E Tech 1st Q Reviewer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Page 1 of 2

UNIVERSITY OF THE EAST


SECONDARY LABORATORY SCHOOL
MANILA

Name: ______________________________Grade & Section: __________ Date: _______ Score


Surname First Name M.I.

PERIODICAL EXAMINATION (REVIEW)


HIT111 – Empowerment Technology

100
Identify the following:

1. Empowerment refers to the process of giving yourself, or other people, the capacity to achieve a specific end-goal.
2. In ICT, empowerment requires being information literate and technology literate.
3. Information Literacy involves recognizing when information is needed and being able to efficiently locate, accurately
evaluate, effectively use, and clearly communicate information in various formats.
4. Technology Literacy is the ability to use digital technology, communications tools and/or networks.
5. Empowerment Technology refers to computer technology used almost every day, enables users to do tasks, that in
the past, require professional help.
6. Information and Communications Technology deals with the use of different communication technologies such as
mobile phones, telephone, internet to locate, save, send and edit information.
7. SMS stands for Short Message Service.
8. MMS stands for Multimedia Messaging Service.
9. BPO stands for Business Process Outsourcing.
10. Other term used for BPO is Call Centers.
11. Four major aspects of life that has a significant changes because of ICT are Communications, Education,
Economics and Travel.
12. Web 1.0 are static websites without interactivity.
13. WWW stands for World Wide Web.
14. WWW was invented by Tim Berners-Lee in 1989.
15. HTML stands for Hyper Text Markup Language
16. URL stands for Uniform Resource Locator.
17. Web 2.0 are websites that contain dynamic content.
18. Artificial Intelligence and Advanced Machine Learning is composed of many technologies and techniques that
make smart things "intelligent".
19. Intelligent Apps are virtual personal assistants, like Siri and Google Home, that perform some human assistance
functions, making tasks easier.
20. Intelligent Things refers to the physical things that are imbued with machine learning capabilities through rigid
programming.
21. IOT stands for Intelligent Of Things.
22. Virtual and Augmented Reality refers to the immersive technologies that are now dominating the market.
23. Digital Twin refers to the dynamic software model of a machine or a things or system that uses data from various
sensors to do autonomous actions such as comprehension, reaction and improvement operations. It includes
metadata and analytics.
24. Mesh App and Service Architecture (MASA) enables users to have an optimized solution for targeted endpoints in
the digital mesh such as desktop, smartphones automobile.
25. Digital Technology Platforms are platforms that enable a digital business such as information systems, customer
experience, analytics and intelligence, the IOT, and business ecosystems.
26. Adaptive Security Architecture are constant processing of information that requires better, ultra-efficient
architectures to handle the demand.
27. Google Search is the most popular and powerful search engine in the 21st century.
Page 2 of 2

28. Google Scholar gives the users, especially researchers, a simpler way to search scholarly literature on the Internet.
29. Online Journals is a periodical publication that contains scholarly articles relating to a particular discipline or field of
study.
30. Microsoft Word is a word processing application developed by the Microsoft Corporation.
31. Mail Merge is a effective tool which allows you to create multiple letters, labels, envelopes, name tags and more
using information stored in a list, database, or spreadsheet.
32. In Microsoft Excel, a complex formula follows the PEMDAS order.
33. A cell address is combination of a column letter and a row number.
34. The cell or set of cells involved in a formula is known as a cell reference.
35. A function is a predefined formula in Excel that performs calculations for a specific value using reference cells.
36. Using SUM function willl add all the values of cells in the argument.
37. Using AVERAGE function will get the average of all the values of cells in the argument.
38. Using COUNT function counts the number of cells with numerical data in the argument.
39. Using MAX function will get the highest cell value included in the argument.
40. Using MIN function will get the lowest cell value included in the argument.
41. Sorting is one of MS Excel features that is use to manage information, enables you to quickly sort your data
alphabetically, numerically, and in many other ways.
42. Sort Sheet sorts all data in your worksheet by one column.and related information is kept together when sorted.
43. Sort Range sorts the data in a range of cells, which can be helpful when working with a sheet that contains several
tables.
44. Filtering is one of MS Excel feature that narrow down data in your worksheet allowing you to view only the
information you need.
45. Chart is a graphical representation of your workbook data that's easier to visualize for comparisons and trends.
46. Column Chart is a graphical representation that uses vertical bars to represent data.
47. Line Chart is a graphical representation that is ideal for showing trends and data points are connected by lines.
48. Pie Chart is a graphical representation used to compare proportions.
49. Bar Chart is a graphical representation like Column chart but uses horizontal bars instead to represent data.
50. Area Chart is a graphical representation like Line chart, except the areas under the lines are shaded.
51. Surface Chart is a graphical representation that allows you to display in 3D landscape.
52. Malware stands for Malicious Software.

53. Virus is a malicious program designed to replicate itself and transfer from one computer to another either through the
Internet and local networks or data storage like flash drives and CDs
54. Worm is a malicious program / standalone malware computer program that replicates itself in order to spread to other
computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to
access it.
55. Trojan is a malicious program that is disguised as a useful program but once downloaded or installed, leaves your
PC unprotected and allows hackers to get your information.
56. Spyware is a program that runs in the background without you knowing it.
57. Spam is an unwanted email mostly from bots or advertisers.
58. Phishing tends to acquire sensitive personal information like passwords and credit card details.
59. Pharming is a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.
60. Keyloggers used to record the stroke done by the users.

Study the following (additional review)


1. Textbook (pp. 7 to 96).
2. MS Word environment, commands, buttons and functions.
3. MS Excel environment, commands, buttons, basic formulas, if and logical conditions.
4. MS Powerpoint environment, commands, buttons and functions.

You might also like