Professional Documents
Culture Documents
EMPTECH Exam Q1 SHS 1stattempt
EMPTECH Exam Q1 SHS 1stattempt
Select one:
a.
Social Media
b.
Dynamic
c.
Native
d.
Static
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
.com stands for _____
Select one:
a.
company
b.
communication
c.
complicated
d.
commercial
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
By default, Gmail will delete a message in the Trash after 30 days.
Select one:
True
False
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A centralized location for numerous servers is called a _____
Select one:
a.
Library
b.
Data farm
c.
Data center
d.
Server hub
Question 5
Complete
Mark 0.00 out of 1.00
Flag question
Question text
What is the current generation of the internet?
Select one:
a.
Web 1.0
b.
Web 4.0
c.
Web 3.0
d.
Web 2.0
Question 6
Complete
Mark 0.00 out of 1.00
Flag question
Question text
What do you call a program that is used to create, view, edit, and print documents?
softw are
Answer:
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is the name of the of spreadsheet application that was used in Chapter 5?
Select one:
a.
LibreOfficeCalc
b.
OpenOfficeCalc
c.
Google Sheets
d.
Microsoft Excel
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Web 1.0 websites are mostly dynamic
Select one:
True
False
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
People who send unwanted and unsolicited emails are called _____
Select one:
a.
Scammers
b.
Hackers
c.
Phishers
d.
Spammers
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is the sign that separates the 2 parts of an email
Select one:
a.
:
b.
@
c.
&
Question 11
Complete
Mark 1.00 out of 1.00
Flag question
Question text
You can use _____ to create multiple letters with the same body or message but are
addressed to different people.
Select one:
a.
Data source
b.
Formula
c.
Mail Merge
d.
LibreOffice
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In the spreadsheet app that you learned about in Chapter 5, what is the default name of the
cell that belongs to the second row and the third column?
Select one:
a.
C:2
b.
2C
c.
C2
d.
2-C
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Some search engines have _____ features that can be used to do complex web search.
Select one:
a.
Integrated Search
b.
Improved Search
c.
Advanced Search
d.
Assisted Search
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The legal right to own an original work is called _____
Select one:
a.
Copyright
b.
Intellectual Property Code
c.
Plagiarism
d.
Piracy
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answers to the following formula:
=SUM(B1:B5)
300
Answer:
Question 16
Complete
Mark 1.00 out of 1.00
Flag question
Question text
.com stands for _____
Select one:
a.
complicated
b.
company
c.
commercial
d.
communication
Question 17
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information stolen via _____ such as credit card and bank account information can be used in
identity theft and stealing money.
Select one:
a.
Trojan
b.
Phishing
c.
Spam
d.
Worm
Question 18
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a TLD that was created for online communities, open-source projects and non-profit
entities.
Select one:
a.
.edu
b.
.com
c.
.org
d.
.net
Question 19
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is the name of the search engine owned by Apple
Select one:
a.
Mozilla Firefox
b.
Bing
c.
Internet Explorer
d.
Safari
Question 20
Complete
Mark 0.00 out of 1.00
Flag question
Question text
A task that is done by a computer for another computer is called a _____
Select one:
a.
Service
b.
Server
c.
Client
d.
Cloud
Question 21
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Apple’s web browser is called _____.
Select one:
a.
Internet Explorer
b.
Bing
c.
Savanna
d.
Safari
Question 22
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
=B2/C2+B4
84
Answer:
Question 23
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Wiki is derived from the Hawiian work wikiwiki, which means _____
Select one:
a.
Many
b.
Quick
c.
Free
d.
Super-free
Question 24
Complete
Mark 0.00 out of 1.00
Flag question
Question text
A program designed to interfere with your computer, device or network’s normal operation
malw a
is called a Answer .
Question 25
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The “.gov” TLD was originally intended to be used solely by government agencies but today
anyone can purchase and use it.
Select one:
True
False
Question 26
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In the spreadsheet application that you learned about, what sign is used for multiplication?
Select one:
a.
-
b.
*
c.
/
d.
+
Question 27
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Ad-blockers are browser add-ons that prevent advertisements from being displayed in your
browser.
Select one:
True
False
Question 28
Complete
Mark 1.00 out of 1.00
Flag question
Question text
blind ca
Bcc Stands for Answer .
Question 29
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
=A1*B5-A5
950
Answer:
Question 30
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
=B3*C1-A4
260
Answer:
Question 31
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Yahoo, Google, and Bing are examples of a _____.
Select one:
a.
Search bar
b.
Advanced search
c.
Web search bots
d.
Web search engine
Question 32
Complete
Mark 1.00 out of 1.00
Flag question
Question text
LibreOffice Calc is an example of _____
Select one:
a.
Spreadsheet
b.
Office productivity suite
c.
DBMS
d.
Word processor
Question 33
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The most common acts of _____ include posting inappropriate or banned contents, posting
off topic messages
Select one:
a.
Hacking
b.
Piracy
c.
Trolling
d.
Spamming
Question 34
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is the sign that separates the two parts of the email address?
Select one:
a.
Dot sign
b.
.com sign
c.
www sign
d.
At sign
Question 35
Complete
Mark 1.00 out of 1.00
Flag question
Question text
server
A computer that does a task for other computers is called a Answer .
Question 36
Complete
Mark 1.00 out of 1.00
Flag question
Question text
w eb 2.
Answer is the generation of the Internet that is characterized by the increased focus
on user participation and the prevalence of dynamic websites.
Question 37
Complete
Mark 0.00 out of 1.00
Flag question
Question text
With Google Chrome and Mozilla Firefox, you can make an online search by typing the
keywords in the _____
Select one:
a.
Space bar
b.
Keyword bar
c.
Address bar
d.
Domain bar
Question 38
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The _____ is the first part of an email address. It follows strict naming rules.
Select one:
a.
Name part
b.
Domain part
c.
Client part
d.
Local part
Question 39
Complete
Mark 0.00 out of 1.00
Flag question
Question text
The apps in your smart phone are web-based apps because they connect to the Internet.
Select one:
True
False
Question 40
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Hypert
HTML stands for Answer
Question 41
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Other than the search bar, you can also enter your search keywords in your browser’s _____.
Select one:
a.
Space bar
b.
Address bar
c.
Keyword bar
d.
Domain bar
Question 42
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A website that allows users to edit its contents and structure is called a _____.
Select one:
a.
Wiki
b.
Google
c.
Web 3.0
d.
Cloud
Question 43
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A _____ is a computer that does tasks for other computers.
Select one:
a.
Network
b.
Service
c.
Server
d.
Client
Question 44
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The practice of tricking people into submitting their personal details is called _____.
Select one:
a.
Spam
b.
Phishing
c.
Worm
d.
Trojan
Question 45
Complete
Mark 1.00 out of 1.00
Flag question
Question text
LibreOffice is an open-source _____
Select one:
a.
Productivity tool
b.
Office productivity suite
c.
Graphics suite
d.
Word processor
Question 46
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a type of malware that causes unwanted advertisements to appear in your screen.
Select one:
a.
Firmware
b.
Adware
c.
Hardware
d.
Adblocker
Question 47
Complete
Mark 0.00 out of 1.00
Flag question
Question text
The names of _____ are numbers
Select one:
a.
Collumns
b.
Rows
c.
Formulas
d.
Cells
Question 48
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Web 1.0 websites are static
Select one:
True
False
Question 49
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In Calc, what is the symbol used for multiplication?
Select one:
a.
*
b.
/
c.
+
d.
-
Question 50
Complete
Mark 1.00 out of 1.00
Flag question
Question text
While typing a keyword in a search bar, _____ may appear below it.
Select one:
a.
Solutions
b.
Suggestions
c.
Indentations
d.
Corrections
2nd Attempt
LibreOffice _____ is an example of a word processor
Select one:
a.
word
b.
Notepad
c.
Writer
d.
Docs
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is the name given to applications that allow people to interact with one another in online
communities
Select one:
a.
Wiki
b.
Native app
c.
Social Media
d.
Cloud
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Web 2.0 websites are mostly dynamic
Select one:
True
False
Question 4
Complete
Mark 0.00 out of 1.00
Flag question
Question text
What is the name of word processor that we used in Chapter 5?
Select one:
a.
LibreOffice Fresh
b.
LibreOffice Word
c.
LibreOffice Document
d.
LibreOffice Writer
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A program used to create, store, and manage data in tables.
Select one:
a.
Word processor
b.
DBMS
c.
Graphics suite
d.
Spreadsheet
Question 6
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a type of malware that does not need human action to spread
Select one:
a.
Spam
b.
Worm
c.
Phishing
d.
Trojan
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is bad because it denies the rightful owners the proper compensation for their work.
Select one:
a.
Trolling
b.
Bootlegging
c.
Piracy
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ Internet-based networks that are used to store, manage, and share resources and
information
Select one:
a.
Local Area Network
b.
Service
c.
Cloud Computing
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The _____ is usually the name of the website that provides the email service.
Select one:
a.
Name part
b.
Client part
c.
Local part
d.
Domain part
Question 10
Complete
Mark 0.00 out of 1.00
Flag question
Question text
What is the name given to software used to create, store and collections of information?
Database softw are
Answer:
Question 11
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are web
apps.
Select one:
True
False
Question 12
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Web ap
A Answer is an Internet-based application that can be accessed using browsers.
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Recording live performances or broadcasts without permission from the owner is called _____.
Select one:
a.
Bootlegging
b.
Counterfeiting
c.
Trolling
d.
Streaming
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Data centers are centralized locations for _____
Select one:
a.
Servers
b.
Cloud
c.
Social Media
d.
Google
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The World Anti-Piracy Observatory is operated by _____
Select one:
a.
WHO
b.
UNILAB
c.
UNICEF
d.
UNESCO
Question 16
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is the name of the open-source productivity suite that we used in Chapter 5?
LibreOffice
Answer:
Question 17
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A household has four laptops but only dad's laptop has direct access to the internet. To share
the Internet connection, he turns his laptop into a Wifi hotspot for the rest of the family to
connect to. In this scenario, dad's laptop is the _____
Select one:
a.
Service
b.
Network
c.
Server
d.
Client
Question 18
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a TLD that was originally intended for non profit entities.
Select one:
a.
.org
b.
.com
c.
.net
d.
.edu
Question 19
Complete
Mark 0.00 out of 1.00
Flag question
Question text
The _____ lists 15 types of works that are covered by copyright protection.
Select one:
a.
Copyright Protection Act
b.
World Anti-Piracy Observatory
c.
Intellectual Property Code of the Philippines
d.
Anti-Piracy Law of the Philippines
Question 20
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A _____ is a software that is used to create information like documents, spreadsheet,
presentations, etc.
Select one:
a.
Productivity tool
b.
Graphics suite
c.
DBMS
d.
Word processor
Question 21
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In Calc, what is the symbol used for subtraction?
Select one:
a.
-
b.
+
c.
*
d.
/
Question 22
Complete
Mark 0.00 out of 1.00
Flag question
Question text
The alias that you use when you sign up in a website is called a _____.
Select one:
a.
Domain name
b.
Maiden name
c.
Username
d.
Full name
Question 23
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Adware are browser add-ons that prevent advertisements from being displayed in your browser.
Select one:
True
False
Question 24
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
=SUM(C1:C5)
75
Answer:
Question 25
Complete
Mark 1.00 out of 1.00
Flag question
Question text
.com and .net are examples of _____
Select one:
a.
Top-level domains
b.
Web Addresses
c.
Websites
d.
Search Engines
Question 26
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is reserved for schools and universities
Select one:
a.
.org
b.
.edu
c.
.gov
d.
.sch
Question 27
Complete
Mark 0.00 out of 1.00
Flag question
Question text
What is the name of the LibreOffice version with the latest features?
Select one:
a.
LibreOffice Document
b.
LibreOffice Fresh
c.
LibreOffice Writer
d.
LibreOffice Word
Question 28
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Clicking on a search result using the _____ will open the link in a new tab.
Select one:
a.
Cursor
b.
Left button
c.
Right button
d.
Mouse wheel
Question 29
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The names of _____ are letters
Select one:
a.
Formulas
b.
Collumns
c.
Cells
d.
Rows
Question 30
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
=D5/D1
5
Answer:
Question 31
Complete
Mark 0.00 out of 1.00
Flag question
Question text
REPUBLIC ACT NO. 8293, also known as the IP Code governs the protection of intellectual
property and online etiquette in the Philippines.
Select one:
True
False
Question 32
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
5. =B2/C2-D1
-107
Answer:
Question 33
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A _____ can be a single program or a system of programs designed to look for information in the
Internet.
Select one:
a.
Search bar
b.
Web search engine
c.
Advanced search
d.
Facebook
Question 34
Complete
Mark 0.00 out of 1.00
Flag question
Question text
An office has one computer that is connected to a printer. It prints documents that are sent to it
by other computers via Local Area Network In this setup, the computer connected to printer is
the _____.
Select one:
a.
Server
b.
Client
c.
Network
d.
Service
Question 35
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is ok to post your passwords in your social media accounts so you won't forget them.
Select one:
True
False
Question 36
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Websites that belong in different generations of the internet cannot co-exist in a given time
period
Select one:
True
False
Question 37
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ websites can change their appearance and behavior based on the users' actions.
Select one:
a.
Native
b.
Dynamic
c.
Social Media
d.
Static
Question 38
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Websites from the 2.0 or later generations of the internet that can change their appearance and
behavior depending on the user's action, location, preferences, etc. are called _____ websites.
Select one:
a.
Static
b.
Social Media
c.
Native
d.
Dynamic
Question 39
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fake accounts that belong to the same person are called _____
Select one:
a.
Trolls
b.
Flame puppets
c.
Sock puppets
d.
Bullies
Question 40
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is the act of claiming someone else's work as your own.
Select one:
a.
Plagiarism
b.
Bootlegging
c.
Piracy
d.
Trolling
Question 41
Complete
Mark 0.00 out of 1.00
Flag question
Question text
The _____ of the email address is on the left.
Select one:
a.
Local part
b.
Domain part
c.
Client part
d.
Name part
Question 42
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ may appear in web search engines, address bars, and search bars while you are typing a
keyword
Select one:
a.
Suggestions
b.
Indentations
c.
Corrections
d.
Solutions
Question 43
Complete
Mark 1.00 out of 1.00
Flag question
Question text
All the forms of piracy are violations of _____ which is the legal right to own an original work.
Select one:
a.
IP Code
b.
Piracy
c.
Copyright
d.
Plagiarism
Question 44
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is ok to take pictures of strangers without asking for permission as long as you tag them when
you post the pictures.
Select one:
True
False
Question 45
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A computer virus can spread when the infected computer makes contact with another
computer.
Select one:
True
False
Question 46
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In a spreadsheet, the horizontal groupings are called _____.
Select one:
a.
Collumns
b.
Cells
c.
Rows
d.
Formulas
Question 47
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ are unruly members who deliberately break the rules of an online community.
Select one:
a.
Trolls
b.
Spammers
c.
Bullies
d.
Pirates
Question 48
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Spam can spread when the infected computer makes contact with another computer.
Select one:
True
False
Question 49
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a type of malware that is named after a fictional horse.
Select one:
a.
Worm
b.
Adware
c.
Spam
d.
Trojan
Question 50
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The Hawaiian word wikiwiki, means _____
Select one:
a.
Many
b.
Quick
c.
Free
d.
Super-free