0% found this document useful (0 votes)
7 views5 pages

Reviewer

The document is a review guide for a third quarter examination on Empowerment Technologies, covering various topics related to the Internet, web pages, online platforms, malware, and Microsoft Word functionalities. It includes multiple-choice questions that test knowledge on definitions, concepts, and procedures related to technology. The questions range from identifying types of malware to understanding netiquette and using software applications effectively.

Uploaded by

twentyhendy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

Reviewer

The document is a review guide for a third quarter examination on Empowerment Technologies, covering various topics related to the Internet, web pages, online platforms, malware, and Microsoft Word functionalities. It includes multiple-choice questions that test knowledge on definitions, concepts, and procedures related to technology. The questions range from identifying types of malware to understanding netiquette and using software applications effectively.

Uploaded by

twentyhendy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

EMPOWERMENT TECHNOLOGIES 6. The Internet can be defined as _____.

THIRD QUARTER EXAMINATION What is the missing word to complete a


REVIEWER sentence?
A. Internet highway
1. What is being defined as an electronic B. Information highway
device for storing and processing data C. Internet superhighway
typically in binary form, according to D. Information superhighway
instructions given to it in a variable
program? 7. What is the synergy of technological
advancements to work on a similar goal or
A. computer C. web page
task?
B. internet D. World Wide Web
A. Convergence C. Assistive Media B.
social media D. Cloud computing
2. It is a hypertext document connected to
the World Wide Web. What is being defined 8. What is a website, application, or online
in this statement? channel that enables web users web users
A. computer ​ C. web page to create, co-create, discuss modify, and
B. internet ​ D. World Wide Web exchange user-generated content?
A. Convergence C. Assistive Media
3. What is an information system on the B. social media D. Cloud computing
internet that allows documents to be
connected to other documents by hypertext 9. Which features of Web 2.0 allows users
links, enabling the user to search for to categorize and classify information using
information? freely chosen keywords?
A. computer ​ C. web page A. long tail ​ C. user participation
B. internet ​ D. World Wide Web B. folksonomy ​ ​ D. mass
participation
4. What online platform of the World Wide
Web is entirely made up of Web pages 10. Which of the following features diverse
connected by hyperlinks? information sharing through universal web
A. Web 1.0 access?
B. Web 2.0 A. long tail ​ C. user participation
C. Web 3.0 B. folksonomy ​ D. mass participation
D. static web page
11. What malware asks the user to pay to
5. In different online platforms of the World improve security, but they are not protected
Wide Web, what platform is all about the at all?
semantic web? A. adware ​ C. keyloggers
A. Web 1.0 B. spyware ​ D. rogue security
B. Web 2.0 software
C. Web 3.0
D. static web page 12. Lester wants to connect a computer to
any other computer anywhere in the world
via dedicated routers and servers. What PayPal website, and the stolen credit card
network is he going to use? information is used to commit further
A. computer ​ ​ C. Web page crimes. What do you call the goal of this
B. Internet ​ D. World Wide web kind of threat?
A. adware B. pharming
13. Some information that can be found on C. phishing D. spamming
the Internet is not reliable and accurate
such as wikis. What will you do in this 18. Russell receives an official-looking
instance? e-mail with an attachment. The attachment
A. disregard the credibility contains malicious code that is executed as
B. look for a credible source soon as he clicks on the attachment.
C. ask your classmates on what to do Nothing bad happens to his computer and
D. do a crowd-sourcing on Facebook or continues to work as expected. However,
Twitter the computing device is now infected. What
type of malware is being illustrated here?
14. It is acknowledging the original author of A. spyware ​ B. trojan
the page or information in which to properly C. virus ​ ​ D. worm
cite a reference. What action is being
described? 19. Which of the following is NOT
A. giving credit considered an Internet threat?
B. advanced search ​ A. copyright ​ ​C. phishing
C. providing feedback B. malware ​ D. spam
D. looking for a credible source
20. What malware asks the user to pay to
15. It is known that there are some improve security but they are not protected
limitations to copyright laws. at all?
A. Internet Threats A. adware ​ C. Keyloggers
B. Online Research ​ B. spyware ​ D. Rouge security
C. Copyright Infringement software
D. Rouge security software
21. Which of the following is NOT a type of
16. What type of malware uses malicious malware?
software that infects computers and other A. Adware ​ C. Trojan
internet-connected devices and secretly B. Spam ​ ​ D. Virus
records your browsing habits, the websites
you visit, and your online purchases? 22. What do you call the goal of this threat
A. spyware ​ B. trojan to acquire sensitive personal information
C. virus ​ ​ D. worm like passwords and credit card details.
A. adware ​ C. phishing
17. An e-mail from PayPal arrives, telling B. pharming ​ D. spamming
you that your account has been
compromised and will be deactivated unless 23. What rule of netiquette can get a sense
you confirm your credit card details. The link of what the discussion group is about before
in the suspicious e-mail takes you to a fake you join it?
29. Which tab in a Word document allows
A. don’t abuse your power users to set margins, themes, page
B. share expert knowledge orientation, and paragraph indentation and
C. remember the human lines?
D. know where you are in cyberspace A. Draw tab ​ C. Home tab
B. Design tab ​ D. Layout tab
24. Which of the ten netiquettes does this
statement belong “Always check your 30. What is the intersection of columns and
spelling and grammar before posting”? rows?
A. remember the human A. cell ​ ​ C. MS Word
B. don’t abuse your power B. table ​ D. formatting text
C. share expert knowledge
D. make yourself look good online 31. How to insert a table in a Word
document?
25. What processing program is used to I. Choose your preferred tables. II.Open a
create, format, save, and print letters, blank Word document. III.From the Home
manuals, contracts, and other documents? tab, Click the Insert tab. IV.Choose tables,
A. MS Excel ​ ​ C. MS
then click the dropdown option
Publisher
“table”.
B. MS PowerPoint ​ D. MS Word
A. I, II, III, and IV C. II, III, IV, and I
B. II, III, I, and IV D. III, IV, I, and II
26. This method is the fastest of all once
you’ve created some Word documents.
32. Ara wants to create a hyperlink in Word.
What type of launching Word is this?
What keyboard shortcuts will she use? ​
A. Start Menu
A. Ctrl+H​ ​ B. Ctrl+K
B. Quick Launch Toolbar
C. Ctrl+N ​ D. Ctrl+P
C. Opening a Word document
D. Windows Key + R + type winword
33. Tyron wants to open a new document in
27. What is being defined as the default tab
Word without minimizing the current Word
in Microsoft Word that has five groups of
document. What keyboard shortcuts will he
related commands such as clipboard, font,
use? ​
paragraph, styles, and editing?
A. Ctrl+D​ ​ B. Ctrl+G
C. Ctrl+N ​ D. Ctrl+O
A. Draw tab ​ C. Home tab
B. Design tab ​ D. Insert tab
34. What is similar to a spreadsheet that
contains columns and rows?
28. Which group in a Home tab allows users
A. cell ​ C. MS Excel
to change the font or style, size, and even
B. table ​ D. MS Word
the color of the text?
A. font group ​ ​ C. styles
35. It contains various items that you may
group
want to insert into a document. Which part
B. editing group. ​ D. paragraph group
of the ribbon tab is being described.
A. file tab ​ C. insert tab
B. home tab ​ D. layout tab
41. Which of the following commands will
36. This is a line of art drawing or images NOT save a worksheet or workbook?
used as a generic representation for ideas A. Alt+S
that you might want to include in your B. Ctrl+S
document. ​ C. File Menu, Save
A. chart/icons ​ ​ B. ClipArt D. Quick access toolbar, Save
C. shapes ​ D. SmartArt graphic
42. Which of the following is an example of
37. Allows the user to format the object a function name?
presets, text wrapping, graphics outline, A. colons​ C. product
effects, fill, crop, etc. B. commas D. =product(E8,15%)
A. clipart​ ​ C. picture format
B. graphics format ​ D. shape format 43. Which of the following shows the proper
procedure for creating a basic Excel
38. What will Matthew use to format the function?
style, outline, effects, position, and wrap text I. Press enter and the result will appear.
of a shape? II. Select the cell where the answer will
A. clipart​ ​ C. picture format appear.
B. graphics format ​ D. shape format III. Type the equal sign (=), then type the
function name.
39. Angelita wants to save her work in
IV. Enter the cells for the argument inside
standard image format to contain lossy and
the parentheses.
compressed data. What type of pictures
does she want to achieve?
A. I, II, III, and IV C. II, IV, I, and III
A. JPEG ​ ​ C. PNG
B. II, III, IV, and I. ​ D. III, IV, II, and I
B. GIF ​ ​ D. XPS
ITEMS 44 - 47
40. Sean wants to create an infographic
using different shapes. He wants to change
the color of the shape from blue to red.
What should the right procedure be for
Sean to format the shape?

A. choose red - Click shape format- Click


the shape – Click shape fill/outline
B. click shape fill/outline – Choose red -
Click shape format- Click the shape
C. click shape format- Click the shape –
Click shape fill/outline – Choose red
D. click the shape – Click shape format –
Click shape fill/outline – Choose red
44. If you want to compute the Average of
Student A, what must be the argument
inside the function?
A. (C7,E7,G7,I7,K7) ​
B. (C8,E8,G8,I8,K8)
C. (C9,E9,G9,I9,K9)
D. (C10,E10,G10,K10)

45. If you want to compute the Average of


Student C, what must be the argument
inside the function?
A. (C7,E7,G7,I7,K7) ​
B. (C8,E8,G8,I8,K8) ​
C. (C9,E9,G9,I9,K9)
D. (C10,E10,G10,K10)

46. To get a percentage of the project per


student, what formula did the Teacher
apply?
A. =product(K7,30%)
B. =product(K7:30%)
C. =product(K7,20%) ​
D. =product(K7:20%)

47. The formula


=AVERAGE(C11,E11,G11,I11,K11)
to come with an 84.4 average of student E.
What do you call the underlined part of the
formula?
A. argument ​ C. equal sign
B. syntax ​ D. function name

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy