Sunteți pe pagina 1din 2

Technological University of the Philippines Taguig

Electrical Department
Empowerment Technology

Name:_______________________________ Date:___________________
Yr & Sec:_____________________________ Score:__________________

INSTRUCTION. This exam is good for 45 minutes. Erasures are considered wrong and will be deducted to your total
score. Please refrain from talking to your seatmate and using of smartphones while taking this.

TEST I IDENTIFICATION

______________1. Required for information processing, in particular, the use of electronic computers, communication
devices and software applications to convert, store, protect, process, transmit and retrieve information from
anywhere, anytime
______________2. Act of transmitting messages. It is a process whereby information is exchanged between
individuals using symbols, signs or verbal interactions
______________3. Use of scientific knowledge, experience and resources to create processes and products that fulfill
human needs
______________4. Refers to the knowledge obtained from reading, investigation, study or research
______________5. Develop by the Phoenicians in 1500 BC
______________6. An extremely important step of the advancement of computers during first generation computers
______________7. The process and art of combining text and graphics and communicating an effective message
______________8. Denotes direction of movement (as in diagonal lines and arrows) or provide an anchor to hold
elements on a page (such as lines at the top, bottom, or sides of a page)
______________9. Its development signaled the beginning of the Third generation of computers
_____________10. Known as the Father of modern computers
_____________11. Large-scale circuits which contain thousands of transistors
_____________12. Unsolicited e-mail messages, advertisement or newsgroup posting sent to many recipients at once
_____________13. A moral Philosophy where a person makes specific moral choice and sticks to it
_____________14. He developed the first apple computers
_____________15. A government agency that regulates, make policies and infrastructure of information technology
system

TEST II ENUMERATION

16 20 Usage of ICT
21 25 Impact of ICT on Society
26 30 Five Elements of Graphic Design

TEST III. TRUE or FALSE. Write TRUE if the statement is compliant to computer ethics and FALSE if not.

1. Code of ethics is way of setting standards.


2. Law indicates rules & regulations to be obeyed in the organization.
3. Right things does not depend upon moral principles.
4. Morals are sets of things to be done.
5. Ethical principles are based on moral values.
6. Ethics is the art of determining what is right or wrong.
7. Ethics was invented by Bill Gates.
8. Ethics are generally accepted standards of right and wrong in the society.
9. The code of ethics is a combination of Do's and Don't's.
10. Morals are set of standards, which decide right or wrong.
11. Pirated software means software without license.
12. Users has rights to receive or use unauthorized copies of software.
13. Computer user should purchase only legitimate software products.
14. A person accessing the confidential data without having authorized is called
Unauthorized Access.
15. User have rights to use unauthorized copies of software.
16. Software piracy is a victimless crime.
17. Software theft is not a serious matter.
18. Computer users have right to copy the software without permission.
19. User can purchase pirated software.
20. Trying to log on to others computer system is authorized access.
21. It is possible to upgrade the pirated software.
22. Users can make unauthorized copies of software for themselves.
23. User should not use a computer to steal.
24. Antivirus helps a user to access information for another computer.
25. Computer professionals should not try to open the files or database
belonging to the other users.
26. Rules for computing are called as commandments.
27. Cyber crime refers to all the legal and regularly aspects of internet and the
WWW.
28. User can copy the original data from other user or owner without
permission.
29. Privacy is the professional's responsibility.
30. Software piracy should be practiced for maintaining ethics.