Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Republic of the Philippines

PALAWAN STATE UNIVERSITY


Puerto Princesa City

Living the IT Era Mid- Term Examination

Multiple Choice: Choose the best response for each question, then record it on your answer sheet.

1. What is the digital divide?


a) The gap between people who have access to digital technology and those who do not
b) The gap between people who use digital technology frequently and those who do not
c) The gap between people who are digitally literate and those who are not
d) The gap between people who use social media and those who do not

2. What is the network society?


a) A society in which people are isolated and disconnected from each other
b) A society in which people are highly connected through digital networks
c) A society in which people primarily interact through face-to-face communication
d) A society in which people primarily communicate through written letters

3. What is the impact of the network society on social relationships?


a) It has increased opportunities for social connection and interaction
b) It has led to more superficial and impersonal social relationships
c) It has decreased opportunities for face-to-face interaction
d) All of the above

4. What is a significant factor that causes the digital divide?


a. Income c. Gender
b. Physical location d. All of the above

5. What is the term used to describe the gap in technology skills between different groups?
a. Technology gap c. Skill divide
b. Digital literacy divide d. Technology literacy gap

6. These are the significant cause of the digital divide in rural areas, except?
a. Lack of access to high-speed internet
b. Lack of awareness of technology
c. Lack of funding for technology infrastructure
d. Lack of support from the other business organization

7. Which term describes the idea that individuals without digital skills or access to the internet
are at a disadvantage in today's society?
a. Digital divide c. Technological superiority
b. Internet inequality d. Digital literacy

8. What is one potential consequence of the digital divide in education?


a. Equal access to educational resources for all students
b. Enhanced learning opportunities for disadvantaged students
c. Limited access to online learning materials for some students
d. Reduced need for digital literacy skills

9. What do you think is the primary role of governmental and non-governmental organizations
in addressing the digital divide?
a. Expanding the divide further
b. Providing free digital devices to all citizens
c. Promoting digital literacy and ensuring equitable access to technology
d. Regulating internet content and usage

10. What is digital etiquette?


a. Rules for using electronic devices c. Good manners for communicating online
b. Guidelines for protecting personal information d. Standards for using social media

11. What is digital law?


a. The use of technology to create laws
b. The legal issues related to the use of technology
c. The ethical issues related to the use of technology
d. The study of technology trends and their impact on the legal system

12. What is intellectual property?


a. The property of the mind c. The property of the body
b. The property of the government d. The property of the land

13. What is the purpose of copyright law?


a. To protect the rights of inventors c. To protect the rights of creators of original works
b. To protect the rights of business owners d. To protect the rights of consumers

14. Which of the following is an example of cybercrime?


a. Downloading music from a peer-to-peer file-sharing network
b. Posting negative comments about someone on social media
c. Hacking into a computer network to steal personal information
d. Installing a software program on a friend's computer without their knowledge

15. What does the term "memes" refer to in digital culture?


a. Formal academic articles
b. Internet jokes and viral images
c. Online dating profiles
d. Social media influencers

16. In the context of digital culture, what does the term "troll" typically refer to?
a. A mythical creature from folklore
b. An online user who intentionally provokes and upsets others
c. A popular type of internet cat video
d. A type of online game character

17. Which of the following is considered good digital etiquette when participating in online
discussions or forums?
a. Posting unrelated advertisements
b. Engaging in respectful and constructive discussions
c. Ignoring other participants' comments
d. Using offensive language and personal attacks

18. What is the purpose of using "emoticons" or "emoji" in digital communication?


a. To confuse the reader
b. To convey tone and emotion in text-based messages
c. To hide the true meaning of a message
d. To indicate urgency

19. What does the process of digitization involve?


a. Converting physical information into digital format
b. Printing digital documents on paper
c. Scanning digital information back into physical form
d. Encrypting digital data for security
20. What is the central concept of the network society?
a. Hierarchical organization
b. Centralized control
c. Decentralized communication networks
d. Industrial manufacturing

21. Which technology played a crucial role in the development of the network society?
a. Steam engine c. Telephone
b. Printing press d. Internet

22. What term describes the phenomenon where individuals or organizations connect and
communicate through online platforms, often transcending geographical boundaries?
a. Globalization c. Industrial revolution
b. Digitalization d. Networked society

23. Which of the following is a key characteristic of the network society?


a. Strict hierarchical structures
b. Limited access to information
c. Increased connectivity and interdependence
d. Reduced reliance on digital technologies

24. How does the network society impact the way people access and share information?
a. It limits access to information.
b. It centralizes information sources.
c. It diversifies and democratizes information access and sharing.
d. It makes information more scarce.

25. What is the main purpose of a privacy policy on a website or online platform?
a. To collect user data without consent
b. To outline how user data is collected, used, and protected
c. To prevent users from accessing the website
d. To limit users' access to certain content

26. Which of the following is a digital responsibility when using public Wi-Fi networks?
a. Sharing personal and financial information freely
b. Connecting to public Wi-Fi without password protection
c. Avoiding the use of virtual private networks (VPNs)
d. Exercising caution and using encryption for sensitive data

27. What is "plagiarism" in the context of digital rights and responsibilities?


a. Properly citing and giving credit to original sources
b. Using someone else's work without permission or proper attribution
c. A type of online gaming
d. A way to protect your online identity

28. What is the primary focus of ethics?


a. Compliance with legal regulations c. Achieving financial success
b. Personal beliefs and values d. Enforcing societal norms

29. Which term refers to the principles or rules governing right conduct and behavior
a. Ethics c. Morals
b. Laws d. Conscience

30. Which term refers to a set of rules and regulations established by a government or authority?
a. Ethics c. Principles
b. Morals d. Laws
31. What may happen when a person's actions are legal but considered unethical?
a. The person is exempt from any consequences.
b. The person may face legal penalties.
c. The person's actions are always considered moral.
d. The person is praised for their behavior.

32. Which of the following statements is true regarding the relationship between ethics, morals,
and laws?
a. Laws are always based on ethics, which are always based on morals.
b. Laws may or may not align with ethics, and ethics may or may not align with personal
morals.
c. Ethics, morals, and laws are always identical and interchangeable.
d. Laws are solely based on personal morals.

33. What term describes the unauthorized copying, distribution, or use of copyrighted digital
content?
a. Piracy c. Plagiarism
b. Encryption d. Data compression

34. What does the term "phishing" refer to in digital computing?


a. A method of data compression
b. A type of software development
c. An attempt to trick individuals into revealing personal or sensitive information
d. A technique for securely deleting data

35. What is the fundamental difference between data and information?


a. Data is processed, while information is raw.
b. Data is unorganized, while information is organized.
c. Data is meaningful, while information is meaningless.
d. Data is a subset of information.

36. Which of the following best describes "data"


a. Processed facts and figures c. Information used for decision-making
b. Meaningful and organized facts and figures d. Raw facts and figures without context

37. When data is processed, organized, and presented in a meaningful context, what does it
become?
a. Big data c. Raw data
b. Information d. Knowledge

38. What does the term "digital literacy" encompass?


a. Knowing how to write cursive
b. Proficiency in using digital devices and technology
c. The ability to read printed books
d. Fluency in a foreign language

39. Which of the following is an example of a personal information technology device?


a. Espresso machine c. Toaster
b. Smartphone d. Refrigerator

40. What is the term for the act of intentionally spreading false information online with the intent
to damage a person's reputation or cause harm?
a. Hacking c. Cyberbullying
b. Identity theft d. Cyberspace
41. What do you call the interest, attitude and ability of individuals to appropriately use digital
technology and communication tools to assess, manage, integrate, analyze and evaluate
information, construct new knowledge, create and communicate with others?
a. Digital Technology c. Digital Crime
b. Digital Literacy d. Digital Interest

You might also like