0% found this document useful (0 votes)
648 views2 pages

Summative Test in Emp - Tech 11

This document is a 20-item multiple choice summative test on empowerment technologies. The test covers topics like Web 2.0, ICT, social media, Microsoft Office functions, and cybersecurity threats. For each question, students must choose the correct answer from the given options and write their response on a separate sheet.

Uploaded by

roelpabelonia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
648 views2 pages

Summative Test in Emp - Tech 11

This document is a 20-item multiple choice summative test on empowerment technologies. The test covers topics like Web 2.0, ICT, social media, Microsoft Office functions, and cybersecurity threats. For each question, students must choose the correct answer from the given options and write their response on a separate sheet.

Uploaded by

roelpabelonia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Summative Test 1 in Empowerment Technologies 11

Name: _________________________Grade & Section: ______________Date: _________ Score:____

Test I - Multiple choice: Choose the letter that corresponds to the correct answer. Write your answer for
each item on a separate sheet.

1. Which of the following statements is NOT true about Web 2.0?


a. Folksonomy is one of the features of Web 2.0.
b. Web 2.0 introduced static web pages that allow users to interact with the page.
c. Web 2.0 is the evolution of Web 1.0 by adding web pages that are affected by user input
or preference.
d. None of the above
2. Which of the following statements is NOT true about ICT?
a. The use of computers, communication devices and software applications to convert,
store, process, transmit and retrieve information.
b. The use of scientific knowledge, experience and resources to create processes that fulfil
human needs.
c. The use of different communication technologies such as mobile phones, telephone,
Internet to locate, save, send, and edit information.
d. None of the above
3. It is an ultimate network spanning the entire globe.
a. Local Area Network c. Wide Area Network
b. Metropolitan Area Network d. Internet
4. When the World Wide Web was invented most of the web pages cannot be manipulated by the
user. This type of web page is known as ____.
a. Static b. dynamic c. semantic d. Web 2.0
5. The following are types of social media, except
a. Microblogging b. Assistive media c. Media sharing d.
Bookmarking sites
6. Spotify is a social media website that can be classified as
a. Microblogging b. Social news c. Bookmarking site d. Media
sharing
7. This worm is sometimes referred to as “Love Bug” that attacked tens of millions of Windows
personal computers on and after 5 May 2000.
a. ILOVEYOU b. LOVE-LETTER-FOR-YOU c. Brontok d.
Melissa
8. The following are characteristics of a worm, except _________
a. can travel without any human action.
b. has the capability to replicate itself on a system.
c. disguise itself to be a useful software.
d. can cause network servers and individual computers to stop responding.

9. Lenard is typing an application letter. He wants to send his intention to different companies
without altering the message of the letter. Which of the following features of MS Word can help
him?
a. Tables b. Mail merge c. Text Box d. Mailings Tab
10. Frances wants to merge the information of the recipients of her letter. Which of the following file
is she going to merge with her form document?
a. directory b. data file c. Contact list d.
Recipient list
11. Teacher Ferlyn tasked her students to make a newsletter. He told them to use pictures in full
color just like in digital pictures. Which of the following image compression/file type they will use?
a. .jpg b. .gif c. .png d. .ppt
12. Which of the following symbols is shown in a cell if the cell is not wide enough?
a. #VALUE b. ##### c. #DIV/0!
d. 1.11111E+15
13. Column F and row 7 is also referred to as
a. Col F and row 7 b. Column F7 c. Cell F7 d.
ColRow F7
14. Which among the following is NOT part of the syntax for AVERAGEIF?
a. average range b. range c. criteria d.
logical test
15. A syntax in the AVERAGEIF function that includes the value or label that determines if the cell is
part of the range to be solved
a. Range b. criteria c. average range d.
logical test
16. What external material allows you to insert organizational or structural templates like
organizational charts and flowcharts on your documents?
a. Clip Art b. Drawing c. Smart art d. Chart
17. Bethy is using a technique that tries to take information from the user. She commonly takes
things like credit cards, usernames, passwords, and home addresses. What type of threat is
depicted in the scenario?
a. Fishing b. Scam c. Spam d.
Phishing
18. Statement 1: Both IF and AVERAGEIF can perform a logical test.
Statement 2: Excel formula and functions are the same.
a. Both statements are true. d. Statement 2 is true; Statement 1
b. Both statements are false is false.
c. Statement 1 is true; Statement 2
is false.
19. Statement 1: You use MS Excel to do the math.
Statement 2: Excel spreadsheet can be used as the data source for a Mail Merge.
a. Both statements are true. d. Statement 2 is true; Statement 1
b. Both statements are false is false.
c. Statement 1 is true; Statement 2
is false.
20. If A1=50, A2=25 and you want to multiply these two cells and show output in B3. Which formula
should you use?
a. Type in cell B6, =A1*A2 c. Type in cell B6, MULTIPLY
b. Type in cell B6, =50*25 A1:A2
d. Type in cell B6, PRODUCT a1:a2

You might also like