Living In-The-It-Era-Reviewer

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

LIVING IN THE IT ERA REVIEWER

1. Which protocol is commonly used for sending emails over the internet?
a. HTTP c. SMTP
b. FTP d. TCP
2. The WWW was invented by Tim-Berners Lee while working at which organization?
a. Microsoft c. CERN
b. Apple d. NASA
3. What is the main function of a Domain Name System (DNS) in the internet architecture?
a. To store web pages
b. To translate domain names to IP addresses
c. To create websites
d. To send emails
4. What is the difference between the World Wide Web (WWW) and the internet?
a. They are the same thing
b. The internet is a network of computers, while the WWW is a collection of
websites
c. The WWW is a network of computers, while the internet is a collection of websites
d. The internet is a collection of websites, while the WWW is a network of computers
5. Which of the following is not a type of internet connection?
a. Dial-up c. fiber optic
b. DSL d. Bluetooth
6. Which of the following is a markup language commonly used to create web pages?
a. HTML c. Java
b. CSS d. Python
7. What is the purpose of a hyperlink on a web page?
a. To display images c. to navigate to other web pages
b. To play videos d. to send emails
8. What is the purpose of a web cache?
a. To store web pages temporarily
b. To block access to websites
c. To create websites
d. To send emails
9. Which of the following is not a web browser?
a. Goggle Chrome c. Microsoft word
b. Firefox d. Safari
10. What is the purpose of a web feed?
a. To display advertisements
b. To track user activity
c. To subscribe to updates from website
11. What is the function of cookies on websites?
a. To track user activity and preferences
b. To prevent access to the website
c. To display advertisements
d. To block pop-up windows
12. The development of the ARPANET in the late 1960s led the foundation for
a. The World Wide Web c. Cloud Computing
b. Email communication d. Virtual Reality
13. What is the main difference between a website and a web page?
a. They are the same thing
b. A website is a collection of web pages
c. A web page is a collection of websites
d. A website is a type of a web browser
14. What does URL stands for in the context of the internet?
a. Universal Resource Locator c. Universal Reference Link
b. Uniform Resource Locator d. Uniform Reference Link
15. What is the main function of a web server?
a. To store and deliver web pages c. To create websites
b. To browse the internet d. To send emails
16. What is the purpose of Internet Server Providers (ISPs) in the internet ecosystem?
a. To provide web hosting services c. to offer internet connectivity to users
b. To develop web applications d. to create websites
17. What is the purpose of a web cache?
a. To store web pages temporarily c. to create websites
b. To block access to websites d. to send emails
18. What is the purpose of a search engine on the internet?
a. To create websites c. To find information
b. To store web pages d. To send emails
19. which of the following individuals is known for creating the first commercially successful
personal computers?
a. Steve Jobs c. Tim-Berners Lee
b. Bill Gates d. Jack Kilby
20. What is the purpose of a web browser?
a. To store web pages c. To display web pages
b. To create websites d. To send emails
21. What is the role of a web server in the content of the World Wide Web?
a. To store and deliver web pages to users
b. To browse the internet
c. To create websites
22. What does ICT stands for?
a. Internet and Computer Technology
b. Information and Communication Technology
c. Integrated Communication Tools
d. Innovative Computing Techniques
23. What was the name of the first electronic digital computer?
a. ENIAC c. IBM PC
b. UNIVAC d. Altair 8800
24. What does ISP stands for in the context of the internet?
a. Internet Service Provider
a. Internet Security Protocol
b. Internet Server Provider
c. Internet Search Provider
25. Which of the following is not commonly used as web programming language?
a. HTML c. JAVA
b. CSS d. .exe
26. Which of the following is an example of an ICT tool?
a. Hammer c. Microwave
b. Television d. Refrigerator
27. How does ICT impact economic development?
a. Slows down economic growth
b. Has no impact on economic development
c. Enhances economic development
d. Causes economic recession
28. Which of the following is a challenge associated with the adaptation of ICT?
a. Decreased productivity
b. Limited job opportunities
c. Cybersecurity threats
d. Reduced communication efficiency
29. What role does ICT play in organizations?
a. Decrease collaboration among employees
b. Slows down communication processes
c. Enhances operational efficiency
d. Limits access to information
30. How does ICT impacted on global communication?
a. It has increased the cost of communication
b. It has made global communication slower and less reliable
c. It has improved the speed and ease of global communication
d. It has no significant impact on global communication
31. What is one of the benefits of ICT in the field of education?
a. Reduced access to information
b. Limited educational resources for students
c. Enhanced learning through online courses and resources
d. Decreased collaboration opportunities
32. How does ICT positively impacted the workplace?
a. Decreased productivity due to technology dependence
b. Increased costs for businesses due to technology upgrades
c. Enabled remote work and telecommunicating
d. Reduced the ability to share information and collaborate
33. What positive impacts has ICT had on healthcare?
a. Slowed down medical research developments
b. Decreased the efficiency of patient record management
c. Improved patient care through telemedicine and electronic health records
d. Restricted access to health information and services
34. In what way has ICT contributed to the economy?
a. By limiting market expansion for businesses
b. By creating job shortages in the tech industry
c. By enabling the growth of e-commerce and digital markets
d. By increasing trade barriers between countries
35. What is the common physical health issue linked to excessive use of computers and mobile
devices?
a. Improved posture c. Enhanced vision
b. Eye strain d, Increased physical endurance
36. how can the widespread use of ICT negatively impact the environment?
a. By decreasing energy consumption
b. Through promotion of paperless communication
c. By increasing electronic waste
d. Through reduced use of natural resources
37. Which if the following is a potential social consequence of excessive use of ICT?
a. Enhanced face-to-face communication skills
b. Increased outdoor recreational activities
c. Social isolation
d. Strengthened interpersonal relationships
38. Cyberbullying is an issue that has emerged as a result of ICT. What is the nature of
cyberbullying?
a. It can only occur during school hours
b. It is less harmful that traditional bullying
c. It can occur at any time and can be anonymous
d. It is quickly noticed and stopped by adults
39. What is a potential risk associated with the reliance on ICT for storing sensitive personal
information?
a. Greater privacy
b. Decreased risk if identity theft
c. Increased data security
d. Data breaches leading to identity theft
40. When was the mechanical age of computing generally considered to have begun?
a. 1450-1840 c. 1940-1956
b. 1642-1840 d. 1840-1940
41. The first successful commercial computer was the UNIVAC I. In which year was it delivered to a
client?
a. 1945 c. 1960
b. 1951 d. 1954
42. Who is credited with conceptualizing the first programmable computer?
a. Charles Babbage c. Alan Turing
b. Blaise Pascal d. John Von Neumann
43. What was the name of the first electronic digital computer?
a. ENIAC c. IBM PC
b. UNIVAC d. Altair 8800
44. The period known as the ‘second generation’ of computers was characterized by the use of which
technology?
a. Vacuum tubes c. Integrated circuits
b. Transistors d. Microprocessor
45. The Integrated Circuit (IC) was a pioneering technology that marked the beginning of which
computing era?
a. First Generation c. Third Generation
b. Second Generation d. Fourth Generation
46. What is the significance of the microprocessor in the history of computing?
a. It allowed the creation of the first electronic computers
b. It marked the beginning of the fourth generation
c. It replaced the use of integrated circuit
d. It was first introduced in the Altair 8800
47. In what decade did the personal computer (PC) market begin to take shape?
a. 1960s c. 1980s
b. 1970s d. 1990s
48. Which company is credited with introducing the first widely successful personal computer with a
graphical user interface (GUI)?
a. IBM c. Apple
b. Microsoft d. Atari
1. Using all capital letters in a message is known as
Ans: SCREAMING.
2. Proofreading messages before sending them is a best practice for _____ communication.
Ans: EFFECTIVE AND EFFICIENT
3. it is considered good judgement to ask for permission before sharing
Ans: ONLINE
4. Sharing sensitive personal information online can compromise your
Ans: PRIVACY AND SAFETY.
5. Copying someone else’s work and passing it off as your own is known as
Ans: PLAGIARISM.
6. Rule 1 of the 10 commandments of Computer Ethics emphasizes the importance of
Ans: REMEMBERING THE HUMAN.
7. Rule 7 of the 10 commandments of Computer Ethics highlights the need to respect other
people’s ________________.
Ans: TIME AND BANDWIDTH.
8. Rule 6 of the 10 commandments of Computer Ethics encourages sharing
Ans: EXPERT KNOWLEDGE.
9. “Flaming” in virtual communication refers to expressing opinions with strong
Ans: EMOTION.
10. Rule 8 of the 10 commandments of Computer Ethics stresses the importance of respecting
others’ _______.
Ans: PRIVACY
11. Being forgiving of other people’s mistakes in the virtual world is a key aspect of practicing
Ans: KINDNESS AND FORGIVENESS.
12. What is the definition of cybercrime according to the document?
Ans: A CRIME IN WHICH A COMPUTER IS THE OBJECT OF THE CRIME OR IS USED AS A
TOOL TO COMMIT AN OFFENSE.
13. What is Republic Act No. 10175 also known for?
Ans: CYBERCRIME PREVENTION ACT OF 2012
14. What is the act protecting individuals’ personal information?
Ans: REPUBLIC ACT NO. 10173 DATA PRIVACY ACT OF 2012
15. What is the act or instance of using or closely imitating the language and thoughts of another
author without authorization?
Ans: PLAGIARISM
16. What is the maximum penalty for hacking if committed against critical infrastructure of the
Philippines?
Ans: BETWEEN 12-20 YEARS RECLUSION TEMPORAL
17. What is the penalty for computer-related forgery, fraud, and/or identity theft?
Ans: MAXIMUM OF PHP 200,000 FINE OR PRISION MAYOR
18. What id the practice of illegally copying and selling digital music, video, computer software, etc.?
Ans: DIGITAL PIRACY
19. What is the penalty for engaging in cybersex with the aid of a computer system for favor or
consideration?
Ans: AT LEAST PHP 200,000 AND/OR PRISION MAYOR
20. What is the penalty for cyber defamation?
Ans: 6-12 YEARS OF IMPRISONMENT OR PRISION MAYOR
21. What is the form of child sexual exploitation defined and punishable by Republic Act No. 9775?
Ans: CHILD PORNOGRAPHY
22. What is the act of obtaining files that you do not have the right to use from the internet?
Ans: ILLEGAL DOWNLOADING
23. What is the persona you create about yourself virtually?
Ans: VIRTUAL SELF
24. What is the penalty for copyright infringement?
Ans: PENALTY OF PHP 50,000 – 5000,000 AND/OR PRISION MAYOR
25. Netiquette is the etiquette of _____
Ans: CYBERSPACE
26. Netiquette is a set of rules for behaving properly _____
Ans: ONLINE
27. The core rules of netiquette were adopted from ____
Ans: VIRGINIA SHEA
28. It is important to treat others with _____ when communicating online
Ans: RESPECT

TRUE OR FALSE (MODIFIED)


1. The digital age is also known as Industrial revolution.
Ans: FALSE (DIGITAL REVOLUTION)
2. ICT stands for Information and Communication Technology.
Ans: TRUE
3. ICT has little impact on social development in developing countries.
Ans: FALSE (HUGE IMPACT)
4. Digital technologies have not changed the way people work, consume, and communicate.
Ans: FALSE (HAD CHANGED)
5. The impact of ICT on business is not significant.
Ans: FALSE (*remove not)
6. ICT has no role in enhancing access to information for all in education.
Ans: FALSE (HAVE ROLE)
7. Digital resources in classrooms do not help prepare students for a digital society.
Ans: FALSE (*remove DO NOT)
8. The digital transformation has led to a net loss of jobs.
Ans: FALSE (INCREASE OF JOBS)
9. Teleworking may improve work-life balance by reducing commuting time.
Ans: TRUE
10. Digitalization has no impact on the healthcare delivery system.
Ans: FALSE (HAVE AN IMPACT)
11. Extreme us of digital technologies has no potential negative mental health effects.
Ans: FALSE (HAS A)
12. Technological determinism theory suggests that technology shapes society.
Ans: TRUE
13. Social Constructivism Theory believes that humans do not shape technology.
Ans: FALSE (*remove DO NOT)
14. Technological change does not lead to an increase in productivity.
Ans: FALSE (*remove DOES NOT)
15. Invention and innovation are the same concepts.
Ans: FALSE (DIFFERENT CONCEPTS)
16. Invention is the commercial exploitation of new techniques.
Ans: FALSE (INNOVATION)
17. The process of growth of technical knowledge involves only two stages.
Ans: FALSE (FOUR STAGES)
18. Innovation is the practical application of invention in production for market.
Ans: TRUE
19. Invention is an economic fact, while innovation is a scientific fact.
Ans: FALSE (INNOVATION, INVENTION)
20. Inventions require large capital investments at every stage.
Ans: TRUE
21. Invention is the discovery of new techniques, while innovation is the application of these
techniques.
Ans: TRUE
22. The digital age is synonymous with the information age.
Ans: TRUE
23. Digital technologies have not impacted the way we experience entertainment.
Ans: FALSE (*remove NOT)

You might also like