i. Answer all the questions in the spaces provided.
ii. Read carefully and understand before answering the questions. 1. What is computer software? ________________________________________________________________________ ________________________________________________________________________ 2. Give the meaning of Power Point ________________________________________________________________________ ________________________________________________________________________ 3. Computer software can as well be referred to as PROGRAM A. False B. True 4. There was a meeting for the St. Ann Lifred Schools’ staff members. The Director requested for a projector for easy presentations by the speakers. Which program do you think the speakers used to prepare their presentations? A. Ms Office Word B. Ms Office Excel
C. Ms Office Power Point D. Ms Office Access
5. Identify the following either as an output device or input device.
a. Monitor __________________ e. Keyboard _________________
b. Scanner __________________ f. Speakers __________________ c. Printer ___________________ g. Microphone ________________ d. Mouse ___________________ h. Camera _________________
6. _____________________ is referred to as the brain of the computer.
7. Outline the steps of inserting pictures in power point slide. i. __________________________________________________________________ ii. __________________________________________________________________ iii. __________________________________________________________________ iv. __________________________________________________________________ 8. It is a feature which is located at Insert tab and can be used to add clipart in your presentation. A. Design B. WordArt C. Animation D. Slideshow 9. ___________ is the entry effect as one slide replaces another in a power point show. 10. It is the screen viewed when the computer is turned on. ________________________
Hacking for Beginners: Comprehensive Guide on Hacking Websites, Smartphones, Wireless Networks, Conducting Social Engineering, Performing a Penetration Test, and Securing Your Network (2022)