1. What was the name of first computer designed by 10.
Which electronic components are used in First
Charles Babbage? Generation Computers?
a. Analytical Engine a. Transistors
b. Difference Engine b. Integrated Circuits
c. Colossus c. Vacuum Tubes
d. ENIAC d. Microprocessor
2. Which was the first electronics digital programmable 11. Which electronic components are used in Second
computing device? Generation Computers?
a. Analytical Engine a. Transistors
b. Difference Engine b. Integrated Circuits
c. Colossus c. Vacuum Tubes
d. ENIAC d. Microprocessor
3. EDVAC stands for __________? 12. Which electronic components are used in Third
a. Electronic Discrete Variable Automatic Calculator Generation Computers?
b. Electronic Discrete Variable Automatic Computer a. Transistors
c. Electronic Data Variable Automatic Calculator b. Integrated Circuits
d. Electronic Data Variable Automatic Computer c. Vacuum Tubes
4. Which was the first commercial computer? d. Microprocessor
a. Mark 1 13. Which electronic components are used in Fourth
b. Analytical Engine Generation Computers?
c. Difference Engine a. Transistors
d. Colossus b. Integrated Circuits
5. UNIVAC stands for __________? c. Vacuum Tubes
a. Universal Automatic Calculator d. Microprocessor
b. Universal Native Input Automatic computer 14. Which electronic components are used in Fifth
c. Universal Native Input Automatic calculator Generation Computers?
d. Universal Automatic Computer a. Transistors
6. ENIAC stands for __________? b. Integrated Circuits
a. Electronic Numerical Integrator And Computer c. Vacuum Tubes
b. Electronic Numerical Integrator And Calculator d. Microprocessor
c. Electronic Numerical Integrator Automatic 15. ENIAC Computer belongs to __________?
Computer a. First Generation Computers
d. Electronic Numerical Integrator Automatic b. Second Generation Computers
Calculator c. Third Generation Computers
7. John Mauchly and J. Presper Eckert are the inventors d. Fourth Generation Computers
of __________ computer. 16. What are the four examples of Web 2.0?
a. UNIAC Social Networking
b. ENIAC Blogs
c. EDSAC Wikis
d. Mark 1 Video Sharing Sites
8. Who invented the punch card? 17. Who are the inventor/father of the internet and www?
a. Charles Babbage Vincent Gray Cerf
b. Semen Korsakov Bob Kahn
c. Herman Hollerith 18. Give at least 6 uses of the internet.
d. Joseph Marie Jacquard Look for information
9. In the late _____, Herman Hollerith invented data School works, jobs, and home purposes
storage on punched cards that could be read by a Send and receive electronic mail
machine. Video teleconferencing
a. 1860 Buy and sell product
b. 1900 Social networking
c. 1890 19. Define Web, Web 1.0, 2.0, and 3.0
d. 1880 Web – World Wide Web
Web 1.0 – Read Only Static Web 9. It is one of the more common methods of both sending
Web 2.0 – Read-Write Interactive Web information out and collecting it from unsuspecting
Web 3.0 – Read-Write Intelligent Web people. Phishing
20. What are the different types of servers? 10. It is a set of rules for behaving properly online.
Application Server Netiquette
Web Server 11. A type of malware that restricts access to your
Proxy Server computer or your files and displays a message that
Mail Server demands payment for the restriction to be removed.
File Server Ransomware
Policy Server 12. A means to point you to a malicious and illegitimate
21. Give 5 types of websites and its features. website by redirecting the legitimate URL. Pharming
Ecommerce Website – shopping 13. Worms are common threat to computer and the
Entertainment Website – for entertainment internet as a whole.
Portfolio Website – showing examples of past work 14. Action taken by someone to gain unauthorized access to
Business Website – represent specific business a computer. Hacking
Media Website – collect new stories 15. It encrypts files on your system’s hard drive and
22. What are the top-level domains? sometimes on shared network, drives, USB drives, and
.com external hard drives and even some cloud storage drives
.org preventing you from opening them. Encryption
.net Ransomware
.edu 16. They often come in the form of a free download and are
.gov installed automatically with or without your consent.
23. What are the two types of ISP? Adware
National ISP 17. A malicious program that is disguised as or embedded
Regional ISP within legitimate software. Trojan Horse
24. DNS stands for? And give some examples. 18. Virtual listening in on your information that’s shared
Domain Name System over an unsecured or not encrypted network. Wi-Fi
.com, .org, .edu, .net, .gov, .ph, .au Eavesdropping
25. Give examples of browsers. 19. It is the proper way to communicate in an online
Google Chrome environment. Netiquette
Safari 20. Software that collects personal information about you
Internet Explorer without you knowing. Spyware
Opera
Mozilla
1. Malware is a short term used for malicious software.
2. It displays an image that prevents you from accessing
your computer. Lockscreen Ransomware
3. Phishing is a common type of online fraud.
4. Netiquette is a short term used for internet etiquette.
5. The mass distribution of unsolicited messages,
advertising or pornography to addresses which can be
easily found on the internet. Spam
6. Malware and spyware are often used by third parties to
infiltrate your computer.
7. It is an executable file that will install itself and run
automatically once it’s downloaded. Trojan Horse
8. Malicious computer programs that are often sent as an
email attachment or a download with the intent of
infecting your computer. Viruses