1. What was the name of first computer designed by 10.
Which electronic components are used in First
Charles Babbage? Generation Computers?
a. Analytical Engine a. Transistors
b. Difference Engine b. Integrated Circuits
c. Colossus c. Vacuum Tubes
d. ENIAC d. Microprocessor
2. Which was the first electronics digital programmable 11. Which electronic components are used in Second
computing device? Generation Computers?
a. Analytical Engine a. Transistors
b. Difference Engine b. Integrated Circuits
c. Colossus c. Vacuum Tubes
d. ENIAC d. Microprocessor
3. EDVAC stands for __________? 12. Which electronic components are used in Third
a. Electronic Discrete Variable Automatic Calculator Generation Computers?
b. Electronic Discrete Variable Automatic Computer a. Transistors
c. Electronic Data Variable Automatic Calculator b. Integrated Circuits
d. Electronic Data Variable Automatic Computer c. Vacuum Tubes
4. Which was the first commercial computer? d. Microprocessor
a. Mark 1 13. Which electronic components are used in Fourth
b. Analytical Engine Generation Computers?
c. Difference Engine a. Transistors
d. Colossus b. Integrated Circuits
5. UNIVAC stands for __________? c. Vacuum Tubes
a. Universal Automatic Calculator d. Microprocessor
b. Universal Native Input Automatic computer 14. Which electronic components are used in Fifth
c. Universal Native Input Automatic calculator Generation Computers?
d. Universal Automatic Computer a. Transistors
6. ENIAC stands for __________? b. Integrated Circuits
a. Electronic Numerical Integrator And Computer c. Vacuum Tubes
b. Electronic Numerical Integrator And Calculator d. Microprocessor
c. Electronic Numerical Integrator Automatic 15. ENIAC Computer belongs to __________?
Computer a. First Generation Computers
d. Electronic Numerical Integrator Automatic b. Second Generation Computers
Calculator c. Third Generation Computers
7. John Mauchly and J. Presper Eckert are the inventors of d. Fourth Generation Computers
__________ computer. 16. What are the four examples of Web 2.0?
a. UNIAC
b. ENIAC
c. EDSAC
d. Mark 1
8. Who invented the punch card? 17. Who are the inventor/father of the internet and www?
a. Charles Babbage
b. Semen Korsakov
c. Herman Hollerith 18. Give at least 6 uses of the internet.
d. Joseph Marie Jacquard
9. In the late _____, Herman Hollerith invented data
storage on punched cards that could be read by a
machine.
a. 1860
b. 1900
c. 1890
19. Define Web, Web 1.0, 2.0, and 3.0
d. 1880
_______________8. Malicious computer programs that are
often sent as an email
attachment or a download with the intent of infecting your
computer.
20. What are the different types of servers? _______________9. It is one of the more common methods
of both sending information out
and collecting it from unsuspecting people.
_______________10. It is a set of rules for behaving properly
online.
_______________11. A type of malware that restricts access
to your computer or your files
and displays a message that demands payment for the
21. Give 5 types of websites and its features.
restriction to be removed.
_______________12. A means to point you to a malicious
and illegitimate website by
redirecting the legitimate URL.
_______________13. _______ are common threat to
computer and the internet as a whole.
22. What are the top-level domains? _______________14. Action taken by someone to gain
unauthorized access to a computer.
23. What are the two types of ISP? _______________15. It encrypts files on your system’s hard
drive and sometimes on shared
network, drives, USB drives, and external hard drives and
24. DNS stands for? And give some examples. even some cloud storage drives
preventing you from opening them.
_______________16. They often come in the form of a free
25. Give examples of browsers. download and are installed
automatically with or without your consent.
_______________17. A malicious program that is disguised
as or embedded within
legitimate software.
_______________18. Virtual listening in on your information
that’s shared over an unsecured
or not encrypted network.
_______________1. Malware is a short term used for _______________19. It is the proper way to communicate in
_________. an online environment.
_______________2. It displays an image that prevents you _______________20. Software that collects personal
from accessing your computer. information about you without you
_______________3. _______ is a common type of online knowing.
fraud.
_______________4. Netiquette is a short term used for
_______.
_______________5. The mass distribution of unsolicited
messages, advertising or
pornography to addresses which can be easily found on the
internet.
_______________6. ______ and ______ are often used by
third parties to infiltrate your
computer.
_______________7. It is an executable file that will install
itself and run automatically once
it’s downloaded.