1st Empowerment Technologies

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Maryknoll College of Panabo, Inc

(Formerly: Maryknoll High School of Panabo)


National Highway, Brgy. Sto. Niño, Panabo City

Senior High School Unit

Empowerment Technology
1st Mastery Test

Name: ______________________________________ Date: ____________


Grade & Section: ______________________________ Score: ___________

I.Multiple Choice
Read and understand the following statement/question. Encircle the letter of the correct answer.

1. Characteristics of Web 2.0 allows users to categorize and classify/arrange information using freely
chosen keywords (e.g. tagging).
A. Folksonomy C. Rich User Interface
B. Long Tale D. User Participation
2. Characteristics of Web 2.0 which service are offered on demand rather than on a one time purchase.
A. Folksonomy C. Rich User Interface
B. Long Tale D. User Participation
3. Characteristics of Web 2.0 which content is dynamic and is responsive to user’s input.
A. Folksonomy C. Rich User Interface
B. Long Tale D. User Participation
4. Characteristics of Web 2.0 which is the owner of website is not the only one who is able to put content.
A. Folksonomy C. Rich User Interface
B. Long Tale D. User Participation
5. It is meant to locate, find and remove virus threats that are already in your computer.
A. Automatic Updates C. Security Center
B. Firewall D. Virus Protection
6. Many of the updates coming from Microsoft are usually meant to updates some Windows feature, secure
areas of vulnerability, fix any bugs in the OS, and others.
A. Automatic Updates C. Security Center
B. Firewall D. Virus Protection
7. It is recommended that you keep this setting ON
A. Automatic Updates C. Security Center
B. Firewall D. Virus Protection
8. Accounts created for transient users and do not have access to the other computer accounts and their
content.
A. Computer Administrator C. Limited Account
B. Guest D. Virus Protection
9. Controls all the contents and users of the computer, installs program, and adds and deletes users
A. Computer Administrator C. Limited Account
B. Guest D. Virus Protection
10. Has limited control and only have access to his/her particular account.
A. Computer Administrator C. Limited Account
B. Guest D. Virus Protection
11. Dynamic Web Page
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. World Wide Web
12. A movement led by the World Wide Web Consortium (W3C).
A. Compatibility C. Semantic Web
B. Security D. Web 2.0
13. These are sites that allow users to post their own news items or links to other news sources.
A. Blog and Forums C. Social Network
B. Social Media D. Social News
14. It allows users to create and manage advertising campaigns, generate reports, and retrieve information
A. Advertising Platform C. Creative Content Outlets
B. Communication Service D. Payment System
15. This is the place where you can set additional protection from threats to your computer, especially when
using the internet.
A. Automatic Updates C. Security Center
B. Firewall D. Virus Protection

II. Identification
Read and understand the following statements and identify what is being referred to by each definition. Write
your answers on the space provided before each numbers.

_______________ 1. It is a temporary endeavor undertaken to create a unique product, service, or result.


______________2. It work with project sponsors, the project team, and other people involved in a project to
meet project goals
______________3. Most web pages were static also known as flat page or stationary page.
______________4. Usually unsolicited commercial email sent from an unknown source with identical
message sent to multiple recipients.
______________5. A group of related projects managed in a coordinated way to obtain benefits, control and
managing them individually.
______________6. Types of user accounts that controls all the contents and users of the computer, installs
program, and adds and deletes users.
______________7. It helps in protecting the computer from unauthorized entries, viruses, or worms from
the internet or network.
______________8. Is a software system that is design to search for information on the world Wide
Web(W.W.W)
______________9. What Platform that is used to settle financial transactions through transfer of monetary
Value.
_____________10. It prevents malware from gaining entry into your computer

III. Modified True or False


Read the following statements and determine whether the statements are elements, attribute or value. If the
statement is true, put a T on the space provided before each numbers, and if the statement is false, underline the
word that makes it faulty and write the correct word on the space provided before each numbers. (2 pts. each
items)

______________1. “12”
______________2. href
_______________3. target
_____________ 4.border
_____________ 5.”green”
_____________ 6. src
_____________ 7. “dragon.jpg”
_____________8. cellpadding
_____________9. marquee
_____________10. scrollamount
_____________11. bgcolor
_____________12. font
_____________13. face
_____________14”slide”
_____________15. embed
IV. Enumeration

You might also like