Sie sind auf Seite 1von 4

Republic of the Philippines

Department of Education
Caraga Administrative Region
LIBUAC NATIONAL HIGH SCHOOL
Brgy. Libuac, Surigao City
School ID: 317703
SY:2019-2020

Midterm Examination
Empowerment Technologies (Applied ICT) in GRADE 11

Name: _____________________________ Score: _________________


Grade and Section:_________________ Teacher: ________________

Multiple Choice. Choose the letter of the correct answer on the following questions. Write your answer before the
number. STRICTLY NO ERASURE. Use blue or black ballpen in answering the question.

1. Which of the following is the correct meaning of ICT?


A.Information and Communication Technology C.Intertropical and Community Telecommunication
B. International Countries Technology D. Information in the Community Trends
2. The application of scientific knowledge for practical purposes, especially in industry.
A. Science B. Computer C. Technology D. Communication
3. Which of the following is not a scope of Information and Communication Technology?
A. Installing Software B.audio-visual systems C. Editing MS Excel D. Creating Garden in your yard
4. Assertive Media is established by _______________
A. Time Berners-Lee B. Steve Jobs c. Billy Gates D. David Harvey
5. When was Web 2.0 first used?
A. 2000 b. 2007 c.2004 d. 2002
6. The only available feedback mechanism in Web 1.0 is __________.
A. Private Emails B.Social Media Interaction C. Desktop Messaging D. Telegram
7. HTML stands for __________?
A. Hyperlink Technology Mechanism Language B.High Technology Mechnism Lottery
C. HyperText Markup Language D. High Tolerant Mechanism Launching
8. Who is the Father of the WWW?
A. Time Berners-Lee B. Steve Jobs c. Billy Gates D. David Harvey
9. The organization was the first internet-based reading service for persons with visual and reading
impairments. The produce and publish voice-recorded written materials on cassettes, cds, and in the internet.
A. Media and Information Technology c. Audio Visual Media
B. Assistive Media d. Media of All Ages
10. It is referred to as the semantic web or data driven web content and response
A. Web 1.0 b. Web 2.0 C. Web 3.0 D. Windows XP
11. What is the best way to get rid of Junk Mail?
A.Don’t used email account in registering malicious websites
B. Always be active online.
C. Make friends and give your email add to dating sites.
D. Open unknown source emails frequently to acquaintances.
12. Which of the following best describe Pharming?
A. It obtains username and passwords, as well as credit cards ad financial information, and use these to
steal their money electronically or use the credit cards of the victims.
B. It is a deceitful practice of trying to get confidential information such as passwords and usernames, and
credit card details by making it appear as if it comes from a trustworthy source.
C. It is a deceitful email practice in which the sender address is changed, so that it would appear to have
come from a different source which is usually someone you know.
D. It is used by spammers to hide the origin of the spam.
13. How do we know it is a trojan horse-infected file?
A. It is usually spread through email and running of attachments from suspicious sources. • It spreads by
exploiting weaknesses in operating systems
B. It can create unknown files and converts files from one form to another form. It can also update antivirus
in the computer system.
C.It can disable the computer’s defenses, opening it to unauthorized entry. It can erase data, can corrupt
files, allow access to computer.
D. None of the option is infected by horse-infected file.
14. Which of the following is an activity of a hacker?
A. Sending friend request in facebook.
B. Vandalizes the victims’ website, steals personal information, obtains intellectual property, and performs
credit card fraud.
C. It creates group chats in social media organizing an event and create various videos to be receive likes in
his accounts
D. It is one of your family member creating fake accounts and send friend request among their kids to have
informational activities among their children.
15. When will you know if someone is phishing you online?
A. Give congratulatory letter informing that you win the lottery.
B. Getting personal information from other accounts and creating new account for unlawful activities.
C. Deriving you to other business website for you to buy a product and give your ban accounts.
D. Sending friend request.
16. It is any system used to settle financial transactions through transfer of monetary value, and includes the
institutions, instruments, people, rules, procedures, standards, and technologies.
A. Payment System B. Advertising Platforms C. Creative Content Outlets D. Web Search Engines
17. It allows users to create and manage campaigns, generate reports, and retrieve information about the ads,
campaigns, and organizations that are associated with an account.
A. Payment System B. Advertising Platforms C. Creative Content Outlets D. Web Search Engines
18. Which of the following is under Online Collaborative Tools?
A. Prezi, Zoho Shows, MS PowerPoint. C. Google Drive, Viber, Facebook
B. Dropbox, Tumblr, Wix D. Picasa, Adobe Photoshop, GIMP
19. Which of the following are video editing tools?
A. Picasa, Adobe Photoshop, GIMP C. Dropbox, Google Drive, Microsoft One Drive
B. Sony Vegas Pro, Windows Movie Maker, Adobe Premier Pro D. Dropbox, Flickr
20. Prezi, Zoho Shows, MS PowerPoint. are used for _________________________.
A. Presentation Tools C. Photo Editing Tools
B. Newsletter, ICT Content Platforms D. Online Collaborative Tools
21. Which of the following Microsoft office will you create a word file but emphasizes on page layout and
design?
A. Access B. Excel C. Publisher D. Visio
22. How to Embed/Insert Images: COPY & PASTE Commands
A. Locate the photo. Left-click the file and hold. DRAG the photo into the word file. RELEASE left-click. Edit the photo.
B. Locate the photo. Right-click the file and click COPY. (Press CTRL + C on the keyboard.) Right-click on the Word
document and click PASTE. (Press CTRL + V on the keyboard.) Edit the photo.
C. Use the INSERT TAB. Use the COPY & PASTE Commands. Use the DRAG & DROP Functions.
D. Customize the Columns.Type the needed information per entry. Press TAB on the keyboard for a new entry. To delete,
click the GRAY box besides the entry, press DELETE on the keyboard. Once completed, click OK. SAVE the list in your
folder.

23. Which of the following process has the following command :Click the MAILINGS tab. Click the START MAIL
MERGE Command. Choose the document type.
A. How to use MAIL MERGE C. How to use MAIL MERGE (Existing List)
B. How to Embed/Insert Images: DRAG AND DROP D. How to Generate Labels

24. Which of the following websites create a presentation file full of design which magnify during the
presentation and could only be opened if there is internet connection .
a. Google Drive b. Prezi C. Youtube d. Savenet
25. It is Google’s free photo manager to edit and organize your photos. It has tools for photo editing like crop,
straighten, rotate, red-eye removal, contrast, and filters.
A. Picasa B. Paint.net C. Google Sketch Up D. Autodesk Pixlr
26. Which of the following description best describe Adobe Photoshop?
A. It is a free editing tool that is similar to Photoshop and has more that 600 effects, overlays, and borders that you
can use
B. It is a tool to create, modify, combine and optimize digital photos and images offline .
C. It is a free 3D-modeling program with tools that allow you to create 3D models of houses, home renovation,
woodworking projects, and others with dimensional accuracy
D. It is a free and open source available in Windows. It can be used for photo editing like recolor, crop, text edit,
rotate, multiple layers, and other photo editing work with internet connection.

27. Which of the following is the function of shape layers in Photoshop ?


A. It lets you add solid colors, gradients, or a pattern. C. It lets you add vector shapes.
B. It allows you to add words to your images. D. It contains images.

28. It allows you to add words to your images in Photoshop?


A. Image Layers B.Fill Layers C.Shape Layers D. Type Layers
29. It is a free 3D-modeling program with tools that allow you to create 3D models of houses, home renovation,
woodworking projects, and others with dimensional accuracy.
A. Google Sketch Up B. Autodesk Pixlr C. Paint.net D. Adobe Photoshop
30. Which of the following software will you used to create beautiful gowns and dresses digitally that almost near
to reality?
A. Google Sketch Up B. Autodesk Pixlr C. Paint.net D. Adobe Photoshop
31. Which of the agency/ Website is famous in receiving online payments for their product?
A. Master Card b. Visa d. Lazada d. PayPal
32. Which of the following website is considered as Computational Knowledge Engine?
A. Google B. Yahoo c. Wolframa D. Internet Archive
33. Which of the following website is considered as No.1 email provider in 2016?
A. Bing B. Yahoo c. Wolframa D. Internet Archive
34. How to animate texts & objects?
A. Create text.Select the text box.Click the ANIMATIONS TAB.Choose one or more animation
presets.Customize the time and speed.
B. Select the desired text or text box, and then click any of the presets to apply the animation.
C. Click ADD ANIMATION. Choose your desired animation preset.Check the animation pane.Customize speed
and timing.
D. Select the object, picture, or text you want to give an hyperlink.Click the INSERT TAB and Click LINK
(Right-click and click LINK). Browse for the file you want to link to. Click OK.

35. The following are the types of animation in a powerpoint presentation except ______.
A. Entrance B.Emphasis C. Exit D. Float In
Write the formula of the following math opertions under Microsoft excel
36. What image compression / file type is capable of displaying simple animation
a. . bmp b. gif c. . jpg d.png
37.Which image compression types allow you to display images in full color just like digital pictures.
a.. bmp b. gif c. jpg d. tiff
37. Among the text wrap option , which one allows you to place an image or external material in line with text ,
treating the image just like how a text is treated?
a. In line with the text b. Through c. square d. tight
38Where can you find the Start Mail merge button ?
a.File Tab b. Mailing Tab c. Reference Tab d.home tab
39. A function used to count the number of cells that contains something in them if the criteria are met.
a. COUNT B. COUNTNOW C. COUNTING D. COUNTIF
40. What insertin in MS Word that allows you to represent data, characteristics and trends?
a. Chart b. Smart Art c. Clip Arts d. Screenshots
41. Which of the following is the best tool in arranging data with certain formula to be accumulated with end
results in each columns etc.
A. MS Word B. VLC C. MS Excel D. Photoshop
42. Which of the following is the best software among windows 8,9, and 10 is the best video player in PCs
within the Philippines due to its louder audio settings?
A. Window Player B. VLC C. Winap D. Photoshop
43. The following are browser except for ________?
A. Opera Mini B. Google Chrome C. Mozilla Firefox D. Yahoo
44. The following tools are considered to be social networking sites except ______.
A. Facebook B. Twitter C. Youtube D.Instagram
45. Which of the following sites will be the best to visit if you want to see a video on how to tailor clothes?
A. Facebook B. Twitter C. Youtube d.Instagram
46. You saw that one of your classmates posted a very offensive picture of your other classmate, what will be the
best thing to do?
A. Comment down to the picture reminding your classmate that it’s an offensive act and punishable by law. Then,
ignore the post.
B. Share the picture since it is a social media at all.
C. Comment HahHAHahHAHa to the post and ignore it.
D. Let other people know verbally the post and create a page out of it.

47 What is the best thing to do when you saw your classmate copying text of other people and posting it to social
media without credits to the real author.
A. Advise her not to post it. C. The person can write anonymous in the post.
B. Let her do it. It’s not your account at all. D. Block that person in your friends list
48. Before leaving the internet café, you should make sure to _______.
A. Log out your account. C. Turn off the desktop
B. Turn off the computer. D. All of the options are correct
49. You want to promote your local barangay, which of the following is the best way to do it that would be catchy
in this generation.
A. Write a blog on it with corresponding picture or video and post it to social media.
B. Make a collage made up of shell and display it in urban places
C. Collect shells and sell it to the other locality.
D. Avoid promoting it because it’s not your job.

50 . The following is the negative effect of social media except __________.


A. Creates a non-verbal interaction among other people because all of the activities are posted already.
B. Social media creates threat among people by promoting stalking among people.
C. Creates a media of interaction among all other people from different places anytime and anywhere.
D. A venue for cyber bullying among students.

Prepared by:

JULENE JOY Z. ABELADA


SST II

Das könnte Ihnen auch gefallen