Sei sulla pagina 1di 5

Republic of the Philippines

Department of Education
Region V - Bicol
CAMARINES SUR INTERNATIONAL SCHOOL

EMPOWERMENT TECHNOLOGIES
1ST QUARTER EXAM

NAME: ________________________________ COURSE & SECTION: ______________


DATE: __________ SCORE: ___________

MULTIPLE CHOICE: Encircle the letter of the BEST answer.

1. It is also called the “read only web”.


a. web 1.0 c. web 3.0
b. web 2.0 d. None of the above

2. WWW stands for


a. Word Wide Web c. World Wide Web
b. World War Web d. World Within the Web

3. The advent of the “read-write” web.


a. web 1.0 c. web 3.0
b. web 2.0 d. None of the above

4. It is also called the “read-write-execute” web


a. web 1.0 c. web 3.0
b. web 2.0 d. None of the above

5. The first stage of the World Wide Web.


a. web 1.0 c. web 3.0
b. web 2.0 d. None of the above

6. Founder of Facebook
a. Tim Berners-Lee c. Mark Zuckerberg
b. Bill Gates d. Charles Babbage

7. The following are the most common social media site EXCEPT
a. Facebook c. Instagram
b. Twitter d. Mobile Legends

8. If you can program it, then it’s a ________. If you can’t, then it’s not.” -Mark Andreessen
a. function c. platform
b. system d. code

9. This is a program that duplicates itself and then infects the computer.
a. spyware c. Trojan horse
b. computer worm d. computer virus
10. This refers to deceitful email practice in which the sender address is changed, so that it would
appear to have come from a different source usually someone you know.
a. Email spoofing c. Pharming
b. Phishing d. Email spam

11. Also known as junk email, it is usually unsolicited commercial email sent from one source with
identical message sent to multiple recipients.
a. Email spoofing c. Pharming
b. Phishing d. Email spam

12. This is a deceitful practice of trying to get confidential information such as passwords and
usernames, credit card details by making it appear as if it comes from a trustworthy source.
a. Email spoofing c. Pharming
b. Phishing d. Email spam

13. This is a dangerous hacker attack on a website which directs all traffic to that web site to
another fictitious website.
a. Email spoofing c. Pharming
b. Phishing d. Email spam

14. This is a computer program that is installed covertly on a personal computer to collect
information or even take control over the computer without the knowledge of the user.
a. spyware c. Trojan horse
b. computer worm d. computer virus

15. This is a dangerous computer program that replicates itself through a network. Some can delete
files, other disrupts the network function and still, other send junk mail from infected computer.
a. spyware c. Trojan horse
b. computer worm d. computer virus

16. This is a form of malicious software fronting to perform a good task, but covertly undesirable
function with the intention of entering the computer without the user’s consent.
a. spyware c. Trojan horse
b. computer worm d. computer virus

17. This is a program that duplicates itself and then infects the computer.
a. spyware c. Trojan horse
b. computer worm d. computer virus

18. This is a person who is able to enter and control other people’s computer without authorization.
a. programmer c. IT expert
b. hacker d. none of the above

19. It is where you can set additional protection from threat to your computer, especially when
using the internet.
a. cloud c. screen saver
b. security center d. antivirus
20. It helps in protecting your computer from unauthorized entries, viruses or worms from the
internet or network.
a. firewall c. virus protection
b. automatic updates d. none of the above

21. Another feature of Windows which when turned on will automatically download updates from
Microsoft Windows Website.
a. firewall c. virus protection
b. automatic updates d. none of the above
22. It is usually about the current antivirus software installed in your computer; this option is
recommended to be turned on always.
a. firewall c. virus protection
b. automatic updates d. none of the above

23. It is the most important in drawing conclusion to the various ideas and arguments that one
encounters, and to be able to draw form these data for their real treasure.
a. critical thinking c. problem solving capability
b. analytical skill d. organized data mining

24. It is the ability to present solution or solve problems by presenting a decision based on the given
information.
a. critical thinking c. problem solving capability
b. analytical skill d. organized data mining

25. It is a well-planned design of the database of all the research materials either inside the
computer or hard copies.
a. critical thinking c. problem solving capability
b. analytical skill d. organized data mining

26. The ability to present the ideas and draw conclusions from the research and be able to explain
in writing purpose, step, goals, and objective of the research.
a. critical thinking c. research presentation
b. analytical skill d. organized data mining

27. The ability to look for alternative solution to the problems needed to solve in the research and
thinking not only within the context but also beyond the usual approaches to the research
objectives.
a. creativity and developed imagination c. computer literacy
b. analytical skill d. organized data mining

28. Knowledge of the various computer application and tools when working with large amount of
data helps the researcher manage this information.
a. creativity and developed imagination c. computer literacy
b. analytical skill d. organized data mining
29. These are photos taken by amateur or professional photographers using a digital camera.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos

30. Images that you transfer from printed photos and graphic using scanning devices.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos

31. Photographs and created images that are available for sale. They come in CD or DVD format and
many of these images are royalty-free.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos
32. Photos that are found in the World Wide Web.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos

33. File format that are owned and controlled by individuals or corporations and the file format
specifications are not available in public.
a. proprietary format c. close format
b. open format d. lossless file format

34. Means and ways for storing digital information that are free, can be used by the public and are
not encumbered by copyrights.
a. proprietary format c. close format
b. open format d. raw format

35. It is usually used for storing original file format; it is flexible form but needs bigger memory to
store.
a. Uncompressed format c. both A and B
b. raw format d. none of the above

36. A file format that was compressed to replicate the original quality but reduced files size.
a. proprietary format c. close format
b. open format d. lossless file format

37. Is a multi-platform application which is designed for systemizing, storing, and taking notes.
a. Evernote c. Google Drive
b. Dropbox d. Amazon Cloud Drive

38. A private cloud storage amenity which renders features like a cloud storage, and file exchange
and synchronization.
a. Evernote c. Google Drive
b. Microsoft OneDrive d. Amazon Cloud Drive

39. A free file storage and synchronization service where you can store and exchange documents,
photos, music, videos, etc one place and be able to access it anywhere in the cloud.
a. Microsoft OneDrive c. Google Drive
b. Dropbox d. Amazon Cloud Drive
40. A data storage and file exchange service to save your files and photos from anywhere, and on
any device.
a. Evernote c. Microsoft OneDrive
b. Dropbox d. Amazon Cloud Drive

41. Who is the father of WWW?


a. Tim Berners-Lee c. Mark Zuckerberg
b. Bill Gates d. Charles Babbage

42. What image online format is capable of displaying simple animation?


a. .bmp c. .jpg
b. .gif d. .png

43. Among online file formats for image, which one allows you to display images in full colors with
NO transparency?
a. .bmp c. .jpg
b. .gif d. .png

44. In order to establish SECURITY within website content, one should protect it by using a _____.
a. Pin code c. Password
b. Pattern d. Security code

45. A program designed to create spreadsheets which can later be used to analyzed statistical data.
a. Microsoft Word c. Microsoft Publisher
b. Microsoft Excel d. None of the Above

46. A function that adds a range of cells.


a. ADD c. SUM
b. PLUS d. TOTAL

47. A function that gets the average of a range of cell.


a. AVERAGE c. MEAN
b. SUM d. MEDIAN

48. A function used to count the number of cells that contains something in them if the criteria are
met.
a. COUNT c. COUNTING
b. COUNTNOW d. COUNTER

49. A function used to add a certain range of cells if a condition is met.


a. SUMIF c. TOTALIF
b. ADDIF d. PLUSIF

50. Which of the following is the shortcut for printing documents?


a. Ctrl + S c. Ctrl + F
b. Ctrl + P d. Ctrl + C

Potrebbero piacerti anche