You are on page 1of 2

The Science and Business Oriented School for Excellence, Globally Competitive and Innovative Programs

Lot 31, Blk 52, Purok 2, A. Bonifacio Avenue, cor Ricahuerta St., Upper Bicutan Taguig City.
Nos.: 839-0135; 838-9077 Email: morehacademy2002@yahoo.com

FIRST QUARTERLY ASSESSMENT


EMPOWERMENT TECHNOLOGIES
FIRST SEMESTER S.Y. 2018-2019

Name: Date:
Strand & Section: Teacher:

Reminder: Erasure means WRONG.


A. MULTIPLE CHOICE.
Directions: Read the sentences carefully. Choose the letter of the best answer. Write the letter on the blank before the number. Use
CAPITAL LETTERS only and avoid erasures.
1. This is also referred to as Data Field or Merge Field.
a. Mail Merge b. Place Holder c. List or Data File d. Form Document
2. It provides a common framework to allow data to be shared and reused across platform, enterprise, and community
boundaries.
a. Semantic Web b. W3C c. Static Web d. Dynamic Web
3. A malicious program that transfers from one computer to another by any type of means.
a. Virus b. Trojan c. Spam d. Worm
4. A program designed to create spreadsheet which can later be used to analyze statistical data.
a. Microsoft Excel b. Microsoft Word c. Microsoft Publisher d. Microsoft PowerPoint
5. It is a text or object that contains a link to another files, web page, a place in a document, or email address.
a. Hypertext b. Hyperlink c. PowerPoint d. Presentation
6. It describes the unauthorized use of copyrighted materials, such as text, photos, videos, music and other original
content.
a. Copyright Law b. Fair Use c. Copyright Infringement d. Intellectual Property
7. What features of Microsoft Word allows you to efficiently create documents that have the same general content but
may have different recipients or purpose?
a. Mail Merge b. Send Merge c. View Merge d. Print Merge
8. This refers to the feature where users are able to categorize and locate information through tagging.
a. Taxonomy b. Hashtags c. Rich user experience d. Folksonomy
9. A function that gets the average of a range of cells.
a. SUM b. AVERAGE c. COUNT d. MEAN
10. It is one of the most dangerous places, especially if you do not know what you are doing.
a. Internet b. Internet Threats c. Malware d. Copyright
11. It is a document that contains the main body of the message we want to convey or send.
a. List or Data File b. Label Generation c. Form Document d. Place Holder
12. This media is designed to help people who have visual and reading impairments.
a. Convergence b. Assistive Media c. Social Network d. Mobile Technologies
13. This are the equation that perform calculation in your spreadsheet.
a. Function b. Formula c. Average d. Criteria
14. It refers to a creation of mind such as invention; literary or artistic work.
a. Copyright Law b. Fair Use c. Copyright Infringement d. Intellectual Property
15. What is a kind of trend in ICT that has website, application, or online channel that enables web users to create, co-
create, discuss, modify, and exchange user-generated content?
a. Convergence b. Assistive Media c. Social Network d. Mobile Technologies

B. IDENTIFICATION
Directions: Read the following statement and identify what is being asked. Choose the answers on the box and write your answer
on the space before each number.
1. The synergy of technological advancements to work on a similar goal or task.
2. A function used to count the cells with content with content in a range.
3. It creates a blank form document that simulates either a blank label or envelope of pre-defined size and will
use the data file that you selected to print the information, typically, individual addresses.
4. It deals with the use of different communication technologies such as mobile phones, telephone, internet,
etc. to locate, save send, and edit information.
5. A malicious program that is disguised as a useful program but once get downloaded or installed, leaves your
PC unprotected.
6. A part of spreadsheet that is a horizontal stack and represented by numbers.
7. It is also known as Flat page or Stationary page.
8. A features of Web 2.0 that allows you to “rent” a software for a minimal fee.
9. An evolution of Web 1.0 that can be manipulated by the user.
10. A more complicated way of phishing where it exploits the DNS (Domain Name System)
Trojan Dynamic Web Convergence
Software as service Count ICT
Label generation Copyright Row
Static Web Pharming

C. ENUMERATION
Direction: Enumerate the following:
A. Six types of Social Media. (1-6)
B. Seven types of Mobile Technologies. (1-7)
C. Six Kinds of Materials used in Image Integration. (1-6)
D. Seven Different settings on Image Placement using Text Wrapping. (1-7)
E. Six tips on Creating Presentation. (1-6)
F. Three types of Pictures. (1-3)

You might also like