Republic of the Philippines
Pangasinan State University
ALAMINOS CITY CAMPUS
Alaminos City, Pangasinan
MIDTERM EXAMINATION
CC 101 - Introduction to Computing
First Semester, A.Y. 2024-2025
Name: ____________________________________ Score:___________
Section: ___________________________________ Date: ___________
I. Select the letter of the correct answer. Write your answer before the number. Any forms of erasures and
alternations will be considered incorrect.
1. Which of the following is a major technological advancement that has significantly disrupted
traditional industries and created new business models?
a. cloud computing c. mainframe computers
b. personal computers d. internet
2. The use of artificial intelligence in decision-making raises ethical concerns. Which of the following is a
potential ethical issue associated with AI?
a. job placement c. bias in algorithms
b. data privacy d. all of the above
3. In the context of cybersecurity, what is the purpose of a firewall?
a. to prevent unauthorized access to a network
b. to encrypt data transmitted over the internet
c. to detect and remove malware
d. to create backups of important data
4. How has the rise of social media platforms influenced the way businesses interact with their
customers?
a. by creating new channels for customer service
b. by facilitating direct marketing campaigns
c. by enabling customer feedback and reviews
d. all of the above
5. Which of the following is a potential future trend in the IT industry that could have a significant impact
on society?
a. increased use of augmented reality
b. widespread adoption of blockchain technology
c. development of quantum computing
d. all of the above
6. One of the major challenges facing the IT industry is the shortage of skilled workers. What strategies
can be implemented to address this issue?
a. investing in STEM education
b. offering competitive salaries and benefits
c. promoting diversity and inclusion in the workplace
d. all of the above
7. What is the difference between a client and a server in a computer network?
a. A client requests services, while a server provides them.
b. A server requests services, while a client provides them.
c. There is no difference between a client and a server.
d. A client is a physical device, while a server is software.
8. The use of facial recognition technology in public spaces raises privacy concerns. Which of the
following is a potential negative consequence of widespread facial recognition?
a. increased surveillance c. reduced personal freedom
b. discrimination based on facial features d. all of the above
9. How has the rise of mobile devices transformed the IT industry?
a. by creating new markets for software and hardware
b. by changing consumer behavior and preferences
c. by enabling remote work and collaboration
d. all of the above
10. What is the potential impact of quantum computing on cybersecurity?
a. It could make current encryption methods obsolete.
b. It could improve the efficiency of malware detection.
c. It could create new opportunities for data analysis.
d. all of the above
11. Which domain of computing focuses on the design, development, and maintenance of software
systems?
a. software engineering c. computer hardware
b. computer hardware d. artificial intelligence
12. How has the field of artificial intelligence transformed the healthcare industry?
a. by improving medical diagnosis accuracy
b. by automating routine tasks
c. by developing personalized treatment plans
d. all of the above
13. In the context of computer networks, what is the purpose of a routing protocol?
a. to manage network traffic c. to provide internet connectivity
b. to ensure data security d. to configure network devices
14. Which domain of computing is concerned with the ethical implications of technology and its impact on
society?
a. computer ethics c. cybersecurity
b. human-computer interaction d. data science
15. One of the major challenges in the field of computer hardware is the increasing demand for energy
efficiency. What strategies can be implemented to address this issue?
a. developing energy-efficient components c. improving cooling systems
b. optimizing software performance d. all of the above
16. In the context of data science, what is the difference between supervised and unsupervised learning?
a. Supervised learning involves training the model with labeled data, while unsupervised learning
does not.
b. Supervised learning is used for prediction, while unsupervised learning is used for clustering.
c. Supervised learning is more accurate than unsupervised learning.
d. Supervised learning requires less computational resources than unsupervised learning.
17. Which domain of computing focuses on the study of human-computer interaction and the design of
user-friendly interfaces?
a. human-computer interaction c. computer graphics
b. software engineering d. cybersecurity
18. One of the major challenges in the field of cybersecurity is the constant emergence of new threats.
What strategies can be implemented to stay ahead of cybercriminals?
a. investing in cybersecurity research c. raising awareness about cybersecurity threats
b. implementing strong security measures d. all of the above
19. In the context of computer graphics, what is the purpose of a rendering engine?
a. to create 3D models c. To animate characters
b. to generate visual images d. To provide sound effects
20. Which domain of computing focuses on the development of intelligent systems that can perform tasks
typically requiring human intelligence?
a. artificial intelligence c. software engineering
b. computer networks d. cybersecurity
21. Which of the following early computing devices used punch cards to input data and store
instructions?
a. Electronic Numerical Integrator and Computer
b. Universal Automatic Computer
c. Analytical Engine
d. Mark I
22. How did the development of the transistor revolutionize the computing industry?
a. by making computers smaller and more affordable
b. by improving the speed and efficiency of computers
c. by enabling the development of personal computers
d. all of the above
23. What was the significance of the Turing Test in the history of computing?
a. it defined the criteria for artificial intelligence
b. it demonstrated the capabilities of early computers
c. it introduced the concept of machine learning
d. it paved the way for the development of the internet
24. How has the rise of cloud computing changed the way businesses and individuals use technology?
a. by making computing resources more accessible
b. by reducing the need for on-premise hardware
c. by enabling collaboration and remote work
d. all of the above
25. Which of the following is a potential future trend in computing that could have a significant impact on
society?
a. increased use of quantum computing
b. widespread adoption of artificial intelligence
c. development of neuromorphic computing
d. all of the above
26. What was the primary purpose of early computers, such as ENIAC and UNIVAC?
a. to perform scientific calculations c. to play games
b. to process business data d. to create art
27. How did the development of the internet transform the way people communicate and access
information?
a. by creating a global network of interconnected computers
b. by making information more accessible and affordable
c. by enabling new forms of social interaction
d. all of the above
28. What are some of the ethical implications of the increasing use of technology in society?
a. privacy concerns c. bias in algorithms
b. job displacement d. all of the above
29. How did the development of microprocessors lead to the creation of personal computers?
a. by making computers smaller and more affordable
b. by improving the speed and efficiency of computers
c. by enabling the development of user-friendly interfaces
d. all of the above
30. What is the potential impact of quantum computing on fields like cryptography and materials science?
a. it could break current encryption methods
b. it could accelerate drug discovery
c. it could create new materials with unique properties
d. all of the above
31. How do the CPU, RAM, and storage devices work together in a computer system?
a. The CPU processes data, RAM stores data temporarily, and storage devices store data
permanently.
b. The CPU stores data, RAM processes data, and storage devices retrieve data.
c. The CPU retrieves data, RAM processes data, and storage devices store data.
d. The CPU stores data, RAM retrieves data, and storage devices process data.
32. What is the primary function of the motherboard in a computer system?
a. To control the flow of data between the components
b. To process instructions and perform calculations
c. To store data permanently
d. To display visual output
33. How does the input device interact with the output device in a computer system?
a. The input device sends data to the output device for display.
b. The output device processes data and sends it to the input device.
c. The input device and output device are not connected.
d. The input device stores data, and the output device retrieves it.
34. How has the development of solid-state drives (SSDs) impacted the performance of computer
systems?
a. by increasing storage capacity
b. by reducing data access times
c. by decreasing power consumption
d. all of the above
35. What is the significance of the operating system in a computer system?
a. it manages hardware resources and provides a user interface
b. it processes instructions and performs calculations
c. it stores data permanently
d. it displays visual output
36. How does the BIOS (Basic Input/Output System) play a role in the booting process of a computer?
a. it loads the operating system into memory
b. it performs hardware diagnostics
c. it provides a user interface
d. it controls the flow of data between components
37. How do the CPU and GPU work together in a computer system?
a. The CPU handles general-purpose tasks, while the GPU specializes in graphics processing.
b. The CPU and GPU are interchangeable.
c. The CPU controls the GPU, which is a peripheral device.
d. The CPU and GPU do not interact with each other.
38. What is the primary function of the power supply unit (PSU) in a computer system?
a. To convert AC power to DC power
b. To store data permanently
c. To process instructions
d. To display visual output
39. How do the input devices, such as a keyboard and mouse, interact with the operating system?
a. by sending input signals to the operating system
b. by storing data for the operating system
c. by processing instructions for the operating system
d. by displaying output for the operating system
40. How has the development of cloud computing impacted the role of traditional storage devices in
computer systems?
a. by reducing the need for local storage
b. by increasing the cost of storage
c. by decreasing the reliability of storage
d. by making storage devices obsolete
41. How has the rise of smartphones disrupted traditional industries like photography and
telecommunications?
a. by creating new markets for camera phones and mobile apps
b. by reducing the demand for traditional cameras and landline phones
c. by changing consumer behavior and preferences
d. all of the above
42. How can blockchain technology be used to improve the transparency and efficiency of supply chains?
a. By tracking products from origin to destination
b. By reducing the risk of counterfeit goods
c. By streamlining payment processes
d. all of the above
43. How has the rise of social media platforms disrupted traditional marketing and advertising?
a. By creating new channels for reaching consumers
b. By enabling targeted advertising campaigns
c. By empowering consumers to share their experiences
d. all of the above
44. How do the fields of computer science and software engineering overlap and differ?
a. Computer science focuses on the theoretical foundations of computing, while software engineering
focuses on the practical application of computer science principles.
b. Computer science is primarily concerned with hardware, while software engineering is primarily
concerned with software.
c. Computer science and software engineering are interchangeable terms.
d. Computer science is a subset of software engineering.
45. One of the major challenges in the field of cybersecurity is the constant emergence of new threats.
What strategies can be implemented to stay ahead of cybercriminals?
a. Investing in cybersecurity research
b. Implementing strong security measures
c. Raising awareness about cybersecurity threats
d. all of the above
46. What was the primary impact of the development of integrated circuits (ICs) on the evolution of
computers?
a. They made computers smaller and more affordable
b. They increased the processing power of computers
c. They enabled the development of personal computers
d. all of the above
47. What are some of the key characteristics of fifth-generation computers?
a. Artificial intelligence
b. Parallel processing
c. Natural language processing
d. all of the above
48. How does the motherboard connect to other components in a computer system?
a. Through expansion slots and connectors
b. Through a power supply cable
c. Through a video cable
d. all of the above
49. What is the primary function of the chipset on a motherboard?
a. To control the flow of data between the CPU and other components
b. To provide power to the motherboard
c. To store data permanently
d. To display visual output
50. What is the significance of the motherboard in a computer system?
a. It serves as the backbone of the system, connecting all the components together
b. It determines the overall performance and capabilities of the system
c. It influences the compatibility of different components
d. All of the above
Prepared by
CARLO GENSTER P. CAMPOSAGRADO, DIT
Instructor
Validated by Approved by
ROSEL L. DELA CRUZ, MIT ROSARIO DL. VALENCERINA, EdD
Department Chairperson Campus Executive Director