Professional Documents
Culture Documents
Third Quarter
Third Quarter
Department of Education
REGION VI – WESTERN VISAYAS
SCHOOLS DIVISION OF HIMAMAYLAN CITY
HIMAMAYLAN NATIONAL HIGH SCHOOL
BRGY 3, HIMAMAYLAN CITY, NEGROS OCCIDENTAL
EMPOWERMENT TECHNOLOGY
THIRD QUARTER EXAMINATION
2nd Semester | S.Y. 2023-2024
Name: ______________________________________Grade & Section:_______________________
Multiple Choice: Read the following statements carefully. Choose the best answer from
the choices given below and write it on the space provided before each number. Use
CAPITAL letters only. AVOID ERASURES.
22. Which of the following should you never give on the Internet?
A. Your Age C. Your Address
B. Your Name D. All of the above
23. What should you do if you feel you are being cyber-bullied?
A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Interne
24. Knowledge and understanding of netiquette is useful because ___________
A. It will help you create a positive impression on those you meet in
cyberspace.
B. It explains some of the technical limitations of online
communications.
C. It explains the conventions already being used by millions of
cybernauts.
D. All of the above.
25. What are the three main search expressions, or operators, recognized by
Boolean
logic?
A. and, or, not C. and, or, but
B. from, to, whom D. search, keyword, text
26. What happens when a phrase or sentence is placed inside quotation marks
when
doing research?
A. Will only return items that have both terms.
B. Will search for words that are together and in order
C. Will return items that exclude a term
D. Will return items that have either of the terms
27. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World Wide Web
D. A search engine
28. Which of the following describes Web 3.0?
A. It is recognized as the “read-only web” of web evolution.
B. It is recognized as the “writable web” of web evolution.
C. It is recognized as the “executable web” of web evolution.
D. It is recognized as the “social web” of web evolution.
29. Which of the following features displays technology convergence in
communication technology?
A. refrigerator with built-in TV monitor
B. television that uses the internet instead of an antenna for signal
reception
C. movie that is converted as an interactive game
D. wristwatch that can also be used as a cellular phone
30. Which of the following statements is NOT true about the benefits of the
convergence of technology among electronic devices?
A. It allows the merging of two or more functions into one device,
which
makes it easier to carry.
B. It allows the merging of two or more functions in one device, which
allows users to have lower electricity cost.
C. It allows the merging of two or more functions in one device, which
lowers user’s expense because he or she just needs to buy only
one device instead of buying two or more.
D. It allows the merging of two or more functions into one device,
which
makes it more stylish. ____31. It refers to a state in
31. It refers to a state in which two or more technology entities and functions are
combined into one device or system.
A. Technological Convergence B. Mechanical Technology
C. Computing Technology D. Content Technology
32. Which of the following extensions represents a document created in MS Word?
A. .dotsx B. .xlsx
C. .pptx D. .docx
33. What Microsoft Office program designed to create Spreadsheets which can later
be used to analyze statistical data?
A. MS Publisher B. MS Word
C. MS Excel D. MS OneNote
34. Which of the following BEST describes PowerPoint?
A. Presentation Software B. Database Software
C. Drawing Software D. Desktop Publishing Software
35. Vince is an influencer. He is active in social media. He has a lot of followers on
Twitter and Instagram. Despite showing great and inspirational content, there are
still haters who want his reputation destroyed. Few months back, he received an
email notification stating that someone tried to access his account through another
device he does not own. What should he do to secure his accounts?
A. Never agree to meet strangers in chat rooms.
B. Change Passwords and use stronger ones.
C. Think before you click.
D. Do not share personal information.
36. Which of the following statements does NOT describe Netiquette?
A. It is a set of rules followed in the virtual world.
B. It is a set of rules that help people be safe in cyberspace.
C. It is a set of rules created by the king only.
D. It is a set of rules that guide people how to communicate
appropriately online.
37. Which statement is TRUE about the information you post online?
A. Only you have the access to the information you posted.
B. You and your friends have the joint access to the information you
posted.
C. No one has access to the information you posted.
D. Anyone can access the information you posted.
38. What do we call software that looks for information on a database according to
the user’s query?
A. Search Engines C. Ask Engines
B. Inquiry Engines D. Hunt Engines
39. Which of the following is NOT an example of Search Engines?
A. Facebook C. Google
B. Yahoo! D. Bing
40. What feature of a word processor allows users to duplicate a section of text or
an
object from one place in a document and use that section later?
A. Copy C. Paste
B. Cut D. Insert
Good Luck and God Bless!
Prepared by: