Uploaded by EDELITO JR PLENOS

3RD QUARTER EXAM Grade 12 ETech

advertisement
Republic of the Philippines
DEPARTMENT OF EDUCATION
REGION 12
DIVISION OF SARANGANI
BATULAKI, GLAN SARANGANI PROVINCE
VALERIA B. LOPEZ INTEGRATED SCHOOL
EMPOWERMENT TECHNOLOGIES
NAME:_____________________________ GRADE:_______ DATE:__________ SCORE:___________
PART I. Multiple Choice. Select the letter that corresponds to the best answer.
1. An example of WEB 2.0
A. Blogs, and wikis
B. social networking sites
C. video sharing
D. All of the above
2. It refers to the placement of elements of equal weight on the page.
A. Balance
B. Contrast
C. Movement
D. Repetition
3. It refers to the consistent repeated appearance of webpage graphic designs.
A. Balance
B. Contrast
C. Movement
D. Repetition
4. Which of the following is NOT included in the basic principles of graphics and layout?
A. Balance
B. Contrast
C. Movement
D. Repetition
5. The visual weight of objects, texture, colors, and space is evenly distributed on the screen.
A. Balance
B.
6. When WWW was invented, most web pages were static. Static (also known as flat page or stationary page) in the same that
the page “as is” and cannot be manipulated by the user. This referred to as Web1.0.
A. HTTP
B. html
C. www
D. all of the above
7. What image online format is capable of displaying simple animation?
A. .bmp
B. .gif
C. .jpg
D. .png
8. It is an online platform which displays information using pictures, images and graphs/charts.
A. Piktochart B. Slideshare
C. Soho
D. Zamzar
9. Among online file formats for images, which one allows you to display images in full colors with NO transparency?
A. .bmp
B. .gif
C. .jpg
D. .png
10. what is ICT means?
A. Information and communication highway technology
C. Information and communication technology
B. Information and computer technology
D. Information and computer highway technology
11. it allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging).
A. Folksonomy B. User participation
C. Rich user interface
D. None of the above
12. Which of the following image manipulation techniques is used to add content or element such as pictures and video files in a
web page?
A. Designing B. Sharing
C. Text combining
D. Uploading
13. key features of web which content is dynamic and is responsive to user’s input. An example would be a website that shows
local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their
website.
A. Folksonomy B. User participation
C. Rich user interface
D. None of the above
14. Wix is an online tool for _________________.
A. Cloud computing
B. Presentation/Visualization
C. Social Media D. Web Site Creation
15. the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means
of comments, reviews, and evaluation.
A. Email address
B. Rich user Interface
C. User participation
D. Long tail
16. Which of the following groups of online platforms are intended for file conversion and management?
A. Google drive, Evernote, Dropbox
C. Prezi, Slideshare, Soho
B. Wix, Weebly, Jimdo
D. Zamzar, Mp3skull, word2pdf
17. Which of the following is an example of a social media site?
A. Slideshare B. Soho
C. Tumblr
D. Wix
18. Wix, weebly, wordpress and _____________ are examples of website builder.
A. Blogger
B. Wikimapia
C. Google Map D. Jimdo
19. It is described as a state of being connected to the cyberspace through a medium of internet or computer network.
A. Offline
B. Online
C. Website
D. Webpage
20. What is meant by UPLOADING?
A. The process of getting files from the Internet.
C. the process of acquiring digital files
B. The process of putting digital files into the computer or internet
D. Both A and C
21. The following statements are some of the current problems being faced in the ICT except one;
A. Communication happens globally & in real time
C. It has decreased personal privacy
B. The Internet can be an addiction
D. Internet dependence can lessen productivity
22. WAN means ______________.
A. Wide Area Network
B. World Area Network C. Weak Area Network D. All of these
23. the original smartphone OS; used by Nokia devices.
A. Symbian
B. WebOS
C. Android
D. windows mobile
24. _______ was one of the first uses of the Internet and is still the most popular use, accounting for most of the traffic on the
Internet.
A. Blogs
B. e-mail
C. chat rooms D. discussion boards
25. Designed to send you advertisement.
A. adware
B. trojan
C. internet
D. pharming
26. Replicates and can transfer from one computer to another.
A. Virus
B. Spyware
C. Spam
D. Malware.
27. Exploit the DNS system.
A. Pharming
B. Rogue
C. Malware
D. Spam
28. Runs in the background and monitors what you are doing.
A. Spyware
B. Spam
C. Trojan
D. Keylogger
29. Unwanted emails, mostly from bots.
A. Spam
B. Rogue
C. Malware
D. Net
30. Disguise as a useful program but it’s not.
A. Trojan
B. Rogue
C. Keylogger
D. Worm
31. A malicious software.
A. Malware
B. Spyware
C. Spam
D. Keylogger
32. Used to record the keystrokes done by the user.
A. Keylogger
B. Spam
C. Trojan
D. Worm
33. Malicious program like “LOVE BUG” created by a Filipino programmer.
A. Worm
B. Virus
C. Malware
D. Trojan
34. Tricks the user into posting that is a security software. Bonus
A. Phishing
B. Virus
C. Pharming
D. Spam
35. It is defined as information superhighway.
A. Web
B. Internet
C. Computer
D. Social Media
36. which of the following is an online platform category/ies?
A. Social media
B. payment system
C. search engine
D. all of the above
37. Among the text wrap options, which one allows you to treat the image just like how a text is treated?
A. In line with text
B. Square
C. Through
D. Tight
38. What file format is needed so that a certain file or document will be used in Mendeley?
A. Docs
B. PNG
C. pdf
D. word document
39. These are visual elements creating a sense of unity where they relate well with one another.
A. Style
B. Proportion
C. Variety
D. Emphasis
40. Which of the following is NOT a component of a mail merge?
A. Address
B. File name
C. Form document
D. Data file
PAERT II. Directions: Tell whether the statement is related to Online Safety and Security, Protecting Reputation Online, Copyright
Infringement and Online Research. Write “A” for Online Safety and Security, “B” for Protecting Reputation Online, “C” Copyright
Infringement and “D” for Online Research.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
There is a protection on a literary works, paintings, drawings, music etc.
Your cellphone number should not be posted over the internet.
Having your birthday on your profile makes vulnerable to identity theft.
Your reputation is at risk if you are careless in using your social media account.
Your post in the internet have tell about your personality.
It is important to acknowledge some body about their woks.
To filter information, use advance search.
It is illegal to use something made from somebody else’s creativity.
There is a risk on sharing your Name and other information online
Search engine like Google, Bing and Yahoo is a flatform for gathering information online.
Download