Document Details
Uploaded by Deleted User
Full Transcript
### Lesson 1: Information and Communication Technology (ICT) **Q5: Which of the following is a benefit of ICT in education?** - **A:** - a) Increased administrative workload for teachers. - b) Faster grading and feedback through online systems. - c) Reduced learning resources for students...
### Lesson 1: Information and Communication Technology (ICT) **Q5: Which of the following is a benefit of ICT in education?** - **A:** - a) Increased administrative workload for teachers. - b) Faster grading and feedback through online systems. - c) Reduced learning resources for students. - **Answer:** **b) Faster grading and feedback through online systems.** **Q6: What is a key advantage of cloud storage in ICT?** - **A:** - a) Data can only be accessed on one device. - b) It is a free service for all users. - c) Files can be accessed from any internet-connected device. - **Answer:** **c) Files can be accessed from any internet-connected device.** **Q7: In which sector has ICT notably increased transparency and accountability?** - **A:** - a) Construction. - b) Healthcare. - c) Government. - **Answer:** **c) Government.** --- ### Lesson 2: Evolution of Information Technology **Q4: Who invented the punched card system, and what was its primary use?** - **A:** - a) Herman Hollerith; to store and process data for the U.S. Census. - b) Charles Babbage; for advanced mathematical calculations. - c) Blaise Pascal; for early encryption methods. - **Answer:** **a) Herman Hollerith; to store and process data for the U.S. Census.** **Q5: What was the ENIAC primarily used for after its invention?** - **A:** - a) Stock market analysis. - b) Military calculations during World War II. - c) Calculating weather patterns. - **Answer:** **b) Military calculations during World War II.** **Q6: Which early computer was the first to use stored programs?** - **A:** - a) IBM PC. - b) Manchester Baby. - c) Harvard Mark I. - **Answer:** **b) Manchester Baby.** --- ### Lesson 3: The Web and the Internet **Q4: What is an IP address?** - **A:** - a) A unique identifier for each device on a network. - b) A code for accessing websites faster. - c) A method for encrypting online communications. - **Answer:** **a) A unique identifier for each device on a network.** **Q5: What is the role of a search engine?** - **A:** - a) A tool for storing large data files. - b) A system that organizes, retrieves, and displays information based on keywords. - c) A website for hosting personal blogs. - **Answer:** **b) A system that organizes, retrieves, and displays information based on keywords.** **Q6: Which protocol is commonly used to ensure secure data transfer on the web?** - **A:** - a) FTP (File Transfer Protocol). - b) HTTPS (Hypertext Transfer Protocol Secure). - c) SMTP (Simple Mail Transfer Protocol). - **Answer:** **b) HTTPS (Hypertext Transfer Protocol Secure).** --- ### Lesson 4: Netiquette and Computer Ethics **Q4: What is considered poor netiquette when participating in online discussions?** - **A:** - a) Responding thoughtfully to others’ comments. - b) Sharing relevant resources with the group. - c) Sending frequent, off-topic messages or spamming. - **Answer:** **c) Sending frequent, off-topic messages or spamming.** **Q5: Which of the following violates the Ten Commandments of Computer Ethics?** - **A:** - a) Sharing a legally purchased software license with a friend. - b) Logging out of a shared device after use. - c) Giving credit when using online resources in presentations. - **Answer:** **a) Sharing a legally purchased software license with a friend.** **Q6: Why should personal information be protected online?** - **A:** - a) To avoid receiving useful advertisements. - b) To reduce the risk of identity theft and misuse of information. - c) To keep personal information in the public domain. - **Answer:** **b) To reduce the risk of identity theft and misuse of information.** Here are 10-15 questions each based on Lessons 1-4 from your material. Each question includes four choices, with the correct answer indicated in bold. --- ### **Lesson 1: Information and Communication Technology (ICT)** **Q1: What is a primary use of ICT in education?** - a) Replacing in-person teaching completely. - b) Communicating information, creating, storing, and managing it. - c) Encouraging students to avoid technology. - d) Limiting access to online resources. - **Answer:** **b) Communicating information, creating, storing, and managing it.** **Q2: Which of the following sectors uses ICT for tracking inventory and creating reports?** - a) Retail - b) Social Media - c) Military - d) Government - **Answer:** **a) Retail** **Q3: How does ICT benefit students in remote areas?** - a) By providing access to expert teachers and learning resources. - b) By reducing available educational resources. - c) By limiting access to online databases. - d) By monitoring their personal information. - **Answer:** **a) By providing access to expert teachers and learning resources.** **Q4: In which sector is ICT most useful for creating and maintaining health records?** - a) Arts - b) Banking - c) Healthcare - d) Marketing - **Answer:** **c) Healthcare** **Q5: Which of the following is NOT a benefit of ICT in business?** - a) Inventory tracking - b) Project management - c) Real-time meetings - d) Reduction of available products - **Answer:** **d) Reduction of available products** **Q6: What technology does ICT use in navigation?** - a) Virtual Reality - b) GPS - c) Web servers - d) Cloud storage - **Answer:** **b) GPS** **Q7: ICT allows people to communicate in real-time through which method?** - a) Email - b) Physical mail - c) Real-time chat - d) SMS - **Answer:** **c) Real-time chat** **Q8: What is a positive impact of ICT on society?** - a) Increased job loss - b) Reduced access to information - c) Enhanced security - d) Reduced physical activity - **Answer:** **c) Enhanced security** **Q9: What is a common negative impact of ICT on personal interaction?** - a) It increases in-person communication. - b) It leads to job creation. - c) It reduces physical activity. - d) It enhances community engagement. - **Answer:** **c) It reduces physical activity.** **Q10: Which application of ICT involves monitoring heart rate and blood pressure?** - a) Government - b) Healthcare - c) Military - d) Education - **Answer:** **b) Healthcare** --- ### **Lesson 2: Evolution of Information Technology** **Q1: What device, created in 2400 BC, is known as the earliest computing tool?** - a) Slide Rule - b) Napier’s Bones - c) Abacus - d) Pascaline - **Answer:** **c) Abacus** **Q2: Who is known as the Father of Computers?** - a) Charles Babbage - b) John Napier - c) Gottfried Wilhelm Leibniz - d) Blaise Pascal - **Answer:** **a) Charles Babbage** **Q3: What was the primary purpose of the Jacquard Loom?** - a) To solve mathematical equations - b) To weave patterns in textiles - c) To calculate taxes - d) To store information - **Answer:** **b) To weave patterns in textiles** **Q4: What major contribution did Lady Ada Lovelace make to computing?** - a) Invented the abacus - b) Created the first computer program - c) Developed the Jacquard Loom - d) Introduced the ENIAC computer - **Answer:** **b) Created the first computer program** **Q5: The first commercially successful calculating machine was the:** - a) Jacquard Loom - b) Arithmometer - c) Stepped Reckoner - d) Abacus - **Answer:** **b) Arithmometer** **Q6: What advancement characterizes the second generation of computers?** - a) Use of vacuum tubes - b) Use of transistors - c) Use of silicon chips - d) Use of microprocessors - **Answer:** **b) Use of transistors** **Q7: Who developed the first electronic general-purpose computer?** - a) Konrad Zuse - b) John Presper Eckert and John Mauchly - c) Charles Babbage - d) Vinton Cerf - **Answer:** **b) John Presper Eckert and John Mauchly** **Q8: The Analytical Engine, designed by Charles Babbage, was known for:** - a) Enabling arithmetic operations - b) Becoming the first digital computer - c) Storing information for the first time - d) Being the first programmable computer - **Answer:** **d) Being the first programmable computer** **Q9: What replaced vacuum tubes in second-generation computers?** - a) Integrated Circuits - b) Microprocessors - c) Semiconductors - d) Transistors - **Answer:** **d) Transistors** **Q10: The term "Artificial Intelligence" is associated with which generation of computers?** - a) First - b) Second - c) Fourth - d) Fifth - **Answer:** **d) Fifth** --- ### **Lesson 3: The Web and the Internet** **Q1: Who is credited with inventing the World Wide Web?** - a) Vinton Cerf - b) Bob Kahn - c) Tim Berners-Lee - d) Charles Babbage - **Answer:** **c) Tim Berners-Lee** **Q2: Which term describes the first stage of the web where users could only read content?** - a) Web 1.0 - b) Web 2.0 - c) Web 3.0 - d) Web 4.0 - **Answer:** **a) Web 1.0** **Q3: What is Web 2.0 commonly known for?** - a) Static content - b) Only business use - c) User interaction and collaboration - d) Limited to HTML only - **Answer:** **c) User interaction and collaboration** **Q4: In what year did the word "Internet" begin being used?** - a) 1969 - b) 1982 - c) 1991 - d) 1986 - **Answer:** **b) 1982** **Q5: What is the purpose of the DNS?** - a) To provide internet service - b) To translate domain names to IP addresses - c) To store multimedia files - d) To provide cloud storage - **Answer:** **b) To translate domain names to IP addresses** **Q6: Which type of website allows users to directly make purchases?** - a) Nonprofit website - b) eCommerce website - c) Portfolio website - d) Educational website - **Answer:** **b) eCommerce website** **Q7: Web 3.0 is also known as the:** - a) Static Web - b) Semantic Web - c) Interactive Web - d) Video Web - **Answer:** **b) Semantic Web** --- ### **Lesson 4: Netiquette and Computer Ethics** **Q1: What does "netiquette" refer to?** - a) Proper online behavior - b) Website design guidelines - c) Data privacy laws - d) System security measures - **Answer:** **a) Proper online behavior** **Q2: What is one of the main rules of netiquette?** - a) Always use complex words - b) Respect others’ viewpoints - c) Avoid using complete sentences - d) Copy information freely - **Answer:** **b) Respect others’ viewpoints** **Q3: Which commandment of computer ethics states that you should not abuse your power?** - a) Rule 5 - b) Rule 8 - c) Rule 9 - d) Rule 10 - **Answer:** **c) Rule 9** **Q4: Which of the following is a good netiquette practice when writing emails?** - a) Use excessive emojis. - b) Avoid proofreading. - c) Check grammar and spelling. - d) Write in all caps. - **Answer:** **c) Check grammar and spelling.** **Q5: Sharing private messages without permission violates which netiquette guideline?** - a) Proofreading - b) Avoiding slang - c) Sharing expert knowledge - d) Respecting privacy - **Answer:** **d) Respecting privacy** **Q6: Which rule of netiquette reminds users that all online interactions involve real people?** - a) Rule 1 - b) Rule 4 - c) Rule 6 - d) Rule 10 - **Answer:** **a) Rule 1**