Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Republic of the Philippines

Department of Education
REGION VI – WESTERN VISAYAS
SCHOOLS DIVISION OF HIMAMAYLAN CITY
HIMAMAYLAN NATIONAL HIGH SCHOOL
BRGY 3, HIMAMAYLAN CITY, NEGROS OCCIDENTAL

EMPOWERMENT TECHNOLOGY
THIRD QUARTER EXAMINATION
2nd Semester | S.Y. 2023-2024
Name: ______________________________________Grade & Section:_______________________
Multiple Choice: Read the following statements carefully. Choose the best answer from
the choices given below and write it on the space provided before each number. Use
CAPITAL letters only. AVOID ERASURES.

1. Which of the following components of information and communications


technology includes electronic devices such as the keyboard, mouse, and
printer?
A. hardware C. software
B. people D. procedure
2. This component of ICT is the output from an ICT system that is useful and
meaningful to the people using the system. What is this component?
A. data C. computer
B. information D. software
3. Which of the following definitions of ICT is true?
A. Machines that are able to perform processes and calculations based on
instructions given by the software
B. Distribution of multimedia content using any electronic mass
communication tool
C. Tools, devices, services, and applications that are used to retrieve,
process, store, secure, and transmit information
D. Space where the user and computer system interact using a combination
of hardware and software
4. What type of web page is classified as flat or stationary?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
5. Mr. Cruz developed a new website for his business; however, his website is not
interactive. It does not cater users’ query; all pictures are just still and the only way
to move to another webpage is by clicking the hyperlink next. What particular
website does Mr. Cruz have created?
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
6. Who invented the World Wide Web?
A. Charles Babbage C. Mark Zuckerberg
B. Tim-Berners Lee D. Elon Musk
7. What is the name of the symbol that is used to classify and categorize
information?
A. Question Mark C. Hashtag
B. Asterisk D. At sign
8. What specific type of social media allows you to connect with other people?
A. Social Networks C. Media Sharing
B. Microblogging D. Social News
9. Twitter is an example of what specific type of social media?
A. Media Sharing C. Microblogging
B. Social Networks D. Social News
10. What do you call the global system of interconnected computer networks that
use servers to link billions of devices worldwide?
A. Internet C. Web browser
B. Websites D. World Wide Web
11. What type of web page is classified as a Dynamic Page?
A. Web 1.0 C. Web 2.0
B. Internet D. Web 3.0
12. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
13. It is OK to forward or post an email message that you received, if ______?
A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or
post it.
C. it does not contain any copyrighted material. D. the author of the
message hasn't marked it as confidential.
14. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or
criticism.
15. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
16. It happens when an attacker uses electronic devices to do unwanted
surveillance
against its victim?
A. Cyberbullying C. Spamming
B. Phishing D. Cyberstalking
17. What type of information should you avoid giving when using the internet?
A. Phone Number C. Shirt Size
B. Profile Picture D. Religion
18. What is the golden rule of Netiquette?
A. Use correct grammar. C. Remember the human.
B. Put a smiley in every message. D. Respect people’s time.
19. The people who are raised in a digital, media-saturated world are called?
A. Digital Immigrant C. Gen Z
B. Digital Natives D. Millennial
20. You get an email telling you that you won a hundred thousand without joining
in a competition. You should ____________.
A. Claim the prize. C. Return the email with response.
B. Ignore the email. D. Send rude message as revenge
21. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks -
by
your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt
someone's
feelings, then it’s okay.
D. You are judged by how you look – you profile picture is important.

22. Which of the following should you never give on the Internet?
A. Your Age C. Your Address
B. Your Name D. All of the above
23. What should you do if you feel you are being cyber-bullied?
A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the Interne
24. Knowledge and understanding of netiquette is useful because ___________
A. It will help you create a positive impression on those you meet in
cyberspace.
B. It explains some of the technical limitations of online
communications.
C. It explains the conventions already being used by millions of
cybernauts.
D. All of the above.
25. What are the three main search expressions, or operators, recognized by
Boolean
logic?
A. and, or, not C. and, or, but
B. from, to, whom D. search, keyword, text
26. What happens when a phrase or sentence is placed inside quotation marks
when
doing research?
A. Will only return items that have both terms.
B. Will search for words that are together and in order
C. Will return items that exclude a term
D. Will return items that have either of the terms
27. What is a URL?
A. A computer software program
B. An acronym for Unlimited Resources for Learning
C. The address of a document or "page" on the World Wide Web
D. A search engine
28. Which of the following describes Web 3.0?
A. It is recognized as the “read-only web” of web evolution.
B. It is recognized as the “writable web” of web evolution.
C. It is recognized as the “executable web” of web evolution.
D. It is recognized as the “social web” of web evolution.
29. Which of the following features displays technology convergence in
communication technology?
A. refrigerator with built-in TV monitor
B. television that uses the internet instead of an antenna for signal
reception
C. movie that is converted as an interactive game
D. wristwatch that can also be used as a cellular phone
30. Which of the following statements is NOT true about the benefits of the
convergence of technology among electronic devices?
A. It allows the merging of two or more functions into one device,
which
makes it easier to carry.
B. It allows the merging of two or more functions in one device, which
allows users to have lower electricity cost.
C. It allows the merging of two or more functions in one device, which
lowers user’s expense because he or she just needs to buy only
one device instead of buying two or more.
D. It allows the merging of two or more functions into one device,
which
makes it more stylish. ____31. It refers to a state in

31. It refers to a state in which two or more technology entities and functions are
combined into one device or system.
A. Technological Convergence B. Mechanical Technology
C. Computing Technology D. Content Technology
32. Which of the following extensions represents a document created in MS Word?
A. .dotsx B. .xlsx
C. .pptx D. .docx
33. What Microsoft Office program designed to create Spreadsheets which can later
be used to analyze statistical data?
A. MS Publisher B. MS Word
C. MS Excel D. MS OneNote
34. Which of the following BEST describes PowerPoint?
A. Presentation Software B. Database Software
C. Drawing Software D. Desktop Publishing Software
35. Vince is an influencer. He is active in social media. He has a lot of followers on
Twitter and Instagram. Despite showing great and inspirational content, there are
still haters who want his reputation destroyed. Few months back, he received an
email notification stating that someone tried to access his account through another
device he does not own. What should he do to secure his accounts?
A. Never agree to meet strangers in chat rooms.
B. Change Passwords and use stronger ones.
C. Think before you click.
D. Do not share personal information.
36. Which of the following statements does NOT describe Netiquette?
A. It is a set of rules followed in the virtual world.
B. It is a set of rules that help people be safe in cyberspace.
C. It is a set of rules created by the king only.
D. It is a set of rules that guide people how to communicate
appropriately online.
37. Which statement is TRUE about the information you post online?
A. Only you have the access to the information you posted.
B. You and your friends have the joint access to the information you
posted.
C. No one has access to the information you posted.
D. Anyone can access the information you posted.
38. What do we call software that looks for information on a database according to
the user’s query?
A. Search Engines C. Ask Engines
B. Inquiry Engines D. Hunt Engines
39. Which of the following is NOT an example of Search Engines?
A. Facebook C. Google
B. Yahoo! D. Bing
40. What feature of a word processor allows users to duplicate a section of text or
an
object from one place in a document and use that section later?
A. Copy C. Paste
B. Cut D. Insert
Good Luck and God Bless!

Prepared by:

RODITO J. VILLANUEVA JR.

You might also like