SAN FERNANDO NATIONAL HIGH SCHOOL
SENIOR HIGH SCHOOL
FIRST PERIODICAL TEST IN EMPOWERMENT TECHNOLOGIES 11
QUARTER 1
NAME: _________________________________ YEAR AND SECTION: ________________
SCORE: ________________________________ TEACHER: CHARMAINE JOY PALOMAR
General Directions:
1. Read the question carefully before you answer.
2. Cell phones are not permitted to use in any way.
3. Erasures and superimpositions are given no credit.
PART I
1. What does ICT stand for?
A. Information Computing in Technologies C. Information and Communication Technology
B. Information Communication Technology D. Information Communication with Technology
2. Jewel is using a technique that tries to take information from the user. She commonly takes things
like credit cards, usernames, passwords, and home addresses using a fake website. What type of
threat is depicted in the scenario?
A. Virus B. Phishing C. Worm D. Spyware
3. Jonathan is having a problem because his files were corrupted. He discovered that most of his
folders were replicated. What kind of malware did he encounter?
A. Virus B. Phishing C. Worm D. Spyware
4. This media is designed to help people who have visual and reading impairments.
A. Assistive B. Social C. Bookmark D. Accessibility
5. What external material allows you to insert organizational or structural templates like organizational
charts and flow charts on your document?
A. Shapes B. SmartArt C. Chart D. ClipArt
6. It is an application that allows users to create, edit, and print documents.
A. Microsoft Word B. Cellphones C. Tablet D. Computer
7. A website that allows you to broadcast short message.
A. Social News B. Bookmarking sites C. Media Sharing D. Microblogging
8. Which is true about Internet?
A. Internet is a system of the computer
B. It is a program run by the computer
C. It is an electronic device linked to the network
D. Internet is a network of computers linked together around the world.
9. The network servers of SFNHS stopped to respond and it was found out that much of the system's
memory was consumed by the malicious software. What kind of malware is this?
A. Worm B. Virus C. Replicates D. Phishing
10. To broaden your search on advertising, you will search the term ___________.
a. advertising OR commercial
b. advertising AND commercial
c. advertising BUT commercial
d. advertising NOT commercial
11. Charmaine is using a technique that tries to take information from the user. He commonly takes
credit cards, usernames, passwords, and home addresses. What type of threat is depicted in the
scenario?
A. Phishing B. Scam C. Spam D. Fishing
12. The following are tips on how to stay safe online except
A. Add friends you know in real life.
B. Avoid visiting untrusted websites.
C. Share your password with anyone.
D. Buy the software, do not use pirated ones.
13. This media is designed to help people who have visual and reading impairments.
A. Assistive B. bookmark C. social D. accessibility
14. A piece of code that spreads itself from one computer to another without human interaction.
A. Virus B. Worm C. Trojan D. Adware
15. . This refers to the feature where users are able to categorize and locate information through
tagging.
A. Hashtags B. folksonomy C. Taxonomy D. rich user experience
16. Pinterest is a social media website that can be classified as
A. Bookmarking site C. Microblogging
B. media sharing D. blogs and forums
17. A feature of a dynamic website that allows users to put their own content.
A. Rich user experience B. Long tail C. user participation D. mass participation
18. It provides a common framework to allow data to be shared and reused across platform,
enterprise, and community boundaries.
A. W3C B. Semantic Web C. Web 1.0 D. Web 2.0
19. You received a comment from an unknown friend in one of your posts in social media saying, “YOU
IDIOT!” What do you call this kind of act?
A. Acting B. Blogging C. Bullying D. Flaming
20. It refers to a set of rules for an acceptable online behavior.
A. Ethics B. Nethics C. Good Moral D. Netiquette
21. It is an act of following, secret surveillance, persistent and manipulative calling and texting, and
other means of approaching the victim unexpectedly using online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking
22. It is an act of engaging an underage minor into inappropriate sexual relationship through the
internet.
A. Cyberbullying B. Flaming C. Cyberstalking D. Online predation
23. Mari found a good application and she installed it on her computer. But after the installation, some
of her files were deleted.
What type of internet threat is depicted in the scenario?
A. Trojan B. Virus C. Phishing D. Worm
24. This is one form of internet advertising used by advertisers to get the attention of web users but
sometimes has obscene or offensive content.
A. Adverts B. Cards C. Infographics D. Pop-
ads
25. This feature of Microsoft Word allows you to create documents and combine them with another
document or data file. It is commonly used when sending out advertising materials to various
recipients.
A. Microsoft Excel B. Data Source C. Main Documents D. Mail merge
26. . It is a program designed to create spreadsheets which can later be used to analyze statistical data
A. Micro Excel B. Micro PowerPoint C. Microsoft Word D. Mail Merge
27. A piece of code that spreads itself from one computer to another without human interaction.
A. Worm B. Virus C. Pharming D. Roque
28. What is Netiquette?
A. Using a net to catch fish.
B. Being mean to other people on Facebook.
C. Using proper manners at the dinner table.
D. The proper use of manners and etiquette on the Internet.
29. Knowledge and understanding of netiquette are useful because________.
A. it will help you create a positive impression on those you meet in cyberspace.
B. it explains some of the technical limitations of online communications.
C. it explains the conventions already being used by millions of cybernauts.
D. All of the above.
30. Precy has received an email from the bank asking her to update her personal information for
security purposes. She clicked the link signed in. Unknowingly, Precy is already a victim
of________________________.
A. Blogging B. Flaming C. Pharming D. Phishing.
31. It is the services that are offered on demand rather than on a one-time purchase.
A. Longtail B. Software as a service C. Rich user Experience D.
Mass participation
32. . It is the synergy of technological advancements to work on a similar goal or task.
A. Convergence B. Compatibility C. Microsoft Word D.
Form Document
33. Which of the following explains the best reason why you need to narrow down what you are
searching online?
A. To search everything in one go.
B. To avoid getting a specific result.
C. To determine a credible source.
D. To determine the most related result.
34. A kind of internet threat where the attacker uses a fake website to get your sensitive information.
A. Worm B. Phishing C. Pharming D. Trojan
35. . What symbol will you use to search for the exact term or phrase?
a. () b. “ “ c. & d. –
36. Charmaine is using a technique that tries to take information from the user. He commonly takes
credit cards, usernames, passwords, and home addresses. What type of threat is depicted in the
scenario?
A. Fishing B. Scam C. Spam D. Phishing
37. Spamming is very poor Netiquette and means ____________________
A. Spilling the juice of meat-byproducts into your keyboard
B. Sending in lines of nonsensical garbage in a chat conversation
C. Posting or emailing unsolicited advertising messages to a wide audience.
D. Posting a message that contains graphic descriptions of something really gross
38. Knowledge and understanding of netiquette is useful because _________
A. It will help you create a positive impression on those you meet in cyberspace
B. It explains the conventions already being used by millions of cybernauts
C. It explains some of the technical limitations of online communications
D. all of the above.
39. What should you do to avoid being cyber-bullied?
A. Observe proper netiquette rules
B. Give out personal information to anyone who asks
C. Ignore any requests from people to be your friend online
D. Strike first - post mean things about other people on your Facebook Wall
40. Harold wants to drag select cells A1 to D7. How can he accomplish this?
A. Long press Alt then click A1 then click D7.
B. Select A1 then D7 while pressing shift
C. Type A1:D7 in the formula bar
D. Press Ctrl + A.
41. What computer program that gives the user the ability to create tables and edit their values.
A. Presentation C. Spreadsheet
B. Word D. Outlook
42. What is the purpose of the Formula Bar?
A. It allows an easy-to-see input box for formulas in a cell
B. It is a selection of shortcuts and different formula in Microsoft Excel
C. It is the formula that allows the computation of values from different cells.
D. The Formula Bar is a label below the cell that indicates the result of a formula
43. How do you assign which cell the formula = (A1 + A2) + A3 will be displayed on?
A. On the formula bar type cell address
B. Press right click then select Cell Format then click on the Formula tab, type which cell you want
that formula will be displayed
C. Click Cell Formatting then select the formula then type where it will display.
D. Type the formula where you want it to be displayed on.
44. What is the formula that will add the contents of the cells C1 and C10?
A. C1 + C10 C. C1 + C10 =
B. = C1 + C10 D. SUM (C1:C3)
45. What is the purpose of the Formula Bar?
A. It allows an easy to see input box for formula in a cell
B. It is a selection of shortcuts different formula in Microsoft Excel
C. It is the formula that allows computation of values from different cells.
D. The Formula Bar is a label below the cell that indicates the result of a formula
46. Rey wants to start his slideshow using the keyboard. What function he needs to press?
A. Ctrl+P B. Ctrl+S C. F1 D. F5
47. What is the main purpose of a PowerPoint?
A. To create videos B. To create document C. To create pictures D. To create Presentation
48. It refers to the motion effects that occur in the Slide Show view when you move from one slide to
the next during a presentation.
A. Animation B. Custom Animation C. Transition D. Custom Slideshow
49. Marco used bullets and short sentences in his presentation. What tip in creating an effective
presentation did he apply?
a. Contrast b. Clarity c. Consistency d. Simplicity
50. The following are things to consider in creating an effective presentation, except
a. Clarity b. Simplicity c. Consistency d. Creativity
“It’s not about how bad you want it, it's about how hard you are willing to work for it”
Prepared by: Checked by: Noted by:
CHARMAINE JOY PALOMAR BUTCH L. MANOG VIRGILIO C. LABUAC
SHST-1 SHS Department Head-Designate Principal