Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Mock Test: Learning Strand 6 - Digital Literacy

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Republic of the Philippines

Department of Education
Region X

MOCK TEST
A&E Secondary
Learning Strand 6 – Digital Literacy
1. Danny wants to use his computer. What is the first thing he needs to do?
a. click on Restart b. turn on the WiFi c. click Stand By d. press Power Button

2. What software application is more appropriate in writing an excuse letter?


a. Spreadsheet b. Word Processing c. Desktop Publishing d. Powerpoint Presentation

3. Danica wants to save personal files on her computer. Which characteristic of the computer is most useful for her?
a. speed b. accuracy c. display d. storage

4. Mr. Cruz wants to copy his research work on his flash drive. What is the correct order of steps?
1. Select open folder to view. 3. Insert the flash drive in the USB port.
2. Get a menu of option for using the drive. 4. Bring up a window showing the flash drive.
a. 1, 2, 3, 4 b. 2, 3, 4, 1 c. 3, 4, 2, 1 d. 4, 1, 2, 3

5. What is the basic function of a computer mouse?


a. displays video c. selects menu commands
b. prints documents d. performs basic computation

6. Your Social Studies teacher gave you a project to create an Electronic Photo Album about the beautiful places that you
have already visited in the Philippines. What is the easiest and fastest option to create a presentation for this project?
a. blank and recent c. new from existing
b. installed templates d. installed themes

7. Margaux wants to increase the font size of her resume. After selecting all the text, which icon should she click?

a. b. c. d.

8. Rose wants to put slide effects on her presentation for their family reunion. Which tab should she select?
a. Design b. Format c. Home d. Transition

10. Rachelle is chatting with a friend. Which of the following should she avoid?
a. gossiping c. respect one's opinion
b. politeness d. end conversation properly

11. You have tried all the available templates and designs installed in your computer, but none of these match your
preference. What option will you choose to find more templates that you can use?
a. blank and recent b. installed templates c. new from existing d. Microsoft Office Online

12. It is a collection of webpages that can be accessed through the internet.


a. Home page b. Web browser c. Web address d. Website

13. Which of the following statements about computer is correct?


a. It produces many errors. c. It works without instruction from the user.
b. It works fast and performs multiple functions. d. It takes a long time to operate.

14. Shaina wants to save her project into a USB flash drive. What is the correct order of steps to save it?
1. Click File 3. Name the file and click save
2. Choose Save As 4. Insert the flash drive to USB slot
a. 3, 4, 2, 1 b. 4, 1, 2, 3 c. 1, 2, 3, 4 d. 2, 3, 1, 4

15. Why do you need to print a document?


a. to store it in a device c. to have it in hard copy
b. to save it in a folder d. to delete it afterward

16. You are going to open an existing document, what is the correct order of steps to open it?
1. Locate and select your document. 3. On the Ribbon, click File.
2. Click Open. 4. Choose Open. The Open Dialog Box appears
a. 4, 3, 2, 1 b. 3, 1, 2, 4 c. 1, 3, 2, 4 d. 2, 1, 3, 4

17. Which key will erase the letters or numbers on the right side of the cursor?
a. Backspace b. Delete c. Escape d. Shift

18. On which tab can you find the button that allows you to show or hide the Ruler?
a. View b. Insert c. Home d. Page layout

19. Which mouse action allows one to move an object from one place to another?
a. double-clicking b. dragging c. clicking d. pointing

20. All of the following are examples of web browsers EXCEPT ONE.
a. Chrome TM b. World Wide Web c. Microsoft Edge d. Mozilla Firefox®

21. Sarah is typing her application letter on the word document. Which key will she press when she wants to exit the
program?
a. Backspace b. Delete c. Escape d. Shift

22. After using the Paint window, you have to close it before turning the computer off. Which button will you click to
close the window and will not be displayed on the taskbar anymore?

a. b. c. d.

23. You are going to open an existing document, what is the correct order of steps to open it?
1. Locate and select your document. 3. On the Ribbon, click File.
2. Click Open. 4. Choose Open. The Open Dialog Box appears.
a. 4, 3, 2, 1 b. 3, 1, 2, 4 c. 1, 3, 2, 4 d. 2, 1, 3, 4

24. Teacher Vilma is using this type of display screen that has a touch sensitive transparent panel covering the screen,
which is similar to a touch screen. What computer hardware is being used by Teacher Vilma on her learning session?
a. White board b. LED Monitors c. Smart board d. LCD Monitors

25. Anika wants to print photos of animals as her project in Science. What could be the best printer to use to have a high
quality of pictures?
a. Inkjet Printer b. Dot-Matrix Printer c. Line Printer d. Laser Printer

26. A worksheet is also called ______________.


a. Spreadsheet b. Tax sheet c. Bedsheet d. none of these

27. Alt + F4 key is used to ______________ Excel.


a. Create New b. Open c. Exit d. Minimize

28. Choose which part of the computer system is considered the “brain” of a computer, where all of the processing and
calculations take place.
a. CD b. ALU c. CPU d. Hard drive

29. What is ROM?


a. The Bios c. Programs currently in use
b. The Operating system d. A permanent memory

30. Which is true about RAM?

a. It is the work that you save in My Documents. c. It is the Bios.


b. It is the temporary memory. d. It is an operating system.

31. Into which device category does a projector fall under?


a. Input device b. Output device c. Storage d. both A and B

32. What does URL stands for?


a. Universal Ready Language c. Universal Resource Logistic
b. Uniform Resource Locator d. Uniform Research Locale

33. In what aspect is a computer not smarter than a human being?


a. solve complex Math problems in a school c. make well-reasoned decisions
b. store massive amounts of information d. recall information stored in a split second

34. What led to the creation of the World Wide Web?


a. the internet c. hypertext
b. Hypertext Markup Language (HTML) d. the intranet

35. What determine the paths used to exchange information on the internet?
a. routers b. Hub c. your computer d. Web servers

36. Which computer has been used for highly critical applications such as bulk data processing?
a. Mainframe b. Supercomputer c. Microcomputer d. Minicomputer

37. Who is regarded as the “Father of Computer”?


a. Charles Babbage b. Thomas Edison c. Bill Gates d. Blaise Pascal

38. Which device is used to share data or otherwise a device which let computers exchange information?
a. USB Port b. LAN card c. Server d. Modem

39. Which of the following things can a “virus” do?


a. create an e-mail b. go online c. crash your computer d. chat with you

40. How do search engines determine what Web sites it will show in the result of your query?
a. how often the words in the query occur on the Web page
b. it determines quality of information
c. Web pages with the least amount of clicks by people doing similar searches
d. searching the billions of Web pages ranking all the results from most related to least

41. Which of the following things can ‘link” do?


a. open an internet café c. help you save an information
b. close a file d. bring you to another website

42. Three of the following reason can affect how long it takes for a Web page to load on your computer screen. Which
one does not affect the loading of a Web page?
a. file size c. computer with slow microprocessor
b. bandwidth d. number of person using the internet

43. Which statement is true with regards to wireless connections?


a. wireless cards are only built in the computers, they cannot be added to a computer
b. all wireless connections have identical speed and distances
c. wireless connections allow you to connect to the internet from varying distances
d. there is only one type of wireless device: laptop computer

44. Which type of computers are used extensively in scientific field for research and simulations?
a. Mainframe b. Supercomputer c. Microcomputer d. Minicomputer

45. Which of the following things can you find in an “inbox”?


a. a blog b. an e-mail message c. hardware d. a monitor

46. You saw photos being shared online of a girl you knew, and after a while people started bullying her at school too.
What is the best thing to help the girl?
a. tell the teacher what was happening c. call the parents of the girl
b. fight back at the people who bullied her d. ignore the situation

47. Johannes is frustrated and saddened by the comments his high school peers are making about his sexuality.
Furthermore, it appears a group of male student has created an imposter account to impersonate him on an online
dating site. Posing as Johannes and using his contact information, they start sending out very provocative and sexually
bold messages to other guys on the site. When he starts receiving e-mails from members of this site in his inbox, he
mortified and devastated. If you were Johannes, what would be an acceptable way to deal with this problem?
a. leave the situation b. stay calm c. decide to respond d. ask for help

48. A mother is walking by her son Mark while he is on his iPhone and notices that he keeps hiding the screen and
pretending that he isn’t doing anything when she walks by or get close to him. Upon further observation, the mother
sees Mark is sending out hateful tweets via what seems to be a Twitter account he has set up to impersonate someone
else. What should the mother do first?
a. punish her son c. contact the Twitter
b. ask her child the full story d. send her child to Guidance Councilor

49. If you work at a company with 500 employees. The company will therefore have hundreds of computers that all have
network cards connecting them together. Without a firewall in place, all of those hundreds of computers are directly
accessible to anyone on the internet. If one employee makes a mistake and leaves a security hole, what is most likely to
happen next?
a. A computer network is protected from unauthorized access.
b. Network firewalls guard the internal network against malicious access.
c. Hackers can get to the machine and exploit the hole.
d. A company will place a firewall at every connection to the internet.

50. Mobile phones nowadays are becoming one of the most popular pieces of technology and nearly everyone own a
cell phone. Nonetheless, mobile phones bring not only easiness in communication area, but also many negative health
effects. What are the disadvantages of using mobile phone?
1. Increases stress level 3. Increases risk of eye vision problem
2. Increases risk of illness 4. Increases risk of chronic pain
a. 1,2,3 b. 1 and 3 c. 2, 3, 4 d. 1, 2, 3, 4

You might also like