Quiz: Do You Really Know About Information Technology?

44 Questions | Attempts: 113
Share
Please wait...
Question 1 / 44
0 %
0/100
Score 0/100
1. _________ is an office software that is used for designing presentations.
Submit
Please wait...
About This Quiz
Quiz: Do You Really Know About Information Technology? - Quiz

.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. ______ is an illegal act of accessing the computer resources of some people without their knowledge or permission.
Submit
3. Which of the following is true about Computer Aided Instruction?
Submit
4. Aircraft engineers, developers, and designers use _________ to design, test computer controlled-instruments to monitor aircraft systems and navigate their planes.
Submit
5. _________ is an act of attacking the mission-critical information technology infrastructure and government network system of a particular country.
Submit
6. ____________ is when someone uses your identify by stealing and using your name, SS ID, or using your personal information.
Submit
7. _________ is a type of program that is used to spy, track, monitor online activities.
Submit
8. Doctors use ___________ scans to see cross-sectional slices of human bodies.
Submit
9. A cookie is a program that runs in a webserver and asks your web browser to place it in the computer.
Submit
10. What is ATM?
Submit
11. _________ is a type of office software used to type reports and memos.
Submit
12. The software that is used for workgroups is _______.
Submit
13. Pedro's modus is to act as if he withdraws in an ATM Machine. He falls in line and secretly videotaping someone who withdraws in the ATM trying to get the PIN. What is Pedro doing?
Submit
14. ____________ is about designing an ultra-tiny chips and electrical conductors. 
Submit
15. ___________ is an application in schools that allows students to learn even beyond the walls of the school, or even without having the student go to school.
Submit
16. Check as many as you can in the choices below that say true about Distance Learning?
Submit
17. A Spam collects and records secretly resources from your computer.
Submit
18. Spam usually offers products or services that we want and need.
Submit
19. The manager uses __________ to help them in planning, directing, organizing, and controlling the company's different activities.
Submit
20. A hacker employs a technique known as ___________ where he tries to guess the password of a hapless victim.
Submit
21. Check as many as you can that is true about Computer Viruses.
Submit
22. Which of the following are types of viruses?
Submit
23. _________________ is the office of the future in which magnetic and optical archives will replace cabinets.
Submit
24. In medicine, which of the following are the uses of computers?
Submit
25. _________ is the first step to good computer security.
Submit
26. Check as many as you can that say true about MS-Excel.
Submit
27. In __________, photons can travel on optical fibers or thin films to store and process data.
Submit
28. Computers can also be used for education. The software used for this is called ________.
Submit
29. It is a future technology that uses embedded protons which remain where they are when the power turns off, thus preserving data.
Submit
30. Which of the following are true about an antivirus?
Submit
31. Users using a groupware that works simultaneously even they are not in the same room is called ________.
Submit
32. Spyware is a type of unsolicited email that enters your inbox.
Submit
33. With ___________, a new class of multi-user software, the users can share and work on the same documents simultaneously.
Submit
34. Which of the following are true about Cyber Crime?
Submit
35. Which of the following are different uses of computers in banks?
Submit
36. Which of the following is true about an antivirus?
Submit
37. A __________ is anything that can cause harm to your computer resources.
Submit
38. Anna received an email informing her that she is one of the few selected as the recipient of a Free VISA given by the US Government. It then instructs her to send the password of her email in order to receive the award. Anna was excited knowing that she will be given a free VISA to travel in the US. It has long been her dream to do so. She gave her password to the sender. Is this an example of hacking? If yes, what type of hacking technique is used?
Submit
39. Which of the following holds true about a paperless office?
Submit
40. In a factory, which of the following are applications of computers?
Submit
41. Which of the following is True about Threats?
Submit
42. Which of the following are the uses of computers in TV and Movies?
Submit
43. Anna received an email informing her that she won a lottery in the amount of 1 million pesos. The email instructs her to reply with her Credit Card Number and PIN in order for the amount to be sent to her. Anna was confused, yet excited knowing that winning that huge amount of money is once in a lifetime, and yet she doesn't remember anything betting in a lottery. Does Anna experience a Threat? What Threat?
Submit
44. A firewall is another tool to countermeasure Threats in your computer system. Which of the following are different types of firewalls?
Submit
View My Results

Quiz Review Timeline (Updated): Mar 15, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 10, 2012
    Quiz Created by
    Anthzila
Cancel
  • All
    All (44)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
_________ is an office software that is used for designing...
______ is an illegal act of accessing the computer resources of some...
Which of the following is true about Computer Aided Instruction?
Aircraft engineers, developers, and designers use _________ to design,...
_________ is an act of attacking the mission-critical information...
____________ is when someone uses your identify by stealing and using...
_________ is a type of program that is used to spy, track, monitor...
Doctors use ___________ scans to see cross-sectional slices of human...
A cookie is a program that runs in a webserver and asks your web...
What is ATM?
_________ is a type of office software used to type reports and memos.
The software that is used for workgroups is _______.
Pedro's modus is to act as if he withdraws in an ATM Machine. He...
____________ is about designing an ultra-tiny chips and electrical...
___________ is an application in schools that allows students to learn...
Check as many as you can in the choices below that say true about...
A Spam collects and records secretly resources from your computer.
Spam usually offers products or services that we want and need.
The manager uses __________ to help them in planning, directing,...
A hacker employs a technique known as ___________ where he tries to...
Check as many as you can that is true about Computer Viruses.
Which of the following are types of viruses?
_________________ is the office of the future in which magnetic and...
In medicine, which of the following are the uses of computers?
_________ is the first step to good computer security.
Check as many as you can that say true about MS-Excel.
In __________, photons can travel on optical fibers or thin films to...
Computers can also be used for education. The software used for this...
It is a future technology that uses embedded protons which remain...
Which of the following are true about an antivirus?
Users using a groupware that works simultaneously even they are not in...
Spyware is a type of unsolicited email that enters your inbox.
With ___________, a new class of multi-user software, the users can...
Which of the following are true about Cyber Crime?
Which of the following are different uses of computers in banks?
Which of the following is true about an antivirus?
A __________ is anything that can cause harm to your computer...
Anna received an email informing her that she is one of the few...
Which of the following holds true about a paperless office?
In a factory, which of the following are applications of computers?
Which of the following is True about Threats?
Which of the following are the uses of computers in TV and Movies?
Anna received an email informing her that she won a lottery in the...
A firewall is another tool to countermeasure Threats in your computer...
Alert!

Advertisement