100% found this document useful (1 vote)
119 views4 pages

Final Exam Empowerment With Key

The document is a practice exam for a high school Empowerment Technologies course. It contains 43 multiple choice questions testing students' knowledge of topics like office software, online safety, digital citizenship, and emerging technologies.

Uploaded by

Paulina Paquibot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
119 views4 pages

Final Exam Empowerment With Key

The document is a practice exam for a high school Empowerment Technologies course. It contains 43 multiple choice questions testing students' knowledge of topics like office software, online safety, digital citizenship, and emerging technologies.

Uploaded by

Paulina Paquibot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Republic of the Philippines

Department of Education
Region VII, Central Visayas
DIVISION OF LAPU-LAPU
DISTRICT X
NEMESIO-EPIFANIA TANEO MEMORIAL HIGH SCHOOL
SENIOR HIGH SCHOOL DEPARTMENT

4TH QUARTER EXAMINATION


EMPOWERMENT TECHNOLOGIES
SECOND SEMESTER. S.Y. 2023 – 2024

Name:_______________________________________________ Date:_____________ Score:__________

I. Multiple Choice: Write the letters that correspond to your answer. All answers should be CAPITALIZE.

_____1. It is a program designed to create spreadsheets which can later be used to analyzed statistical data?
A. MS Word B. MS Exel C. MS Powerpoint D. MS publisher
_____2. The Yolanda people finder that was used to locate individuals during and after the storm was created
by
A. Google B. Microsoft C. ABS-CBN D. GMA
_____3. A “coming together of two or more disparate disciplines or technologies”.
A. Collaborative platforms B. ICT C. Convergent Technologies D. Mobile Media
_____4. An umbrella term that includes any communication device or application
A. Collaborative platforms B. ICT C. Convergent Technologies D. Mobile Media
_____5. A media devices such as mobile phones and PDA’s were the primary source of portable media from
which we could obtain information and communicate with one another.
A. Collaborative platforms B. ICT C. Convergent Technologies D. Mobile Media
_____6. Online versions of information systems, which is “the process of and tools for storing, managing,
using, and gathering of data and communications in an organization.
A. Mobile Media B. Web 1.0 C. Online systems D. Social Media
_____7. Are computer-mediated tools that allow people or companies to create, share, or exchange
information, career interests, ideas, and pictures/videos in virtual communities and networks.
A. Mobile Media B. Web 1.0 C. Online systems D. Social Media
_____8. Describes World Wide Web sites that emphasize user-generated content, usability, and
interoperability. Known as “dynamic web”.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
_____9. A web version that used semantic web.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
_____10. A web design version that based on “static web”.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
_____11. This is done by sending you an email that will direct the user to visit a website and be asked to
update his/her username, password, credit card, or personal information.
A. Spam B. Phishing C. Virus D. Malware
_____12. A malicious program that transfer from one computer to another by any type of means. Often, it uses
a computer network to spread itself. For example, the ILOVEYOU worm (Love bug Worm)
A. Virus B. Adware C. Trojan D. Worm
_____13. A malicious program designed to replicate itself and transfer from one computer to another either
through the internet and local networks or data storage like flash drives and CD’s.
A. Worm B. Trojan C. Virus D. Adware
_____14. A malicious program that is disguised as a useful program but once downloaded or installed, leaves
your PC unprotected and allows hackers to get your information.
A. Worm B. Trojan C. Virus D. Adware
_____15. A program that runs in the background without you knowing it.
A. Spam B. Trojan C. Spyware D. Phishing
_____16. A program designed to send you advertisements, mostly as pop-ups
A. Virus B. Adware C. Trojan D. Worm
_____17. Unwanted email mostly from bots or advertisers. It can be used to send malware.
A. Spam B. Trojan C. Spyware D. Phishing
_____18. Stands for malicious software.
A. Spam B. Phishing C. Virus D. Malware
_____19. A short message of fewer than 160 characters sent from a cell phone.
A. Podcast B. SMS C. P2P, or Peer-to-Peer D. MMOG
_____20. Usually an online virtual world that multiple players navigate and play in together.
A. Podcast B. SMS C. P2P, or Peer-to-Peer D. MMOG
_____21. Can be verbal, based on a certain topic, or can include music, video, and commentary.
A. Podcast B. SMS C. P2P, or Peer-to-Peer D. MMOG
_____22. Network allows for sharing of mp3s, videos, and other digital files by transferring information directly
between two computers rather than by going through a central server.
A. Podcast B. SMS C. P2P, or Peer-to-Peer D. MMOG
_____23. A two- or three-dimensional icon that represents a computer user or a gamer.
A. Flaming B. Aggregator C. Blog D. Avatar
_____24. From the term “weblog”, is a type of website usually updated by an individual or a group of bloggers.
A. Flaming B. Aggregator C. Blog D. Avatar
_____25. A website or Web application where headlines and other content are collected for easy viewing.
A. Flaming B. Aggregator C. Blog D. Avatar
_____26. An act of saying mean things online, usually in ALL CAPS, and often in a public forum with the
intention to humiliate.
A. Flaming B. Aggregator C. Blog D. Avatar
_____27. A remix or blend of multiple songs, videos, or other media content into one product.
A. Blog B. Mash-up C. MMOG D. SMS
_____28. A handy tool for both saving time and getting a feel for what people are searching.
A. Reverse Image B. Autocomplete C. Site D. Define
_____29. Google displays all the definitions it finds on the web.
A. Reverse Image B. Autocomplete C. Site D. Define
_____30. Useful to find product names, recipes, and more.
A. Reverse Image B. Autocomplete C. Site D. Define
_____31. An exact address of a particular wedsite.
A. Reverse Image B. Autocomplete C. Site D. Define
_____32. One of its advantages is only one document needs to be composed for communicating to an
extensive list of interested people, clients or customers.
A. Print merge B. Mail merge C. Send merge D. View merge
_____33. Which of the following is NOT a component of the mail merge?
A. Address B. File name C. Form document D. Data File
_____34. Where can you find the Start Mail Merge button?
A. File Tab B. Mailings Tab C. References Tab D. Home Tab
_____35. What tells Microsoft Word exactly where to place the information coming from the data file to the
main document?
A. Data source B. Insertion line C. Place holder D. Insertion tag
_____36. What types of document can you create using mail merge?
A. Envelopes B. Letters C. Posters D. Labels
_____37. What button allows you to see the result of your mail merge even before you print or send it out?
A. Preview results B. Insert merge field C. Address block D. greeting line
_____38. What file contains the information you need to merge with your main document?
A. Address block B. Contact list C. Data File D. Directory
_____39. What essential component of mail merge is required from users when generating labels?
A. Data file B. Form document C. Place holder D. Merge field
_____40. What image compression/file type is capable of displaying simple animation?
A. .bmp B. .gif C. .jpg D. .png
_____41. The following are tips to stay safe online, except ___
A. Read Terms and Conditions
B. Keep a private profile
C. Add friends as many as you like
D. Buy the software; do not use pirated ones.
_____42. What actions would you take to perform if someone uses your work without your consent?
A. I’ll just ignored it.
B. I’ll talk to him and ask why he used my work.
C. I’ll file a case of plagiarism against him
D. I’ll let him pay my work
_____43. What would happen if someone committed or assisted through the use of the Internet?
A. He will be punished by law.
B. He will be filed a cybercrime case.
C. He will be imprisoned.
D. All of the above.
____44. You have your Facebook account which is set to public and have gained 1000 friends online.
One day, you wanted to open an online selling of your pre-loved dresses, what will you do?
A. Create another Facebook account for online selling only and gain new friends online.
B. Create a group within your Facebook account so that all your friends may see it.
C. You will just post a picture of your pre-loved dress so that your friends will see it.
D. You will use Facebook Live
____45. How effective is Facebook Live?
A. You can communicate with the person in real time.
B. You can watch what’s happening at the moment.
C. You can comment and give feedback right away.
D. All of the above
____46. The following are tips to stay safe online, except ___
A. Read Terms and Conditions
B. Keep a private profile
C. Add friends as many as you like
D. Buy the software; do not use pirated ones.
____47. How would you determine if the virus entered to your computer is a Trojan virus?
A. If disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows
hacker to get your information
B. It has the ability to monitor what you are currently doing and typing through key logging.
C. If it replicates itself and transfer from one file folder to another and also transfer to other computers.
D. All of the above
____48. Online Collaboration means
A. Working together even if the members are in the distant places.
B. It is working together as if you are already in one own office.
C. Both a and b
D. None of the above
Republic of the Philippines
Department of Education
Region VII, Central Visayas
DIVISION OF LAPU-LAPU
DISTRICT X
NEMESIO-EPIFANIA TANEO MEMORIAL HIGH SCHOOL
SENIOR HIGH SCHOOL DEPARTMENT

FOURTH QUARTER EXAM IN


EMPOWERMENT TECHNOLOGIES
SECOND SEMESTER. S.Y. 2023 – 2024

ANSWERKEY

1. B
2. A
3. C
4. B
5. D
6. C
7. D
8. A
9. C
10. B
11. B
12. D
13. C
14. B
15. C
16. B
17. A
18. D
19. B
20. D
21. A
22. C
23. D
24. C
25. B
26. A
27. B
28. B
29. D
30. A
31. C
32. B
33. A
34. B
35. A
36. D
37. A
38. C
39. D
40. B
41. C
42. B
43. D
44. C
45. D
46. C
47. D
48. C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy