Sunteți pe pagina 1din 6

Republic of the PhilippinesDepartment of Education

Region VI-Western Visayas


Schools Division of Iloilo
DE LA PAZ NATIONAL HIGH SCHOOL
Banate, Iloilo

First Quarter Examination in Empowerment Technologies


TEST I. Direction: Select the best answer.

1. Which refers to the collection of technologies in the field of hardware and software that enable communication
from one point to another over long distances?
a. Telephone system
b. Internet
c. World Wide Web
d. ICT
2. Which of the following laws protects an individual’s privacy online?
a. Cybercrime Prevention Act
b. Anti-Bullying Act
c. Republic Act 10628
d. Republic Act 9292
3. Which refers to the transmission of unsolicited messages from various origins via the Internet?
a. Spam
b. Phishing
c. Malware
d. Virus
4. Which technology anchored the development of modern-day ICT?
a. Telegraph
b. Internet
c. Telephone network
d. Morse code
5. What do you call a software tool that is used to produce multiple documents with a given template?
a. Mail Merge
b. Hyperlink
c. Animation
d. E-mail
6. What was the first method of communication of humans?
a. Internet
b. Telegraph
c. Pictures
d. Telephone
7. The first written symbols were written in what type of media?
a. Stones
b. Paper
c. Books
d. Newspaper
8. What type of web is referred to as the “read and write Web”?
a. Web 1.5
b. Web 3.0
c. Web 2.0
d. Web 1.0
9. Which is a term that describes the manners or etiquette of an individual when using the Internet?
a. Behavior
b. Etiquette
c. Policy
d. Netiquette
10. The number system, system of counting, and mathematics started in which period?
a. Premechanical
b. Electronic
c. Mechanical
d. Today
11. Which is an alternative source of information aside from written articles and published materials?
a. Web site
b. Hyperlink
c. Photo
d. Infographics
12. Which of the following is a manually operated computer or calculator?
a. Abacus
b. Slide rule
c. ENIAC
d. Fingers
13. What type of web is referred to as the “semantic executing Web”?
a. Web 1.5
b. Web 3.0
c. Web 2.0
d. Web 1.0
14. Which of the following terms describe the person who is a member of an online community?
a. Community
b. Netizen
c. Social media
d. World Wide Web
15. Which is defined as the transmission of unsolicited messages from various origins using electronic messaging
systems such as e-mail and chat messages?
a. UBE
b. Virus
c. Spam
d. Phishing
16. What do you call the programs which are designed to search information on the Internet?
a. Social media
b. Search engine
c. Web sites
d. Research index
17. What software or program is used by an attacker to obtain personal information?
a. Phishing
b. Virus
c. Spam
d. Malware
18. What do you call a reference to another file that is represented by a word, an image, or any document element on a
document processor?
a. Mail merge
b. Hyperlink
c. Animation
d. E-mail
19. Which law prohibits the use of an individual’s information to disgrace him or her online?
a. Cybercrime Prevention Act
b. Anti-Bullying Act
c. Republic Act 10275
d. Republic Act 9292
20. What is defined as a software or a program used by an attacker to obtain personal information?
a. Spam
b. Phishing
c. Malware
d. Virus
21. Which of these infographic elements can be combined to produce combinations that can catch audience’s
attention?
a. Colors
b. Lines
c. Images
d. Shapes
22. In what period did the telegraph became popular?
a. Premechanical
b. Electronic
c. Mechanical
d. Electromechanical
23. Which is a computer software sent by online attackers to inflict chaos on the computer’s operation and processes?
a. Spam
b. Phishing
c. Malware
d. Hacker
24. Which of the following refers to a program created by developers that can be modified or reprogrammed by other
users?
a. Platform
b. Social media
c. World Wide Web
d. Spam
25. What do you call the second stage of development of the World Wide Web, characterized especially by the change
from static web pages to dynamic or user-generated content and the growth of social media?
a. Web 2.0
b. Web 3.0
c. Web 4.0
d. Web 5.0
e. Web 2.5
26. What do you call the type of web as connective intelligence; connecting data, concepts, and applications of people?
a. Web 2.0
b. Web 3.0
c. Web 4.0
d. Web 5.0
e. Other:
27. What do you call the computer-mediated technologies that facilitate the creation and sharing of information, ideas,
career interests and other forms of expression?
a. Etiquette
b. Mobile media
c. Internet Safety
d. Social media
e. Other:
28. What particular media which are evolving rapidly and while mobile phones will continue to be the mainstay?
a. Etiquette
b. Mobile media
c. Internet Safety
d. Social media
e. Internet Communication
29. What particular code of behavior that delineates expectations for social behavior according to contemporary
conventional norms within a society, social class, or group?
a. Etiquette
b. Mobile media
c. Internet Safety
d. Social media
e. Social interaction
30. What do you call the knowledge of maximizing the user's personal safety and security risks to private information and
property associated with using the internet, and the self-protection from computer crime in general?
a. Etiquette
b. Mobile media
c. Internet Safety
d. Social media
e. Social Savvy
31. What particular awareness of rules that either punish or reward us for doing something: younger children are most
motivated by a fear of being punished for bad behaviour, but become more concerned with the rewards of good
behaviour as they get older?
a. Ethics
b. Mail merge
c. Research Skills
d. Online system
e. World Wide Web
32. What particular state of connectivity to the cyberspace through a medium of internet or computer network?
a. ethics
b. Mail merge
c. Research Skills
d. Online system
e. Social System
33. What particular skills that lead to an original contribution to knowledge in a particular field of inquiry by defining an
important question or problem and then answering or solving it in a systematic way?
a. ethics
b. Mail merge
c. Research Skills
d. Online system
e. Social Skills
34. When you open your email, an unwanted email was sent and coming from a well-known advertisers.
a. Trojan
b. Spyware
c. Spam
d. Phishing
e. Worm
35. What is an automatic addition of names and addresses from a database to letters and envelopes in order to facilitate
sending mail, especially advertising, to many addresses?
a. Ethics
b. Mail merge
c. Research Skills
d. Online system
e. Ethical Merging
36. What is a set of effects which can be applied to objects in PowerPoint so that they will animate in the Slide Show
Power Point?
a. Complex formulas
b. Embedded file
c. Hyperlink
d. Custom Animation
e. Custom Design
37. What do you call a link from a hypertext file or document to another location or file, typically activated by clicking on
a highlighted word or image on the screen?
a. Complex formulas
b. Embedded file
c. Hyperlink
d. Custom Animation
e. Hyperlink animation
38. What refers to any type of multimedia file that you might insert, or embed into the Web page which includes files like
graphics and sound files including Powering Up Digital Transformation such as embedded command, embedded
object?
a. Complex formulas
b. Embedded file
c. Hyperlink
d. Custom Animation
e. Linking file
39. What refers to the use of multiple mathematical operators, as well as those that use absolute and relative
references?
a. Complex formulas
b. Embedded file
c. Hyperlink
d. Custom Animation
e. Referencing
40. What refers to the visual image such as a chart or diagram used to represent information or data?
a. Infographics
b. Application platforms
c. Open-source software
d. image hosting
e. visualization
TEST II. Direction: Read the statement carefully. Write true if the statement is correct and false if the given statement is
incorrect.
_____1.My computer has an antivirus so it is okay to open most email attachments like e-cards
video files.
_____2. Philippines is dub as the ‘’ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is BPO,
Business Process Outsourcing, or call centers.
_____3. Popular social networking sites such as Twitter, Instagram, Facebook, etc. does not use tags that start with a
pound sign (#) or hashtag.
_____4. You received an email stating that your mother’s bank account is going to be forfeited if
you will not respond to the email. Is it safe to reply?
_____5. You forgot that your essay for English class is due tomorrow. While doing your research
, you found a website offering free essay. Is it okay to use the essays from this website?
_____6. A virus is a malware that multiplies and infects other computers through flash drives.
_____7. Blogs and Forums are websites that allow user to post their content..
_____8. Search engines can scan websites for search results even if you have set your post to
“private”.
_____9. There is a danger in posting information about a future vacation.
_____10. Letting people know your birthday is probably a must if you want to get as many gifts
as possible. But having it in your profile makes you vulnerable to identity theft.

“EDUCATION is a gift, a lifelong opportunity that could be our ticket


towards success and remarkable excellence.”-IVAN B. PLANTO

S-ar putea să vă placă și