Empowerment and Technologies Exam S.Y. 2024-2025

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following font styles is commonly used for official documents?

  • Times New Roman (correct)
  • Comic Sans
  • Arial Narrow
  • Papyrus

What is the default page size for a Microsoft Word document?

  • A4
  • Letter (correct)
  • Tabloid
  • Legal

How is text italicized in Microsoft Word?

  • By selecting 'Italic' from the font menu
  • By using the strikethrough option
  • By pressing Ctrl + I (correct)
  • By pressing Ctrl + U

Which of the following describes the term 'cursor' in computing?

<p>The mouse pointer (B)</p> Signup and view all the answers

What is the correct formula for adding numbers in Microsoft Excel?

<p>=SUM() (B)</p> Signup and view all the answers

Which action allows you to move a picture within a Word document?

<p>Select and drag it (A)</p> Signup and view all the answers

Which application is most suitable for creating a spreadsheet?

<p>Microsoft Excel (B)</p> Signup and view all the answers

What is one correct way to save a document in Microsoft Word?

<p>Pressing Ctrl + S (D)</p> Signup and view all the answers

What is the standard layout size for a resume?

<p>A4 (D)</p> Signup and view all the answers

Which of the following best describes Web 1.0?

<p>Static web pages with limited interactivity (C)</p> Signup and view all the answers

What is a common technique for effective web browsing?

<p>Using specific keywords or phrases in searches (C)</p> Signup and view all the answers

Which statement correctly reflects the issue of copyright infringement?

<p>It is punishable by law when used without consent (A)</p> Signup and view all the answers

What operation system do Blackberry devices typically use?

<p>BlackBerry OS (A)</p> Signup and view all the answers

What is the main difference between phishing and pharming?

<p>Pharming redirects users to fake websites without their knowledge (D)</p> Signup and view all the answers

What is defined as malicious software?

<p>Software that is intended to disrupt or harm systems (B)</p> Signup and view all the answers

What should one do if their laptop slows down and files are deleted after downloading a video?

<p>Run a malware scan immediately (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Examination Overview

  • Multiple-choice format aimed at assessing knowledge in Empowerment and Technologies.
  • Relevant for students of the Republic of the Philippines, Department of Education for the first semester of S.Y. 2024-2025.

Key Topics Covered

  • Font Styles:

    • Examples include Times New Roman, Arial, and Calibri.
    • Commonly used in professional documents like application letters.
  • Document Formatting:

    • Default page size for Word documents is typically A4.
    • Standard layout size for resumes is essential for job applications.
  • Image Manipulation in Word:

    • To move a picture, click and drag or use the picture formatting options.
    • Inserting images can be accomplished through the "Insert" tab.
  • Spreadsheet Functions in Excel:

    • Basic formulas for addition, subtraction, multiplication, and division.
    • Example formulas include "=A1+B1", "=A2-B2", "=A3*B3", and "=A4/B4".
  • Web Technologies:

    • Difference between Web 2.0 and Web 3.0; emphasis on interactivity and data connectivity in later versions.
    • Basic understanding of the Semantic Web and its practical implications.

Cybersecurity Awareness

  • Definitions and differences between phishing (fraudulent attempts to obtain sensitive data) and pharming (redirecting users from legitimate websites).
  • Importance of recognizing the risks associated with malware, including viruses and malicious software.

Practical Application Scenarios

  • Approaches to job searching during a pandemic, emphasizing remote applications using online platforms.
  • Strategies for managing technology issues, such as slow computers or potential hacking incidents, emphasizing the need for cybersecurity measures.

General Knowledge of Computing

  • The significance of understanding web browsing techniques for effective internet searching.
  • Recognition of the inventor of the World Wide Web, Tim Berners-Lee, in 1989.
  • Awareness of the operating systems used in various devices, including BlackBerry.

Ethical Considerations

  • Issues surrounding copyright infringement and the legal repercussions for unauthorized use of someone's work.
  • Importance of vigilance regarding unsolicited downloads, which can lead to system vulnerabilities and data loss.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser