Gecelec 1 Midterm

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

GECELEC1: LIVING IN THE IT ERA, MIDTERM EXAM

(2023-2024)

I. Identify the following:


Major Components of the computer (1-15)
Information Management (16-28)
Information Security (29-35)
1. This is the application of scientific knowledge to make different operations easier and more convenient.
2. Which type of computer technology do computers in the first-generation use?
3. Which type of computer technology do computers in the second-generation use?
4. Which type of computer technology do computers in the third-generation use?
5. Which type of computer technology do computers in the fourth-generation use?
6. Part of the computer that's responsible for the enclosure that contains most of the hardware of a
personal computer.
7. What component of a computer is often referred to as the "brain" of the system?
8. Which component is responsible for storing data and long-term memory in a computer?
9. What component is responsible for rendering graphics and images on a computer?
10. Which part of the computer connects all the internal components and allows them to communicate
with each other?
11. What type of memory is volatile and used for temporary storage of data that the CPU is actively
processing?
12. Which storage device has no moving parts and is known for its speed?
13. What part of the computer is responsible for input and output operations, such as connecting to a
monitor or keyboard?
14. What component is responsible for storing the computer's BIOS and firmware?
15. What component of a computer is responsible for long-term data storage and consist of magnetic
platters?
16. A pure and unprocessed – facts and figures without any added interpretation or analysis.
17. Produced by combining information, experience, and insight.
18. Type of knowledge that typically acquired through personal experience, practice, and intuition.
19. Type of knowledge that can be learned or found in books, manuals, databases, or documents.
20. What is the term for the action that you take based on the information you have?
21. It occurs when information received becomes a hindrance rather than a help, when the information is
potentially useful.
22. What is the term for the situation in which information, although potentially useful, becomes a
hindrance rather than a help due to an excessive amount of unsolicited data?
23. Through what medium is information primarily transferred in electrical wiring and electronic circuits?
24. In fiber-optic communication systems, what type of transmission is achieved using thin strands of glass
or plastic to transmit data?
25. What medium is commonly used for broadcasting information wirelessly, such as in radio broadcasting?
26. What term is used to describe a private network within an organization that is accessible only to its
members and often used for internal communications and sharing resources?
27. When an organization extends its network to include select external partners or stakeholders for
collaborative purposes, what network type is formed?
28. What global network connects millions of public and private networks worldwide and serves as the
backbone for the World Wide Web and online services?
29. What is a type of cyber-attack that is obtain by downloading something on the internet?
30. What is the term used to describe a manipulative technique used by malicious actors to deceive
individuals or employees into revealing confidential information or performing actions that compromise
security?
31. Which Philippine law governs the protection of personal data and information?
32. What is a type of phishing that involves fraudulent voice calls or voicemails to deceive individuals into
revealing sensitive information or taking certain actions?
33. What is the primary communication method used in smishing attacks?
GECELEC1: LIVING IN THE IT ERA, MIDTERM EXAM
(2023-2024)
34. What social engineering method involves exchanging something of value for sensitive information or
access to a computer system?
35. When an unauthorized individual gains entry to a restricted area by following an authorized person,
what type of social engineering attack is being employed?

II. COMPUTER DATA: Convert the following number system to another number system. (15pts)

DECIMAL TO BINARY 8.) 101110111 _________________


1.) 125 _________________ OCTAL TO DECIMAL
2.) 213 _________________ 9.) 123 _________________
DECIMAL TO OCTAL 10.) 235 _________________
3.) 159 _________________ HEXADECIMAL TO DECIMAL
4.) 245 _________________ 11.) 312 _________________
DECIMAL TO HEXADECIMAL 12.) 415 _________________
5.) 198 _________________ OCTAL TO BINARY
6.) 149 _________________ 13.) 172 _________________
BINARY TO DECIMAL 14.) 234 _________________
7.) 110110110 _________________ 15.) 160 _________________

You might also like