This midterm exam for an IT course covers three main sections:
1) Identifying major computer components, information management concepts, and types of information security threats. Students are tested on components like CPUs, RAM, hard drives as well as concepts like data, information, knowledge, and decision making.
2) Converting numbers between decimal, binary, octal, and hexadecimal number systems. Problems include changing 125 decimal to binary and 312 hexadecimal to decimal.
3) True/false and multiple choice questions related to cybersecurity attacks, data protection laws, and social engineering techniques. Questions address topics like phishing, smishing, and pretexting.
This midterm exam for an IT course covers three main sections:
1) Identifying major computer components, information management concepts, and types of information security threats. Students are tested on components like CPUs, RAM, hard drives as well as concepts like data, information, knowledge, and decision making.
2) Converting numbers between decimal, binary, octal, and hexadecimal number systems. Problems include changing 125 decimal to binary and 312 hexadecimal to decimal.
3) True/false and multiple choice questions related to cybersecurity attacks, data protection laws, and social engineering techniques. Questions address topics like phishing, smishing, and pretexting.
This midterm exam for an IT course covers three main sections:
1) Identifying major computer components, information management concepts, and types of information security threats. Students are tested on components like CPUs, RAM, hard drives as well as concepts like data, information, knowledge, and decision making.
2) Converting numbers between decimal, binary, octal, and hexadecimal number systems. Problems include changing 125 decimal to binary and 312 hexadecimal to decimal.
3) True/false and multiple choice questions related to cybersecurity attacks, data protection laws, and social engineering techniques. Questions address topics like phishing, smishing, and pretexting.
This midterm exam for an IT course covers three main sections:
1) Identifying major computer components, information management concepts, and types of information security threats. Students are tested on components like CPUs, RAM, hard drives as well as concepts like data, information, knowledge, and decision making.
2) Converting numbers between decimal, binary, octal, and hexadecimal number systems. Problems include changing 125 decimal to binary and 312 hexadecimal to decimal.
3) True/false and multiple choice questions related to cybersecurity attacks, data protection laws, and social engineering techniques. Questions address topics like phishing, smishing, and pretexting.
Major Components of the computer (1-15) Information Management (16-28) Information Security (29-35) 1. This is the application of scientific knowledge to make different operations easier and more convenient. 2. Which type of computer technology do computers in the first-generation use? 3. Which type of computer technology do computers in the second-generation use? 4. Which type of computer technology do computers in the third-generation use? 5. Which type of computer technology do computers in the fourth-generation use? 6. Part of the computer that's responsible for the enclosure that contains most of the hardware of a personal computer. 7. What component of a computer is often referred to as the "brain" of the system? 8. Which component is responsible for storing data and long-term memory in a computer? 9. What component is responsible for rendering graphics and images on a computer? 10. Which part of the computer connects all the internal components and allows them to communicate with each other? 11. What type of memory is volatile and used for temporary storage of data that the CPU is actively processing? 12. Which storage device has no moving parts and is known for its speed? 13. What part of the computer is responsible for input and output operations, such as connecting to a monitor or keyboard? 14. What component is responsible for storing the computer's BIOS and firmware? 15. What component of a computer is responsible for long-term data storage and consist of magnetic platters? 16. A pure and unprocessed – facts and figures without any added interpretation or analysis. 17. Produced by combining information, experience, and insight. 18. Type of knowledge that typically acquired through personal experience, practice, and intuition. 19. Type of knowledge that can be learned or found in books, manuals, databases, or documents. 20. What is the term for the action that you take based on the information you have? 21. It occurs when information received becomes a hindrance rather than a help, when the information is potentially useful. 22. What is the term for the situation in which information, although potentially useful, becomes a hindrance rather than a help due to an excessive amount of unsolicited data? 23. Through what medium is information primarily transferred in electrical wiring and electronic circuits? 24. In fiber-optic communication systems, what type of transmission is achieved using thin strands of glass or plastic to transmit data? 25. What medium is commonly used for broadcasting information wirelessly, such as in radio broadcasting? 26. What term is used to describe a private network within an organization that is accessible only to its members and often used for internal communications and sharing resources? 27. When an organization extends its network to include select external partners or stakeholders for collaborative purposes, what network type is formed? 28. What global network connects millions of public and private networks worldwide and serves as the backbone for the World Wide Web and online services? 29. What is a type of cyber-attack that is obtain by downloading something on the internet? 30. What is the term used to describe a manipulative technique used by malicious actors to deceive individuals or employees into revealing confidential information or performing actions that compromise security? 31. Which Philippine law governs the protection of personal data and information? 32. What is a type of phishing that involves fraudulent voice calls or voicemails to deceive individuals into revealing sensitive information or taking certain actions? 33. What is the primary communication method used in smishing attacks? GECELEC1: LIVING IN THE IT ERA, MIDTERM EXAM (2023-2024) 34. What social engineering method involves exchanging something of value for sensitive information or access to a computer system? 35. When an unauthorized individual gains entry to a restricted area by following an authorized person, what type of social engineering attack is being employed?
II. COMPUTER DATA: Convert the following number system to another number system. (15pts)
DECIMAL TO BINARY 8.) 101110111 _________________
1.) 125 _________________ OCTAL TO DECIMAL 2.) 213 _________________ 9.) 123 _________________ DECIMAL TO OCTAL 10.) 235 _________________ 3.) 159 _________________ HEXADECIMAL TO DECIMAL 4.) 245 _________________ 11.) 312 _________________ DECIMAL TO HEXADECIMAL 12.) 415 _________________ 5.) 198 _________________ OCTAL TO BINARY 6.) 149 _________________ 13.) 172 _________________ BINARY TO DECIMAL 14.) 234 _________________ 7.) 110110110 _________________ 15.) 160 _________________