Republic of the Philippines DEPARTMENT OF EDUCATION REGION 12 DIVISION OF SARANGANI BATULAKI, GLAN SARANGANI PROVINCE VALERIA B. LOPEZ INTEGRATED SCHOOL EMPOWERMENT TECHNOLOGIES NAME:_____________________________ GRADE:_______ DATE:__________ SCORE:___________ PART I. Multiple Choice. Select the letter that corresponds to the best answer. 1. An example of WEB 2.0 A. Blogs, and wikis B. social networking sites C. video sharing D. All of the above 2. It refers to the placement of elements of equal weight on the page. A. Balance B. Contrast C. Movement D. Repetition 3. It refers to the consistent repeated appearance of webpage graphic designs. A. Balance B. Contrast C. Movement D. Repetition 4. Which of the following is NOT included in the basic principles of graphics and layout? A. Balance B. Contrast C. Movement D. Repetition 5. The visual weight of objects, texture, colors, and space is evenly distributed on the screen. A. Balance B. 6. When WWW was invented, most web pages were static. Static (also known as flat page or stationary page) in the same that the page “as is” and cannot be manipulated by the user. This referred to as Web1.0. A. HTTP B. html C. www D. all of the above 7. What image online format is capable of displaying simple animation? A. .bmp B. .gif C. .jpg D. .png 8. It is an online platform which displays information using pictures, images and graphs/charts. A. Piktochart B. Slideshare C. Soho D. Zamzar 9. Among online file formats for images, which one allows you to display images in full colors with NO transparency? A. .bmp B. .gif C. .jpg D. .png 10. what is ICT means? A. Information and communication highway technology C. Information and communication technology B. Information and computer technology D. Information and computer highway technology 11. it allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging). A. Folksonomy B. User participation C. Rich user interface D. None of the above 12. Which of the following image manipulation techniques is used to add content or element such as pictures and video files in a web page? A. Designing B. Sharing C. Text combining D. Uploading 13. key features of web which content is dynamic and is responsive to user’s input. An example would be a website that shows local content. In the case of social networking sites, when logged on, your account is used to modify what you see in their website. A. Folksonomy B. User participation C. Rich user interface D. None of the above 14. Wix is an online tool for _________________. A. Cloud computing B. Presentation/Visualization C. Social Media D. Web Site Creation 15. the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation. A. Email address B. Rich user Interface C. User participation D. Long tail 16. Which of the following groups of online platforms are intended for file conversion and management? A. Google drive, Evernote, Dropbox C. Prezi, Slideshare, Soho B. Wix, Weebly, Jimdo D. Zamzar, Mp3skull, word2pdf 17. Which of the following is an example of a social media site? A. Slideshare B. Soho C. Tumblr D. Wix 18. Wix, weebly, wordpress and _____________ are examples of website builder. A. Blogger B. Wikimapia C. Google Map D. Jimdo 19. It is described as a state of being connected to the cyberspace through a medium of internet or computer network. A. Offline B. Online C. Website D. Webpage 20. What is meant by UPLOADING? A. The process of getting files from the Internet. C. the process of acquiring digital files B. The process of putting digital files into the computer or internet D. Both A and C 21. The following statements are some of the current problems being faced in the ICT except one; A. Communication happens globally & in real time C. It has decreased personal privacy B. The Internet can be an addiction D. Internet dependence can lessen productivity 22. WAN means ______________. A. Wide Area Network B. World Area Network C. Weak Area Network D. All of these 23. the original smartphone OS; used by Nokia devices. A. Symbian B. WebOS C. Android D. windows mobile 24. _______ was one of the first uses of the Internet and is still the most popular use, accounting for most of the traffic on the Internet. A. Blogs B. e-mail C. chat rooms D. discussion boards 25. Designed to send you advertisement. A. adware B. trojan C. internet D. pharming 26. Replicates and can transfer from one computer to another. A. Virus B. Spyware C. Spam D. Malware. 27. Exploit the DNS system. A. Pharming B. Rogue C. Malware D. Spam 28. Runs in the background and monitors what you are doing. A. Spyware B. Spam C. Trojan D. Keylogger 29. Unwanted emails, mostly from bots. A. Spam B. Rogue C. Malware D. Net 30. Disguise as a useful program but it’s not. A. Trojan B. Rogue C. Keylogger D. Worm 31. A malicious software. A. Malware B. Spyware C. Spam D. Keylogger 32. Used to record the keystrokes done by the user. A. Keylogger B. Spam C. Trojan D. Worm 33. Malicious program like “LOVE BUG” created by a Filipino programmer. A. Worm B. Virus C. Malware D. Trojan 34. Tricks the user into posting that is a security software. Bonus A. Phishing B. Virus C. Pharming D. Spam 35. It is defined as information superhighway. A. Web B. Internet C. Computer D. Social Media 36. which of the following is an online platform category/ies? A. Social media B. payment system C. search engine D. all of the above 37. Among the text wrap options, which one allows you to treat the image just like how a text is treated? A. In line with text B. Square C. Through D. Tight 38. What file format is needed so that a certain file or document will be used in Mendeley? A. Docs B. PNG C. pdf D. word document 39. These are visual elements creating a sense of unity where they relate well with one another. A. Style B. Proportion C. Variety D. Emphasis 40. Which of the following is NOT a component of a mail merge? A. Address B. File name C. Form document D. Data file PAERT II. Directions: Tell whether the statement is related to Online Safety and Security, Protecting Reputation Online, Copyright Infringement and Online Research. Write “A” for Online Safety and Security, “B” for Protecting Reputation Online, “C” Copyright Infringement and “D” for Online Research. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. There is a protection on a literary works, paintings, drawings, music etc. Your cellphone number should not be posted over the internet. Having your birthday on your profile makes vulnerable to identity theft. Your reputation is at risk if you are careless in using your social media account. Your post in the internet have tell about your personality. It is important to acknowledge some body about their woks. To filter information, use advance search. It is illegal to use something made from somebody else’s creativity. There is a risk on sharing your Name and other information online Search engine like Google, Bing and Yahoo is a flatform for gathering information online.