spying Tools

    • C. 

      Webmaster Tools

  • 32. 
    Cookie is a program that runs in a webserver and asks your web browser to place in the computer.
    • A. 

      True

    • B. 

      False

  • 33. 
    A spyware is a type of unsolicited email that enters in your inbox.
    • A. 

      True

    • B. 

      False

  • 34. 
    A Spam collects and records secretly recources from your computer.
    • A. 

      True

    • B. 

      False

  • 35. 
    Spam usually offers products or sevices that we want and need.
    • A. 

      True

    • B. 

      False

  • 36. 
    ______ is an illegal act of accessing the computer resources of some people without their knowledge or permission.
    • A. 

      Programming

    • B. 

      Hacking

    • C. 

      Sniffing

  • 37. 
    A hacker employs a technique known as ___________ where he tries to guess the password of a hapless victim.
    • A. 

      Programing

    • B. 

      IP Spoofing

    • C. 

      Sniffing

  • 38. 
    Anna received an email informing her that she is one of the few selected as recipient of a Free VISA given by the US Government.  It then instructs her to send the password of her email in order to receive the award.  Anna was excited knowing that she will be given a free VISA to travel in US.  I has long been her dream do so.  She gave her password to the sender.  Is this an example of hacking? If yes, what type of hacking technique is used?
    • A. 

      Yes

    • B. 

      No

    • C. 

      Sniffing

    • D. 

      Phishing

  • 39. 
    Which of the following are ture about Cyber Crime?
    • A. 

      It is a fraudulent act

    • B. 

      Stealing of hardware and software

    • C. 

      Unauthorized use of Credit Card in buying online

    • D. 

      Hacking and online vandalism

  • 40. 
    ____________ is about designing an ultra-tiny chips and electrical conductors. 
    • A. 

      Nanotechnology

    • B. 

      Nanorobot

    • C. 

      Nanocomputers

  • 41. 
    In __________, photons can travel on optical fibers or thin films to store and process data.
    • A. 

      Holographic Storage

    • B. 

      Protonic Memory

    • C. 

      Optical Computers

    • D. 

      Nanocomputers

  • 42. 
    In __________, photons can travel on optical fibers or thin films to store and process data.
    • A. 

      Holographic Storage

    • B. 

      Protonic Memory

    • C. 

      Optical Computers

    • D. 

      Nanocomputers

  • 43. 
    It is a future technology that uses embedded protons which remain where they are when the power turns off, thus preserving data.
    • A. 

      Photonic Memory

    • B. 

      Optical Computers

    • C. 

      Holographic Storage

  • 44. 
    _________ is an act of attacking the mission-critical information tecnology infrastructure and goverment network system of a particular country.
    • A. 

      Virus

    • B. 

      Firewall

    • C. 

      Cyberterrorism

  • 45. 
    A firewall is another tool to contermeasure Threats in your computer system.  Which of the following are different types of Firewall?
    • A. 

      Router

    • B. 

      Software

    • C. 

      Server