Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE

Gen. A Luna St., Quinale Tabaco, City


First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

NAME COURSE/YEAR/MAJOR DATE


I. MULTIPLE CHOICE. Read and analyze the statements below. Choose the
letter of the best answer. Write your answer before the number.
1. Is a malware which attempts to extort money from a user. It claims that your computer
has been used for unauthorized activities.
a. ILOVEYOU
b. DEXTER
c. REVETON
d. CRYPTOLOCKER
2. Infects computers running with Microsoft Windows. Discovered by IT security firm
Seculert in December 2012.
a. DEXTER
b. REVETON
c. MORRIS WORM
d. NIMDA
3. Encrypting ransom ware appeared in 2013. It gets distributed either as an attachment to a
malicious e-mail or as a drive-by download. It demands a payment with either MoneyPak
card or Bitcoin to recover the key.
a. CRYPTOLOCKER
b. ILOVEYOU
c. REVETON
d. DEXTER
4. HTML is written in the form of tags with parenthesis.
a. CLOSE AND OPEN
b. ANGLE
c. BRACKET
d. TRIANGLE
5. The window contains the elements which are the same with any
document window such as Word.
a. NOTEPAD
b. WORD
c. EXCEL
d. NOTES
6. ___________ are the basic units or building blocks of an HTML file.
a. ANGLE BRACKETS
b. NOTEPAD
c. TAGS
d. BRACKETS
7. _____________ is the prime language that is used to create Web pages.
a. HTML
b. TAGS
c. CODES
d. WEB BROWSER
8. The is the color, size, character and information of the elements in the
tag; they are reflected on the beginning tag but not on the closing tag.
a. TAG
b. CODE
c. ATTRIBUTE
d. HUE
9. Each tag has a beginning tag and an end tag which are enclosed in brackets. The end tag
is structured with a as </html> or </body>.
a. ANGLE PARENTHESIS
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

b. SLASH
c. COMMA
d. BACKSLASH
10. The main heading will have the biggest font size and designated as .
a. <a1>
b. <b1>
c. <c1>
d. <h1>
11. Refers to writing, photography, and other media that is self-published online.
a. VLOGGING
b. BLOGGING
c. CONTENT MAKING
d. FACEBOOK LIVE
12. Is a list, sometimes categorized of links to webpages where the author of a blog finds
worthwhile or interesting.
a. BLOGGING
b. HEADER
c. BLOGROLL
d. FOOTER
13. This provides a way for users to keep up with the latest and hottest information posted on
different blogging sites.
a. HEADER
b. FOOTER
c. FEEDS
d. CONTENTS
14. This displays copyright, some basic information about the site and the ownership.
a. HEADER
b. FOOTER
c. FEEDS
d. CONTENTS
15. Is a component of a blog where contents are displayed.
a. HEADER
b. FOOTER
c. FEEDS
d. CONTENTS
16. Is an abbreviated term for "weblog" which is a term used to describe websites that
maintain an ongoing chronicle of information.
a. BLOG
b. BLOGGING
c. VLOGGING
d. VLOG
17. Due to many reasons, if the data stored in the computer is lost, the person responsible for
handling the computer will have to tolerate a lot.
a. Disadvantage of IT to society
b. Negative Effect of IT to society
c. Advantage of IT to society
d. Positive Effect of Society
18. Any professional individual like doctors, engineers, businessmen etc. undergo a change
in their style or working pattern after they get the knowledge of computer.
a. Disadvantage of IT to society
b. Negative Effect of IT to society
c. Advantage of IT to society
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

d. Positive Effect of Society


19. The elements of a notepad window are the following EXCEPT:
a. Title Bar
b. Menu Bar
c. Text Area
d. Footer
20. Every HTML page should have the following structure EXCEPT:
a. <html> tag pair
b. <head> tag pair
c. <body> tag pair
d. <foot> tag pair

II. TRUE OR FALSE. Write TRUE if statement is correct and FALSE if not.
1. There are so many tags and each has its own use.
2. HTML is written in the form of tags with angle parenthesis.
3. Tags are enclosed in angle brackets > and <.
4. Source code is comprised of a series of commands called tags.
5. HTML file are divided into three parts.
6. Each HTML page requires a title to indicate what the page describes.
7. You cannot print the copy of HTML codes.
8. HTML means Hypertext markup language.
9. In writing HTML, you need high-end software applications.
10. Notepad window contains elements like the other document window.

III. IDENTIFICATION. Identify the terms described in each sentence.


_____________ 1. Is a piece of code embedded in a legitimate program and is created with the
ability to self-replicate infecting other programs on a computer.
_____________ 2. The first computer virus.
_____________ 3. The first computer virus to appear outside the computer where it was created
in.
_____________ 4. A virus that attached itself to an executable program. It is also called a
parasitic virus which typically infects files with .exe or .com extensions.
_____________ 5. Type of virus that is commonly found in programs such as Microsoft word or
Excel.
_____________ 6. It is often called a browser redirect virus because it redirects your browser to
other malicious websites that you don’t have any intention of visiting.
_____________ 7. What this virus does is overwrite code on a website and insert links that can
install malicious software on your device.
_____________ 8. These viruses are found distributed in forms of physical media such as
external hard drives or USB.
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

_____________ 9. This virus has the capability to evade anti-virus programs since it can change
codes every time an infected file is performed.
_____________ 10. This virus stores itself on your computer’s memory which allows it to infect
files on your computer.
_____________ 11. A type of virus that is very infectious and can easily spread on your
computer system.
_____________ 12. Takes a copy of itself and propagates it to other users.
_____________ 13. Also known as the "love letter virus" and the "love bug worm." 
_____________ 14. Short for “malicious software,” refers to any intrusive software developed
by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and
computer systems.
_____________ 15. Is one that opens your computer up to malicious users allowing them to read
your files.

Make the necessary correction to the following HTML codes. Write the correct code on the
space provided.
1. <html<
2. >head<
3. <\title>
4. <html/>
5. <body>

IV. ENUMERATION.
1-3. Three Examples of Blogging Platform

4-6. Three Purposes of Blogging

7-10. Four Best Types of Blog to create

11-15. Components of a Blog


COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

V. ESSAY. Answer the following questions. Explain your answers briefly. (5 points
each)
1. What are the effects of IT to the environment?
2. What are the effects of IT to health?
3. Explain the uses of computer in:
- Education
- Health and Medicine
- Financial Institutions
- Transport System
- Our Country’s Defense
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

NAME KEY TO CORRECTION COURSE/YEAR/MAJOR DATE


III. MULTIPLE CHOICE. Read and analyze the statements below. Choose the
letter of the best answer. Write your answer before the number.
1. Is a malware which attempts to extort money from a user. It claims that your computer
has been used for unauthorized activities.
a. ILOVEYOU
b. DEXTER
c. REVETON
d. CRYPTOLOCKER
2. Infects computers running with Microsoft Windows. Discovered by IT security firm
Seculert in December 2012.
a. DEXTER
b. REVETON
c. MORRIS WORM
d. NIMDA
3. Encrypting ransom ware appeared in 2013. It gets distributed either as an attachment to a
malicious e-mail or as a drive-by download. It demands a payment with either MoneyPak
card or Bitcoin to recover the key.
a. CRYPTOLOCKER
b. ILOVEYOU
c. REVETON
d. DEXTER
4. HTML is written in the form of tags with parenthesis.
a. CLOSE AND OPEN
b. ANGLE
c. BRACKET
d. TRIANGLE
5. The window contains the elements which are the same with any
document window such as Word.
a. NOTEPAD
b. WORD
c. EXCEL
d. NOTES
6. ___________ are the basic units or building blocks of an HTML file.
a. ANGLE BRACKETS
b. NOTEPAD
c. TAGS
d. BRACKETS
7. _____________ is the prime language that is used to create Web pages.
a. HTML
b. TAGS
c. CODES
d. WEB BROWSER
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

8. The is the color, size, character and information of the elements in the
tag; they are reflected on the beginning tag but not on the closing tag.
a. TAG
b. CODE
c. ATTRIBUTE
d. HUE
9. Each tag has a beginning tag and an end tag which are enclosed in brackets. The end tag
is structured with a as </html> or </body>.
a. ANGLE PARENTHESIS
b. SLASH
c. COMMA
d. BACKSLASH
10. The main heading will have the biggest font size and designated as .
a. <a1>
b. <b1>
c. <c1>
d. <h1>
11. Refers to writing, photography, and other media that is self-published online.
a. VLOGGING
b. BLOGGING
c. CONTENT MAKING
d. FACEBOOK LIVE
12. Is a list, sometimes categorized of links to webpages where the author of a blog finds
worthwhile or interesting.
a. BLOGGING
b. HEADER
c. BLOGROLL
d. FOOTER
13. This provides a way for users to keep up with the latest and hottest information posted on
different blogging sites.
a. HEADER
b. FOOTER
c. FEEDS
d. CONTENTS
14. This displays copyright, some basic information about the site and the ownership.
a. HEADER
b. FOOTER
c. FEEDS
d. CONTENTS
15. Is a component of a blog where contents are displayed.
a. HEADER
b. FOOTER
c. FEEDS
d. CONTENTS
16. Is an abbreviated term for "weblog" which is a term used to describe websites that
maintain an ongoing chronicle of information.
a. BLOG
b. BLOGGING
c. VLOGGING
d. VLOG
17. Due to many reasons, if the data stored in the computer is lost, the person responsible for
handling the computer will have to tolerate a lot.
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

a. Disadvantage of IT to society
b. Negative Effect of IT to society
c. Advantage of IT to society
d. Positive Effect of Society
18. Any professional individual like doctors, engineers, businessmen etc. undergo a change
in their style or working pattern after they get the knowledge of computer.
a. Disadvantage of IT to society
b. Negative Effect of IT to society
c. Advantage of IT to society
d. Positive Effect of Society
19. The elements of a notepad window are the following EXCEPT:
a. Title Bar
b. Menu Bar
c. Text Area
d. Footer
20. Every HTML page should have the following structure EXCEPT:
a. <html> tag pair
b. <head> tag pair
c. <body> tag pair
d. <foot> tag pair

IV. TRUE OR FALSE. Write TRUE if statement is correct and FALSE if not.
1. There are so many tags and each has its own use. TRUE
2. HTML is written in the form of tags with angle parenthesis. TRUE
3. Tags are enclosed in angle brackets > and <. FALSE
4. Source code is comprised of a series of commands called tags. TRUE
5. HTML file are divided into three parts. TRUE
6. Each HTML page requires a title to indicate what the page describes. TRUE
7. You cannot print the copy of HTML codes. FALSE
8. HTML means Hypertext markup language. TRUE
9. In writing HTML, you need high-end software applications. FALSE
10. Notepad window contains elements like the other document window. TRUE
III. IDENTIFICATION. Identify the terms described in each sentence.
COMPUTER VIRUS 1. Is piece of code embedded in a legitimate program and is created with
the ability to self-replicate infecting other programs on a computer.
CREEPER 2. The first computer virus.
ELK CLONER 3. The first computer virus to appear outside the computer where it was created
in.
FILE-INFECTING VIRUS 4. A virus that attached itself to an executable program. It is also
called a parasitic virus which typically infects files with .exe or .com extensions.
MACRO VIRUS 5. Type of virus that is commonly found in programs such as Microsoft word
or Excel.
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

BROWSER HIJACKER 6. It is often called a browser redirect virus because it redirects your
browser to other malicious websites that you don’t have any intention of visiting.
WEB SCRIPTING VIRUS 7. What this virus does is overwrite code on a website and insert
links that can install malicious software on your device.
BOOT SECTOR VIRUS 8. These viruses are found distributed in forms of physical media such
as external hard drives or USB.
POLYMORPHIC VIRUS 9. This virus has the capability to evade anti-virus programs since it
can change codes every time an infected file is performed.
RESIDENT VIRUS 10. This virus stores itself on your computer’s memory which allows it to
infect files on your computer.
MULTIPARTITE VIRUS 11. A type of virus that is very infectious and can easily spread on
your computer system.
WORM 12. Takes a copy of itself and propagates it to other users.
ILOVEYOU 13. Also known as the "love letter virus" and the "love bug worm." 
MALWARE 14. Short for “malicious software,” refers to any intrusive software developed by
cybercriminals (often called “hackers”) to steal data and damage or destroy computers and
computer systems.
TROJAN VIRUS 15. Is one that opens your computer up to malicious users allowing them to
read your files.

Make the necessary correction to the following HTML codes. Write the correct code on the
space provided.
6. <html< - <html>
7. >head<- <head>
8. <\title> - </title>
9. <html/> - </html>
10. <body> - <body>

VI. ENUMERATION.
1-3. Three Examples of Blogging Platform
- Joomla
- Blogspot
- Typepad
4-6. Three Purposes of Blogging
- Blogging provides Information people want
- Blogging establishes you as an authority
- Blogging Exposure leads to sale
7-10. Four Best Types of Blog to create
- Travel Blogs
COMPUTER COMMUNICATION DEVELOPMENT INSTITUTE
Gen. A Luna St., Quinale Tabaco, City
First Semester A.Y 2022-2023

MIDTERM EXAM in
Intro. to Computing

- Health and Fitness Blogs


- Lifestyle blogs
- Fashion and beauty blogs
11-15. Components of a Blog
- Header • content area • footer • feeds • blogroll

VII. ESSAY. Answer the following questions. Explain your answers briefly. (5 points
each)
1. What are the effects of IT to the environment?
2. What are the effects of IT to health?
3. Explain the uses of computer in:
- Education
- Health and Medicine
- Financial Institutions
- Transport System
- Our Country’s Defense

You might also like