0% found this document useful (0 votes)
12 views5 pages

E-TECH-3rd-Quarter Examination

The document is a third quarterly examination for Empowerment Technology at San Remigio National High School, consisting of multiple-choice questions covering topics related to Information and Communication Technology (ICT), software applications, and online safety. It includes an answer key with explanations for each question, ensuring clarity on the concepts assessed. The exam aims to evaluate students' understanding of ICT and its applications in various contexts.

Uploaded by

Jundell Diaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views5 pages

E-TECH-3rd-Quarter Examination

The document is a third quarterly examination for Empowerment Technology at San Remigio National High School, consisting of multiple-choice questions covering topics related to Information and Communication Technology (ICT), software applications, and online safety. It includes an answer key with explanations for each question, ensuring clarity on the concepts assessed. The exam aims to evaluate students' understanding of ICT and its applications in various contexts.

Uploaded by

Jundell Diaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Republic of the Philippines

Department of Education
Division of Cebu Province
District of San Remigio I
SAN REMIGIO NATIONAL HIGH SCHOOL
Poblacion, San Remigio, Cebu

THIRD QUARTERLY EXAMINATION IN EMPOWERMENT TECHNOLOGY


NAME: ______________________________________ SCORE: ________________________
GRADE/SECTION: ___________________________ DATE: _________________________

I. MULTIPLE CHOICE. Read the questions carefully and encircle the letter that corresponds to your
answer. STRICTLY NO ERASURES.

1. What does ICT stand for?


a. Information and Communication Tools c. Information and Computer Technology
b. Internet and Communication Technology d. Information and Communication Technology
2. Which of the following is an example of ICT?
a. Typewriter b. Smartphone c. Chalkboard d. Whiteboard
3. What is the main purpose of productivity software?
a. Entertainment c. Creating and managing digital content
b. Browsing the internet d. Playing games
4. What is Netiquette?
a. Internet-based ticketing system c. Online safety guidelines
b. Rules for proper behavior on the internet d. Website development technique
5. Which of the following is an example of a search engine?
a. Facebook b. YouTube c. Google d. Netflix
6. What is the default file extension of a Microsoft Word document?
a. .txt b. .docx c. .xlsx d. .pdf
7. Which of the following is NOT a spreadsheet software?
a. Microsoft Excel b. Google Sheets c. LibreOffice Calc d. Adobe Photoshop
8. What is the primary function of a word processor?
a. Creating spreadsheets b. Editing videos c. Writing and formatting text d. Managing database
9. Which key combination is used to copy text in most software applications?
a. Ctrl + V b. Ctrl + C c. Ctrl + X d. Ctrl + Z
10. What is “cyberbullying”?
a. A form of online gaming c. A secure way of communicating
b. Harassment using electronic communication d. A method of securing data
11. What is the best way to prevent phishing attacks?
a. Click on all links received in emails c. Verify the sender before clicking on links
b. Always use the same password d. Download files from unknown sources
12. What tool is used to calculate numerical data in a spreadsheet?
a. Charts b. Pivot Tables c. Formulas d. Formatting Tools
13. What does SSL stand for in website security?
a. Secure Socket Layer c. System Software License
b. Safe Security Link d. Smart Software Language
14. Which file format is best for printing a final document?
a. .docx b. .xls c. .pdf d. .txt
15. What is the primary function of Google Sheets?
a. Create and edit text documents c. Browse websites
b. Organize and analyze data in a spreadsheet d. Create video animations
16. What is the purpose of a mail merge in word processing?
a. Combining multiple documents into one c. Sending personalized messages to multiple recipients
b. Encrypting email messages d. Formatting text documents
17. Which software is commonly used for data analysis?
a. Microsoft Word b. Microsoft Excel c. Microsoft PowerPoint d. Microsoft Publisher
18. What is the shortcut key for undo in most applications?
a. Ctrl + U b. Ctrl + Z c. Ctrl + X d. Ctrl + Y
19. What feature in Microsoft Word automatically moves text to the next line without pressing Enter?
a. Text Wrapping b. Line Break c. Word Wrap d. Paragraph Spacing
20. In a spreadsheet, what symbol is used for multiplication in formulas?
a. × b. * c. / d. #
21. What is the purpose of the SUM function in a spreadsheet?
a. To calculate the total of selected values c. To find the largest value in a range
b. To count the number of cells d. To sort values in a column
22. What is data validation in spreadsheets used for?
a. Creating graphs c. Restricting the type of data entered in a cell
b. Formatting text d. Inserting hyperlinks
23. What does Ctrl + P do in most applications?
a. Pastes copied text c. Prints the document
b. Previews the document d. Opens a new file
24. In Excel, which function is used to count the number of non-empty cells?
a. COUNT b. COUNTA c. COUNTIF d. COUNTBLANK
25. What Microsoft Word tool automatically corrects commonly misspelled words?
a. AutoFormat b. AutoCorrect c. Spell Check d. Find and Replace
26. What is “phishing”?
a. A form of online fraud c. A type of cloud computing
b. A method of website development d. A feature in Microsoft Word
27. What type of software is Google Docs?
a. Spreadsheet b. Word Processing c. Slide Presentation d. Database Management
28. What function in Excel is used to look up values in a table?
a. VLOOKUP b. SUM c. COUNTIF d. AVERAGE
29. In Mail Merge, what is the document containing the personalized fields called??
a. Primary Document b. Secondary Document c. Data Source d. Form Letter
30. Which of the following is an open-source office productivity suite?
a. Microsoft Office b. LibreOffice c. Adobe Acrobat d. Google
31. Which of the following is an example of cloud-based storage?
a. Hard drive b. USB flash drive c. Google Drive d. CD-ROM
32. Which spreadsheet function is used to extract data based on a specific condition?
a. VLOOKUP b. IF c. CONCATENATE d. COUNT
33. What is the purpose of conditional formatting in spreadsheets?
a. To change text size c. To automatically apply formatting based on values
b. To insert images into cells d. To add formulas
34. What is an absolute cell reference in Excel?
a. A cell reference that changes when copied c. A fixed cell reference that does not change
b. A hidden cell d. A merged cell
35. Which of the following is NOT an example of an ICT service?
a. Cloud storage b. Online banking c. Fast food delivery d. E-learning
36. What formula would you use in Excel to find the total average of values in cells A1 to A10?
a. =SUM(A1:A10) b. =AVERAGE(A1:A10) c. =COUNT(A1:A10) d. =IF(A1:A10)
37. In online communication, what is the best way to verify information?
a. Trust any website c. Check multiple reliable sources
b. Share immediately on social media d. Ignore all information
38. What is cyber hygiene?
a. Physical cleanliness c. Safe and responsible internet practices
b. Cleaning your computer screen d. Using the internet only at night
39. What does Ctrl + Shift + N do in most web browsers?
a. Opens a new tab c. Opens a new incognito/private window
b. Opens a new window d. Saves the webpage
40. What does HTTPS stand for, and why is it important?
a. Hyperlink Transfer Protocol Secure – It makes browsing faster
b. HyperText Transfer Protocol Secure – It encrypts website data for security
c. High Tech Text Processing System – It allows better formatting of websites
d. Home Technology Transfer Page System – It enables file sharing over the web
E-TECH 3RD Quarter answer key: 21. a
1. d 22. c
2. b 23. c
3. c 24. b
4. b 25. b
5. c 26. a
6. b 27. b
7. d 28. a
8. c 29. a
9. b 30. b
10. b 31. c
11. c 32. b
12. c 33. c
13. a 34. c
14. c 35. c
15. b 36. b
16. c 37. c
17. b 38. c
18. b 39. c
19. c 40. b
20. b
Answer Key with Explanations – Empowerment Technologies (Quarter 3)

ICT and Its Current State (1-6)


1. d – Information and Communication Technology (ICT) refers to technologies that
provide access to information through telecommunications, including the internet,
wireless networks, and other communication tools.
2. b – Smartphones are ICT tools because they allow users to access the internet,
communicate via messaging apps, and perform digital tasks.
3. c – Productivity software includes tools like word processors, spreadsheets, and
presentation software that help users create and manage digital content.
4. b – Netiquette refers to the rules and guidelines for appropriate and respectful
communication on the internet.
5. c – Google is a search engine that helps users find information online, unlike Facebook
and YouTube, which are social media and video-sharing platforms.
6. b – .docx is the standard file format for Microsoft Word documents, used for text-based
files.

Software Applications and Platforms (7-12)


7. d – Adobe Photoshop is an image-editing software, not a spreadsheet application like
Excel, Google Sheets, or LibreOffice Calc.
8. c – A word processor (e.g., Microsoft Word) is used to write, format, and edit text-
based documents.
9. b – Ctrl + C is the universal shortcut key for copying text or objects in most software
applications.
10.b – Cyberbullying is the act of using electronic communication to harass, intimidate,
or threaten others.
11.c – Verifying the sender before clicking links is the best way to prevent phishing
attacks, which attempt to steal personal information.
12.c – Formulas are used to perform calculations and process numerical data in
spreadsheet software.

Netiquette (13-18)
13.a – Secure Socket Layer (SSL) is a security protocol that encrypts data exchanged
between a website and a user to protect sensitive information.
14.c – PDF (.pdf) is the best file format for printing documents because it preserves
formatting and is widely compatible with different devices.
15.b – Google Sheets is a cloud-based spreadsheet application used for organizing and
analyzing data.
16.c – Mail Merge is used to send personalized messages to multiple recipients by
merging a template document with a data source.
17.b – Microsoft Excel is a spreadsheet application commonly used for data analysis,
calculations, and organizing information.
18.b – Ctrl + Z is the shortcut for undoing the last action in most applications.

Online Navigation (19-24)


19.c – Word Wrap automatically moves text to the next line when it reaches the right
margin without the need to press Enter.
20.b – The asterisk (*) is used for multiplication in spreadsheet formulas.
21.a – The SUM function calculates the total of selected values in Excel.
22.c – Data validation restricts the type of data that can be entered in a spreadsheet,
ensuring accuracy and consistency.
23.c – Ctrl + P is the shortcut for printing a document.
24.b – COUNTA counts the number of non-empty cells in a given range.

Applied Productivity Tools – Word Processor & Spreadsheet (25-40)


25.b – AutoCorrect automatically fixes common spelling mistakes in Microsoft Word.
26.a – Phishing is a fraudulent attempt to obtain sensitive information by pretending to
be a trustworthy entity.
27.b – Google Docs is a word processing software that allows users to create and edit
text documents online.
28.a – VLOOKUP is used to search for a value in a column and return a corresponding
value from another column in Excel.
29.a – Primary Document contains the main layout and content of a Mail Merge
document.
30.b – LibreOffice is an open-source office productivity suite, unlike Microsoft Office,
which requires a paid license.
31.c – Google Drive is an example of a cloud-based storage service that allows users
to store and access files online.
32.b – The IF function is used to extract data based on a specified condition in Excel.
33.c – Conditional Formatting applies automatic formatting (such as color changes)
based on cell values in a spreadsheet.
34.c – Absolute cell references ($A$1) do not change when copied to another cell,
unlike relative references that adjust automatically.
35.c – Fast food delivery is not an ICT service, unlike cloud storage, online banking, or e-
learning, which rely on digital technology.
36.b – =AVERAGE(A1:A10) calculates the total average of values in the selected range.
37.c – Checking multiple reliable sources is the best way to verify online information
and avoid misinformation.
38.c – Cyber hygiene refers to practicing safe and responsible internet habits to protect
data and privacy.
39.c – Ctrl + Shift + N opens an Incognito (Private) Window in web browsers, allowing
users to browse without saving history.
40.b – HTTPS (HyperText Transfer Protocol Secure) encrypts website data for
security, making online transactions safer.

Final Notes:
✅ All answers have been verified and explained.
✅ Corrections were made to ensure accuracy (e.g., #9 now correctly states that Ctrl
+ C is used for copying).
✅ This answer key ensures full understanding of the concepts covered in the exam.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy