0% found this document useful (0 votes)
5 views5 pages

2nd Quarter Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 5

NEW CORELLA NATIONAL HIGH SCHOOL

Poblacion, New Corella Davao del Norte


EMPOWERMENT TECHNOLOGIES
FOURTH QUARTERLY EXAMINATION
2ND semester SY 2022-2023

NAME_______________________________________GRADE/SECTION_________________SCORE

TEST I. MULTIPLE CHOICES: ENCIRCLE THE CORRECT ANSWER.


1. It is an online petition platform that allows the online community to create or sign petitions.
A. Weebly B. Pinterest
C. Change.org D. Better.net

2. In what year did EDSA Dos take place?


A. 2001 B. 2002
C. 2003 D. 2004

3. It was a series of protest that happened during August 22 to 26, 2013 that was caused by the misuse of the pork barrel.
A. EDSA TRES B. EDSA DOS
C. Million People March D. Digital Revolution

4. Which radio station did Cardinal Sin use to call on the Filipino people to support the rally against President Marcos?
A. DZMM B. Radio Veritas
C. DZRH D. ABAM

5. The Yolanda People Finder that was used to locate individuals during and after the storm was created by
A. GMA 7 B. ABS-CBN
C. GOOGLE D. Microsoft

6. It is dubbed as “The World’s Platform for Change”.


A. Weebly B. Pinterest
C. Change.org D. Better.net

7. The Million People March never reached a million. What was the estimated number of protesters for this protest
A. 400k B. 500k
C. 600k D. 700k

8. What made EDSA Dos protest successful?


A. Facebook social campaign B. Text brigades

C. A radio broadcast D. None of the above

9. The People Power Revolution protest mainly happened along EDSA from February 22 to 25 of what year?
A. 1983 B. 1985
C. 1986 D. 1988

10. The Million People March was a series of protest around key cities in the Philippines and around the world. Where did
the Million People March happen mainly?
A. New People’s Park B. EDSA
C. Mendiola D. Luneta Park

11. Online courses that stimulate the classroom online.


A. Courseware B. Online test
C. Podcast D. Etech course

12. An episodic series of audio or text files streamed online.


A. Vodcast B. Podcast
C. Videos D. Courseware

13. An episodic series of video streamed online.


A. Podcast B. Courseware
C. Vodcast D. Online test
14. Which one of the following is an appropriate routine to shut down a non-responding application?
A. Close all open documents and press the power button until the computer automatically switches off.
B. Press Ctrl +Alt+ Delete, select the application in the Task Manager window and click End Task
C. Pull out the power cable from the back of the computer.
D. Click Shut Down on the Start menu and choose Shut down from the Shut Down Windows

15. Which one of the following shows file size from smallest to largest?
A. Gigabyte, Megabyte, Kilobyte, Byte B. Megabyte, Gigabyte, Kilobyte, Byte
C. Byte, Kilobyte, Megabyte, Gigabyte D. Kilobyte, Megabyte, Byte, Gigabyte

16. Keeping slide counts to a minimum.


A. Minimize B. Clarity
C. Simplicity D. Consistency
17. Making sure the font is readable.
A. Contrast B. Visuals
C. Simplicity D. Clarity
18. Using bullets or short sentences; applying the 6x7 rule.
A. Contrast B. Visuals
C. Simplicity D. Minimize
19. Using graphics that attract, not distract the audience.
A. Visuals B. Clarity
C. Contrast D. Simplicity
20. Making your designs uniform.
A. Contrast B. Consistency
C. Visuals D. Clarity

TEST II WRITE TRUE IF THE SENTENCE IS CORRECT; OTHERWISE, WRITE FALSE ON THE BLANK BEFORE
EACH ITEM.

_____1. Extortion is the act of using the internet to threaten or damage someone’s reputation to extort money or anything
else of value.
_____2. Criminal copyright infringement is the act of piracy mainly for financial gain.
_____3. Electronic harassment is also referred to as cyber bullying.
_____4. Hacking is an act of sending unwanted emails.
_____5. In Philippines, gambling in internet is legal
_____6. Wager gambling is the act of betting on any sports event over the internet.
_____7. Cyberbullying is an act of using internet to engage in prostitution.
_____8. Phishing/spoofing is the act of spamming emails.
_____9. Cybercrimes are legal in other countries.
_____10. (ICT) deals with the use of different communications technology to locate, save, send, and edit information.

TEST III MATCHING TYPE: MATCH COLUMN A WITH COLUMN B. WRITE THE LETTER OF THE CORRECT
ANSWER ON THE SPACE BEFORE EACH NUMBER.

A B

_____1. Ctrl + O A. Open find box


_____2. Ctrl + C B. Justify paragraph alignment
_____3. Ctrl + F C. Close document
_____4. Ctrl + Z D. Open options
_____5. Ctrl + K E. Font options
_____6. Ctrl +V F. Open new/blank document
_____7. Ctrl + J G. Paste
_____8. Ctrl + N H. Copy selected text
_____9. Ctrl + D I. Insert ink
_____10. Ctrl + W J. Undo last action
NEW CORELLA NATIONAL HIGH SCHOOL
Poblacion, New Corella Davao del Norte
EMPOWERMENT TECHNOLOGIES
FIRST QUARTERLY EXAMINATION
2ND semester SY 2019-2020

NAME_______________________________________GRADE/SECTION_________________SCORE

TEST I. MULTIPLE CHOICES: ENCIRCLE THE CORRECT ANSWER.


1. A web page that allows interaction from the user
A. static B. social
C. dynamic D. comment

2. This refers to the feature where users are able to categorize and locate information through tagging.
A. hashtags B. taxonomy
C. folksonomy D. rich users experience

3. A feature of a dynamic websites that allows user to put their own content.
A. rich users experience B. user participation
C. long tail D. mass participation

4. It provides a common framework to allow data to be shared and to be shared and reused across plat
form ,enterprise, and community boundaries.
A. W3C B. Web 1.0
C. Semantic Web D. Web 2.0

5. According to this magazine, two Philippine cities are part of the top 10 in their research about “The Selfiest
Cities around the World”.
A. People B. Reader’s Digest
C. Time D. Candy

6. This is the operating system for blackberry phones.


A. Blackberry OS B. Windows mobile
C. Symbian D. iOS

7. Pinterest is a social media website that can be classified as.


A. bookmarking site B. microblogging
C. media sharing D. blogs and forums

8. Currently, this is the fastest mobile network.


A. 2G B. 4G

C. 3G D. 5G

9. This media is designed to help people who have visual and reading impairments.
A. assistive B. bookmark
C. social D. accessibility

10. This type of social media website focuses on short updates posted by the user.
A. blogging B. social media
C. microblogging D. hashtagging

11. What feature of Microsoft Word allows you to efficiently create documents that have the same general
content but may have different recipients or purpose?
A. mail merge B. send merge
C. print merge D. view merge
12. What image compression/file type is capable of displaying simple animation?

A. .bmp B. .jpg
C. .gif D. .png
13. Among the text wrap options, which one allows you to place an image or external material in line with the
text, treating the image just like how a text is treated?
A. In line with the text B. through
C. square D. tight
14. Which image compression type allows you to display images in full color just like in digital pictures?
A. .bmp B. .jpg
C. .gif D. .tiff

15. What external material allows you to insert organizational or structural templates like organizational charts
and flow charts on your documents?
A. chart B. screen shots
C. pictures D. smart art

TEST II MATCHING TYPE: MATCH COLUMN A WITH COLUMN B. WRITE THE LETTER OF THE
CORRECT ANSWER ON THE SPACE BEFORE EACH NUMBER.

A B

_____1. Virus A. design to send you advertisements


_____2. rogue B. sends an official-looking email and is designed to steal sensitive personal
information
_____3. keylogger C. a provision that allows you to use copyrighted work without consent with
certain limitations
_____4. adware D. A browser feature that is synonymous to “private” browsing
_____5. spam E. replicates and can transfer from one computer to another
_____6. phishing F. exploits the DNS system
_____7. Fair use G. states that anyone who uses your work without your consent is
punishable by law
_____8. spyware H. runs in the background and monitors what you are doing
_____9. private I. unwanted email mostly from bots
_____10. malware J. disguised as a useful program but is not
_____11. incognito k. the information superhighway
_____12. internet L. tricks user into posing that it is a security software
_____13. trojan M. a malicious software
_____14. copyright N. an option to hide a post so that search engines could not scan it
_____15. pharming O. used to record the keystrokes done by the user

TEST III WRITE TRUE IF THE SENTENCE IS CORRECT; OTHERWISE, WRITE FALSE ON THE BLANK
BEFORE EACH ITEM.

_____1. Tim Berners-Lee created the World Wide Web


_____2. People Magazine conducted the research on “The Selfiest Cities in the Worl.”
_____3. Web 2.0 introduced static web pages that allow users to interact with the web page.
_____4. Folksonomy allows users to categorize and locate information
_____5.Technological convergence is the synergy of technological advancements to work on a similar goal or
task
_____6. According to Neilsen, users who use the internet spend more time in social media sites than in any
other type of site
_____7. Blogging sites are sites that focus on short updates from the user
_____8. Android is a mobile operating system for Apple devices
_____9. Assistive media is a nonprofit service designed to help people who have visual and reading
impairments
_____10. Information and Communication Technology (ICT) deals with the use of different communications
technology to locate, save, send, and edit information.

You might also like