Professional Documents
Culture Documents
ICT Practice Test For Grade 11
ICT Practice Test For Grade 11
I. Identification
________________1. Layman’s term: Umbilical cord is connected to your mother’s womb.
________________2. Refers to the process of giving yourself or other people the capacity to
achieve a specific end-goal.
________________3. Collection of techniques, skills, methods, and processes used in the
production of goods or services or in the accomplishments of objectives (such as scientific
investigation).
________________4. May kwenta ba shinare mo?
________________5. Hindi porket nirephrase mo, sa’yo na.
________________6. Pagkakaroon ng end-goal.
________________7. Legal matters.
________________8. You add your own information or understanding to the presented
information.
________________9. Ability to use a digital technology, communication tools, and/or networks
to define an information need, access, manage, integrate and evaluate information, create new
information or knowledge and be able to communicate this information to others.
________________10. Deals with the use of different communication technologies such as
mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
________________11. Created the internet or World Wide Web (WWW) by using unifrom
Resource Locator (URL).
________________12. When did he create Web 1.0- Crawl
________________13. Documents which are formatted and annottated using HDML or other
web resources (unique fingerprints).
________________14. Are the first computers used by the military during World War II.
________________15. The content users see are the same.
________________16. Read-only web.
________________17. No design.
________________18. Who created the Web 2.0- Walk?
________________19. Co-create and create own content.
________________20. Different profile pictures, ability to upload. Bloggers.
________________21. When?
________________22. “Read-Write Web, Web of interaction, or Participative Web”
________________23. Allowed users to interact and collaborate with each other through social
media dialogue.
________________24. Feature that allows user to categorize and classify/arrange information
using freely chosen keywords (E.g. Tagging).
________________25. Importance of Folksonomy.
________________26. Main idea is the user’s ability to modify user interface (E.g. Background)
________________27. Content is dynamic and is responsive to user’s input.
________________28. Time purchase.
________________29. What is the importance of Long Tail?
________________30. Services are offered on demand rather than on a one-time purchase.
________________31. What is the importance of User Participation?
________________32. The owner of the website is not the only one who is able to put content.
________________33. E.g. Amazon
________________34. Users will be able to subscribe to a software only when needed rather
than purchasing them.
________________35. Rent the software for minimum fee. (other cracks)
________________36. Give an example of Software as a Service
________________37. Importance: various culture.
________________38. Content is based on the culture of the people.
________________39. A diverse information sharing through universal web access.
________________40. What type of web is Web 3.0- RUN?
________________41. Aim:Understand the user's preference.
________________42. Worked as a personal assistant.
________________43. Advertising in which it is based on the behavior of the user.
________________44. HTML files and current web browsers could not support Web 3.0.
________________45. User's security is also in question since the machine is saving his or her
preferences.
________________46. WWW already contains billions of web pages.
________________47. Certain words are imprecise. The words "old" and "small" would depend
on the user.
________________48. Since machine uses logic, there are certain limitations for a computer to
be able to predict what the user is referring to at a given time.
________________49. A synergy of technological advancement to work on a similar goal or
task.
________________50. A website, application, or online channel that enables web users to
create, co-create, discuss, modify, and exchange user-generated content.
________________51. Sites that allow you to connect with other people with the same interests
or background.
________________52. To store and manage links of favorite websites.
________________53. Are websites that allow you to post news.
________________54. Share images, videos, and music.
________________55. Short updates from websites that allow you to post own contents.
________________56. Site where you can only give opinions and comments.
________________57. Site that, in addition, can do Q&As at the same thread.
________________58. Form of technology that's mostly used in cellular.
________________59. Help people with impairment.
________________60. Nonprofit service designed to help people who have visual and reading
impairments.
________________61. Internet+Etiquette
________________62. Disease; You think someone texted or you felt your phone vibrated but
in reality, it didn’t.
________________63. Malicious software. (Shortcut term, first of the internet threats)
________________64. Designed to replicate itself and transfer itself from one computer to
another.
________________65. Virus can transfer itself via (2 possible answers)
________________66. Replicates itself and transfers from one computer to another by any
means. (Clue for realizing: Many files of copies)
________________67. Once downloaded, can leave computer unprotected.
________________68. A malware that happens when you download an app.
________________69. Disguises itself as a useful program.
________________70. A program that runs in the background of your computer (w/o you
knowing it).
________________71. How to fix the problem stated above?
________________72. Once connected to a network, you get ads.
________________73. Designed to send advertisement in the form of pop-ups.
________________74. An internet threat where malware can start.
________________75. Unwanted mail, mostly from bots or advertisers.
________________76. They acquire sensitive information like passwords and credit card
details. (Aim: Get perseonal info)
________________77. A variant other than phising, only difference is that when clicked,
immediately starts. (Aim: Get information immediately)
________________78. What should you be good at to avoid plagiarising?
________________79. True or false: Quoting is different from referencing.
6. AVOID PLAGIARISM
Hints: 1. P
2. C
3. Q
4. R