Advanced Computer Quiz PDF
Document Details
Uploaded by CoolestNash7146
Cagayan State University
Tags
Summary
This quiz covers topics related to computer science, including issues and trends in ICT, computer ethics, and software/hardware technology trends. It contains questions designed to test understanding of fundamental computer science concepts as well as specific technologies.
Full Transcript
ADVANCED COMPUTER QUIZ I. ISSUES AND TRENDS IN ICT 1. It is the method of communication that allows users to create, share, and exchange ideas through virtual communities and networks. Answer: Social Media 2. Give one type of ICT addiction Answer: Internet, Gaming, Social Media,...
ADVANCED COMPUTER QUIZ I. ISSUES AND TRENDS IN ICT 1. It is the method of communication that allows users to create, share, and exchange ideas through virtual communities and networks. Answer: Social Media 2. Give one type of ICT addiction Answer: Internet, Gaming, Social Media, Online Shopping Addiction 3. What are the 3 types of convergence in ICT? Answer: Technological Convergence, Media Convergence, and Network Convergence 4. Why is it important for professionals across different industries to stay informed about the latest trends in the ICT industry? Answer: Helps understand potential improvements and developments regardless of their work. 5. How does assistive technology help people with disabilities? Answer: Assistive technology helps people with disabilities by providing tools that make it easier for them to do everyday tasks. This can help them become more independent and participate more fully in their daily lives, whether at school, work, or home. 6. It is an illegal activity that involves a computer or a network. It can range from simple hacking to complex financial fraud and identity theft. Answer: Cybercrime 7. Identify the technology that has evolved from basic call and texting functions to multifunctional devices supporting navigation, internet browsing, gaming, and video conferencing. Answer: Mobile technology 8. What causes the erosion of social and interpersonal skills? Answer: Overreliance on digital communication 9. How can excessive use of technology can impact our health? Possible answers: Excessive use of technology can impact health; 'mental health/neck and shoulder problems/vision problems'. 10. What is the difference between trends and issues? Answer: Trends focus on the positive progress, while issues focus on the negative side. II. COMPUTER ETHICS-ACM 1. The term “plagiarism” originates from the Latin word plagium, which means? Answer: Kidnapping/Kidnapper 2. What is RA 10173 also known for? Answer: Data Privacy Act of 2012 3. When was the ACM established? Answer: September 15, 1947 4. Who is the co-founder of ACM? Answer: Edmund Berkeley 5. Set of moral standards used to address ethical problems and develop guidelines, to promote ethical behavior and responsibility in using computers and technology Answer: Computer Ethics 6. Give at least two examples of Privacy Concern Answer: Malware, Anonymity, Data Privacy, Hacking 7. Give an example of Intellectual property rights? Answer: Software hacking, Copyright, Plagiarism, Software license 8. What does ACM stand for? Answer: Association for Computing Machinery 9. Where was the first meeting of ACM held? Answer: Colombia University, New York City, USA 10. Give 1 Positive and 1 Negative effects of computer in society. Answer: +: Economic Growth, Access to Information, Enhanced Communication -: Job Displacement, Mental Health Issues, Dependence and Reduce Skills III. SOFTWARE AND HARWARE TECH TREND 1. What does encryption do to data? A. It splits the data into smaller services for better performance. B. It hides the data in containers to prevent unauthorized access. C. It locks data with a key so only authorized users can access it. D. It allows data to run smoothly across multiple platforms. 2. What are two applications of AI-driven software or AI-machine? A. Predictive analytics and automation B. Video editing and graphic design C. Cooking recipes and gardening tips D. Social media marketing and event planning 3. Which of the following statements best describes the impact of augmented reality and low-code platforms on industries and communication? A. They only focus on enhancing traditional coding practices. B. They reduce the need for any technical skills in industries. C. They facilitate faster development and improve collaboration of hardware and software tech trends. D. They are primarily used for entertainment purposes only. 4. What is a significant benefit of edge computing? A. Increased latency B. Local data processing C. Increased bandwidth use 5. It is one the application of AI ACCELERATOR. A. Computer mission B. Computer policy C. Computer vision 6. Solid-state batteries are being developed to address limitations in traditional batteries. Which of the following is a direct benefit of this innovation? A. Reduced hardware costs B. Longer battery life and faster charging times C. Increased dependency on fossil fuels D. Less reliable energy storage 7. What wireless technology uses higher frequency bands to achieve faster speeds and greater capacity? Answer: 5G technology 8. Technology that records transactions in a secure way. Answer: Blockchain Technology 9. It is an innovation in battery technology like solid-state batteries. Answer: Advanced Battery 10. "Engagement is one of the key principles in quantum mechanics" Correct the statement above. Answer: Entanglement is one of the key principles in quantum mechanics IV. INTERNET OF THINGS 1. Refers to the interconnected network of physical objects embedded with sensors, software, and other technologies to collect and exchange data over the internet. Answer: Internet of Things 2. Refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers. Answer: MITM Attacks 3. Refer to threats that target vulnerabilities in web-based applications. Answer: Web Attacks 4. Occurs when a malicious actor sends emails that seem to be coming from trusted, legitimate sources in an attempt to grab sensitive information from the target. Answer: Phishing Attacks 5. attacks that vast array of malware-infected host machines controlled by the attacker. Answer: DoS and DDoS Attacks 6. IoT drives new technological developments. Examples are smart cities with intelligent traffic systems that reduce congestion, or smart homes where appliances can be controlled remotely. Answer: Internet of Things for Innovation 7. Any such assault on an IoT gadget or organization. It can possibly contaminate your gadgets with malware Answer: IOT Attacks 8. Often rely on low-power processors, making them vulnerable to side-channel attacks, where hackers can gather information from the physical characteristics of the device's operation, such as power consumption or electromagnetic emissions, to infer sensitive data. Answer: Side-channel Attacks 9. IoT devices typically run on embedded firmware, which can contain security flaws. Answer: Firmware Vulnerabilities 10. IoT devices generate and transmit vast amounts of data, including personal, health, and location information. If security vulnerabilities exist, hackers can intercept and steal this sensitive data, leading to privacy violations, identity theft, or even industrial espionage. Answer: Data Breaches