Empowerment Technologies Preliminary Examination
Empowerment Technologies Preliminary Examination
Region IX
Rebokon Agricultural and Vocational High School
Rebokon, Dumalinao, Zamboanga Del Sur
Empowerment Technologies
Preliminary Examination
2017-2018
1. These are programs designed to search or mine the World Wide Web based on keywords provided by
the user?
a. Research Indexing Sites c. Web Search Engines
b. Massive Online Open Course d. Electronic Commerce
3. It is a glass tube that has its gas removed, creating a vacuum so that the electricity can pass through
freely.
a. Transistors b. Resistors c. Diodes d. Vacuum tube
6. These are the symbols that is used as substitute for pictures to depict ideas, objects, and animals.
a. Pictograms b. Pictographs c. Pictographic d. Pictography
7. Government-Connected, Government-Maintained and News Agencies are example of what Web site?
a. Employment Web site c. Credible Web site
b. Government Web site d. Liable Web site
11. This program is disguised as enticing website and are used to spy upon the activity of the computer and
steal information.
a. Spam b. Malware c. Phishing d. Unsolicited Bulk E-mail
12. These are the websites dedicated to compile and index researches done by the academic
researchers, engineers and so on.
a. Massive Online Open Course c. Research Indexing Sites
b. Employment Web sites d. Tutorial Sites
13. It is a heavy and bulky object where early humans wrote their information.
a. Stone tablets b. Pictograms c. Papyrus d. Stone Graphs
16. Who is the American inventor who successfully introduced the first single-circuit telegraph, which gave
rise to the Morse code?
a. Emmanuel F. Morse c. Samuel F. Morse
b. Sammy Wales F. Morse d. Jimmuel F. Morse
17. A device that is composed of a group of transistor and circuit elements compressed in a single
package.
a. Integrated Circuits c. Transistors d. Vacuum Tubes d. Resistors
18. These are also called the “Unsolicited Bulk E-mail” and is used by the attackers as a tool for
advertisement.
a. Group Message b. Emails c. Advertisements d. Spam
19. Why should we visit the related articles and the listed references in reading articles from the Web?
a. To confirm whether the written information is true and if it conforms to the information written in the
article.
b. To confirm whether the written article is famous and if it is written by a famous author.
c. To confirm whether the written article is high rated and if it belongs to a famous site.
d. To confirm whether the articles is true and is written by a famous Web site.
21. From what plant did the early paper was produced?
a. Trees b. Papyrus Plant c. Tablets d. Muds
23. A method of transmitting text information as a series of on-off tones, lights, or clicks.
a. Morse code b. Moorse Code c. Programming Code d. Mourse Code
24. These are the Web sites dedicated to teach and inform users focused on different areas.
a. Massive Online Open Course (MOOC) c. Research Indexing Sites
b. Employment Web sites d. Classroom Format Web sites
25. An electronic device with properties and functions similar to vacuum tubes, but its lighter and faster.
a. Resistor b. Protractor c. Vacuum Tube d. Transistor
27. Why should we be careful in anything we publish, post or share in the internet?
a. Because it can cause trouble in the online society.
b. Because it can bother and harm your cyber avatar.
c. Because it can ruin your life as an internet user.
d. Because it affects us and other individual who exist somewhere around the globe and this individual
may be someone whom you might bump into.
28. JobStreet.ph, JobsDB, and BestJobs are example of what Web site?
a. Tutorial Sites c. Electronic Commerce Sites
b. Employment Web sites d. Online Shops
29. It was the first device to use electricity to transmit information over an electrical media and is
considered as the first electric communications device.
a. Telegram b. Telegraph c. Telephone d. Televise
32. Why should we look for the Author’s name in gathering articles from the Web?
a. So that we can confirm whether the author is famous.
b. So that we can conduct a follow up research whether the author is rich or famous.
c. So that we can conduct a follow up research and verify whether the author really exist.
d. So that we can confirm that the author is not dead.
33. What is the reason why ENIAC was also called as the “GIANT BRAIN”?
a. Because it can compute large amount of number faster and accurate.
b. Because it is physically big and can compute missile trajectory accurately.
c. Because it can compute large amount of numbers from a missile trajectory.
d. Because it can compute the trajectory of a large missile.
35. Why should we verify and authenticate the information we get from the Web?
a. To ensure that the information is written by a brilliant author.
b. To ensure that the information is written by a famous author.
c. To ensure that the information is true and accurate.
d. To ensure the safety of your personal information and to avoid viruses online.
37. This is a technology that uses electronic means to trade product and currencies.
a. Electronic Commerce b. Online Shop c. Tutorial Sites d. Employment Web sites
39. In what way did the early humans gave birth to the early books?
a. They bound it using the stone tablets and store in a clear area.
b. They compiled their records that are written on a piece of paper and then bound together.
c. They compiled their records that are written on a stone tablet and then bound them together.
d. They cut the papyrus plant evenly and make their books.
40. These are the websites that enable users to contribute, collaborate and edit site content.
a. Social Media Sites b. Facebook c. Google Map d. Wiki
“Look up for inspiration, look down for concentration, do not look left and right for information.”