Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region 02
Division of Quirino
BALLIGUI HIGH SCHOOL
Maddela, Quirino

First Quarter Assessment in Empowerment Technology 12


TABLE OF SPECIFICATIONS IN GRADE 12 EMPOWERMENT TECHNOLOGY

Understanding
Remembering

Item Location
Evaluating
Analyzing
Applying

Creating
No.
COMPETENCIES HOURS % of
Items

Compare and contrast the nuances of


varied online platforms, sites, and
content to best achieve specific class 3.00 9.38 4 1 2 0 1,2,4, 5
objectives or address situational
challenges
Apply online safety, security, ethics,
and etiquette standards and practice in
3.00 9.38 4 1 2 0 3, 6, 7, 8
the use of ICTs as it would relate
to their specific professional tracks
Use the Internet as a tool for credible
research and information gathering to 38, 30,
3.00 9.38 4 2 1 0
best achieve specific class objectives 31 32
or address situational
Uses common
9, 12, 15,
productivity tools effectively by
5.00 15.63 6 2 2 1 17, 18,
maximizing advanced application
37
techniques
Creates an original or derivative ICT
10, 11,
content to effectively communicate or
4.00 12.50 5 3 1 0 13, 14,
present data or information related to
33
specific professional tracks.
Evaluate existing websites and online
23,
resources based on the principles of
4.00 12.50 5 3 0 1 25,29,30,
layout, graphic and visual message
34
design.
Use image manipulation techniques on
19, 21,
existing images to change or enhance
4.00 12.50 5 2 1 1 22, 24,
their current state to communicate a
35
message for a specific purpose
Create an original or derivative ICT
content to effectively communicate a
20, 26,
visual message in an online 3.00 9.38 4 2 1 0
28, 36
environment related to specific
professional tracks
Evaluate existing online creation
tools, platforms and applications in 16, 27,
3.00 9.38 4 4 0 0
developing ICT content for specific 29, 40
professional tracks
32 100.00 40 24 12 4

Prepared by: Noted/Checked by:

ANTHONY P. AQUINO IRENE A. GULIQUEY


Teacher I, Science Head Teacher I/Officer In-Charge
Republic of the Philippines
DEPARTMENT OF EDUCATION
Region 02
Division of Quirino
BALLIGUI HIGH SCHOOL
Maddela, Quirino

First Quarter Assessment in Empowerment Technology 12

Directions: Read and analyze the questions carefully. Select the best answer and shade the letter on your
answer sheet. ERASURES means wrong answer.

1. Provision of online consultation between doctors and patients are now available, what field/aspect of the
society ICT was applied?
A. Education B. Science research C. Commerce D. Health services

2. Teacher Gemslee is using PowerPoint and Laptop as a part of his teaching methodology, this is an application
of ICT in_______.
A. Media and visual arts B. Arts, design and music C. Education D. Telecommunication

3. Which of the following is a sample application of ICT in military operation?


A. Computers are used to guide weapon system from any source to a target with high precision.
B. Computers are used to analyze bacteria to be used as weapons of mass destruction
C. Computers are used to detect recruitment plans of terror group
D. Computers are used to monitor the functionality of a weapon.

4. Computers could be used in sports and recreation, example of such is_________.


A. At home, you can contact relatives working abroad. B. Computer can help you prepare narrative report
C. You can research your assignment at home D. There are simulation software where athletes can
practice their skills and identify their flaws.

5. The current state of ICT where users are limited to viewing the website.
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0

6. Facebook, twitter and Instagram are all examples of___________.


A. Mobile media B. Social media C. Assistive media D. Triple media

7. They are persons who are able to enter and control others computer without authorization?
A. Web developer B. Web designer C. Hacker D. Jammer

8. This is a form of malicious software fronting to perform good task but covertly perform undesirable function.
A. Trojan horse B. Virus C. Spyware D. Computer worm

9. These are letters or phrase that serves as a key before you can open your documents or your computer.
A. Anti-virus B. Anti-malware C. Password D. Software

10. Which of the following is NOT included in the Ten Commandments for computer ethics?
A. Thou shall not use computer to harm other
B. Thou shall not use computer to steal
C. Thou shall not use computer to bear false witness
D. Thou shall not use computer too much

11. As a beginner in the use of ICT, What can you suggest to refrain from being hacked?
A. Disclose password to your friends in Facebook B. Use your birthday as your password
C. Create strong password and keep it your secret D. Just make all your data open to public

12. What is the importance of creating guest account in your computer?


A. You will have a privacy in your administrator account
B. You will have an option as to what account you can use
C. Anyone can barrow your Computer and open your administrator account
D. You can use your guest account in hacking
13. Which of the following is TRUE about online research?
A. All websites are reliable and credible source of information
B. Not all websites are reliable and credible source of information
C. Only minimal information can be obtain from the internet
D. Data from the internet are all fabricated

14. What is your primary obligation if you`re copying information from the internet
A. Just copy the information and paste it in your own B. Consider the information you copied to be yours
C. Cite your references to avoid plagiarism D. Cite your friend as your reference

15. This refers to the ability to present solutions or solve problems by presenting a decision based on the given
information.
A. Computer literacy B. Critical thinking
C. Problem solving capability D. Analytical skill

16. This refers to the knowledge on various computer applications and tools when working with large amount of
data that helps the researcher manage these data
A. Analytical thinking B. Computer literacy C. Critical thinking D. Data mining

17. All published books were given their respective ISBN, what does the term ISBN mean?
A. International Service on Book number B. International Supply of Book number
C. International School Book number D. International Serial Book Number

18. Before you can proceed for an online research, what will be your first step?
A. Create reference citation B. Identify resource of your research
C. Make your research strategies D. Identify your topic

19. These are websites that report untrue or false stories meant to amuse or entertain.
A. Satirical sites B. Satirical news C. Satirical Stories D. Satirical Information

20. These are images that you transfer from printed photos using scanning device.
A. Stock Photo library B. Scanned photo C. Personal photo D. Online stock photo

21. These are online digital format for images and text owned by individual or corporation and the file format is
not open for the public.
A. Proprietary format B. Open format C. Close format D. File format

22. A computer-based technology that facilitates the sharing of ideas and information and the building of
virtual networks and communities.
A. Social networking B. Social media C. Virtual reality D. Virtual media

23. Which of the following can be used for cloud computing?


A. g-mail B. Prezi C. Spotify D. Google Drive

24. This refers to the smallest information of an image.


A. Picassa B. Pixel C. Lossy D. Raster

25. What Microsoft office application will you use in manipulating data that is intended for presentation?
A. Office Word B. Office Excel C. Power point D. Publisher

26. The following are software use in manipulating images except


A. Picasa B. Paint.net C. Adobo photo shop D. Google sketch up

27. Web design is a concept that include the following,


A. Planning B. Creating C. Implementing D. Updating

28. A website is essential to a business due to the following reasons EXCEPT


A. It can serve as a brochure to advertise a product
B. It can give your costumer a detail about your services and products
C. It can give the costumer the latest updates about the business
D. It gives the costumer the personal information about the owner
29. What element of web design is used to denote an enclose boundary in a web design?
A. Text B. Shape C. Color D. Video/Audio

30. This allows user to connect to another sites or page that is related to the content of the page
A. Links B. Color C. Background D. Graphics

31. Which web design principle make the webpage to be accessible at a variety of speed?
A. portable design B. direction C. low bandwidth D. accessibility

32. This is the process of planning and arranging graphics or text in a page or a book.
A. Organizing B. Planning C. Arrangement D. Layout

33. Simplicity is the key to a good layout, this means that?


A. Layout should not be complicated B Layout should be full of color
C. Layout should be catchy D. Layout should always come up with picture

34. The principle of webpage design that gives the page a breathing space
A. white spaces B. empty spaces C. convention D. simplicity

35. What would be your action if you want to give emphasis in one element in your layout?
A. Put the element before other element B. Use different size, color or shape to the element
C. Put the element after other element D. Position the element at the middle.

36. The formula 3+5*3 is equal to


A. 24 B. 45 C. 42 D. 54

37. The acronym “WSIWYG” means


A. What you see, is what you get C. What you sow is what you grow
B. What you see is where you go D. What you see is what you glee

38. Use to view and edit timeline of an animation.


A. animation tab B. slide show tab C. animation pane D. slide show pane

39. Excel’s main screen is called ____.


A. worksheet B. spreadsheet C. tabs D. ribbon

40. The information in a selected cell is also displayed in .


A. formula bar B. menu bar C. scroll bar D. all of the above

Prepared by: Noted/Checked by:

ANTHONY P. AQUINO IRENE A. GULIQUEY


Teacher I, Science Head Teacher I/Officer In-Charge

You might also like