MIDTERM-EXAM-IN-CC101-Introduction-to-Computing BSIS

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Catanduanes State University

COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY


Virac, Catanduanes

MIDTERM EXAM IN CC101 INTRODUCTION TO COMPUTING

NAME: _______________________________________ PROGRAM/YEAR/BLOCK: __________________

MULTIPLE CHOICE. Direction. Encircle the letter of the correct answer. ERASURES ARE NOT ALLOWED.

1. The following are the three-pronged definition of computer literacy except one:
a. Awareness c. Reliability
b. Knowledge d. Interaction
2. He has the power to install and delete applications, copy and delete files and cause a massive
system crash by messing with the critical system files.
a. Standard user c. Guest
b. Administrator d. Child
3. He is able to run the applications and touch some files but is unable to install or delete anything.
a. Standard user c. Guest
b. Administrator d. Child
4. This user’s accounts are usually recorded, and unable to open any application, game, or any content
that says “parental guidance is advised.”
a. Standard user c. Guest
b. Administrator d. Child
5. He is able to install and delete applications, and update the system, but is otherwise unable to mess
with the critical system files.
a. Standard user c. Guest
b. Administrator d. Child
6. He is a complete beginner and someone who is new to the cyber world.
a. Power user c. Computer user
b. Computer wizard d. Computer dummy
7. These are guys who have “used too much” computers and have some tech tricks up the sleeve.
a. Power user c. Computer user
b. Computer wizard d. Computer dummy
8. These are the good guys who mess with computers with permission, to warn other people of
security loopholes.
a. Black hat c. Brown hat
b. White hat d. Grey hat
9. These are the type of users who don’t care about what applications are used, as long as things get
done using computers.
a. Classification-oriented users c. Goal-oriented users
b. Computer oriented-users d. Computer wizard
10. The following are the three fundamental characteristics of a computer except one:
a. Speed c. Consistency
b. Reliability d. Storage Capacity
11. Below are the three by-products of the nature of computers except one:
a. Digital currency c. Decision-making
b. Productivity d. Cost reduction
12. Computer systems can store tremendous amounts of data, which can be located and retrieved
efficiently.
a. Speed c. Reliability
b. Storage capability d. Consistency
13. They are the uncommon group of users, who use computers for the sake of computers.
a. Classification-oriented users c. Hacker
b. Goal-oriented users d. Computer oriented-users

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors
Catanduanes State University
COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Virac, Catanduanes

14. The almighty tech geeks. Give them a mess of wired, and they can sort it out.
a. Hacker c. Computer user
b. Computer wizard d. Power user
15. Below are the categories of the work of computer scientists except one:
a. Designing and building software
b. Developing ways to solve computing problems.
c. Devising new ways to use computers.
d. Planning and managing organizational technology infrastructure.
16. Information Systems (IS) is focused on integrating information technology and business processes.
a. Uses technology to give a business a competitive advantage.
b. They can serve as an effective bridge between the management and technical communities
within an organization.
c. IS programs are often located within business facilities.
d. IS professionals require a sound understanding of business practices.
17. Software Engineering (SE) is the discipline of developing and maintaining large software systems.
a. They learn best practices for engineering software applications.
b. SE students learn about software reliability and maintainability.
c. We use special design techniques so that software is more likely to be reliable and correct.
d. They experience teamwork and focus on effective project management
18. Software engineers while on-the-job,
a. Focuses on large-scale systems development.
b. Develops software systems that are maintainable, reliable, efficient, and satisfy customer
requirements.
c. Utilizes sound engineering practices to create computer applications.
d. They assume responsibility for selecting hardware and software products appropriate for an
organization.
19. The following are Information Technology support services except one:
a. Desktop/endpoint computing (including technical support, analysis, and consulting)
b. Teaching and technology center staff
c. Computer installation, maintenance, and repair (including staffing and support contracts)
d. Technology research and development specific to this domain area
20. The following are Educational Technology services except one:
a. Technology research and development specific to this domain area
b. Hardware, software, and supplies affiliated with these function
c. Grid and data-centric computing
d. Teaching and technology center staff
21. Below are research computing services except one:
a. Session Initiation Protocol (SIP) trunking
b. Business process/systems analysis specific to this domain area
c. Hardware, software, and supplies affiliated with these functions
d. Business process/systems analysis specific to this domain area
22. Below are communications infrastructure services except one:
a. Wire and cable infrastructure for data, voice and/or video networks
b. Portal development and support
c. Digital signage systems
d. Telephone services (VoIP or conventional)

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors
Catanduanes State University
COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Virac, Catanduanes

23. Below are enterprise infrastructure and services except one:


a. DHCP and DNS
b. Mobile application design and development
c. Data center, operations
d. Password management
24. Below are Information security services except one:
a. Federated identity
b. Enterprise architecture
c. Security policy and process development
d. Vulnerability analysis
25. Below are information systems and applications except one:
a. Administrative/enterprise information systems
b. Administrative system support
c. Business process/systems analysis specific to this domain area
d. Training of users of these systems
26. Administrative system support includes the following except one:
a. Implementation and support of these systems
b. Mobile interfaces for these systems
c. Training of users of these systems
d. Grants management applications
27. Administrative/enterprise information systems include the following except one:
a. Programming support related to these systems
b. Enterprise decision support
c. Financial management systems
d. Room scheduling and events management
28. Information security includes the following except one:
a. Security awareness and training programs
b. Staff affiliated with these functions
c. Technology research and development specific to this domain area
d. Security information and event management
29. It is the first known calculating machine used for counting.
a. Napier bones c. Abacus
b. Pascal’s calculator d. Leibniz calculator
30. Konrad Zuse created what became known as the first programmable computer which is called_____.
a. Z1 c. K1
b. A1 d. W1
31. He created the ENIAC during World War II to help the Army with ballistics analytics.
a. Konrad Zuse c. John Mauchly
b. Steve Jobs d. Charles Babbage
32. This is the first desktop computer that is sold to the average consumer.
a. JOHNNIAC c. Macintosh
b. Programma 101 d. Xerox Alto
33. In what year was the first Macintosh computer introduced?
a. 1984 c. 1980
b. 1985 d. 1978
34. He/ She is an English mathematician who wrote the world's first computer program.
a. Charles Babbage c. Joseph Marie Jacquard
b. Herman Hollerith d. Ada Lovelace

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors
Catanduanes State University
COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Virac, Catanduanes

35. He is a professor of physics and mathematics at Iowa State University who submitted a grant
proposal to build the first electric-only computer, without using gears, cams, belts or shafts.
a. John Vincent Atanasoff c. Alan Turing
b. David Packard d. Bill Hewlett
36. It is the first commercial computer for business and government applications.
a. ENIAC c. EDVAC
b. UNIVAC d. EDSAC
37. Grace Hopper develops the fist computer language which was known as __________.
a. C programming c. COBOL
b. FORTRAN d. Java Programming
38. It is the first Dynamic Random Access Memory (DRAM) chip.
a. Intel 1101 c. Intel 1001
b. Intel 101 d. Intel 1103
39. He is a member of the research staff for Xerox, which develops Ethernet for connecting multiple
computers and other hardware.
a. Ralph Baer c. Alan Shugart
b. Robert Metcalfe d. Steve Jobs
40. It is the first computerized spreadsheet program which was introduced in the year 1978.
a. VisiCalc c. Excel
b. Google Sheets d. Bime
41. In this year, Google buys Android, a Linux-based mobile phone operating system.
a. 2004 c. 2000
b. 2005 d. 2009
42. In this year, Apple releases the Apple Watch. Microsoft releases Windows 10.
a. 2015 c. 2010
b. 2016 d. 2014
43. It is another term for motherboard.
a. System board c. Memory module
b. Central Processing Unit d. Multicore Processor
44. An electronic tool that allows information to be input, processed, and output is called
_____________.
a. Operating system c. Computer
b. Motherboard d. CPU
45. ___________ is a worldwide network of computers.
a. CPU c. RAM
b. Internet d. Network
46. Name the brain of the computer that does the calculation, moving, and processing of
information.
a. CPU c. Motherboard
b. RAM d. Hard Drive
47. A small picture that represents a folder, program or other things is known as __________.
a. Desktop c. Graphic
b. Icon d. Image
48. What is the name given to the computer’s short-term memory that is lost when the computer is
turned off?
a. CPU c. RAM
b. Hardware d. Processor
49. Name the computer part that is connected to all other aspects of a computer and allows them
to communicate and work together.
a. Operating system c. Output device
b. Disk drive d. Motherboard

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors
Catanduanes State University
COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Virac, Catanduanes

50. Name the computer part that stores programs and other information on two or more disks that
are located inside the computer.
a. Motherboard c. CPU
b. Hard drive d. Operating system
51. A part of the computer that reads information from a disk is called _______________.
a. Operating system c. Hard drive
b. Motherboard d. Disk drive
52. A program that controls a computer’s basic functions is called ________________.
a. Hard drive c. Operating system
b. Motherboard d. CPU
53. Computer memory is organized into a hierarchy that consists of multiple levels of memory with
different speeds and sizes. Order the following storage mediums from fastest to slowest data access
speed: registers, cache, hard disk, and main memory.
a. Cache, hard disk, main memory, registers c. Registers, main memory, cache, hard disk
b. Registers, cache, main memory, hard disk d. Registers, cache, hard disk, main memory
54. Cache memory holds:
a. Frequently used data and instructions c. Data only
b. Direct tunneling address modes d. Instructions only
55. The ALU is the component of the CPU where ____________ and _____________.
a. Data is stored; instructions are interpreted
b. Calculations take place; instructions are interpreted
c. Data is held temporarily; calculations are made
d. Programs are decoded; instructions are fetched
56. Which of the following is not true about buses?
a. Buses connect computer peripherals and the Central Processing Unit (CPU)
b. Buses transfer data from the Central Processing Unit (CPU) and memory
c. Buses connect the power supply and RAM with the motherboard
d. Buses might be a tiny fraction of a centimeter long
57. DOS, iOS, and Windows are examples of what type of software?
a. Firewalls c. Antivirus
b. Operating systems d. Applications
58. All data in the computer system is represented as _____________.
a. Only two numbers 0 and 1 c. numbers and alphabets
b. Numbers, alphabets and symbols d. six numbers (-0, 1, 2, 3, 4, 5)
59. Third generation computers used _____________.
a. VLSI technique c. Vacuum tubes
b. Transistors d. Integrated Circuits
60. Speed of processor chip is measured in _____________.
a. Mbps c. MHz
b. Bits per second d. Bytes per second

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors
Catanduanes State University
COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Virac, Catanduanes

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors
Catanduanes State University
COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Virac, Catanduanes

KEY TO CORRECTION
(CC101)

1. C 21. A 41. B
2. B 22. B 42. A
3. C 23. D 43. A
4. D 24. B 44. C
5. A 25. C 45. B
6. D 26. D 46. A
7. A 27. A 47. B
8. B 28. B 48. C
9. C 29. C 49. D
10. C 30. A 50. B
11. A 31. C 51. D
12. B 32. B 52. C
13. D 33. A 53. B
14. B 34. D 54. A
15. D 35. A 55. C
16. A 36. B 56. C
17. C 37. C 57. B
18. D 38. D 58. A
19. B 39. B 59. D
20. C 40. A 60. C

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors
Catanduanes State University
COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
Virac, Catanduanes

Prepared by:
Noted by:
MERLIJOY M. JAMERO ABEGAIL B. VASOL CAMILLE G. DE JESUS
MARIA ANTONIA E. ROJAS, Ph.D.
JADE T. TRILLES ROSEANN T. TABINAS MA. JESSA V. VARGAS Department Chairperson, Computing Programs

MARIA STELLA T. GERODIAS CENLY OLONAN ROSELLE T. TABIOSAS MIKAELA V. TORRENTE ARNOLD MANLANGIT
Subject Instructors

You might also like