Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Department of Education
Region V - Bicol
CAMARINES SUR INTERNATIONAL SCHOOL
EMPOWERMENT TECHNOLOGIES
1ST QUARTER EXAM
6. Founder of Facebook
a. Tim Berners-Lee c. Mark Zuckerberg
b. Bill Gates d. Charles Babbage
7. The following are the most common social media site EXCEPT
a. Facebook c. Instagram
b. Twitter d. Mobile Legends
8. If you can program it, then it’s a ________. If you can’t, then it’s not.” -Mark Andreessen
a. function c. platform
b. system d. code
9. This is a program that duplicates itself and then infects the computer.
a. spyware c. Trojan horse
b. computer worm d. computer virus
10. This refers to deceitful email practice in which the sender address is changed, so that it would
appear to have come from a different source usually someone you know.
a. Email spoofing c. Pharming
b. Phishing d. Email spam
11. Also known as junk email, it is usually unsolicited commercial email sent from one source with
identical message sent to multiple recipients.
a. Email spoofing c. Pharming
b. Phishing d. Email spam
12. This is a deceitful practice of trying to get confidential information such as passwords and
usernames, credit card details by making it appear as if it comes from a trustworthy source.
a. Email spoofing c. Pharming
b. Phishing d. Email spam
13. This is a dangerous hacker attack on a website which directs all traffic to that web site to
another fictitious website.
a. Email spoofing c. Pharming
b. Phishing d. Email spam
14. This is a computer program that is installed covertly on a personal computer to collect
information or even take control over the computer without the knowledge of the user.
a. spyware c. Trojan horse
b. computer worm d. computer virus
15. This is a dangerous computer program that replicates itself through a network. Some can delete
files, other disrupts the network function and still, other send junk mail from infected computer.
a. spyware c. Trojan horse
b. computer worm d. computer virus
16. This is a form of malicious software fronting to perform a good task, but covertly undesirable
function with the intention of entering the computer without the user’s consent.
a. spyware c. Trojan horse
b. computer worm d. computer virus
17. This is a program that duplicates itself and then infects the computer.
a. spyware c. Trojan horse
b. computer worm d. computer virus
18. This is a person who is able to enter and control other people’s computer without authorization.
a. programmer c. IT expert
b. hacker d. none of the above
19. It is where you can set additional protection from threat to your computer, especially when
using the internet.
a. cloud c. screen saver
b. security center d. antivirus
20. It helps in protecting your computer from unauthorized entries, viruses or worms from the
internet or network.
a. firewall c. virus protection
b. automatic updates d. none of the above
21. Another feature of Windows which when turned on will automatically download updates from
Microsoft Windows Website.
a. firewall c. virus protection
b. automatic updates d. none of the above
22. It is usually about the current antivirus software installed in your computer; this option is
recommended to be turned on always.
a. firewall c. virus protection
b. automatic updates d. none of the above
23. It is the most important in drawing conclusion to the various ideas and arguments that one
encounters, and to be able to draw form these data for their real treasure.
a. critical thinking c. problem solving capability
b. analytical skill d. organized data mining
24. It is the ability to present solution or solve problems by presenting a decision based on the given
information.
a. critical thinking c. problem solving capability
b. analytical skill d. organized data mining
25. It is a well-planned design of the database of all the research materials either inside the
computer or hard copies.
a. critical thinking c. problem solving capability
b. analytical skill d. organized data mining
26. The ability to present the ideas and draw conclusions from the research and be able to explain
in writing purpose, step, goals, and objective of the research.
a. critical thinking c. research presentation
b. analytical skill d. organized data mining
27. The ability to look for alternative solution to the problems needed to solve in the research and
thinking not only within the context but also beyond the usual approaches to the research
objectives.
a. creativity and developed imagination c. computer literacy
b. analytical skill d. organized data mining
28. Knowledge of the various computer application and tools when working with large amount of
data helps the researcher manage this information.
a. creativity and developed imagination c. computer literacy
b. analytical skill d. organized data mining
29. These are photos taken by amateur or professional photographers using a digital camera.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos
30. Images that you transfer from printed photos and graphic using scanning devices.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos
31. Photographs and created images that are available for sale. They come in CD or DVD format and
many of these images are royalty-free.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos
32. Photos that are found in the World Wide Web.
a. Personal And Professional Photos c. Stock Photo Library
b. Scanned Images d. Online Stock Photos
33. File format that are owned and controlled by individuals or corporations and the file format
specifications are not available in public.
a. proprietary format c. close format
b. open format d. lossless file format
34. Means and ways for storing digital information that are free, can be used by the public and are
not encumbered by copyrights.
a. proprietary format c. close format
b. open format d. raw format
35. It is usually used for storing original file format; it is flexible form but needs bigger memory to
store.
a. Uncompressed format c. both A and B
b. raw format d. none of the above
36. A file format that was compressed to replicate the original quality but reduced files size.
a. proprietary format c. close format
b. open format d. lossless file format
37. Is a multi-platform application which is designed for systemizing, storing, and taking notes.
a. Evernote c. Google Drive
b. Dropbox d. Amazon Cloud Drive
38. A private cloud storage amenity which renders features like a cloud storage, and file exchange
and synchronization.
a. Evernote c. Google Drive
b. Microsoft OneDrive d. Amazon Cloud Drive
39. A free file storage and synchronization service where you can store and exchange documents,
photos, music, videos, etc one place and be able to access it anywhere in the cloud.
a. Microsoft OneDrive c. Google Drive
b. Dropbox d. Amazon Cloud Drive
40. A data storage and file exchange service to save your files and photos from anywhere, and on
any device.
a. Evernote c. Microsoft OneDrive
b. Dropbox d. Amazon Cloud Drive
43. Among online file formats for image, which one allows you to display images in full colors with
NO transparency?
a. .bmp c. .jpg
b. .gif d. .png
44. In order to establish SECURITY within website content, one should protect it by using a _____.
a. Pin code c. Password
b. Pattern d. Security code
45. A program designed to create spreadsheets which can later be used to analyzed statistical data.
a. Microsoft Word c. Microsoft Publisher
b. Microsoft Excel d. None of the Above
48. A function used to count the number of cells that contains something in them if the criteria are
met.
a. COUNT c. COUNTING
b. COUNTNOW d. COUNTER