JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Final Exam January 2024
Sign in to Google
to save your progress.
Learn more
* Indicates required question
Email
*
Your email
What is digital literacy?
*
1 point
A. Having current knowledge about computers.
B. A person who is familiar with how to use technology.
C. A large and complex information source.
D. Capability to understand computer language.
Which of the following best describes all-in-one computer?
*
1 point
A. A chip that contains a central processing unit.
B. A term that describes the trend of computers and devices with technologies that overlap.
C. A thin, lightweight mobile computer that has a touch screen.
D. A type of computer that does not contain a tower.
A set of coded instructions that tell a computer or device what tasks to perform is referred to as the following EXCEPT
*
1 point
A. software
B. AUP
C. program
D. app
Which of the following is NOT a technique used to steal personal information?
*
1 point
A. Dumpster diving
B. Stealing
C. Texting
D. Phishing
_____ is a term that refers to the large and complex data sources that defy traditional data processing methods.
*
1 point
A. Convergence
B. Server
C. Big data
D. Data broker
Which of the following are the examples of mobile devices?
i. Tablet
ii. Smartphone
iii. e-reader
iv. Desktop
*
1 point
A. i, ii and iii
B . i. ii and iv
C. ii, iii and iv
D. I, iii and iv
The following are green computing efforts EXCEPT
*
1 point
A. donating computer equipment.
8. using paperless communication.
C. using videoconferencing for meetings.
D. not shutting down the computer when not using it to avoid using excess electricity to turn it on.
A server is ______________ .
*
1 point
A. an electronic device, operating under the control of instructions stored in its own memory
B. a collection of related webpages
C. a high-capacity computer the user accesses using the Internet or another network
D. a collection of computers and devices connected together
A _____ is a personal computer designed to be in a stationary location, where all of its components fit on or under a desk.
*
1 point
A. server
B. desktop
C. network
D. smartphone
The examples of game controllers are ____ .
i. Plotter
ii. Gamepad
iii. Wheel
iv. Joystick
*
1 point
A. i. ii and iv
B. ii, iii and iv
C. i, ii and iii.
D. All of the above
The following are computer outputs EXCEPT
*
1 point
A. video
B. graphics
C. text
D. command
MICR reader is a _______ .
*
1 point
A. device that reads text printed with magnetised ink.
B. device that uses radio signals to communicate with a tag placed on an object.
C. device that uses a light source to read characters, marks, and codes.
D. light-sensing input device.
Which of the following printer is suitable to print posters?
*
1 point
A. Large-format printer
B. Thermal printer
C. Label printer
D. Mobile printer
"A key that will alternate views or turn a feature 'on' or 'off' each time you press it". The
statement refers to _________ .
*
1 point
A. a toggle key
B. a keyboard shortcut
C. an ergonomic keyboard
D. function keys
Capacity is the number of _____ a storage medium can hold.
*
1 point
A. data
B . platter
C. bytes
D. RAM
Computers and mobile devices contain two (2) types of memory _____ memory does not lose its contents when the computer's power is turned off.
*
1 point
A. Non-volatile
B. Random
C. Permanent
D. Volatile
_____ is copyrighted and distributed at no cost for a trial period.
*
1 point
A. Saas
B. Shareware
C. Freeware
D. Open source
Choose the CORRECT match.
*
1 point
(Categories) Personal interest (Name of Software) Videoconference
(Categories) Productivity (Name of Software) Accounting
(Categories) Communications (Name of Software) Entertainment
(Categories) Security (Name of Software) PC maintenance
Firefox, Edge and Safari are the examples of ____ .
*
1 point
A. web browsing app
B. shopping app
C. location app
D. social media
Which of the following is NOT a graphic format used on the Web?
*
1 point
A. JPEG
B. GIF
C. TIFF
D. Multimedia.
A digital graphic is ____ .
*
1 point
A. a printed image or picture
B. a live action
C. an image people can see, store, and manipulate on a computer
D. a sound that is recorded as computer data
The app that allows you to track your workouts is ___ .
*
1 point
A. location sharing
B. fitness
C. counter
D. mapping
Columns and rows in a spreadsheet collectively are called a(n) ____ .
*
1 point
A. worksheet
B. data table
C. calculation
D. document
The function of _____ is to monitor the battery usage.
*
1 point
A. file management
B. power management
C. maintenance
D. disk cleanup
Siri is a feature of ___________.
*
1 point
A. Microsoft
B. LINUX
C. UNIX
D. macOS
Which of the following is FALSE?
*
1 point
Microsoft Office .docx (Word), xlsx (Excel)
Text file .asp, .xml
Webpaqe .htm, .html
Graphics .jpg, .png
Which of the following statement is CORRECT about Chrome OS?
*
1 point
A. It allows an operating system to temporarily store data on a storage medium until it can be swapped into RAM.
B. It will run on newer versions of an operating system.
C. Linux-based operating system designed to work primarily with web apps.
D. It enables a computer or device to run another operating system in addition to the one installed.
One of the operating systems functions is to ____ .
*
1 point
A. provide Microsoft Office software
B. provide GULs
C. establish Internet connection
D. protect processor from crash
Dania was messaging her friend via WhatsApp on her laptop. Her friend asked her to check the group project sent to her on WhatsApp. Dania downloaded the Microsoft Word file and opened it to review. The Microsoft Word file is known as ____ .
*
1 point
A. foreground
B. front end
C. background
D. back end
____ is NOT a desktop operating system.
*
1 point
A. UNIX
B. Linux
C. Windows
D. Google Assistant
Which of the following is a Web browser?
i. Mozilla Firefox
ii. Safari
iii. Opera
iv. Microsoft Edge
*
1 point
A. i, ii and iii
B. i, ii and iv
C. ii, iii and iv
D. All of the above
Choose the appropriate TLDs for military organisations.
*
1 point
A. .org
B . . mil
C. .net
D. .name
Which of the following best describes web server?
*
1 point
A. A website that gathers, organise, and then distributes web content.
B. A computer that delivers requested webpages to computer or mobile device.
C. A character, words or symbols that refine a search.
D. A term used to refer to the major carriers of network traffic.
Which of the following statement is CORRECT about blog?
*
1 point
A. A microblog allows users to publish short messages, usually less than 1000 characters.
B. Twitter is the example of video blog.
C. Blogger is referring to the author.
D. Web blog is a formal website.
A hashtag (#) allows users to ____ .
*
1 point
A. classify posts related to a particular topic
B. let a person or account to be notified of the post
C. add content from a person or page to his or her newsfeed
D. prevent others from seeing your posts on that social network
When a computer or device connects to a _____ , it is said to be online.
*
1 point
A. drive
B. network
C. camera
D. display
Long Term Evolution (LTE) is a network standard that defines _______ .
*
1 point
A. how to tap into home routers
B. how users connect to a network to exchange money
C. how to send signals and data through cables
D. how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications
The following statements are true about communication systems components, EXCEPT
*
1 point
Sending device - Initiates an instruction to transmit data, instructions, or information
Communication device - Connects the sending device to receiving device
Receiving device - Accepts the transmission of data, instructions, or information
Transmission media - Means by which data, instructions, or information travels
Internet is classified as a ___________ .
*
1 point
A. MAN
B. LAN
C. WAN
D. PAN
Debit card uses the ____ protocol to transmit data.
*
1 point
A. NFC
B. lrDA
C. Bluetooth
D. Wi-Fi
Choose the CORRECT Network Topology based on the picture below
*
1 point
A. Mesh network
B. Ring network
C. Star network
D. Bus network
The following statements discuss on a backup method.
• This method provides great flexibility.
• Users choose which folders and files to be included in a backup.
• The least manageable of all backup methods.
• Difficult to manage individual file backups.
Determine which backup method fits the descriptions above.
*
1 point
A. Full backup
B. Differential backup
C. Incremental backup
D. Selective backup
The descriptions belom refer to ______.
*
1 point
A. malware
B. spyware
C. virus
D. worm
A period of time during which an individual refrains from using technology is referred to as ____ .
*
1 point
A. digital detox
B. code of conduct
C. filtering
D. computer ethics
_____ are the moral guidelines that govern the use of computers, mobile devices, information systems and related technologies.
*
1 point
A. Technology ethics
B. Professional ethics
C. Netiquette
D. Information ethics
Which of the following statements is INCORRECT about password?
*
1 point
A. A combination of letters, numbers, and characters that only the user should know.
B. The weakness of a password is due to human memory.
C. Avoid using multiple passwords to reduce the risk that you might forget the password.
D. Passwords are one of the tools for authentication.
In the encryption process, the unencrypted, readable data is called ____ .
*
1 point
A. plaintext
B. ciphertext
C. digital certificate
D. encode
A group of compromised computers or mobile devices connected to a network and are used to attack other networks, usually for nefarious purposes, are called a ____ .
*
1 point
A. botnet
B. spyware
C. back door
D. malware
The following statements related to information privacy are true EXCEPT
*
1 point
A. Authentication is the process of ensuring that the person requesting access is not an imposter.
B. Passphrase is a numeric password.
C. Biometric security can be used for authentication.
D. Protecting your device from unauthorised access is one of the methods to secure your information privacy.
Which of the following is NOT a biometric security?
*
1 point
A. Facial recognition
B. Voice recognition
C. Hand geometric system
D. CAPTCHA
Which of the following is NOT related to a value proposition of FinTech?
*
1 point
A. New offering of financial products/services
B. Normal use of technology
C. New business models
D. New processes
Which of the following is NOT the potential problem in Cloud Computing?
*
1 point
A. Lower computer costs
B. Completely dependent on network
C. Cloud site failure
D. Sensitive information stored in Cloud
Editing documents or photos, sending email messages, and managing finances are common consumer tasks of _____ applications.
*
1 point
A. laaS
B. DaaS
C. Saas
D. PaaS
All of the following are threats to cloud computing EXCEPT
*
1 point
A. data integrity
B. virtualisation
C. confidentiality
D. truthfulness
Which of the following is NOT the risk associated with Fin Tech?
*
1 point
A. Cybercrime defense
B. Low volatility of transactions
C. Lack of government intervention
D. Crowdfunding
Trading in bitcoins gives the following benefits EXCEPT
*
1 point
A. transparency
B. global community
C. economic supremacy
D. opportunity for money laundering activities
Fin Tech has a bright prospect because of the following reasons EXCEPT
*
1 point
A. the explosion of funding activities in Fin Tech.
B. the increasing trend of the establishment of the Fin Tech company.
C. the growth in Fin Tech due to the increasing trend of mobile payment transactions.
D. The baby boomer's generation is being phased out.
Which of these is not a major type of cloud computing usage?
*
1 point
A. Hardware as a Service
B. Platform as a Service
C. Software as a Service
D. Infrastructure as a Service
Which of the following statements are CORRECT regarding the advantages banks have over FinTech?
i) There are history and trust that exist between banks and their customers.
ii) Banks have large market capitalization.
iii) Banks are more susceptible to turbulence and market volatility.
iv) Banks have large sales forces and customer service infrastructure.
*
1 point
A i, ii and iii
B. i, ii and iv
C. ii, iii and iv
D. All of the above
The emergence of FinTech is attributed to the following factors EXCEPT
*
1 point
A technology growth.
B. favourable regulatory environment.
C. demographic factors in the form of the rise of the millennials and Gen Zs who are more open to newer mediums and technologies.
D. expensive financial services.
Submit
Clear form
This content is neither created nor endorsed by Google. -
Terms of Service
-
Privacy Policy
Does this form look suspicious?
Report
Forms