Mock Test: Learning Strand 6 - Digital Literacy

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Republic of the Philippines

Department of Education
Region XII
DIVISION OF GENERAL SANTOS

MOCK TEST
A&E Secondary
Learning Strand 6 – Digital Literacy
1. Danny wants to use his computer. What is the first thing he needs to do?
a. click on Restart b. turn on the WiFi c. click Stand By d. press Power Button

2. What software application is more appropriate in writing an excuse letter?


a. Spreadsheet b. Word Processing c. Desktop Publishing d. Powerpoint Presentation

6. Your Social Studies teacher gave you a project to create an Electronic Photo Album about the
beautiful places that you have already visited in the Philippines. What is the easiest and fastest option
to create a presentation for this project?
a. blank and recent c. new from existing
b. installed templates d. installed themes

8. Rose wants to put slide effects on her presentation for their family reunion. Which tab should she
select?
a. Design b. Format c. Home d. Transition

10. Rachelle is chatting with a friend. Which of the following should she avoid?
a. gossiping c. respect one's opinion
b. politeness d. end conversation properly

11. You have tried all the available templates and designs installed in your computer, but none of these
match your preference. What option will you choose to find more templates that you can use?
a. blank and recent b. installed templates c. new from existing d. Microsoft Office Online

12. It is a collection of webpages that can be accessed through the internet.


a. Home page b. Web browser c. Web address d. Website

20. All of the following are examples of web browsers EXCEPT ONE.
a. Chrome TM b. World Wide Web c. Microsoft Edge d. Mozilla Firefox®

24. Teacher Vilma is using this type of display screen that has a touch sensitive transparent panel
covering the screen, which is similar to a touch screen. What computer hardware is being used by
Teacher Vilma on her learning session?
a. White board b. LED Monitors c. Smart board d. LCD Monitors

26. A worksheet is also called ______________.


a. Spreadsheet b. Tax sheet c. Bedsheet d. none of these

27. Alt + F4 key is used to ______________ Excel.


a. Create New b. Open c. Exit d. Minimize

35. What determine the paths used to exchange information on the internet?
a. routers b. Hub c. your computer d. Web servers

38. Which device is used to share data or otherwise a device which let computers exchange
information?
a. USB Port b. LAN card c. Server d. Modem
39. Which of the following things can a “virus” do?
a. create an e-mail b. go online c. crash your computer d. chat with you

40. How do search engines determine what Web sites it will show in the result of your query?
a. how often the words in the query occur on the Web page
b. it determines quality of information
c. Web pages with the least amount of clicks by people doing similar searches
d. searching the billions of Web pages ranking all the results from most related to least

42. Three of the following reason can affect how long it takes for a Web page to load on your computer
screen. Which one does not affect the loading of a Web page?
a. file size c. computer with slow microprocessor
b. bandwidth d. number of person using the internet

43. Which statement is true with regards to wireless connections?


a. wireless cards are only built in the computers, they cannot be added to a computer
b. all wireless connections have identical speed and distances
c. wireless connections allow you to connect to the internet from varying distances
d. there is only one type of wireless device: laptop computer

45. Which of the following things can you find in an “inbox”?


a. a blog b. an e-mail message c. hardware d. a monitor

46. You saw photos being shared online of a girl you knew, and after a while people started bullying her
at school too. What is the best thing to help the girl?
a. tell the teacher what was happening c. call the parents of the girl
b. fight back at the people who bullied her d. ignore the situation

47. Johannes is frustrated and saddened by the comments his high school peers are making about his
sexuality. Furthermore, it appears a group of male student has created an imposter account to
impersonate him on an online dating site. Posing as Johannes and using his contact information, they
start sending out very provocative and sexually bold messages to other guys on the site. When he starts
receiving e-mails from members of this site in his inbox, he mortified and devastated. If you were
Johannes, what would be an acceptable way to deal with this problem?
a. leave the situation b. stay calm c. decide to respond d. ask for help

48. A mother is walking by her son Mark while he is on his iPhone and notices that he keeps hiding the
screen and pretending that he isn’t doing anything when she walks by or get close to him. Upon further
observation, the mother sees Mark is sending out hateful tweets via what seems to be a Twitter
account he has set up to impersonate someone else. What should the mother do first?
a. punish her son c. contact the Twitter
b. ask her child the full story d. send her child to Guidance Councilor

49. If you work at a company with 500 employees. The company will therefore have hundreds of
computers that all have network cards connecting them together. Without a firewall in place, all of
those hundreds of computers are directly accessible to anyone on the internet. If one employee makes
a mistake and leaves a security hole, what is most likely to happen next?
a. A computer network is protected from unauthorized access.
b. Network firewalls guard the internal network against malicious access.
c. Hackers can get to the machine and exploit the hole.
d. A company will place a firewall at every connection to the internet.
50. Mobile phones nowadays are becoming one of the most popular pieces of technology and nearly
everyone own a cell phone. Nonetheless, mobile phones bring not only easiness in communication
area, but also many negative health effects. What are the disadvantages of using mobile phone?
1. Increases stress level 3. Increases risk of eye vision problem
2. Increases risk of illness 4. Increases risk of chronic pain
a. 1,2,3 b. 1 and 3 c. 2, 3, 4 d. 1, 2, 3, 4

1. Fila is making a resume using word processing. Her middle name is ANIŇON. How will she type “Ň “?

a. alt + 163 b. alt + 164 c. alt + 165 d. alt + 166

2. Beth wants to undo her last command in word processing. Aside from clicking the “undo icon”, how can she
undo her last command?

a. ctrl + z b. ctrl + y c. ctrl + p d. ctrl + s

2
3. 5 + 43 = 89. 2 and 3 are exponents. What do you call the numbers written above the line?
a. subscript b. subscript c. base d. product

4. Alice is writing her autobiography. She wants to create a clean look along the left and right side of the page.
How will she align text to both the left and right margins, adding extra space between words as necessary?

a. ctrl + j b. ctrl + r c. ctrl + e d. ctrl + l

TABLE OF SPECIFICATIONS

Learning Code No. of Items Item Level of Percentage of


Competency Placement Understanding item
Demonstrate the LS6DC- 1 1
finalization of DA/PS-PSC-
outputs in AE/JHS-5
presentation
software in terms
of preparation,
checking, and
presentation of
slides by doing
the following:
Make use of a LS6DC- 1 2
word-processing DA/WP-
application to PSC-
produce different AE/JHS-1
documents used
in everyday life
Create new LS6DC- 1 6
document based DA/WP-
on the different PSC-
available AE/JHS-3
templates
Make use of LS6DC- 1 8
presentation DA/PSC-
software AE/JHS-66
application to
produce different
documents to
present
dat/information in
everyday life
Practice LS6DC-DE- 1 10
respectful PSF-
conduct when AE/JHS-3
using the internet
Create a new LS6DC-DA- 1 11
presentation PS-PSC-
based on the AE/JHS-68
default template
Make use of the LS6DC-DS- 1 12
world wide web PSD-
(www) to search AE/JHS-4
for information
Use the different LS6DC-DS- 3 20,40,45
search engines PSD-
in researching AE/JHS-6
topic
Evaluate the LS6DC-DD- 1 24
different kinds of PSE-
mobile devices AE/JHS-4
according to its
use
Make use of the LS6DC- 1 26
spreadsheet DA/S-PSC-
application to AE/JHS-28
generate
different
documents
Demonstrate LS6DC- 1 27
how to DA/S-PSC-
open/close a AE/JHS-29
spreadsheet
application
Browse the world LS6DC-DS- 1 35
wide web using PSD-
different types of AE/JHS-4.1
internet
connections.
internet service
providers
Describe the LS6DC-DS- 2 38,43
different ways to PSD-
access the AE/JHS-3
internet
Identify the LSDC-DO- 1 39
different potential PSB-JHS-5
problems of a
desktop
computer
Publish web LS6DC-DS- 1 42
pages on the PSD-JHS-10
world wide web
Explain different LS6DC-DE- 2 46,47
terminologies in PSF-
safe and AE/JHS-4
responsible use
of digital
technology
Explain how to LS6DC-DE- 1 48
minimize the PSF-
risks of negative AE/JHS-5
online behaviour
Distinguish LS6DC-DE- 1 49
ethical versus PSF-
unethical AE/JHS-2
behaviour as a
user of digital
technology
Discuss the LS6DC-DD- 1 50
advantages and PSE-
disadvantages of AE/JHS-7
using mobile
devices

Prepared by:
Fila Mae R. Bequilla-Canto
Elizabeth Lasib
Reynald Lasib
Alvin Jay Serrano
Rudy Fabricante
Randy Taojo

You might also like