The document is a review guide for a third quarter examination on Empowerment Technologies, covering various topics related to the Internet, web pages, online platforms, malware, and Microsoft Word functionalities. It includes multiple-choice questions that test knowledge on definitions, concepts, and procedures related to technology. The questions range from identifying types of malware to understanding netiquette and using software applications effectively.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
7 views5 pages
Reviewer
The document is a review guide for a third quarter examination on Empowerment Technologies, covering various topics related to the Internet, web pages, online platforms, malware, and Microsoft Word functionalities. It includes multiple-choice questions that test knowledge on definitions, concepts, and procedures related to technology. The questions range from identifying types of malware to understanding netiquette and using software applications effectively.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5
EMPOWERMENT TECHNOLOGIES 6. The Internet can be defined as _____.
THIRD QUARTER EXAMINATION What is the missing word to complete a
REVIEWER sentence? A. Internet highway 1. What is being defined as an electronic B. Information highway device for storing and processing data C. Internet superhighway typically in binary form, according to D. Information superhighway instructions given to it in a variable program? 7. What is the synergy of technological advancements to work on a similar goal or A. computer C. web page task? B. internet D. World Wide Web A. Convergence C. Assistive Media B. social media D. Cloud computing 2. It is a hypertext document connected to the World Wide Web. What is being defined 8. What is a website, application, or online in this statement? channel that enables web users web users A. computer C. web page to create, co-create, discuss modify, and B. internet D. World Wide Web exchange user-generated content? A. Convergence C. Assistive Media 3. What is an information system on the B. social media D. Cloud computing internet that allows documents to be connected to other documents by hypertext 9. Which features of Web 2.0 allows users links, enabling the user to search for to categorize and classify information using information? freely chosen keywords? A. computer C. web page A. long tail C. user participation B. internet D. World Wide Web B. folksonomy D. mass participation 4. What online platform of the World Wide Web is entirely made up of Web pages 10. Which of the following features diverse connected by hyperlinks? information sharing through universal web A. Web 1.0 access? B. Web 2.0 A. long tail C. user participation C. Web 3.0 B. folksonomy D. mass participation D. static web page 11. What malware asks the user to pay to 5. In different online platforms of the World improve security, but they are not protected Wide Web, what platform is all about the at all? semantic web? A. adware C. keyloggers A. Web 1.0 B. spyware D. rogue security B. Web 2.0 software C. Web 3.0 D. static web page 12. Lester wants to connect a computer to any other computer anywhere in the world via dedicated routers and servers. What PayPal website, and the stolen credit card network is he going to use? information is used to commit further A. computer C. Web page crimes. What do you call the goal of this B. Internet D. World Wide web kind of threat? A. adware B. pharming 13. Some information that can be found on C. phishing D. spamming the Internet is not reliable and accurate such as wikis. What will you do in this 18. Russell receives an official-looking instance? e-mail with an attachment. The attachment A. disregard the credibility contains malicious code that is executed as B. look for a credible source soon as he clicks on the attachment. C. ask your classmates on what to do Nothing bad happens to his computer and D. do a crowd-sourcing on Facebook or continues to work as expected. However, Twitter the computing device is now infected. What type of malware is being illustrated here? 14. It is acknowledging the original author of A. spyware B. trojan the page or information in which to properly C. virus D. worm cite a reference. What action is being described? 19. Which of the following is NOT A. giving credit considered an Internet threat? B. advanced search A. copyright C. phishing C. providing feedback B. malware D. spam D. looking for a credible source 20. What malware asks the user to pay to 15. It is known that there are some improve security but they are not protected limitations to copyright laws. at all? A. Internet Threats A. adware C. Keyloggers B. Online Research B. spyware D. Rouge security C. Copyright Infringement software D. Rouge security software 21. Which of the following is NOT a type of 16. What type of malware uses malicious malware? software that infects computers and other A. Adware C. Trojan internet-connected devices and secretly B. Spam D. Virus records your browsing habits, the websites you visit, and your online purchases? 22. What do you call the goal of this threat A. spyware B. trojan to acquire sensitive personal information C. virus D. worm like passwords and credit card details. A. adware C. phishing 17. An e-mail from PayPal arrives, telling B. pharming D. spamming you that your account has been compromised and will be deactivated unless 23. What rule of netiquette can get a sense you confirm your credit card details. The link of what the discussion group is about before in the suspicious e-mail takes you to a fake you join it? 29. Which tab in a Word document allows A. don’t abuse your power users to set margins, themes, page B. share expert knowledge orientation, and paragraph indentation and C. remember the human lines? D. know where you are in cyberspace A. Draw tab C. Home tab B. Design tab D. Layout tab 24. Which of the ten netiquettes does this statement belong “Always check your 30. What is the intersection of columns and spelling and grammar before posting”? rows? A. remember the human A. cell C. MS Word B. don’t abuse your power B. table D. formatting text C. share expert knowledge D. make yourself look good online 31. How to insert a table in a Word document? 25. What processing program is used to I. Choose your preferred tables. II.Open a create, format, save, and print letters, blank Word document. III.From the Home manuals, contracts, and other documents? tab, Click the Insert tab. IV.Choose tables, A. MS Excel C. MS then click the dropdown option Publisher “table”. B. MS PowerPoint D. MS Word A. I, II, III, and IV C. II, III, IV, and I B. II, III, I, and IV D. III, IV, I, and II 26. This method is the fastest of all once you’ve created some Word documents. 32. Ara wants to create a hyperlink in Word. What type of launching Word is this? What keyboard shortcuts will she use? A. Start Menu A. Ctrl+H B. Ctrl+K B. Quick Launch Toolbar C. Ctrl+N D. Ctrl+P C. Opening a Word document D. Windows Key + R + type winword 33. Tyron wants to open a new document in 27. What is being defined as the default tab Word without minimizing the current Word in Microsoft Word that has five groups of document. What keyboard shortcuts will he related commands such as clipboard, font, use? paragraph, styles, and editing? A. Ctrl+D B. Ctrl+G C. Ctrl+N D. Ctrl+O A. Draw tab C. Home tab B. Design tab D. Insert tab 34. What is similar to a spreadsheet that contains columns and rows? 28. Which group in a Home tab allows users A. cell C. MS Excel to change the font or style, size, and even B. table D. MS Word the color of the text? A. font group C. styles 35. It contains various items that you may group want to insert into a document. Which part B. editing group. D. paragraph group of the ribbon tab is being described. A. file tab C. insert tab B. home tab D. layout tab 41. Which of the following commands will 36. This is a line of art drawing or images NOT save a worksheet or workbook? used as a generic representation for ideas A. Alt+S that you might want to include in your B. Ctrl+S document. C. File Menu, Save A. chart/icons B. ClipArt D. Quick access toolbar, Save C. shapes D. SmartArt graphic 42. Which of the following is an example of 37. Allows the user to format the object a function name? presets, text wrapping, graphics outline, A. colons C. product effects, fill, crop, etc. B. commas D. =product(E8,15%) A. clipart C. picture format B. graphics format D. shape format 43. Which of the following shows the proper procedure for creating a basic Excel 38. What will Matthew use to format the function? style, outline, effects, position, and wrap text I. Press enter and the result will appear. of a shape? II. Select the cell where the answer will A. clipart C. picture format appear. B. graphics format D. shape format III. Type the equal sign (=), then type the function name. 39. Angelita wants to save her work in IV. Enter the cells for the argument inside standard image format to contain lossy and the parentheses. compressed data. What type of pictures does she want to achieve? A. I, II, III, and IV C. II, IV, I, and III A. JPEG C. PNG B. II, III, IV, and I. D. III, IV, II, and I B. GIF D. XPS ITEMS 44 - 47 40. Sean wants to create an infographic using different shapes. He wants to change the color of the shape from blue to red. What should the right procedure be for Sean to format the shape?
A. choose red - Click shape format- Click
the shape – Click shape fill/outline B. click shape fill/outline – Choose red - Click shape format- Click the shape C. click shape format- Click the shape – Click shape fill/outline – Choose red D. click the shape – Click shape format – Click shape fill/outline – Choose red 44. If you want to compute the Average of Student A, what must be the argument inside the function? A. (C7,E7,G7,I7,K7) B. (C8,E8,G8,I8,K8) C. (C9,E9,G9,I9,K9) D. (C10,E10,G10,K10)
45. If you want to compute the Average of
Student C, what must be the argument inside the function? A. (C7,E7,G7,I7,K7) B. (C8,E8,G8,I8,K8) C. (C9,E9,G9,I9,K9) D. (C10,E10,G10,K10)
46. To get a percentage of the project per
student, what formula did the Teacher apply? A. =product(K7,30%) B. =product(K7:30%) C. =product(K7,20%) D. =product(K7:20%)
47. The formula
=AVERAGE(C11,E11,G11,I11,K11) to come with an 84.4 average of student E. What do you call the underlined part of the formula? A. argument C. equal sign B. syntax D. function name