Professional Documents
Culture Documents
Empowerment Technologies 4 PDF Free
Empowerment Technologies 4 PDF Free
Technologies (E-Te
Quarter 1: Performance Task 1 10/10
You want to know if classes are suspended because of a storm. Which of the
following TLD's is most likely to have the most credible information
.gov
Clicking on a search result using the _____ will open the link in a new tab.
Mouse wheel
People who send unwanted and unsolicited emails are called _____
Spammers
While you are typing your keyword in the address bar or the search bar, several _____
may appear bellow it
Suggestions
A _____ page is about a single topic and can be edited by anyone with the right
credentials
Wiki
You copied an essay that you found online and submitted it in an essay writing contest.
You have committed _____.
Plagiarism
_____ Internet-based networks that are used to store, manage, and share resources and
information
Cloud Computing
You used your smartphone to access Yahoo mail and send an email. In this scenario,
your smartphone is a _____
Server
You can check an article's _____ to know if the information that it contains is updated.
Publication date
Which of the following is not a factor that can be used to determine a source's
credibility?
The article's length
Columns
What is the name of the of spreadsheet application that was used in this chapter?
LibreOfficeCalc
A group of programs used to view, manipulate, and print computer graphics is called a
_____.
Graphics suite
In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1
25500
What do you call software that are used to create information like documents,
spreadsheet, presentations, etc?
Productivity tool
You bought an artist's album then you made and sold copies of it. What you did is
called _____.
Counterfeiting