Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

1st em - Tech.

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

NAME: ___________________________________________________ DATE: ______________

GRADE LEVEL/SECTION: _________________________________ SCORE: _____________

FIRST PERIODIC TEST


EMPOWERMENT TECHNOLOGY

Directions: Choose the letter of your answer for each item.


1. What is the meaning of ICT?
A. Information and Computer Technology
B. Internet and Computer Technology
C. Information and Communication Technology
D. Internet and Communication Technology
2. It is a web-based technology that allows users to socialize online.
A. Social Media Platform C. Online Learning Platform
B. E-Commerce Platform D. Online Video Platform
3. It is a collection of software technologies that allows merchants to create a storefront on the internet
A. Social Media Platform C. Online Learning Platform
B. E-Commerce Platform D. Online Video Platform
4. It is a set of interactive online services that provides the teachers, learners, parents and others involved in the
educational sector.
A. Social Media Platform C. Online Learning Platform
B. E-Commerce Platform D. Online Video Platform
5. It is a service providing end-to-end tools used to create, customize, publish, and manage videos online.
A. Social Media Platform C. Online Learning Platform
B. E-Commerce Platform D. Online Video Platform
6. An example of common issues and crimes on the internet that involves bullying.
A. Hacking C. Identity Theft
B. Cyberbullying D. Intellectual Property Rights
7. _________ is a common issue and crime on the internet that involves posers and dummy accounts.
A. Hacking C. Identity Theft
B. Cyberbullying D. Intellectual Property Rights
8. It is a crime where people steal the content of others without proper credit.
A. Hacking C. Identity Theft
B. Cyberbullying D. Intellectual Property Rights
9. It is a crime where people steal an account and use it for his/her personal use.
A. Hacking C. Identity Theft
B. Cyberbullying D. Intellectual Property Rights
10. ___________ is malware that secretly observes the computer user’s activities without permission and reports
it to the software’s author.
A. Trojan Horse B. Spyware C. Adware D. Ransomware
11. It is an unwanted software designed to throw advertisements up on your screen. Examples, pop-up ads and
banner ads.
A. Trojan Horse B. Spyware C. Adware D. Ransomware
12. It is one of the most dangerous malware types. It usually represents itself as something useful in order to trick
you. Once it’s on your system, the attackers behind the malware gain unauthorized access to the affected
computer.
A. Trojan Horse B. Spyware C. Adware D. Ransomware
13. ___________ is a form of malware that locks you out of your device and/or encrypts your files, then forces
you to pay a ransom to get them back.
A. Trojan Horse B. Spyware C. Adware D. Ransomware
14. A tip on improving your search skills online that tells to make sure to find the most reliable information.
A. Know your resources
B. Use your web browser properly
C. Organize your bookmarks
D. Learn to use advanced search techniques
15. Use your browser's bookmark manager to organize the links you have marked.
A. Know your resources
B. Use your web browser properly
C. Organize your bookmarks
D. Learn to use advanced search techniques
16. Know the capabilities of your preferred browsers to make your search faster and easier.
A. Know your resources
B. Use your web browser properly
C. Organize your bookmarks
D. Learn to use advanced search techniques
17. Practice using keywords in searching in the browsers and search engines.
A. Know your resources
B. Use your web browser properly
C. Organize your bookmarks
D. Learn to use advanced search techniques
18. It generally refers to someone using internet services or software to defraud or take advantage of victims,
typically for financial gain.
A. Phishing B. Internet Scam C. Internet Robot D. Pharming
19. It happens when an email is sent from an internet criminal disguised as an email from a legitimate,
trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
A. Phishing B. Internet Scam C. Internet Robot D. Pharming
20. It happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one.
A. Phishing B. Internet Scam C. Internet Robot D. Pharming
21. _______ is a kind of tool which can be used for free and for an unlimited time.
A. Freeware B. Software C. Hardware D. Shareware
22. It is the tools that can be used for trial but needs to be purchased for continued use.
A. Freeware B. Software C. Hardware D. Shareware
23. ______ is a tool of technology that is installed in the operating system of the device.
A. Freeware B. Software C. Hardware D. Shareware
24. It is a tool of technology that is installed as part of the device.
A. Freeware B. Software C. Hardware D. Shareware
25. A software toolkit that is used to produce multiple documents with a given template, editing the basic
information that is supplied by a structured dataset.
A. Microsoft Word B. Microsoft Excel C. Mail Merged D. Hyperlink
26. Which menu in Microsoft Word provides options for adjusting the page layout, margins, and orientation of a
document?
A. File B. Home C. Page Layout D. Insert
27. Which keyboard shortcut is commonly used to undo the last action in Microsoft Word?
A. Ctrl + Z B. Ctrl + C C. Ctrl + X D. Ctrl + V
28. What is the purpose of the "Mail Merge" feature in Microsoft Word?
A. To create a table of contents.
B. To combine data from a database with a document for mass customization.
C. To format text in columns.
D. To create a digital signature.
29. Which ribbon tab in Microsoft Word provides options for adding and formatting various shapes and images in
a document?
A. Home B. Review C. Insert D. References
30. This is generally a GIF type; line art drawings or images used as generic representation for ideas and objects
that you might want to integrate in your document.
A. Pictures B. Clip art C. Shapes D. Smart Art
31. Generally, these are predefined sets of different shapes grouped together to form ideas that are organizational
or structural in nature.
A. Pictures B. Clip Art C. Shapes D. Smart Art
32. A types of Microsoft office that provides an automated way of displaying any statistical data.
A. Microsoft Word C. Microsoft Powerpoint
B. Microsoft Excel D. Mail merged
33. In Microsoft Excel, what is a cell reference that refers to a specific cell by its column letter and row number,
such as "A1"?
A. Formula B. Cell Name C. Cell Address D. Cell Value
34. In Excel, what does the function "SUM(A1:A5)" do?
A. It multiplies the values in cells A1 to A5.
B. It subtracts the values in cells A1 to A5.
C. It adds the values in cells A1 to A5.
D. t averages the values in cells A1 to A5.
35. To add a transition effect between slides in a PowerPoint presentation, which tab on the ribbon should you
access?
A. Home B. Insert C. Transitions D. Design
36. In PowerPoint, what feature allows you to create a self-running presentation that automatically advances from
slide to slide without user interaction?
A. Animation B. Hyperlinks C. Slide Transition D. Slide Show
37. Here are some basic elements of layout and design, which of the following does NOT belong to the group?
A. Shapes B. Color C. Lines D. Consistency
38. What website is dedicated to hosting video clips?
A. Flickr B. YouTube C. Twitter D. Facebook
39. Which among the websites cater to the hosting of images?
A. YouTube B. Twitter C. Flickr D. Facebook
40. It is a social networking service that enables users to send and read short messages with 140 characters.
A. Flickr B. YouTube C. Twitter D. Facebook
41. Which website requires the users to register an account and create a user profile?
A. YouTube B. Twitter C. Flickr D.Facebook
42. It refers to the physical arrangement of the content and elements on a website.
A. Layouts B. Typefaces C. Navigation D. Purpose
43. Refers to the facility that the audience can use to go through the website and its subpages.
A. Layouts B. Typefaces C. Navigation D. Purpose
44. ____ alone placed on the website can deliver a complete message that the website wishes to communicate to
the audience.
A. Purpose B. Typefaces C. Images D. Color
45. It is a computer application (sometimes online or browser-based) that allows you to publish, edit and
manipulate, organize and delete web content.
A. Content Management System C. Blogging Platform
B. Social Media Platforms D. Online Shopping
46. It is an online platform that you can buy anything anytime or anywhere you want.
A. Content Management System C. Blogging Platform
B. Social Media Platforms D. Online Shopping
47. What does "WWW" stand for in web addresses?
A. World Web Widget C. Web World Wide
B. World Wide Web D. World Widget Web
48. What is the purpose of a web browser?
A. To create web pages C. To search the internet
B. To send and receive emails D. To encrypt data
49. Which of the following is NOT a common file format for images?
A. JPEG B. GIF C. MP3 D. PNG
50. What is the term for the practice of copying someone else's work or ideas without giving proper credit?
A. Plagiarism B. Copyright C. Encryption D. Firewalling

“You don’t need to be scared of the test; that test needs to be scared of you.”

Prepared by:

MARIA MARTINA F. DELOS SANTOS


Subject Teacher

Checked and Approved:

DIANA M. DEL MUNDO, EdD


OIC – Principal I

You might also like