3rd QUARTER EXAMINATION (Empowerment Technologies)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Republic of the Philippines 9.

Which of the following malware is a program designed to send


advertisements, mostly pop ups?
Department of Education a. Virus b. Trojan c. Adware d. Spyware
Region V – Bicol 10. If the domain name ends with .org, it means that site is a/an _______.
DIVISION OF CAMARINES NORTE a. Government site c. Educational site
Tuaca High School b. Organizational site d. Commercial site
Tuaca, Basud, Camarines Norte 11. If the domain name ends with .com, it means that site is a/an _______.
a. Government site c. Educational site
EMPOWERMENT TECHNOLOGIES b. Organizational site d. Commercial site
3rd Quarter Examination 12. If the domain name ends with .gov, it means that site is a/an _______.
MULTIPLE CHOICE- General Direction: Choose the correct answer and a. Government site c. Educational site
PROPERLY SHADE the letter of the correct answer to the attached answer b. Organizational site d. Commercial site
sheet. 13. Which of the following is the shortcut key for copying highlighted text?
a. Ctrl+A b. Ctrl+B c. Ctrl+C d. Ctrl+V
1. What do you call a web page that allows interaction from the user? 14. Which of the following is the shortcut key for pasting copied tex?
a. Static b. Dynamic c. Semantic d. Social a. Ctrl+P b. Ctrl+B c. Ctrl+C d. Ctrl+V
2. Which of the following refers to the feature where users are able to 15. Which of the following is the file extension of a saved document made
categorize and locate information through tagging? from Microsoft Word?
a. Hashtags c. Taxonomy a. .docx b. .pptx c. xlsx d. .mp4
b. Folksonomy d. Rich User Experience 16. Which of the following is the file extension of a saved presentation made
3. Which feature of a dynamic website allows users to put their own content? from Microsoft PowerPoint?
a. Hashtags c. Taxonomy a. .docx b. .pptx c. xlsx d. .mp4
b. Folksonomy d. Rich User Experience 17. Which of the following is the file extension of a saved spreadsheet made
4. Which of the following aimed to have a machine or servers understand the from Microsoft Excel?
users’ preference to be able to deliver web content specifically targeting the a. .docx b. .pptx c. xlsx d. .mp4
user? 18. Which of the following is NOT a component of the mail merge?
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0 a. File name c. Recipient list
5. This media is designed to help people who have visual and reading b. Main document d. Merged document
impairments. 19. Which of the following is the shortcut key used to insert hyperlink?
a. assistive b. social c. bookmark d. accessibility a. Ctrl+H b. Ctrl+Y c. Ctrl+K d. Ctrl+V
6. It stands for Malware. 20. In Microsoft Word, what tab is 'Mail Merge' found under?
a. Malicious software c. Malleable software a. Insert b. Format c. Design d. Mailings
b. Malicious hardware d. Malleable hardware 21. What is the motion effect or movement that you can apply to a text and
7. Which of the following malware is a program that runs in the background objects such as icons, shapes, and pictures?
without you knowing it and has an ability to monitor what you are doing and a. Transition b. Animation c. Art Effects d. Slide Show
typing? 22. Which of the following is Not a category of Animation style that can be
a. Virus b. Trojan c. Adware d. Spyware used in Microsoft PowerPoint?
8. Which of the following malware is a program that disguised as a useful a. Exit b. Entrance c. Transition d. Motion Paths
program but once downloaded or installed, it allows hackers to get your 23. What symbol should you type into an empty cell to start a formula?
information? a. * b. ( c. = d^
a. Virus b. Trojan c. Adware d. Spyware

Page | 1
24. To divide 64 by 16 in a formula in Excel, you would use what math b. Favorite Color d. Address
operator symbol?
a. * b. / c. - d. + 36.Which of the following domains is considered to be most reliable of all in
25. What type of image manipulation technique can be used if you want to terms of researches?
remove unnecessary parts of a picture? a. .com b. .org c. .gov d. .edu
a. Brightness and Contrast c. Cropping 37. What Microsoft applications are used to create a mail merge?
b. Color Balance d. Removing Colors a. Word and Power Point c. PowerPoint and Excel
26. What image manipulation technique is done if you change the color tone b. Word and Access/Excel d. Word only
of a picture? 38. You are creating a new mail merge envelope to use in sending a letter to
a. brightness and contrast c. cropping your customers. You have already encoded the data of your customers.
b. color balance d. removing Colors Which Word feature should you use for a predefined format of the mailing
27. What image manipulation technique is done when you desaturate the address for each of your customers?
color of a picture? a. Type a New List c. Use Existing List
a. brightness and contrast c. cropping b. Select from Outlook d. Contact Address block
b. color balance d. removing colors 39. Which of the following best describes PowerPoint?
28. What image manipulation technique is done when you adjust the overall a. Presentation software c. Drawing Software
lightness and darkness of an image? b. Database software d. Desktop publishing software
a. brightness and contrast c. cropping
b. color balance d. removing colors 40. In figure 1, what is the cell address of
29. What image online format is capable of displaying simple animation? the cell where the age of John is located?
a. .bmp b. .gif c. .jpg d. .png a. B1
30. It refers to the placement of elements of equal weight on the page. b. B2
a. Balance b. Contrast c. Movement d. Repetition c. B3
31. YouTube is a social media website that can be classified as d. B4
a. Media sharing c. Microblogging 41. In Figure 1, what data can be seen in
b. Bookmarking site d. Blogs and forums the cell “C3”?
32. This type of social media website focuses on short updates posted by the a. Country c. Russia
Figure 1
user. b. Chicago d. Canada
a. Media sharing c. Microblogging 42. In Figure 1, what data can be seen in
b. Bookmarking site d. Blogs and forums the cell “A2”?
33. Joanna noticed that her email account has a lot of unwanted emails even a. name b. John c. Jenifer d. Clint
if she does not email those senders. What Internet Threat is being 43. Which image manipulation technique is used in the image 1?
mentioned?
a. Spamming b. Scamming c. Phishing d. Hacking a. cropping
34. With your secret codes and passwords, you should: b. color balance
a. Give them to strangers. c. multiple images
b. Never give it except your boyfriend. d. removing colors
c. Give them only to your best friends.
d. Never give your passwords, except to your parents.
35. Internet is truly a powerful tool; however, it is also considered as the
most dangerous place. What do you think are the information you don’t Image 2
disclose in the Internet, EXCEPT for one: https://www.boredpanda.com/photo-manipulations-before-after-jhed-jhed/?
utm_source=google&utm_medium=organic&utm_campaign=organic

a. First Name c. Phone Number

Page | 2
44. Which image
manipulation technique is 48. Which of the following formula can be encoded in cell “D3” to get the
used in the image 2? desired remark?
a. =VLOOKUP(C3,G3:H9,2,TRUE)
a. cropping b. =VLOOKUP(C3,G3:H9,2,FALSE)
b. color balance c. =VLOOKUP(D3,G3:H9,2,TRUE)
c. multiple images d. =VLOOKUP(C3,G3:H9,3,TRUE)
d. removing colors 49. If you input the formula “=SUM(C3:C12)” in cell “E1”, what will be the
Image 3 data that will appear in the cell “E1”?
https://photographyconcentrate.com/15-snazzy-lightroom-and-afters/
a. 668 c. 855
45. Which of the following is NOT included in the basic principles of graphics b. 768 d. 845
and layout?
a. Balance b. Contrast c. Movement d. Repetition 50. Which of the following images displays movement and pattern?
46. Mr. Cruz developed a new website for his business; however, his website
is not interactive. It does not cater users’ query; all pictures are just still and
the only way to move to another web page is by clicking the hyperlink next.
What particular website does Mr. Cruz have created?
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0
47. When someone asks for personal information like phone numbers or a. c.
addresses online, you should:
a. Post the information on any public Web site so anyone can find it.
b. Give the information to anyone who asks because it's the polite
thing to do.
c. Share personal information to meet new friends and have an active
social life. b. d.
d. Never give out personal information online in emails or instant
messages because you never know who you are really
communicating with. Prepared by:
FRANCES P. DOLLERO
For Items 48 and 49, use the figure below. Special Science Teacher I (Math Major)

“Nothing is IMPOSSIBLE. The word itself says “I’m Possible”.”


-Audrey Hepburn
Figure 2

Page | 3
Republic of the Philippines
C9. Which of the following malware is a program designed to send
Department of Education advertisements, mostly pop ups?
Region V – Bicol a. Virus b. Trojan c. Adware d. Spyware
DIVISION OF CAMARINES NORTE B10. If the domain name ends with .org, it means that site is a/an _______.
Tuaca High School
a. Government site c. Educational site
Tuaca, Basud, Camarines Norte
b. Organizational site d. Commercial site
D11. If the domain name ends with .com, it means that site is a/an _______.
EMPOWERMENT TECHNOLOGIES a. Government site c. Educational site
3rd Quarter Examination b. Organizational site d. Commercial site
MULTIPLE CHOICE- General Direction: Choose the correct answer and A12. If the domain name ends with .gov, it means that site is a/an _______.
PROPERLY SHADE the letter of the correct answer to the attached answer a. Government site c. Educational site
sheet. b. Organizational site d. Commercial site
C13. Which of the following is the shortcut key for copying highlighted text?
B1. What do you call a web page that allows interaction from the user? a. Ctrl+A b. Ctrl+B c. Ctrl+C d. Ctrl+V
a. Static b. Dynamic c. Semantic d. Social D14. Which of the following is the shortcut key for pasting copied tex?
B2. Which of the following refers to the feature where users are able to a. Ctrl+P b. Ctrl+B c. Ctrl+C d. Ctrl+V
categorize and locate information through tagging? A15. Which of the following is the file extension of a saved document made
a. Hashtags c. Taxonomy from Microsoft Word?
b. Folksonomy d. Rich User Experience a. .docx b. .pptx c. xlsx d. .mp4
D3. Which feature of a dynamic website allows users to put their own B16. Which of the following is the file extension of a saved presentation
content? made from Microsoft Word?
a. Hashtags c. Taxonomy a. .docx b. .pptx c. xlsx d. .mp4
b. Folksonomy d. Rich User Experience C17. Which of the following is the file extension of a saved spreadsheet
C4. Which of the following aimed to have a machine or servers understand made from Microsoft Word?
the users’ preference to be able to deliver web content specifically targeting a. .docx b. .pptx c. xlsx d. .mp4
the user? A18. Which of the following is NOT a component of the mail merge?
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0 a. File name c. Recipient list
A5. This media is designed to help people who have visual and reading b. Main document d. Merged document
impairments. C19. Which of the following is the shortcut key used to insert hyperlink?
a. assistive b. social c. bookmark d. accessibility a. Ctrl+H b. Ctrl+Y c. Ctrl+K d. Ctrl+V
A6. It stands for Malware. D20. In Microsoft Word, what tab is 'Mail Merge' found under?
a. Malicious software c. Malleable software a. Insert b. Format c. Design d. Mailings
b. Malicious hardware d. Malleable hardware B21. What is the motion effect or movement that you can apply to a text and
D7. Which of the following malware is a program that runs in the background objects such as icons, shapes, and pictures?
without you knowing it and has an ability to monitor what you are doing and a. Transition b. Animation c. Art Effects d. Slide Show
typing? C22. Which of the following is Not a category of Animation style that can be
a. Virus b. Trojan c. Adware d. Spyware used in Microsoft PowerPoint?
B8. Which of the following malware is a program that disguised as a useful a. Exit b. Entrance c. Transition d. Motion Paths
program but once downloaded or installed, it allows hackers to get your C23. What symbol should you type into an empty cell to start a formula?
information? a. * b. ( c. = d^
a. Virus b. Trojan c. Adware d. Spyware
Page | 4
a. First Name c. Phone Number
B24. To divide 64 by 16 in a formula in Excel, you would use what math b. Favorite Color d. Address
operator symbol?
a. * b. / c. - d. + D36.Which of the following domains is considered to be most reliable of all in
C25. What type of image manipulation technique can be used if you want to terms of researches?
remove unnecessary parts of a picture? a. .com b. .org c. .gov d. .edu
a. Brightness and Contrast c. Cropping B37. What Microsoft applications are used to create a mail merge?
b. Color Balance d. Removing Colors a. Word and Power Point c. PowerPoint and Excel
B26. What image manipulation technique is done if you change the color b. Word and Access/Excel d. Word only
tone of a picture? C38. You are creating a new mail merge envelope to use in sending a letter
a. brightness and contrast c. cropping to your customers. You have already encoded the data of your customers.
b. color balance d. removing Colors Which Word feature should you use for a predefined format of the mailing
D27. What image manipulation technique is done when you desaturate the address for each of your customers?
color of a picture? a. Type a New List c. Use Existing List
a. brightness and contrast c. cropping b. Select from Outlook d. Contact Address block
b. color balance d. removing colors A39. Which of the following best describes PowerPoint?
A28. What image manipulation technique is done when you adjust the a. Presentation software c. Drawing Software
overall lightness and darkness of an image? b. Database software d. Desktop publishing software
a. brightness and contrast c. cropping
b. color balance d. removing colors B40. In figure 1, what is the cell address
B29. What image online format is capable of displaying simple animation? of the cell where the age of John is
a. .bmp b. .gif c. .jpg d. .png located?
A30. It refers to the placement of elements of equal weight on the page. a. B1
a. Balance b. Contrast c. Movement d. Repetition b. B2
A31. YouTube is a social media website that can be classified as c. B3
a. Media sharing c. Microblogging d. B4
b. Bookmarking site d. Blogs and forums C41. In Figure 1, what data can be seen
C32. This type of social media website focuses on short updates posted by in the cell “C3”?
Figure 4
the user. a. Country c. Russia
a. Media sharing c. Microblogging b. Chicago d. Canada
b. Bookmarking site d. Blogs and forums B42. In Figure 1, what data can be seen in the cell “A2”?
A33. Joanna noticed that her email account has a lot of unwanted emails a. name b. John c. Jenifer d. Clint
even if she does not email those senders. What Internet Threat is being C43. Which image manipulation technique is used in the image 1?
mentioned?
a. Spamming b. Scamming c. Phishing d. Hacking a. cropping
D34. With your secret codes and passwords, you should: b. color balance
a. Give them to strangers. c. multiple images
b. Never give it except your boyfriend. d. removing colors
c. Give them only to your best friends.
d. Never give your passwords, except to your parents.
B35. Internet is truly a powerful tool; however, it is also considered as the
most dangerous place. What do you think are the information you don’t Image 5
disclose in the Internet, EXCEPT for one: https://www.boredpanda.com/photo-manipulations-before-after-jhed-jhed/?
utm_source=google&utm_medium=organic&utm_campaign=organic

Page | 5
B44. Which image
manipulation technique is
used in the image 2?

a. cropping
b. color balance
c. multiple images
d. removing colors
Image 6
https://photographyconcentrate.com/15-snazzy-lightroom-and-afters/

B45. Which of the following is NOT included in the basic principles of Figure 2
graphics and layout?
a. Balance b. Contrast c. Movement d. Repetition
A46. Mr. Cruz developed a new website for his business; however, his A48. Which of the following formula can be encoded in cell “D3” to get the
website is not interactive. It does not cater users’ query; all pictures are just desired remark?
still and the only way to move to another web page is by clicking the a. =VLOOKUP(C3,G3:H9,2,TRUE)
hyperlink next. What particular website does Mr. Cruz have created? b. =VLOOKUP(C3,G3:H9,2,FALSE)
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0 c. =VLOOKUP(D3,G3:H9,2,TRUE)
D47. When someone asks for personal information like phone numbers or d. =VLOOKUP(C3,G3:H9,3,TRUE)
addresses online, you should: C49. If you input the formula “=SUM(C3:C12)” in cell “E1”, what will be the
a. Post the information on any public Web site so anyone can find it. data that will appear in the cell?
b. Give the information to anyone who asks because it's the polite a. 668 c. 855
thing to do. b. 768 d. 845
c. Share personal information to meet new friends and have an active
social life. B50. Which of the following images displays movement and pattern?
d. Never give out personal information online in emails or instant
messages because you never know who you are really
communicating with.

For Items 48 and 49, use the figure below.


a. c.

b. d.

Prepared by:
FRANCES P. DOLLERO
Page | 6
Special Science Teacher I (Math Major)

“Nothing is IMPOSSIBLE. The word itself says “I’m Possible”.”


-Audrey Hepburn

Page | 7

You might also like