E-TECH 1st Periodical Test - Pasay City East High School - 2024-2025
Document Details
Uploaded by InvincibleAlgorithm6823
Pasay City West High School
2024
Tags
Summary
This is a past paper for Empowerment Technologies from Pasay City East High School, 1st quarter 2024-2025. The exam paper includes questions on ICT, internet, and online safety. It is an important reference for students.
Full Transcript
**Republic of the Philippines** **Department of Education** **NATIONAL CAPITAL REGION** **SCHOOLS DIVISION OF PASAY CITY** **PASAY CITY EAST HIGH SCHOOL** **E. RODRIGUEZ STREET, MALIBAY, PASAY CITY 1300** **EMPOWERMENT TECHNOLOGIES** **1^ST^ PERIODIC EVALUATION on the LEARNING OUTCOMES** **1...
**Republic of the Philippines** **Department of Education** **NATIONAL CAPITAL REGION** **SCHOOLS DIVISION OF PASAY CITY** **PASAY CITY EAST HIGH SCHOOL** **E. RODRIGUEZ STREET, MALIBAY, PASAY CITY 1300** **EMPOWERMENT TECHNOLOGIES** **1^ST^ PERIODIC EVALUATION on the LEARNING OUTCOMES** **1^ST^ Quarter SY 2024-2025** **Name: \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ Grade & Section: \_\_\_\_\_\_\_\_\_\_\_\_\_\_ Score:** **DIRECTIONS:** Read and understand the question/s carefully. **WRITE** the letter of the correct answer on your answer sheet. 1. 2. Which from among the following does ICT stand for? a. Information and Computer Technology b. Information and Computerized Technology c. Information and Communication Technology d. Information and Cyber Technology 3. Which of the following is NOT a benefit of ICT in society? a. used for communication b. platform for advertisement c. access to millions of information d. access to private information 4. Which of among the following does INTERNET stand for? a. Interconnection of Networks b. Interconnecting Networks c. Internet Technology d. Interconnection of Computers 5. What includes several high-bandwidth data lines that comprise the Internet backbone? a. Data c. Internet b. Intranet d. LAN 6. What was invented by Tim Berners-Lee? a. Chrome c. Instagram b. Facebook d. WWW 7. What is being defined as the upgraded version of Web 1.0? a. Web 1.0 c. Web 3.0 b. Web 2.0 d. Web 4.0 8. Which from among the following refers to a network of resources a company can access, and this method of using a digital drive increases the efficiency of an organization? a. Automation c. Big data Analytics b. Cloud computing d. Mobile computing 9. Which among the following are electronic devices or programs that aim to provide support for people with disabilities? a. mobile media c. assistive media b. social media d. smartphones 10. Which from among the following refers to a static page wherein different users will see the same content? a. Web 1.0 c. Web 3.0 b. Web 2.0 d. Web 4.0 11. Which of the following is also known as flat page or stationary page? a. bandwidth c. interactive b. dynamic d. static 12. Which allows users to categorize and classify/arrange information? a. Folksonomy c. Mass Participation b. Long Tail d. Web Pages 13. Which among the following is a hypertext document connected to the World Wide Web? a. Folksonomy c. Mass Participation b. Long Tail d. Web Pages 14. Which of the following is being defined as something that is created to invade and destroy computer systems? a. Malware c. Virus b. Spam d. Worm 15. Which refers to a network zombie that performs large scale malicious acts for the creator of the bot net? a. Internet Bots c. Pharming b. Internet Scam d. Phishing 16. Which include books, newspapers, magazines, journals, and any other hard-copy sources such as official records? a. online sources c. print sources b. internet sources d. none of the above 17. Which from among the following refers to a malicious website that resembles a legitimate website, used to gather information? a. Internet Bots c. malware b. Internet Scam d. Phishing 18. Which from among the following refers to the use of electronic devices to harass or stalk individuals or groups? a. Computer bug c. Cyber bullying b. Cyber Stalking d. Spam 19. Which from among the following refers to the practices and precautions that should be observed when using the internet? a. Cyber bullying c. Online threats b. Cyber stalking d. Online safety 20. Which among the following Is a program designed to replicate by attaching itself into another computer program? a. Malware c. Virus b. Spam d. Worm 21. What is being defined as an act performed by knowledgeable computer user sometimes referred to as hackers? a. Cyber bullying c. Online threats b. Cyber stalking d. Online safety 22. Which internet threat goals to acquire sensitive personal information like passwords. a. Internet Bots c. Virus b. Malware d. Phishing 23. Which is an act of tormenting, threatening, harassing or embarrassing another person using the internet or other technologies? a. Cyber bullying c. Online threats b. Cyber stalking d. Online safety 24. What is Adware? a. A type of fraudulent behavior in its most basic form. b. Leave your computer vulnerable to hackers, allowing them to steal any data on your computer. c. Designed to propagate at an alarming rate, they usually attach themselves discreetly to downloads. d. A valid technique of generating advertising money that helps fund development is frequently included in many shareware or freeware downloads. 25. What is a virus? a. A type of fraudulent behavior in its most basic form. b. Leave your computer vulnerable to hackers, allowing them to steal any data on your computer. c. Designed to propagate at an alarming rate, they usually attach themselves discreetly to downloads. d. A valid technique of generating advertising money that helps fund development is frequently included in many shareware or freeware downloads. 26. Which among the following is a method that involves the collection of information from the Internet? a. research c. online system b. online research d. None of the above 27. Which was invented to help people quickly find information online? a. magazines c. radio b. televisions d. search engine 28. What law protects creators of original material from unauthorized duplication or use? a. copyright c. plagiarism b. copywrite d. data privacy 29. Which of the following shows an advantage of online research? a. Easy access to large information b. It is hard to determine if sources are reliable c. One may encounter inconsistent information d. all of the above 30. What are the steps in a simple search process? a. clarify c. evaluate b. search d. all of the above 31. Which of the following is not a file extension? a. PDF c. PSD b. RAW d. ILY 32. Which among the following is a disadvantage of dynamic information sources? a. Information may be biased. b. can be updated quickly as changes happen. c. can access a lot of content. d. people can access the information at the same time. 33. Which of the following is not a component of online system? a. Terminal devices c. Server b. Network d. Peopleware 34. Which among the following is a type of software that enables the user to create, edit, and format text using various tools. a. word press c. google sheet b. word processor d. Google drive 35. How can we use a word processor aside from using it through a computer or laptop? a. mobile devices c. radio b. television d. all of the above 36. Which among the following is a features of word processor that adds objects such as tables, images, and shapes? a. copy c. delete b. cut d. insert 37. Which is not an example of an offline editing tool? a. Adobe Photoshop c. Autodesk Pixler b. Google Sketch UP d. Instagram 38. Which among the following pertains to photos, illustrations, shapes, or objects. a. graphics c. shapes b. lines d. clip art 39. Which among the following is not an example of a word processor? a. google docs c. MS Word b. google slide d. both a and b 40. What sets the layout of the entire document? a. copy c. find b. cut d. page layout 41. Which word processor tool is used when searching for a string of text and providing an option to replace it with another? a. copy c. find b. cut d. page layout 42. What platform should be used if Albert is about to make a flood hazard map in their city? a. Location tool c. Finding tool b. Mapping tool d. Margin tool 43. How can you make a group of merge field that make up an address in a mail merge document? a. Insert Mailings c. Insert Address Bloc b. Insert Recipient List d. Insert Merge Field 44. What features of word processor should be used if Arjo wants to remove the background of the image that he used for his infographics? a. Format+Picture Tools+Correction b. Format+Picture Tools+Remove Background c. Format+Picture Tools+Color d. Format+Picture Tools+position 45. What should Anna do to improve her report if she placed clip art in her report, used those that are installed in the program and decided the graphics were too small and were not properly aligned with the text after she printed the document? a. She can adjust the size of the clip art using the 'Height and Width' feature. Then she can align it with 'Wrap Text'. b. She can adjust the size of the clip art using the 'Correction' feature. Then she can align it with 'Wrap Text'. c. She can adjust the size of the clip art using the 'Height and Width' feature. Then she can align it with 'Text Alignment'. d. She can just reset the picture using 'Reset Picture'. 46. Which lets the user manage the document using functions such as save, print, and open? a. file c. print b. word wrap d. page layout 47. Which word processor features formats the alignment of your text and object/s? a. file c. print b. word wrap d. page layout 48. What menu do you use to start a mail merge? a. Home c. Mailings b. Insert d. View 49. Which from among the following refers to a powerful tool that combines customized documents with another file from a data source? a. e-mail c. mailings b. mail merge d. word processor 50. Which from among the following refers to the content or template of the mail? a. mailings c. recipient list b. main documents d. word processor 51. Rose was doing an essay about Philippine cuisine. To give some examples of foods that can only be tasted in the country, she decided to insert some pictures. However, once inserted, one picture became darker. She also noticed that two other pictures had unwanted backgrounds. What features of word processor she could use to resolve her concerns? a. correction c. both a and b b. remove background d. none of the above