Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CALOOCAN HIGH SCHOOL

SENIOR HIGH
EMPOWERMENT TECHNOLOGY
S.Y. 2023 – 2024
Midterm

Test I. Multiple Choice. Encircle the best answer.


1. It refers to the knowledge obtained from investigation, study, or instruction
a. Information b. Technology c. Communication d. ICT
2. This is the process of imparting or exchanging of information or news.
a. Information b. Technology c. Communication d. ICT
3. It refers to the machinery or equipment developed from the application of scientific knowledge.
a. Information b. Technology c. Communication d. ICT
4. It provides access to information through telecommunication that deals with the use of different communication
technologies such as mobile phones, telephones, the Internet, etc. to locate, save, send and edit information.
a. Information b. Technology c. Communication d. ICT
5. What electronic device is used for storing and processing data, typically in binary form, according to instructions
given to it in a variable program.
a. Internet b. Machine c. Computer d. ICT
6. It is the global system of interconnected computer networks that use the Internet protocol suite (TCIP/IP) to link
billions of devices worldwide.
a. Internet b. Machine c. Computer d. ICT
7. He is a British computer scientist, who invented WWW in 1989.
a. Tim Berners Lee b. Claude Elwood Shannon c. Ronel Fariolen d. Jean Piaget
8. What does WWW stand for?
a. Worldwide Website b. World Wide Web c. Whole Wide Web d. Whole World Website
9. It refers to the first stage of the World Wide Web evolution and commonly called a read-only web
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0
10. It is characterized especially by the changes and transition from static web pages to dynamic web pages or user-
generated content and the growth of social media.
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0
11. It is the stage of internet services for websites and applications that will focus on using a machine-based
understanding of data to provide a data-driven and semantic web technologies, distributed databases, natural
language processing, and machine learning.
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0
12. It is a user-generated system of classifying and organizing online content into different categories by the use of
metadata such as electronic tags.
a. Rich user experience b. Folksonomy c. Long tail d. User participation
13. It means that the applications are more pervasive, dynamic, and interactive.
a. Rich user experience b. Folksonomy c. Long tail d. User participation
14. This are services are offered on-demand rather than on a one-time purchase.
a. Rich user experience b. Folksonomy c. Long tail d. User participation
15. It means that the web user is participating in web content creation, tagging, and sharing.
a. Rich user experience b. Folksonomy c. Long tail d. User participation
16. A feature of web 2.0 wherein the users will be subscribed to software only when needed rather than purchasing
them.
a. Mass Participation b. Software as service c. Long tail d. Folksonomy
17. It refers to the evolution of technological developments and advancements that merge into a new system bringing
together different types of applications and media to work on a similar goal or task.
a. Assistive media b. Convergence c. Cloud computing d. Social media
18. These are interactive computer-mediated technologies that facilitate the creation or sharing of information,
ideas, career interest and other forms of expression via virtual communities and networks.
a. Assistive media b. Convergence c. Cloud computing d. Social media
19. Is a nonprofit service designed to help people who have visual and reading impairments. A database of audio
recordings and audiobooks is used to read to the user.
a. Assistive media b. Convergence c. Cloud computing d. Social media
20. What is the operating system used in apple devices such as iPhone and iPad?
a. Android OS b. iOS c. Windows Phone OS d. Windows Mobile
21. It is an open-source OS developed by Google. Being opensource means mobile phone companies use this OS for
free.
a. Android OS b. iOS c. Windows Phone OS d. Windows Mobile
22. A close source and proprietary operating system developed by Microsoft.
a. Android OS b. iOS c. Windows Phone OS d. Windows Mobile
23. It was developed by Microsoft for smartphones and pocket PCs.
a. Android OS b. iOS c. Windows Phone OS d. Windows Mobile
24. It refers to the online safety of the people and their information when using the internet.
a. Netiquette b. Online Safety c. Terms of services d. Online Policy
25. It refers to the rules of online courtesy, proper manners, and behavior online. It caters to the do’s and don’ts of
online communication.
a. Netiquette b. Online Safety c. Terms of services d. Online Policy
26. It refers to anything that has the potential to cause serious harm and might exploit a vulnerability to breach
security to a computer system and devices.
a. Netiquette b. Cybercrime c. Terms of services d. Threat
27. What kind of crime committed or assisted using the internet.
a. Netiquette b. Cybercrime c. Terms of services d. Threat
28. It tells the user how the website handles and caters privacy and safety regarding its data.
a. Netiquette b. Cybercrime c. Terms of services d. Threat
29. It stands for malicious software.
a. Malware b. Spyware c. Adware d. Worm
30. It is a malicious program designed to replicate itself and transfer from computer to another destroying data or
crashing network services, do nothing, or just annoying.
a. Virus b. Spyware c. Trojan d. Worm
31. A malicious program that disguises as a useful program but once downloaded or installed, leaves your PC
unprotected, and allows hackers to get your information.
a. Virus b. Spyware c. Trojan d. Worm
32. It is a program that runs in the background without you knowing it.
a. Virus b. Spyware c. Trojan d. Worm
33. It is an unwanted email mostly from bots or advertisers.
a. Adware b. Spam c. Hacking d. Phishing
34. It is a crime whereby criminals impersonate individuals, usually for financial gain.
a. Cybercrime b. Identity theft c. Hacking d. Cyberbullying
35. A form of bullying that involves behavior or acts intended to inflict harm, threats, embarrassment using
technology.
a. Cybercrime b. Identity theft c. Hacking d. Cyberbullying
36. It is a graphical word processing program that allows users to type with. It is made by the computer company
Microsoft.
a. MS Word b. MS Excel c. MS Outlook d. MS PowerPoint
37. It is used for presentations and digital imagery.
a. MS Word b. MS Excel c. MS Outlook d. MS PowerPoint
38. It is a spreadsheet developed by Microsoft that provides an automated way of displaying any statistical data
which features calculation, graphing tools, pivot tables and a macro programming language called Visual Basic
for Applications.
a. MS Word b. MS Excel c. MS Outlook d. MS PowerPoint
39. It is a way to make organized presentation art like graphic organizer.
a. Shapes b. Chart c. Clip art d. Smart art
40. It is a tool that you can use to communicate data graphically.
a. Shapes b. Chart c. Clip art d. Smart art
41. It is a popular file format used for images and graphics also known as Joint Photographic Experts Group.
a. .JPG b. .GIF c. .PNG d. .COM
42. It is an image file format commonly used for images on the web and sprites in software programs. It has simple
animation.
a. .JPG b. .GIF c. .PNG d. .COM
43. This file format is an open format with no copyright limitations, and it also can display transparent background.
a. .JPG b. .GIF c. .PNG d. .COM
44. Generally, these are electronic or digital pictures, images, photographs such as logos that you have saved in any
local storage device.
a. Shapes b. Chart c. Clip art d. Pictures
45. It is a Microsoft Word features which allow the user to create documents and combine or merge it with other
document or data file.
a. Hyperlink b. Mail merge c. List of data file d. Form Document
46. It is the document that contains the main body of the message that we want to convey or send.
a. Hyperlink b. Mail merge c. List of data file d. Form Document
47. This is where the individual information or data that needs to be plugged in to our form document is placed and
maintained.
a. Hyperlink b. Mail merge c. List of data file d. Form Document
48. It is a horizontal line of entries in a table of spreadsheet.
a. Row b. Row heading c. Column d. Column heading
49. It is a vertical line of entries in a table.
a. Row b. Row heading c. Column d. Column heading
50. This is where data or formulas are entered into a worksheet so that it may appear in the active cell. It can also
be used to edit data or formula in the active cell.
a. Formula bar b. Ribbon c. Row d. Cell

You might also like