0% found this document useful (0 votes)
23 views5 pages

3rd Quarter

The document is a summative test for Empowerment Technology 12, covering various topics related to Information and Communication Technology (ICT), social media, netiquette, and design principles. It includes multiple-choice questions that assess knowledge on internet functionality, software applications, data presentation, and cybersecurity. The test is structured to evaluate students' understanding of key concepts and practical skills in technology.

Uploaded by

Cindy Pontillas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views5 pages

3rd Quarter

The document is a summative test for Empowerment Technology 12, covering various topics related to Information and Communication Technology (ICT), social media, netiquette, and design principles. It includes multiple-choice questions that assess knowledge on internet functionality, software applications, data presentation, and cybersecurity. The test is structured to evaluate students' understanding of key concepts and practical skills in technology.

Uploaded by

Cindy Pontillas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SUMMATIVE TEST in Empowerment Technology 12

(Second Semester – First Quarter)


1. How will you describe if something is ICT?
A. ICT focuses on the hardware aspect of networks where it allows interconnection of networks.
B. ICT refers to systems and protocols used inside the internet in able for other computers to interact
with other computers.
C. These are new technologies that allows people to communicate quickly with each other.
D. These are hardware or software that allows access, storage, transmission and manipulation of
information.
2. Which of the following website functionality demonstrates web 2.0 capability
A. An author making an article for people to read. C. Leaving a like on picture on a social media site.
B. Posting details of an item for sale online. D. Reverse searching the web of an image.
3. What does ICT stands for?
A. Information and Communication Technology. C. Interoperable Cellular Telecommunication
B. Integral Convergent Technology D. Information Communication Technology
4. How will you describe Social Media?
A. Multiple different devices combine into a single gadget because of technological advancement.
B. These are platforms that allow users to communicate in an online social communities.
C. This is the miniaturization of previously heavy or big technology.
D. These are web technologies that allow the user to add content.
5. What definition describes the Internet?
A. It is the interconnection of computers, hardware and networks.
B. It allows the transfer of data from one computer to another.
C. It is a network of different web applications that allows quick transfer of data.
D. It is the collection of different websites and webpages searchable using web browsers.
6. Which of the following is the operating system of Blackberry phones?
A. Blackberry OS B. APPLE OS C. Symbian D. Windows Mobile
7. What type of social media website is Pinterest?
A. Blogs and Forums B. Bookmarking site C. Media Sharing D. Microblogging
8. Which of the following types of social media websites focuses on short updates posted by the user?
A. Blogging B. Hashtagging C. Microblogging D. Social Media
9. What is Netiquette?
A. Using a net to catch fish C. Presenting proper manners at the dinner table
B. Being mean to other people on Facebook D. Showing manners and etiquette on the Internet
10. What should you do if you receive a text or email from someone you don't know?
A. Call the police C. Open it immediately and reply
B. Delete it without opening it D. Leave it in your inbox until you figure out who it is
11. What should you do to avoid being cyber-bullied?
A. Observe proper netiquette rules
B. Give out personal information to anyone who asks
C. Ignore any requests from people to be your friend online
D. Strike first - post mean things about other people on your Facebook Wall
12. What should you never do if you get an embarrassing picture from someone?
A. Talk to the person again C. Tell your parents or a teacher
B. Send it on to other friends D. Discourage the person from sending pictures like that
13. It is OK to forward or post an email message that you received if_____________
A. The message is typed in all capital letters
B. It does not contain any copyrighted material
C. The author of the message has marked it as confidential.
D. The author of the message hasn’t given you permission to forward or post it
14. The Golden Rule of Netiquette is __________________________
A. Remember the human! C. Don't follow the rules of netiquette
B. A smiley in every message D. Type in all caps when you're angry.
15. Spamming is very poor Netiquette and means ____________________
A. Spilling the juice of meat-byproducts into your keyboard
B. Sending in lines of nonsensical garbage in a chat conversation
C. Posting or emailing unsolicited advertising messages to a wide audience.
D. Posting a message that contains graphic descriptions of something really gross
16. It is the process of interactively searching given words/terms to gather specific information.
A. Online Mission B. Online Navigation C. Online Expedition D. Online Exploration
17. It is the most known and most used search engine.
A. Baidu B. Yahoo C. Google D. Ask.com
18. Arrange the commands in the correct order when doing a contextualized online navigation:
1Open the Google site, on the upper right side of the window, click the Google Apps icon and click
search.
2n the lower right part of the window, click Settings and the Google Search Settings pop-up list will
appear.
3Click Advanced search and the Advanced Search window will appear.
4Type the keywords that you would like to search and click the Advanced Search button
A. I, II, III, IV B. I, III, IV, II
C. I, II, IV, III D. I, IV, III, II
19. Knowledge and understanding of netiquette is useful because _________
A. It will help you create a positive impression on those you meet in cyberspace
B. It explains the conventions already being used by millions of cybernauts
C. It explains some of the technical limitations of online communications
D. all of the above.
20. The skill refers to the ability to produce good and continuous searches.
A. Thinking Skill B. Learning Skill C. Research Skill D. Production Skill
21. This is collectively organizing gathered data and ensuring tracking of specific information.
A. Critical Thinking B. Data Organizing C. Research Presenting D. None of the above
22. A skill that involves the ability to reflect and analyze on the information presented.
A. Critical Thinking B. Data Organizing C. Research Presenting D. None of the above
23. This type of skill refers to the ability to express the information through creative writing.
A. Critical Thinking B. Data Organizing C. Research Presenting D. None of the above
24. As a student, you are responsible when a specific information was presented to you. Which of these cannot
be done upon searching?
A. Ask someone knowledgeable and get to know the site.
B. Always be cautious and read the contents of the source
C. Click any sites that appeared as a source of information
D. Navigate around the internet, and check if the site is alleged as satirical
25. How can you add Page Number?
A. Click Insert > Header > choose style
B. Click Insert > Footer > Choose Format > Choose Style
C. Click Insert > Header & Footer > Page Number > Choose Style
D. Click Insert > Header & Footer > Page Number > Choose Format > Choose Style
26. It is a computer program or device that provides for input, editing, formatting and output of text, often
with some additional features.
A. Outlook B. Presentation C. Spreadsheet D. Word
27. Harold wants to drag select cells A1 to D7. How can he accomplish this?
A. Long press Alt then click A1 then click D7. C. Type A1:D7 in the formula bar
B. Select A1 then D7 while pressing shift D. Press Ctrl + A.
28. How to format a cell that will automatically add a peso sign?
A. Select the cell or cells you want to edit then press Insert > Symbol > More Symbols. Scroll down and
look for the peso sign then press insert.
B. Select the cell or cells you like to add formatting. Press right click then click Symbol > More
Symbols. Scroll down and look for the peso sign then press insert.
C. In the ribbon, select the Home tab then click Format Cells. In the Number tab, click Currency then in
the dropdown box search for the peso sign symbol.
D. Select the cell or cells you like to add formatting press right click then Format Cells. Then in the
Number tab, click Currency then in the dropdown box search for the peso sign symbol.
29. What computer program that gives the user the ability to create tables and edit their values.
A. Presentation B. Word C. Spreadsheet D. Outlook
30. Juan wants to link the slide 1 to slide 3, what action will he do?
A. Right click > hyperlink > place this link C. Right click > link > create new document
B. Right click > link > place this hyperlink D. Right click > link > place in this document
31. Rey wants to start his slideshow using the keyboard. What function he needs to press?
A. Ctrl+P B. Ctrl+S C. F1 D. F5
32. What is the shortcut key to press in if you want to end the presentation?
A. Esc B. Enter Tab C. Tab D. Shift
33. What is the first layout of slide you will choose if you want to create a presentation?
A. Blank layout B. Title only layout C. Title slide layout D. Title and content layout
34. What is the first step in hyperlinking?
A. Save presentation C. Highlight the text and press right click then link.
B. Add another slide for the hyperlink D. Use images, text, URL or shapes when hyperlinking.

35. Which principle of design is when a designer arranges the elements or text according to its context?
A. Balance B. Emphasis C. Harmony D. Hierarchy
36. What is the purpose of creating a hierarchy in your design?
A. It gives consistency. C. It adds visual weight.
B. To add beauty to the design. D. Make the detail to stand out.
37. The following are the ways where you can emphasize the text if you are working on a magazine except:
A. By changing the font color C. By adding illustrations or images
B. By making the text bold or italic D. By changing the font size, either bigger or smaller
38. The picture in the side shows an example of ________.
A. Balance
B. Emphasis
C. Hierarchy
D. Repetition
39. Which of the principles of graphics and layout refers to the proper arrangement of elements, which gives a
visual weight for the design?
A. Balance B. Emphasis C. Pattern, Repetition and Rhythm D. Unity and Harmony
40. Every element of your design must show the correct placement of texts, paragraphs, or images to make it
formal and readable. Which of the following alignment is not recommended in designing?
A. Center B. Diagonal C. Left D. Right
41. Which of the following refers to the plan of creating an idea through a combination of texts, images, and
other elements that are placed together artistically?
A. Design B. Graphic C. Layout D. Message
42. As a layout artist, we must know the details in arranging and accentuating the most important terms by
changing its size, thickness, and spaces so the reader can navigate the highlight of the event easily. Which
of the following principles best describe the statement above?
A. Alignment B. Contrast C. Hierarchy D. Pattern, Repetition and Rhythm
45. Contrast refers to the use of different or opposite elements such as sizes, shapes, spaces, forms, colors,
and values in design. Which of the designs below show the least application of contrast in a design?

B. A.

D. C.
46. Which is the main use of line graph?
a. To visually present the data. C. To compare difference between data.
b. To see trend of data change. D. To show hierarchy between data sets.
47. You want to visually compare different data group to other data group, which graph should you use?
a. Pie Graph. B. Line Graph C. Bar Graph D. Radial Graph
48. What is the main advantage in the use infographics in a document?
A. It will make the presentation more visually appealing.
B. It makes document shorter and less cluttered
C. It makes data presentation easier to understand.
D. It shows that you’re professional.
49. What are the steps in creating a chart in Microsoft Excel
a. In the ribbon click Insert then click the charts you want to use then drag select the cells needed to
be presented.
b. Press right click then click insert table then in the window select the table you want to present.
c. Select the cells to be presented then press insert in the ribbon then click the desired chart.
d. Select the table then press right click then press insert chart.
50. Which should be done first in making a graph in excel?
A. In the ribbon, click Insert > Charts.
B. Press right click then click insert table.
C. Select the drag cells needed for the chart.
D. In the Insert tab click, Table then click the desired table.
51. Which of the following is NOT the purpose of infographics in the presentation of data?
A. It helps people interpret data visually.
B. It engages audience in your presentation.
C. It helps the presentation to be more visually attractive.
D. It improves people understanding in data gathering.
52. Malicious program designed to replicate itself and transfer from one computer to another through
internet, CDs, and USB.
A. Trojan B. Phishing C. Ransomware D. Virus
53. Malicious program that transfers from one computer to another by any type of means.
A. Trojan B. Phishing C. Worm D. Virus
54. Type of malicious software from crypto virology that threatens to publish the victim’s data or
perpetually block access to it unless a ransom is paid.
A. Spyware B. Phishing C. Ransomware D. Virus
55. A type of malware where is to acquire sensitive personal information like passwords and credit card
details. This is done by sending you an e-mail that will direct the user to visit a fake website and be
asked to update his/her username, password, credit card or personal information.
A. Spam B. Phishing C. Ransomware D. Virus

You might also like