IT App Premid

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

UNIVERSIDAD DE ZAMBONGA- Ipil Campus

Bachelor of Science in Accountancy


Academic Year 2019-2020 – 2nd Semester
PRE-MID EXAMINATION
IT APPLICATION TOOLS IN BUSINESS

Name: _________________________________________ Date: _______________________


Year and Section: _____________________________ Score: ______________________

“ Successful and unsuccessful people do not vary greatly in their abilities. They vary in their desires to reach their
potential. – John Maxwell”

TEST – I. MULTIPLE CHOICE. Encircle Choose the letter of the correct answer.

1. Which one is an input device?


a. printer b. mouse c. monitor d. speakers

2. Which one is an output device?


a. monitor b. speaker c. printer d. all of them

3. Which one is NOT an input device?


a. scanner b. monitor c. mouse d. microphone

4. What type of information gets lost if it isn't saved?


a. CD ROM b. storage memory c. RAM d. flash drive

5. The main circuit board, especially of a personal computer


a. monitor b. motherboard c. RAM d. hardware

6. A computer memory that acts as the main storage available to user for programs and data
a. RAM b. URL c. ROM d. flash drive

7. A hand-operated device that allows control of the cursor on a computer screen.


a. Mouse b. Keyboard c. Printer d. Hardware

8. You organize files by storing them in ____.


a. namespace b. rings c. drawers d. folders

9. When you save a new file, you use the ____ dialog box to provide a filename and select a location for the file.
a. Save As b. Save New c. Save d. Open
10. A PowerPoint Presentation will have which file extension
a.ppt b. power c .doc d. .xls

11. An Image or a photograph will use the following extension


a.html b .jpg c.doc d.xls

12 . A Microsoft Word document will have which file extension?


a.doc b. .ppt c. .xls d.png

13. A Spreadsheet will use which of the following file extensions?


a.doc b.dba c.xls d.png

14. Backing up your files is important because....


a. Computer drives could fail b. A virus could corrupt your work
c. You could accidentally delete a file d. All are important

15. Make copies of files in case of loss.


a. backup b. subfolder c. rename d. copy
16. What do you call a device or program which monitors network traffic to prevent attacks?
a. Firewall b. Spam c. Trojan d. Cyber blocker

17. Data should be backed up.....


a. Never b. When you remember c. regularly d. After an attack

18. This is installed to protect your pc from malicious material.


a. Anti-virus software b. Web browser c. Password control d. Access levels

19. The CPU is like the _______ of the computer?


a. Legs b. Arms c. Brain d. Heart

20. What does the hard drive do?


a. Stores information temporarily
b. Gives Instructions
c. Stores information permanently
d. Drives through the computer

21. All memory is measured in what?


a. Meters (m) b. Volume (v) c. Bytes (GB) d. Inches (in)

22. What is the most important piece of software on a computer?


a. Operating System b. Programs c. Applications d. Hardware

23. How does a computer virus infect a PC?


a. Email attachments b. Attached to files on memory sticks
c. Suspicious web links d. All of the above

24. What can a virus do to your computer?


a. Delete files b. Cause inappropriate adverts to appear
c. Spy on what you are doing d. Steal your information

25. How does a worm infect a computer?


a. E-mail attachments b. Through security loopholes, your computer is not up to date
c. Suspicious web links d. On memory sticks

26. What is spyware?


a. Causes adverts to appear on screen.
b. Software that deletes your files
c. Slows your pc down.
d. Collects information from you and transfers it across the internet.

27. What is the difference between a worm and a virus?


a. A worm is pink
b. A worm is made to burrow in the ground
c. A worm does not need to attach to anything to multiply
d. A virus only takes your money

28. How can you protect yourself from malware?


a. Don't have a computer
b. Use a trusted anti-virus software
c. Download any anti-virus software
d. Just send your details to the attacker and they will leave you alone

29. Technology that helps companies change business by allowing them to use new methods is called:
a. data processing. b. information systems. c. information technology. d. virtualization.

30. The usefulness of management information depends upon which of the following characteristics?
a. quality. b. completeness. c. timeliness. d. all of the above.
31. Computer programs that make it possible for different brands of computers to transfer data to each other
are called:
a. message center software. b. data base software c. communication software. d. all of the above.

32. Computer memory is measured in terms of


a. bits b. bytes c. cells d. units

33. One of the first steps when creating a file management system is to:
a. select multiple files. b. delete files that will be moved.
c. change to Details view. d. create new folders.

34. Folder names should:


a. be meaningful and recognizable. b. not contain spaces.
c. use numbers only d. be as short as possible.

35. To create a folder in Window:


a. right-click and select New, and then Folder.
b. click on the Folder icon and hold down the shift key.
c. left-click the folder you want to create and drag it to the appropriate folder.
d. right-click and select Folder, and then New.

TEST – II TRUE OR FALSE. Write True if the statement is correct and false if the statement is
incorrect. Write your answer on the space provided before the number.

______1. Software is a program which consists of a set of instructions that tells the computer how to perform
an operation.
______2. Microsoft Windows is an example of application software.
______3. Microsoft Word is an example of system software.
______4. A computer is still function properly without system software.
______5. Each computer is only able to have one application software.
______6. Hardware and Software do not have to work together.
______7. Malware is made to stop your device from running properly and sometimes to steal your information.
______8. . A virus is a piece of programming code inserted into other programming to cause some unexpected
and undesirable event.
______9. If a person changes the file he may not be able to open the file.
______10. File extensions are assigned by the program that is used to create a file.

TEST – III FILL IN THE BLANKS. Fill in the blank with the best word that complete the sentence.

1._________________means protecting a data base from destructive forces and unwanted actions of
unauthorized users.

2._______________ is electronic devices that accepts data and process data arithmetically and logically, and
produce information.
3-4. Computer is divided into two categories: ______________and_______________.
5. _________________ is the physical aspect of computers, telecommunications other devices.
6. _____________________consist of external devices by which we give information and instructions to the
computer.
8-10. Computer software is divided into four major types: _________________, _________________,
_______________ and_______________________.

TEST – IV. IDENTIFICATION. Write your answer on the space provided before the number that best
describe the statement.

___________________1. The set of typewriter-like keys that enables you to enter data into a computer.
___________________2. A device that controls the movement of the cursor or pointer on a display screen.
___________________3. A device that can read text or illustrations printed on paper and translate the
Information into a form the computer can use.
___________________4. A display screen used to present output from computer, video camera or other video
Generator.
___________________5. A device that accept text and graphic output from a computer and transfer information
to the paper.
___________________6. An output port to hear the audio produced by the computer.
___________________7. This is used to provide wireless internet access to computer users in home or roaming
networks.
___________________8. A magnetic disk which you can store computer data.
___________________9. A flexible plastic disk coated with magnetic material and covered by a protective jacket,
used primarily by computers to store data magnetically. _
___________________10. This set of instructions is often called a program.

TEST V. ESSAY. Read the question(s) carefully. Make sure you understand before responding. Be brief
and concise as much as possible.

1. How information technology affects business? (10pts)


2. How often you should perform computer maintenance? (5pts)

PREPARED BY: REVIEWED BY: APPROVED BY:

CHRISTINE H. LEAL NEMIA B. HULAGNO, MBA GERALDINE R. TABLATE, ED.D


Instructor Program Chairperson, BSA & BSBA School Administrator

You might also like