Empowerment Technologies-Midterm

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

ASUNCION NATIONAL HIGH SCHOOL

Asuncion, Davao del Norte


SEMI-FINAL EXAMINATION
Empowerment Technologies (ETech)
Second Semester

Name:______________________________ Year and Section: ______________ Score:__________

GENERAL INSTRUCTIONS: Read the instructions carefully. Strictly NO ERASURES and


ALTERATIONS. Answers with erasures and alterations are considered wrong. CHEATING is
forbidden by the law of the state and by this institution. Proper sanction of every violation will be
dealt accordingly.
I – MULTIPLE CHOICE: Encircle the letter of the best answer from the choices given.
1. A web page that allows interaction from the user.
a. Static b. Social c. Dynamic d. Comment
2. This refers to the feature where users are able to categorize and locate information through
tagging.
a. Richer user experience b. Long Tail c. Folksonomy d. Hashtags
3. This type of social media website focuses on short updates posted by the user.
a. Blogging b. Social media c. Microblogging d. Hashtagging
4. This media is designed to help people who have visual and reading impairments.
a. Assistive b. Accessibility c. Social d. Assertive
5. This is the original smartphone OS.
a. WebOS b. Android c. Symbian d. Windows OS
6. Which of the following is not a component of the mail merge?
a. Address b. Form document c. File name d. Data file
7. Where can u find the Start Mail Merge button?
a. File tab b. References tab c. Mailings tab d. Home tab
8. What types of document can you create using mail merge?
a. Envelopes b. Posters c. Letters d. Labels
9. What feature of Microsoft Word allows you to efficiently create documents that have the same
general content but may have different recipients or purpose?
a. Mail merge b. Print merges c. Send merge d. View merge
10. What image compression/file type is capable of displaying simple animation?
a. .bmp b. .gif c. .jpg d. .png
11. Pinterest is a social media website that can be classified as
a. Bookmarking sites b. blogs and forums c. media sharing d. microblogging
12. Which image compression type allows you to display images in full color (16.7 colors) just like
in digital pictures?
a. .bmp b. .gif c. .jpg d. .tiff
13. Among the text wrap options, which one allows you to place an image or external material in
line with the text, treating the image just like how a text is treated?
a. In line with text b. square c. through d. tight
14. What external material allows you to insert organizational or structural templates like
organizational charts and flow charts on your document?
a. Chart b. pictures c. screenshot d. smart art
15. What tells Microsoft Word exactly where to place the information coming from the data file to
the main document?
a. Data source b. insertion line c. place holder d. insertion tag
II – MATCHING TYPE: Match Column A with B. Write the letter of the correct answer on the space
before each number.
A B.
_____ 1. Adware a. used to record the keystrokes done by the user
_____ 2. Spam b. an option to hide a post so that search engines could not scan it
_____ 3. Rouge c. a malicious software
_____ 4. Spyware d. tricks the user into posing that it is security software
_____ 5. Pharming e. the information superhighway
_____ 6. Trojan f. designed to send you advertisement
_____ 7. Fair use g. a browser feature that is synonymous to “private” browsing
_____ 8. Virus h. replicates and can transfer from one computer to another
_____ 9. Keylogger i. exploits the DNS system
____ 10. Incognito j. runs in the background and monitors what you are doing
____ 11. Copyright k. unwanted emails mostly from bots
____ 12. Internet l. sends an official-looking email and is designed to steal sensitive
personal information
____ 13. Private m. a provision that allows you to use copyrighted work
without your consent with certain limitations
____ 14. Malware n. states that anyone who uses your work without your consent is
punishable by law
____ 15. Phishing o. disguised as a useful program but is not
p. new email develop by malicious software

III – TRUE or FALSE. Write TRUE if the statement is correct; otherwise, write FALSE on the blank
before each item.
_____ 1. Information and Communication Technology deals with the use of different communications
technology to locate, save, send, and edit information.
_____ 2. Tim Berners-Lee created the World Wide Web.
_____ 3. Keyloggers are software that shows pop-up ads even if you are not using your browser.
_____ 4. Do not reply or click links from emails.
_____ 5. Install and update virus software on your computer.
_____ 6. Data file is a mail merge component where in it contains the main body of the message you
want to convey or send.
_____ 7. Convergence is the synergy of technological advancements to work on a similar goal or task.
_____ 8. Charts are predefined sets of different shapes grouped together to form ideas that are
organizational or structural in nature.
_____ 9. Android is the operating system for Apple devices.
_____10. In line with text is the default setting for images that are inserted or integrated in the
document.

You might also like