1st Q Emptech Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

BAGONG SILANG HIGH SCHOOL

PRE- TEST
A.Y. 2024-2025
EMPOWERMENT TECHNOLOGY

NAME: ___________________________________________
GRADE AND SECTION: ____________________________

Direction: Read the questions carefully. Write the letter of the


correct answer in your answer sheets.
1. What are the technologies that provide access to information through C. Refers to visual elements creating motion and guide the viewer’s eyes in
telecommunications? certain direction.
A. Computers B. ICT C. Internet D. Mobile Phone D. Refers to distance or closeness between elements that shows the
connection and convey the visual message.
2. What is the type of WEB which is known as flat page?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0 14. How would you describe unity?
A. It is the visual weight of objects, texture, colors, and space is evenly
3. What does WWW mean? distributed on the screen.
A. World Wide Website B. Whole Wide Web B. Refers to the relative sizes and proportions of different elements in a design.
C. World Wide Web D. Whole World Website C. Refers to visual elements creating motion and guide the viewer’s eyes in
certain direction.
4. Which of the following internet traits that aims to acquire sensitive personal D. Refers to distance or closeness between elements that shows the
information like password? connection and convey the visual message.
A. Attitude B. Behavior C. Netiquette D. Norms
15. What is JPEG most suitable for?
5. Which is the main purpose of social media? A. Efficiently store high-quality digital photos packed with detail and color.
A. It allow users to interact, communicate, and share information in a virtual B. It compresses small images into much smaller file sizes.
community and network. C. It can be used for transparent backgrounds.
B. To sell items and earn money. D. It is preferably used for graphic design.
C. Web portal creation.
D. To be famous and be able to brag all your achievements. 16.What is the most popular social networking media on online platforms.
A. Facebook B. Google C. Tumblr D. Twitter
6. Which is not included in the group, among these printable materials that can
be used to enhance your documents? 17. What productivity tool of Google lets you create a presentation?
A. Images B. Mailings C. Shapes D. WordArt A. Google Docs B. Google Classroom
C. Google Forms D. Google Slides
7. Which of the following is the correct description of column heading?
A. It is the colored row of letters used to identify each column within the sheet. 18. Which of the google-developed applications allows you to search for online
B. It is the box at the Bottom of each column that contains a letter. specific locations?
C. It contains the title of a book. A. Google Classroom B. Google Drive
D. It contains number and formula. C. Google Map D. Google Sites

8. What button allows you to see the result of your mail merge even before you 19. What is the proper sequence in inserting page border in MS word?
print or send it out? I. Go to Design > Page Borders.
A. Address book B. Greeting line II. Make selections for how you want the border to look.
C. Preview results D. Start Mail merge
III. To adjust the distance between the border and the edge of the page, select
9. What part of the document that contains the main part of the message that Options.
we want to convey or send? IV. Make your changes and select OK.
A. I, II, III,IV B. II, I, III, IV C. III, I, II, IV d. IV, I, II, III
A. Body Document B. Document Header
20. What is productivity tool of google lets you create a survey, attendance, or
C. Form Document D. Layout Document
enrolment forms.
A. Google Docs B. Google Forms
10. Which of the following best describe a function?
C. Google Slides D. Google Sites
A. It is a predefined calculation which is in-built in Excel.
B. The function is like an equation that user’s type.
21. How would you create a new google form?
C. It can be any type of calculation depending on the user’s choice.
A. Go to form.google.com, Select template, Change the title of your form, adjust
D. It consumes more time because of manual typing.
questions and answers, Customize the google form theme.
B. Go to googleforms.com, Select template, Change the title of your form,
11. How would you describe balance?
adjust questions and answers, Customize the google form theme.
A. It is the visual weight of objects, texture, colors, and space is evenly
C. Go to form.google.com, Select template, Change the title of your form, See
distributed on the screen.
preview, Customize the google form theme.
B. Refers to the relative sizes and proportions of different elements in a design.
D. Go to google.forms.com, Create an account, Change the title of your form,
C. Refers to visual elements creating motion and guide the viewer’s eyes in
adjust questions and answers, Customize the google form theme.
certain direction.
D. Refers to distance or closeness between elements that shows the
22. How would you stop cyber bullying amongst your classmates?
connection and convey the visual message.
A. Report the bully to the authorities.
12. How would you describe proximity?
B. Do not respond to the bully.
A. It is the visual weight of objects, texture, colors, and space is evenly
C. Block the bully.
distributed on the screen.
D. All of the above.
B. Refers to the relative sizes and proportions of different elements in a design.
C. Refers to visual elements creating motion and guide the viewer’s eyes in
23. How to protect yourself and your family against cybercrime?
certain direction.
A. Keep software and operating system updated.
D. Refers to distance or closeness between elements that shows the
B. Use a strong password.
connection and convey the visual message.
C. Do not give out personal information.
D. All the above.
13. How would you describe movement?
24. Which of the following is defined as an attempt to steal, spy, damage or
A. It is the visual weight of objects, texture, colors, and space is evenly
destroy computer systems, networks, or their associated information?
distributed on the screen.
A. Cyber attack B. Computer security
B. Refers to the relative sizes and proportions of different elements in a design.
C. Cryptography D. Digital hacking
25. Which of the following is not an advantage of cyber security? A. The earliest form of internet.
a) Makes the system slower B. Described as read-write and execute kind of web.
b) Minimizes computer freezing and crashes C. It is known as the future of internet.
c) Gives privacy to users D. It is originally called as semantic web.
d) Protects system against viruses
39. how is web 3.0 is different from web 2.0?
26. Which of the following is the hacking approach where cyber-criminals A. Web 3.0 is created as the internet for big tech corporations.
design fake websites or pages for tricking or gaining additional traffic? B. Web 3.0 emphasizes allowing control and ownership over data.
a) Pharming C. The objective of web 3.0 focuses on introducing interactive content to the
b) Website-Duplication internet.
c) Mimicking D. Web 3.0 delivers a better user interface than web 2.0.
d) Spamming
40. Which characteristic is not applicable distinctly for web 3.0?
27. What type of malware is designed to encrypt files and demand payment for A. Contextual Communication B. Data ownership
their release? C. Decentralization D. Speed
A. Ransomware B. Trojan
C. Rootkit D. Worm 41. How would you evaluate the aesthetic worth of a piece of art or a website
28. What type of malware is designed to steal sensitive information, such as design?
login credentials? A. By understanding the basic principles of graphics and layout.
A. Adware B. Trojan B. According to its usability.
C. Ransomware D. Worm C. If it is free to use.
29. Which of the following are objectives of Malware? D. Does the art invoke feeling in the audience?

42.Which among the choices is the use of mailing tab in MS Word?


A. Provide remote control for an attacker to use an infected machine. A. It is used for creating label, envelope, and mail merge.
B. Investigate the infected user’s local network. B. Useful in creating formula and equations.
C. Steal sensitive data. C. It is use in creating presentations.
D. All of the above D. Useful in sending mail to a specific recipient.
30. Which of the following is a program that copy themselves throughout a 43. What will happen if you do not place = sign before a formula in excel?
computer or network? A. What you typed could be displayed as text.
A. Rootkits B. Trojans C. Viruses D. Worms B. What you typed could be displayed as date.
C. It will not perform an operation.
D. All of the above
31. Which is true about Worms? 44. How to insert transition in MS Powerpoint?
A. Self-replicating viruses that exploit security vulnerabilities to automatically A. Select the slide you want to add transition, select the transition tab,
spread themselves across computers and networks. Select a transition to see a preview, Select effect option.
B. Worms on existing programs and can only be activated when a user B. Select the transition you want to add transition, select the slide tab, Select
opens the program. a transition to see a preview, Select effect option.
C. Worms vary and hide themselves in the operating system. C. Select the effects you want to add transition, select the transition tab,
D. It asks for money. Select a transition to see a preview, Select transition option.
D. Select the sheet you want to add transition, select the transition tab,
32. What is true regarding Trojans? Select a transition to see a preview, Select effect option.
A. Trojans will conduct whatever action they have been programmed to
carry out 45. Which part of worksheet you will place the data that will also appear in
B. "Trojan" alludes to the mythological story of Greek soldiers hidden inside a active cell?
wooden horse that was given to the enemy city of Troy. a. Formula Bar b. Formula Cell
C. Trojans do not replicate or reproduce through infection. c. Formula Window d. Formula Pane
D. All of the above 46. Which among the statements is not true about MS PowerPoint?
A. We can create a presentation from scratch or template.
33. Which of the following is not a feature of Web 2.0? B. We can add text, images, and videos on a slide.
A. folksonomy B. Rich-user experience C. We can add animation, transition, and cinematic motions.
C. Short tail D.User participation D. We can use formula and functions.
34. The following are examples of Netiquette. Except: 47. The following are formulas that MS- Excel can understand, Except:
A. Remember you are always talking to human even you are online. a. =average(a1+a2) b. =a1+b2 c. =Sum(a1:a2) d. =1a+b2
B. Respect another people’s time.
C. Do not share expert knowledge. 48. Which of the following is an example of cyberbullying.
D. Help keep flame wars under control. a. Posting pictures of others just for fun.
b. Hurting someone through punching.
35. What comparison can be made between MS word and Google docs? c. Sending threatening message through messenger.
A. Microsoft was the number 1 word processing software. Now with Google d. Both A and C
Docs in the picture, they have become top competitors.
B. Google docs can only be used online. While MS word is an offline 49. Arrange the following steps in inserting header and footer.
application. I. Go to Insert > Header or Footer. II. Choose the header style you want to use.
C. Google Docs can be downloaded as MS Word document. The difference III. Add or change text for the header or footer. IV. To eliminate a header--like
is Microsoft Word doesn’t offer the same compatibility as Google Docs. deleting it on the title page--select it and then check the Different First Page
D. All of the above. box.
36. What is the applications of web 3.0 technology in business? V. Select Close Header and Footer or press Esc to exit.
A. Delivering services at the doorsteps of customers. a. I,II,III, IV,V b. II,I,IV,III,V c. I,II,III,V,IV d. V, IV,III,II,I
B. Reinventing products and services for new trends. 50. Arrange the following Steps in inserting watermark.
C. Web 3.0 helps in learning about customers. I.On the Design tab, select Watermark.II. Choose a pre-configured watermark,
D. Business can improve inventory. like DRAFT, CONFIDENTIAL, or DO NOT COPY. III. For placing a logo or
image, Select Watermark > CustomWatermark > Picture watermark >
37. Which of the following statements provides the best description of Web 3.0? IV. Select Picture. On the same menu you can create a custom text watermark.
A. Web 3.0 is process centric. A. I,II,III,IV B. II,I,III,IV C. III,II,I,IV D.IV,III,II,I
B. Web 3.0 focuses on user.
C. The primary focus of Web 3.0 is the application.
D. All of the above

38. How would you describe web 1.0?

You might also like