You are on page 1of 3

Brgy.

Malusgod, Pototan, Iloilo – 5003

Email Address: svcst_leganes@yahoo.com


st
1 Quarter Examination – Empowerment
Tel. #: (036) 651-5101 Technology
G-12 (48 copies)
Name: Date:
Yr. & Sec.: Subject Instructor: Julian John Billones

I. Multiple Choice. Select the letter that corresponds to the best answer.
1. ___ It refers to the placement of elements of equal weight on the page.
A. Balance B. Contrast C. Movement D. Repetition
2. It refers to the consistent repeated appearance of webpage graphic designs.
A. Balance B. Contrast C. Movement D. Repetition
3. Which of the following is NOT included in the basic principles of graphics and layout?
A. Balance B. Contrast C. Movement D. Repetition
4. Which of the following images displays movement and pattern?

A. B. C.
5. What image online format is capable of displaying simple animation?
A. .bmp B. .gif C. .jpg D. .png
6. In website designing , what does WYSIWYG mean?
A. What You Show Is What You Give C. What You See Is What You Get
B. What You Send Is What You Gather D. All of these
7. Which of these online platforms is applicable for presentation and visualization?
A.Dropbox B. Prezi C. Weebly D. Zamzar
8. Which of the following statements is NOT true about Wordpress?
A. It is an online platform used to communicate a message for a specific purpose.
B. It has NO data analysis and statistical views/records of the viewers and online visitors.
C. Images, video files and visual elements can be uploaded in this platform.
D. None of these
9. Wix is an online tool for _________________.
A. Cloud computing B. Presentation/Visualization C. Social Media D. Web Site Creation
10. Which of the following groups of online platforms are intended for file conversion and management?
A. Google drive, Evernote, Dropbox
B. Prezi, Slideshare, Soho
C. Wix, Weebly, Jimdo
D. Zamzar, Mp3skull, word2pdf
11. Which of the following is an example of a social media site?
A. Slideshare B. Soho C. Tumblr D. Wix
12. Wix, weebly, wordpress and _____________ are examples of website builder.
A. Blogger B. Wikimapia C. Google Map D. Jimdo

13. It is described as a state of being connected to the cyberspace through a medium of internet or computer
network.
A. Offline B. Online C. Website D. Webpage

14. ICT is a medium for advocacy and developmental communication.


A. True B. False C. Maybe D. A and B
15. The following statements are some of the current problems being faced in the ICT except one;
A. Communication happens globally & in real time
B. It has decreased personal privacy
C. The Internet can be an addiction
D. Internet dependence can lessen productivity
16. Online ICT projects for social change are managed by the following websites except one________.
A. Wix B. Weebly C. Wordpress D. Zamzar
17. In order to promote a project for maximum audience impact, website owners must _____________.
A. Upload and manage website content properly.
B. Upload and manage content without considering the Fair Use Policy.
C. A and B D. None of these
18. What is meant by UPLOADING?
A. The process of getting files from the Internet. C. the process of acquiring digital files
B. The process of putting digital files into the computer or internet D. Both A and C
19. WAN means ______________.
A. Wide Area Network B. World Area Network C. Weak Area Network D. All of these
20. The following are examples of monitoring and evaluating techniques in ICT project except one;
A. Interviews B. Feedback forms C. Analytic data D. pencil-paper test
21. Designed to send you advertisement.
A. adware B. trojan C. internet D. pharming
22. Replicates and can transfer from one computer to another.
A. virus B. spyware C. spam D. malware
23. Tricks the user into posting that is a security software.
A. Phishing B. virus C. Pharming D. spam
24. Malicious program like “LOVE BUG” created by a Filipino programmer.
A. worm B. virus C. malware D. Trojan
25. Exploit the DNS system.
A. pharming B. rogue C. malware D. spam
26. Used to record the keystrokes done by the user.
A. keylogger B. spam C. trojan D. worm
27. A malicious software.
A. malware B. spyware C. spam D. keylogger
28. Disguise as a useful program but it’s not.
A. trojan B. rogue C. keylogger D. worm
29. Unwanted emails, mostly from bots.
A. spam B. rogue C. malware D. net
30. Runs in the background and monitors what you are doing.
A. spyware B. spam C. trojan D. keylogger

II. True or False. Write T if the statement is TRUE and F if the statement is FALSE.
___ 31. Do not reply to a suspicious e-mail.
___ 32. Make your Wi-Fi password public.
___ 33.Post anything about future vacation.
___ 34. Add friends you know in real life
___ 35. Share your password to anyone.
___ 36. Do not talk to strangers weather online or face to face.
___ 37.Use pirated software.
___ 38. Think before you click.
___ 39. Avoid visiting untrusted website.
___ 40. Do not just accept terms and conditions; read it.
III. Pick your answer on the BOX.

Book Marking Site Social News Microblogging Blogs and Forums

___ 41. Pinterest


___ 42. Blogger
___ 43. Plurk
___ 44. Twitter
___ 45. CNN news portal
___ 46. Reddit
___ 47. StumbleUpon
___ 48. Yahoo
___ 49. Tumblr
___ 50. Youtube

-E N D O F E X A M I N A T I O N –
GOOD LUCK!!!

STRICTLY NO CHEATING!
GINTUNTO KA NA NIYA GANI, TUNTOHON MO PA GID KAUGALINGON MO? – Sir Julian.

You might also like