This document appears to be a test containing questions about various technologies and computer applications. There are 37 multiple choice questions testing knowledge about topics like information and communication technology, social media, e-commerce, online learning platforms, cyberbullying, malware, internet scams, software vs. hardware, Microsoft Word functions like mail merge, Microsoft Excel functions like SUM, and PowerPoint elements like transitions and slide shows. The test is formatted with questions numbered 1 through 37 and multiple choice answers lettered A through D for each question.
This document appears to be a test containing questions about various technologies and computer applications. There are 37 multiple choice questions testing knowledge about topics like information and communication technology, social media, e-commerce, online learning platforms, cyberbullying, malware, internet scams, software vs. hardware, Microsoft Word functions like mail merge, Microsoft Excel functions like SUM, and PowerPoint elements like transitions and slide shows. The test is formatted with questions numbered 1 through 37 and multiple choice answers lettered A through D for each question.
This document appears to be a test containing questions about various technologies and computer applications. There are 37 multiple choice questions testing knowledge about topics like information and communication technology, social media, e-commerce, online learning platforms, cyberbullying, malware, internet scams, software vs. hardware, Microsoft Word functions like mail merge, Microsoft Excel functions like SUM, and PowerPoint elements like transitions and slide shows. The test is formatted with questions numbered 1 through 37 and multiple choice answers lettered A through D for each question.
This document appears to be a test containing questions about various technologies and computer applications. There are 37 multiple choice questions testing knowledge about topics like information and communication technology, social media, e-commerce, online learning platforms, cyberbullying, malware, internet scams, software vs. hardware, Microsoft Word functions like mail merge, Microsoft Excel functions like SUM, and PowerPoint elements like transitions and slide shows. The test is formatted with questions numbered 1 through 37 and multiple choice answers lettered A through D for each question.
Directions: Choose the letter of your answer for each item.
1. What is the meaning of ICT? A. Information and Computer Technology B. Internet and Computer Technology C. Information and Communication Technology D. Internet and Communication Technology 2. It is a web-based technology that allows users to socialize online. A. Social Media Platform C. Online Learning Platform B. E-Commerce Platform D. Online Video Platform 3. It is a collection of software technologies that allows merchants to create a storefront on the internet A. Social Media Platform C. Online Learning Platform B. E-Commerce Platform D. Online Video Platform 4. It is a set of interactive online services that provides the teachers, learners, parents and others involved in the educational sector. A. Social Media Platform C. Online Learning Platform B. E-Commerce Platform D. Online Video Platform 5. It is a service providing end-to-end tools used to create, customize, publish, and manage videos online. A. Social Media Platform C. Online Learning Platform B. E-Commerce Platform D. Online Video Platform 6. An example of common issues and crimes on the internet that involves bullying. A. Hacking C. Identity Theft B. Cyberbullying D. Intellectual Property Rights 7. _________ is a common issue and crime on the internet that involves posers and dummy accounts. A. Hacking C. Identity Theft B. Cyberbullying D. Intellectual Property Rights 8. It is a crime where people steal the content of others without proper credit. A. Hacking C. Identity Theft B. Cyberbullying D. Intellectual Property Rights 9. It is a crime where people steal an account and use it for his/her personal use. A. Hacking C. Identity Theft B. Cyberbullying D. Intellectual Property Rights 10. ___________ is malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. A. Trojan Horse B. Spyware C. Adware D. Ransomware 11. It is an unwanted software designed to throw advertisements up on your screen. Examples, pop-up ads and banner ads. A. Trojan Horse B. Spyware C. Adware D. Ransomware 12. It is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you. Once it’s on your system, the attackers behind the malware gain unauthorized access to the affected computer. A. Trojan Horse B. Spyware C. Adware D. Ransomware 13. ___________ is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back. A. Trojan Horse B. Spyware C. Adware D. Ransomware 14. A tip on improving your search skills online that tells to make sure to find the most reliable information. A. Know your resources B. Use your web browser properly C. Organize your bookmarks D. Learn to use advanced search techniques 15. Use your browser's bookmark manager to organize the links you have marked. A. Know your resources B. Use your web browser properly C. Organize your bookmarks D. Learn to use advanced search techniques 16. Know the capabilities of your preferred browsers to make your search faster and easier. A. Know your resources B. Use your web browser properly C. Organize your bookmarks D. Learn to use advanced search techniques 17. Practice using keywords in searching in the browsers and search engines. A. Know your resources B. Use your web browser properly C. Organize your bookmarks D. Learn to use advanced search techniques 18. It generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain. A. Phishing B. Internet Scam C. Internet Robot D. Pharming 19. It happens when an email is sent from an internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information. A. Phishing B. Internet Scam C. Internet Robot D. Pharming 20. It happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one. A. Phishing B. Internet Scam C. Internet Robot D. Pharming 21. _______ is a kind of tool which can be used for free and for an unlimited time. A. Freeware B. Software C. Hardware D. Shareware 22. It is the tools that can be used for trial but needs to be purchased for continued use. A. Freeware B. Software C. Hardware D. Shareware 23. ______ is a tool of technology that is installed in the operating system of the device. A. Freeware B. Software C. Hardware D. Shareware 24. It is a tool of technology that is installed as part of the device. A. Freeware B. Software C. Hardware D. Shareware 25. A software toolkit that is used to produce multiple documents with a given template, editing the basic information that is supplied by a structured dataset. A. Microsoft Word B. Microsoft Excel C. Mail Merged D. Hyperlink 26. Which menu in Microsoft Word provides options for adjusting the page layout, margins, and orientation of a document? A. File B. Home C. Page Layout D. Insert 27. Which keyboard shortcut is commonly used to undo the last action in Microsoft Word? A. Ctrl + Z B. Ctrl + C C. Ctrl + X D. Ctrl + V 28. What is the purpose of the "Mail Merge" feature in Microsoft Word? A. To create a table of contents. B. To combine data from a database with a document for mass customization. C. To format text in columns. D. To create a digital signature. 29. Which ribbon tab in Microsoft Word provides options for adding and formatting various shapes and images in a document? A. Home B. Review C. Insert D. References 30. This is generally a GIF type; line art drawings or images used as generic representation for ideas and objects that you might want to integrate in your document. A. Pictures B. Clip art C. Shapes D. Smart Art 31. Generally, these are predefined sets of different shapes grouped together to form ideas that are organizational or structural in nature. A. Pictures B. Clip Art C. Shapes D. Smart Art 32. A types of Microsoft office that provides an automated way of displaying any statistical data. A. Microsoft Word C. Microsoft Powerpoint B. Microsoft Excel D. Mail merged 33. In Microsoft Excel, what is a cell reference that refers to a specific cell by its column letter and row number, such as "A1"? A. Formula B. Cell Name C. Cell Address D. Cell Value 34. In Excel, what does the function "SUM(A1:A5)" do? A. It multiplies the values in cells A1 to A5. B. It subtracts the values in cells A1 to A5. C. It adds the values in cells A1 to A5. D. t averages the values in cells A1 to A5. 35. To add a transition effect between slides in a PowerPoint presentation, which tab on the ribbon should you access? A. Home B. Insert C. Transitions D. Design 36. In PowerPoint, what feature allows you to create a self-running presentation that automatically advances from slide to slide without user interaction? A. Animation B. Hyperlinks C. Slide Transition D. Slide Show 37. Here are some basic elements of layout and design, which of the following does NOT belong to the group? A. Shapes B. Color C. Lines D. Consistency 38. What website is dedicated to hosting video clips? A. Flickr B. YouTube C. Twitter D. Facebook 39. Which among the websites cater to the hosting of images? A. YouTube B. Twitter C. Flickr D. Facebook 40. It is a social networking service that enables users to send and read short messages with 140 characters. A. Flickr B. YouTube C. Twitter D. Facebook 41. Which website requires the users to register an account and create a user profile? A. YouTube B. Twitter C. Flickr D.Facebook 42. It refers to the physical arrangement of the content and elements on a website. A. Layouts B. Typefaces C. Navigation D. Purpose 43. Refers to the facility that the audience can use to go through the website and its subpages. A. Layouts B. Typefaces C. Navigation D. Purpose 44. ____ alone placed on the website can deliver a complete message that the website wishes to communicate to the audience. A. Purpose B. Typefaces C. Images D. Color 45. It is a computer application (sometimes online or browser-based) that allows you to publish, edit and manipulate, organize and delete web content. A. Content Management System C. Blogging Platform B. Social Media Platforms D. Online Shopping 46. It is an online platform that you can buy anything anytime or anywhere you want. A. Content Management System C. Blogging Platform B. Social Media Platforms D. Online Shopping 47. What does "WWW" stand for in web addresses? A. World Web Widget C. Web World Wide B. World Wide Web D. World Widget Web 48. What is the purpose of a web browser? A. To create web pages C. To search the internet B. To send and receive emails D. To encrypt data 49. Which of the following is NOT a common file format for images? A. JPEG B. GIF C. MP3 D. PNG 50. What is the term for the practice of copying someone else's work or ideas without giving proper credit? A. Plagiarism B. Copyright C. Encryption D. Firewalling
“You don’t need to be scared of the test; that test needs to be scared of you.”