0% found this document useful (0 votes)
26 views2 pages

Answer Key Geelec

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views2 pages

Answer Key Geelec

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1. What was the name of first computer designed by 10.

Which electronic components are used in First


Charles Babbage? Generation Computers?
a. Analytical Engine a. Transistors
b. Difference Engine b. Integrated Circuits
c. Colossus c. Vacuum Tubes
d. ENIAC d. Microprocessor
2. Which was the first electronics digital programmable 11. Which electronic components are used in Second
computing device? Generation Computers?
a. Analytical Engine a. Transistors
b. Difference Engine b. Integrated Circuits
c. Colossus c. Vacuum Tubes
d. ENIAC d. Microprocessor
3. EDVAC stands for __________? 12. Which electronic components are used in Third
a. Electronic Discrete Variable Automatic Calculator Generation Computers?
b. Electronic Discrete Variable Automatic Computer a. Transistors
c. Electronic Data Variable Automatic Calculator b. Integrated Circuits
d. Electronic Data Variable Automatic Computer c. Vacuum Tubes
4. Which was the first commercial computer? d. Microprocessor
a. Mark 1 13. Which electronic components are used in Fourth
b. Analytical Engine Generation Computers?
c. Difference Engine a. Transistors
d. Colossus b. Integrated Circuits
5. UNIVAC stands for __________? c. Vacuum Tubes
a. Universal Automatic Calculator d. Microprocessor
b. Universal Native Input Automatic computer 14. Which electronic components are used in Fifth
c. Universal Native Input Automatic calculator Generation Computers?
d. Universal Automatic Computer a. Transistors
6. ENIAC stands for __________? b. Integrated Circuits
a. Electronic Numerical Integrator And Computer c. Vacuum Tubes
b. Electronic Numerical Integrator And Calculator d. Microprocessor
c. Electronic Numerical Integrator Automatic 15. ENIAC Computer belongs to __________?
Computer a. First Generation Computers
d. Electronic Numerical Integrator Automatic b. Second Generation Computers
Calculator c. Third Generation Computers
7. John Mauchly and J. Presper Eckert are the inventors d. Fourth Generation Computers
of __________ computer. 16. What are the four examples of Web 2.0?
a. UNIAC  Social Networking
b. ENIAC  Blogs
c. EDSAC  Wikis
d. Mark 1  Video Sharing Sites
8. Who invented the punch card? 17. Who are the inventor/father of the internet and www?
a. Charles Babbage  Vincent Gray Cerf
b. Semen Korsakov  Bob Kahn
c. Herman Hollerith 18. Give at least 6 uses of the internet.
d. Joseph Marie Jacquard  Look for information
9. In the late _____, Herman Hollerith invented data  School works, jobs, and home purposes
storage on punched cards that could be read by a  Send and receive electronic mail
machine.  Video teleconferencing
a. 1860  Buy and sell product
b. 1900  Social networking
c. 1890 19. Define Web, Web 1.0, 2.0, and 3.0
d. 1880  Web – World Wide Web
 Web 1.0 – Read Only Static Web 9. It is one of the more common methods of both sending
 Web 2.0 – Read-Write Interactive Web information out and collecting it from unsuspecting
 Web 3.0 – Read-Write Intelligent Web people. Phishing
20. What are the different types of servers? 10. It is a set of rules for behaving properly online.
 Application Server Netiquette
 Web Server 11. A type of malware that restricts access to your
 Proxy Server computer or your files and displays a message that
 Mail Server demands payment for the restriction to be removed.
 File Server Ransomware
 Policy Server 12. A means to point you to a malicious and illegitimate
21. Give 5 types of websites and its features. website by redirecting the legitimate URL. Pharming
 Ecommerce Website – shopping 13. Worms are common threat to computer and the
 Entertainment Website – for entertainment internet as a whole.
 Portfolio Website – showing examples of past work 14. Action taken by someone to gain unauthorized access to
 Business Website – represent specific business a computer. Hacking
 Media Website – collect new stories 15. It encrypts files on your system’s hard drive and
22. What are the top-level domains? sometimes on shared network, drives, USB drives, and
 .com external hard drives and even some cloud storage drives
 .org preventing you from opening them. Encryption
 .net Ransomware
 .edu 16. They often come in the form of a free download and are
 .gov installed automatically with or without your consent.
23. What are the two types of ISP? Adware
 National ISP 17. A malicious program that is disguised as or embedded
 Regional ISP within legitimate software. Trojan Horse
24. DNS stands for? And give some examples. 18. Virtual listening in on your information that’s shared
 Domain Name System over an unsecured or not encrypted network. Wi-Fi
 .com, .org, .edu, .net, .gov, .ph, .au Eavesdropping
25. Give examples of browsers. 19. It is the proper way to communicate in an online
 Google Chrome environment. Netiquette
 Safari 20. Software that collects personal information about you
 Internet Explorer without you knowing. Spyware
 Opera
 Mozilla

1. Malware is a short term used for malicious software.


2. It displays an image that prevents you from accessing
your computer. Lockscreen Ransomware
3. Phishing is a common type of online fraud.
4. Netiquette is a short term used for internet etiquette.
5. The mass distribution of unsolicited messages,
advertising or pornography to addresses which can be
easily found on the internet. Spam
6. Malware and spyware are often used by third parties to
infiltrate your computer.
7. It is an executable file that will install itself and run
automatically once it’s downloaded. Trojan Horse
8. Malicious computer programs that are often sent as an
email attachment or a download with the intent of
infecting your computer. Viruses

You might also like