Computer Bsu
Computer Bsu
_______1. Do not bring food and drinks inside the computer laboratory.
_______2. Change the wallpaper to display nice scenery.
_______3. Keep the chairs in line before you leave the computer laboratory.
_______4. You want to display the clock in the desktop so you use it as your wallpaper.
_______5. Close all the programs and log off properly.
_______6. Clean dirty and sticky keys with soap and water.
_______7. Sit everywhere you want.
_______8. Straighten up your mouse and keyboard before you leave the computer laboratory.
_______9. Start the program whenever you are ready.
_______10. Enter the computer laboratory early so you can enjoy the air conditioning.
II. Read each item carefully. Choose the letter of the correct answer and write it in the line.
____ 11. It is the sorting, naming and maintaining of computer files.
A. File Organizer B. File Management C. File Folder
____ 12. How can we create a new folder?
A. Right – click a blank space on our desktop, then choose New.
B. Left – click on Documents, then choose New Folder.
C. Right – click inside the Documents, then choose New.
____ 13. Which of following statement does not tell about a good file name?
A. It causes delay and confusion.
B. It helps us easily find the file we need.
C. It tells us what the file is about even before we open the file.
____ 14. What is an example of a good file name?
A. #MyBestWork B. CuddlingwithDogs C. MathReviewer-Qtr3
____ 15. What computer threats designed to damage, destroy, steal or inflict bad action on data,
hosts or networks?
A. Malware B. Virus C. Program
____ 16. What type of malware propagates by inserting a copy of itself and becoming a part of
another program?
A. Trojan B. Computer Worm C. Computer Virus
____ 17. What type of malware can stand – alone and does not require a host program to
spread?
A. Trojan B. Computer Worm C. Computer Virus
____ 18. It is a type of malware that looks real but it activates and attacks the host when loaded.
A. Trojan B. Computer Worm C. Computer Virus
____ 19. What agency first used the internet for missile research?
A. Advanced Research Projects Agency (ARPA)
B. National Aeronautics and Space Administration (NASA)
C. National Science Foundation (NSF)
____ 20. Who develop the first e – mail program in 1972?
A. Roy Thompson B. Rey Truman C. Ray Tomlinson
____ 21. In 1991, it was the first search engine created; the US government gave the green light
for commercial activities to take place over the Internet.
A. World Wide Web B. Google C. Archie
____ 22. What is the first cell phone release in 1996 with access to Internet?
A. Samsung B. Nokia C. Apple
____ 23. What is the meaning of Wi-Fi?
A. Wireless Fixtures B. Wireless Findings C. Wireless Fidelity
____ 24. It was the cell phone company released the first Internet cell phone in the world in 2001.
A. BalckBerry B. Cherry Mobile C. Apple
____ 25. What internet browser launched in 2005?
A. Facebook B. Google C. YouTube
____ 26. In 2008, its indexed reached 1 trillion links. It is also considered the most popular search
engine today.
A. Google B. Internet Explorer C. Mozilla Firefox
____ 27. In 2010, how many active users announced using Facebook?
A. 300 million B. 400 million C. 500 million
____ 28. What software application use to locate, retrieve and display content on the World Wide
Web?
A. Web Browser B. Search Engine C. Internet Access
____ 29. These are typically simpler versions of web browsers and offer fewer features to run
well on mobile devices.
A. Mobile browsers B. Internet programs C. Search Engine
____ 30. It is a computer program that searches databases and Internet sites for the documents
containing keywords specified by the user.
A. Search engine B. Mobile browsers C. Internet programs
III. Determine the netiquette guideline being discussed. Write the letter on the line.
A. Identify yourself. F. Copy with caution.
B. Include a subject line. G. Do not spam.
C. Avoid sarcasm. H. Be concise.
D. Respect the privacy of others. I. Use appropriate language.
E. Acknowledge and return messages J. Use appropriate emoticons.
promptly. K. Use appropriate intensifiers.
____ 31. Begin messages with a salutation and end them with your name.
____ 32. Observe good grammar and spelling.
____ 33. Use a signature at the end of a message.
____ 34. Give a descriptive phrase in the subject line of the message header.
____ 35. Use common acronyms.
____ 36. Do not send or respond to chain letters or rumors.
____ 37. Use smileys or punctuation marks.
____ 38. Keep messages about one page long.
____ 39. Do not forward e-mail without the original author’s permission.
____ 40. Avoid “flaming” or online “screaming”.
IV. Identify the following. Write your answer on the line.
_______________ 41. It is short electronic mail and exchange information between two users via
telecommunications.
_______________ 42. It is a free e-mail service.
_______________ 43. It is a part of New Message window that allows us to Send the e-mail,
Attach files, Insert files using Drive, Insert photo, Insert Link and Insert emoji.
_______________ 44. It is the part of e-mail address before @.
_______________ 45. It is a sample domain name to which the user belongs.
V. Label the parts of a New Message window. Write your answers on the line.
1 2
4 5
41. _______________________________________
42. _______________________________________
43. _______________________________________
44. _______________________________________
45. _______________________________________