INFORMATION TECHNOLOGY PART 2

INFORMATION TECHNOLOGY PART 2
50問 • 1年前
  • Lha Eva Adajar
  • 通報

    問題一覧

  • 1

    101.It is a company network accessible by authorized outsiders. a) Internet b) Intranet c) Extranet d) Virtual Private Network

    c

  • 2

    102.Data is sent in time to be delivered at the time it is needed. a) Synchronous transmission b) Asynchronous transmission c) Isochronous transmission d) Full-Duplex transmission

    c

  • 3

    103.Messages are separated into small units called packets and travel along the network separately; packets are reassembled once destination is reached a) Circuit switching b) Packet Switching c) Broadcasting d) None of the above

    b

  • 4

    104.Which cable is used for telephone and network connection? a) Twisted-pair cable b) Coaxial cable c) Fiber-optic cable d) None of the above

    A

  • 5

    105.Which cable is used for computer networks and cable television delivery? a) Twisted-pair cable b) Coaxial cable c) Fiber-optic cable d) None of the above

    b

  • 6

    106.Which cable utilizes hundreds of thin transparent clear glass or plastic fibers over which lasers transmit data as light and is used for high-speed communications? a) Twisted-pair cable b) Coaxial cable c) Fiber-optic cable d) None of the above

    c

  • 7

    107.TCP is the most widely used communications protocol. Which protocol is responsible for the delivery of data? a) TCP b) IP c) Both TCP and IP d) None of the Above

    a

  • 8

    108.TCP is the most widely used communications protocol. Which protocol provides address and routing information? a) TCP b) IP c) Both TCP and IP d) None of the Above

    b

  • 9

    109.Which search operator is used to compare? a) filetype: c) define: b) define: d) vs

    d

  • 10

    110.ISRS stands for : a) Information Storage and Retrieval Server b) Information Storage and Renewal Server c) Information Storage and Retrieval System d) Information Storage and Renewal System

    c

  • 11

    111.Protocol used to share files through the web a) FTPS b) HTTP c) FTP d) HTTPS

    c

  • 12

    112.Search engine that is most popular in China a) DuckDuckGo b) Baidu c) Bing d) Yahoo

    B

  • 13

    113.Which search operator is used to search word definitions? a) define: b) meaning: c) expound: d) site:

    a

  • 14

    114.Below are disadvantages of a mesh topology except a) Below are disadvantages of a mesh topology except b) Lots of cabling is required c) Lots of network redundancy d) Scalability depends on the capacity of the central bus and the cable type

    d

  • 15

    115.Which of the following is not true? a) The hub connects two devices b) The bridge can filter content c) The bridge connects LANs d) The hub is not intelligent

    b

  • 16

    116.Everything listed below is true for netiquette except a) Refusing cultural differences b) Refusing to empower abuse and harassment while online c) Recognize that the internet is an extension of society d) Apply the same standards online as we do in public

    a

  • 17

    117.Which search operator is used for price? a) “ “ b) * c) PHP d) #

    c

  • 18

    118.IT trend that allows a client to access the library at any given time a) Virtual Reality b) RFID Technology c) Streaming Services d) Open Libraries

    d

  • 19

    119.Which of the following is not true? a) The Internet connects different network of computers together b) The internet has an unlimited number of users c) The internet is accessible to anyone d) The Internet is safe as compared to the intranet

    d

  • 20

    120. A server that contains, sends and receives electronic mail a) Web b) Mail c) DHCP d) DNS

    B

  • 21

    121.Below are advantages of a mesh topology except a) Heavily dependent on the network medium b) Can handle heavy traffic c) No single point of failure d) Easy to identify faults

    a

  • 22

    122.Below are advantages of a star topology except a) Simplicity of operation b) Easy to detect faults c) Lots of network redundancy d) Can handle heavy traffic

    c

  • 23

    123.Search engine that does not track its users a) Yahoo b) AOL c) Bing d) DuckDuckGo

    d

  • 24

    124.Which network does not belong to the group? a) Local Area Network b) Wide Area Network c) Wired Network d) Metropolitan Area Network

    c

  • 25

    125.DBMS stands for a) Database Monitoring Server b) Database Management Server c) Database Monitoring System d) Database Management System

    d

  • 26

    126.At what distance is a Single Mode Fiber-optic cable used? a) 1.5 kilometers b) 2 kilometers c) 3 kilometers d) 1 kilometer

    c

  • 27

    127.Place search results can be filtered by the following except a) Price b) Time c) Rating d) Cuisine

    b

  • 28

    128.Protocol used to display web pages securely a) FTP b) FTPS c) HTTP d) HTTPS

    d

  • 29

    129.Who created the World Wide Web? a) Vinton Cerf b) Marc Andersen c) Tim Berners-Lee d) Robert Morris

    c

  • 30

    130.Who was considered as one of the Fathers of Internet? a) Vinton Cerf b) Marc Andreessen c) Tim Berners-Lee d) Robert Morris

    a

  • 31

    131.Who released the first web browser? a) Vinton Cerf b) Marc Andreessen c) Tim Berners-Lee d) Robert Morri

    b

  • 32

    132.What is the first web browser? a) Netscape b) Mosaic c) America On-Line (AOL) d) Internet Explorer

    b

  • 33

    133.It is a library of resources available to computer users through the global Internet. It enables users to view a wide variety of information, including magazine archives, public and college library resources, and current world and business news. a) Database b) Ethernet c) World Wide Web d) Online Public Access Catalog (OPAC)

    c

  • 34

    134.In Microsoft Access, it is a tool that allows you to automate tasks and add functionality to your forms, reports, and controls. For example, if you add a command button to a form, you associate the button's OnClick event to a macro, and the macro contains the commands that you want the button to perform each time it is clicked. a) Queries b) Forms c) Macros d) Tables

    c

  • 35

    135. The programming language used in Microsoft Access a) VBA b) C++ c) JavaScript d) MySQL

    A

  • 36

    136.Academic Libraries Book Acquisition Systems Association, Inc. is a network of agencies and institutions engaged in health research and development in the Central Visayas started with 13 original members. Who was the first ALBASA manager? a) Diosdado David b) Eva Brillo c) Fr. Rafael Boromeo d) Nela Serrato

    b

  • 37

    137.Refers to a set of moral rules or a code of behaviour applied to the online environment. As a responsible netizen, you should observe these rules to help make cyberspace a safe place. a) Netiquette b) Computer Ethics c) Technology Ethics d) Social Etiquette

    a

  • 38

    138.It is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. a) Hacking b) DDoS attack c) Phishing d) SYN Flood

    b

  • 39

    139.With the increase of people creating contents on Youtube, many are interested on how to reach more audience and increase viewers. Many refer to this as something that works behind the scene on how contents are being advertised, arranged and presented on the platform. a) Advertisement b) Clickbait c) Algorithm d) Subscribers

    c

  • 40

    140.Microblogging is a type of blog that lets users publish short text updates. Bloggers can usually use a number of service for the updates including instant messaging, e-mail, or Twitter. The posts are called microposts, while the act of using these services to update your blog is called microblogging. Another example of microblog is evident in the following except; a) Facebook b) Instagram c) Tumbler d) Wordpress

    d

  • 41

    141.What is the most basic language Microsoft made? a) DirectX b) Batch c) C++ d) Visual Basic

    d

  • 42

    142.It is an electronic device capable of performing complex computations in a short time. a) Application b) Operating system c) Computer d) Software

    c

  • 43

    143.It is an 8-bit character encoding (code page) used on IBM mainframe operating systems. a) ASCII b) UNICODE c) EBCDIC d) UNIX

    c

  • 44

    144.A part of computer that stores applications, documents and system operating information a) Memory b) Central Processing Unit c) Hard Disk d) Data Disk

    a

  • 45

    145.It is a methodology that is typically used to develop, maintain and replace information systems for improving the quality of the software design and development process. a) System Life Cycle b) Software Licensing Development Cycle c) Program Life Cycle d) Software Development Life Cycle

    d

  • 46

    146.What is the correct way of making a header in HTML? a) <head> text </head> b) <header> text </header> c) <h> text </h> d) <h1> text </h1>

    d

  • 47

    147.Which of the following is the correct way of making a string in Java? a) String "Text"; b) String text = 'text'; c) String text = "text" d) String text = "text";

    d

  • 48

    148.Which of the following is the correct way to use the standard namespace in C++? a) Using namespace std; b) Using namespace standard; c) Using standard namespace; d) Standard namespace used;

    A

  • 49

    149.What does &nbsp mean? a) No Border Space Padding b) Non-Breaking Space c) No Between Spaces d) Non-Bordered Space Padding

    B

  • 50

    150.In HTML, how do you insert a link? a) <a><href=”link”></a> b) <ahref=”link”></ahref> c) <a href=”link”></a> d) <ahref>link</a>

    c

  • ABSTRACTING

    ABSTRACTING

    Lha Eva Adajar · 61問 · 1年前

    ABSTRACTING

    ABSTRACTING

    61問 • 1年前
    Lha Eva Adajar

    ABSTRACTING QUESTIONNAIRE #2

    ABSTRACTING QUESTIONNAIRE #2

    Lha Eva Adajar · 79問 · 1年前

    ABSTRACTING QUESTIONNAIRE #2

    ABSTRACTING QUESTIONNAIRE #2

    79問 • 1年前
    Lha Eva Adajar

    ABSTRACTING AND INDEXING PART 1

    ABSTRACTING AND INDEXING PART 1

    Lha Eva Adajar · 100問 · 1年前

    ABSTRACTING AND INDEXING PART 1

    ABSTRACTING AND INDEXING PART 1

    100問 • 1年前
    Lha Eva Adajar

    ABSTRACTING AND INDEXING PART 2

    ABSTRACTING AND INDEXING PART 2

    Lha Eva Adajar · 50問 · 1年前

    ABSTRACTING AND INDEXING PART 2

    ABSTRACTING AND INDEXING PART 2

    50問 • 1年前
    Lha Eva Adajar

    INFORMATION TECHNOLOGY PART 1

    INFORMATION TECHNOLOGY PART 1

    Lha Eva Adajar · 100問 · 1年前

    INFORMATION TECHNOLOGY PART 1

    INFORMATION TECHNOLOGY PART 1

    100問 • 1年前
    Lha Eva Adajar

    SELECTION AND ACQUISITION PART 1

    SELECTION AND ACQUISITION PART 1

    Lha Eva Adajar · 100問 · 1年前

    SELECTION AND ACQUISITION PART 1

    SELECTION AND ACQUISITION PART 1

    100問 • 1年前
    Lha Eva Adajar

    問題一覧

  • 1

    101.It is a company network accessible by authorized outsiders. a) Internet b) Intranet c) Extranet d) Virtual Private Network

    c

  • 2

    102.Data is sent in time to be delivered at the time it is needed. a) Synchronous transmission b) Asynchronous transmission c) Isochronous transmission d) Full-Duplex transmission

    c

  • 3

    103.Messages are separated into small units called packets and travel along the network separately; packets are reassembled once destination is reached a) Circuit switching b) Packet Switching c) Broadcasting d) None of the above

    b

  • 4

    104.Which cable is used for telephone and network connection? a) Twisted-pair cable b) Coaxial cable c) Fiber-optic cable d) None of the above

    A

  • 5

    105.Which cable is used for computer networks and cable television delivery? a) Twisted-pair cable b) Coaxial cable c) Fiber-optic cable d) None of the above

    b

  • 6

    106.Which cable utilizes hundreds of thin transparent clear glass or plastic fibers over which lasers transmit data as light and is used for high-speed communications? a) Twisted-pair cable b) Coaxial cable c) Fiber-optic cable d) None of the above

    c

  • 7

    107.TCP is the most widely used communications protocol. Which protocol is responsible for the delivery of data? a) TCP b) IP c) Both TCP and IP d) None of the Above

    a

  • 8

    108.TCP is the most widely used communications protocol. Which protocol provides address and routing information? a) TCP b) IP c) Both TCP and IP d) None of the Above

    b

  • 9

    109.Which search operator is used to compare? a) filetype: c) define: b) define: d) vs

    d

  • 10

    110.ISRS stands for : a) Information Storage and Retrieval Server b) Information Storage and Renewal Server c) Information Storage and Retrieval System d) Information Storage and Renewal System

    c

  • 11

    111.Protocol used to share files through the web a) FTPS b) HTTP c) FTP d) HTTPS

    c

  • 12

    112.Search engine that is most popular in China a) DuckDuckGo b) Baidu c) Bing d) Yahoo

    B

  • 13

    113.Which search operator is used to search word definitions? a) define: b) meaning: c) expound: d) site:

    a

  • 14

    114.Below are disadvantages of a mesh topology except a) Below are disadvantages of a mesh topology except b) Lots of cabling is required c) Lots of network redundancy d) Scalability depends on the capacity of the central bus and the cable type

    d

  • 15

    115.Which of the following is not true? a) The hub connects two devices b) The bridge can filter content c) The bridge connects LANs d) The hub is not intelligent

    b

  • 16

    116.Everything listed below is true for netiquette except a) Refusing cultural differences b) Refusing to empower abuse and harassment while online c) Recognize that the internet is an extension of society d) Apply the same standards online as we do in public

    a

  • 17

    117.Which search operator is used for price? a) “ “ b) * c) PHP d) #

    c

  • 18

    118.IT trend that allows a client to access the library at any given time a) Virtual Reality b) RFID Technology c) Streaming Services d) Open Libraries

    d

  • 19

    119.Which of the following is not true? a) The Internet connects different network of computers together b) The internet has an unlimited number of users c) The internet is accessible to anyone d) The Internet is safe as compared to the intranet

    d

  • 20

    120. A server that contains, sends and receives electronic mail a) Web b) Mail c) DHCP d) DNS

    B

  • 21

    121.Below are advantages of a mesh topology except a) Heavily dependent on the network medium b) Can handle heavy traffic c) No single point of failure d) Easy to identify faults

    a

  • 22

    122.Below are advantages of a star topology except a) Simplicity of operation b) Easy to detect faults c) Lots of network redundancy d) Can handle heavy traffic

    c

  • 23

    123.Search engine that does not track its users a) Yahoo b) AOL c) Bing d) DuckDuckGo

    d

  • 24

    124.Which network does not belong to the group? a) Local Area Network b) Wide Area Network c) Wired Network d) Metropolitan Area Network

    c

  • 25

    125.DBMS stands for a) Database Monitoring Server b) Database Management Server c) Database Monitoring System d) Database Management System

    d

  • 26

    126.At what distance is a Single Mode Fiber-optic cable used? a) 1.5 kilometers b) 2 kilometers c) 3 kilometers d) 1 kilometer

    c

  • 27

    127.Place search results can be filtered by the following except a) Price b) Time c) Rating d) Cuisine

    b

  • 28

    128.Protocol used to display web pages securely a) FTP b) FTPS c) HTTP d) HTTPS

    d

  • 29

    129.Who created the World Wide Web? a) Vinton Cerf b) Marc Andersen c) Tim Berners-Lee d) Robert Morris

    c

  • 30

    130.Who was considered as one of the Fathers of Internet? a) Vinton Cerf b) Marc Andreessen c) Tim Berners-Lee d) Robert Morris

    a

  • 31

    131.Who released the first web browser? a) Vinton Cerf b) Marc Andreessen c) Tim Berners-Lee d) Robert Morri

    b

  • 32

    132.What is the first web browser? a) Netscape b) Mosaic c) America On-Line (AOL) d) Internet Explorer

    b

  • 33

    133.It is a library of resources available to computer users through the global Internet. It enables users to view a wide variety of information, including magazine archives, public and college library resources, and current world and business news. a) Database b) Ethernet c) World Wide Web d) Online Public Access Catalog (OPAC)

    c

  • 34

    134.In Microsoft Access, it is a tool that allows you to automate tasks and add functionality to your forms, reports, and controls. For example, if you add a command button to a form, you associate the button's OnClick event to a macro, and the macro contains the commands that you want the button to perform each time it is clicked. a) Queries b) Forms c) Macros d) Tables

    c

  • 35

    135. The programming language used in Microsoft Access a) VBA b) C++ c) JavaScript d) MySQL

    A

  • 36

    136.Academic Libraries Book Acquisition Systems Association, Inc. is a network of agencies and institutions engaged in health research and development in the Central Visayas started with 13 original members. Who was the first ALBASA manager? a) Diosdado David b) Eva Brillo c) Fr. Rafael Boromeo d) Nela Serrato

    b

  • 37

    137.Refers to a set of moral rules or a code of behaviour applied to the online environment. As a responsible netizen, you should observe these rules to help make cyberspace a safe place. a) Netiquette b) Computer Ethics c) Technology Ethics d) Social Etiquette

    a

  • 38

    138.It is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. a) Hacking b) DDoS attack c) Phishing d) SYN Flood

    b

  • 39

    139.With the increase of people creating contents on Youtube, many are interested on how to reach more audience and increase viewers. Many refer to this as something that works behind the scene on how contents are being advertised, arranged and presented on the platform. a) Advertisement b) Clickbait c) Algorithm d) Subscribers

    c

  • 40

    140.Microblogging is a type of blog that lets users publish short text updates. Bloggers can usually use a number of service for the updates including instant messaging, e-mail, or Twitter. The posts are called microposts, while the act of using these services to update your blog is called microblogging. Another example of microblog is evident in the following except; a) Facebook b) Instagram c) Tumbler d) Wordpress

    d

  • 41

    141.What is the most basic language Microsoft made? a) DirectX b) Batch c) C++ d) Visual Basic

    d

  • 42

    142.It is an electronic device capable of performing complex computations in a short time. a) Application b) Operating system c) Computer d) Software

    c

  • 43

    143.It is an 8-bit character encoding (code page) used on IBM mainframe operating systems. a) ASCII b) UNICODE c) EBCDIC d) UNIX

    c

  • 44

    144.A part of computer that stores applications, documents and system operating information a) Memory b) Central Processing Unit c) Hard Disk d) Data Disk

    a

  • 45

    145.It is a methodology that is typically used to develop, maintain and replace information systems for improving the quality of the software design and development process. a) System Life Cycle b) Software Licensing Development Cycle c) Program Life Cycle d) Software Development Life Cycle

    d

  • 46

    146.What is the correct way of making a header in HTML? a) <head> text </head> b) <header> text </header> c) <h> text </h> d) <h1> text </h1>

    d

  • 47

    147.Which of the following is the correct way of making a string in Java? a) String "Text"; b) String text = 'text'; c) String text = "text" d) String text = "text";

    d

  • 48

    148.Which of the following is the correct way to use the standard namespace in C++? a) Using namespace std; b) Using namespace standard; c) Using standard namespace; d) Standard namespace used;

    A

  • 49

    149.What does &nbsp mean? a) No Border Space Padding b) Non-Breaking Space c) No Between Spaces d) Non-Bordered Space Padding

    B

  • 50

    150.In HTML, how do you insert a link? a) <a><href=”link”></a> b) <ahref=”link”></ahref> c) <a href=”link”></a> d) <ahref>link</a>

    c