Professional Documents
Culture Documents
Internet-based networks that are used to store, manage, and share resources and
information
Cloud Computing
are apps and websites used by people to interact with one another by sharing information,
sending messages, and exchanging ideas
Social Media
Which of the following is NOT true about passwords?
Passwords should not be memorized
You want to know if classes are suspended because of a storm. Which of the following
TLD's is most likely to have the most credible information
.gov
page is about a single topic and can be edited by anyone with the right credentials
Wiki
You had to enter your email address in order to play a free game. A few days later, you
started receiving multiple emails with links to other free games and downloads. You have
been a victim of Spam
You can make an online search by entering your keywords in the browser's
Address bar
The cloud enables people in different locations to work on the same project. This enables
Better collaboration
Which of the following is not a factor that can be used to determine a source's credibility?
The article's length
Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by
law but are expected to be followed by everyone.
Informal Netiquette
Servers are housed in centralized locations called Data centers
Which of the following mobile apps is not a native application? None of these
You used your smartphone to access Yahoo mail and send an email. In this scenario, your
smartphone is a Client
You receive an email saying you won an iPhone. When you click the link in the email, you
were asked to enter your credit card number. This is called Pharming
You had to enter your email address in order to play a free game. A few days later, you
started receiving multiple emails with links to other free games and downloads. You have
been a victim of Spam
REPUBLIC ACT NO. 8293 is also know as Intellectual Property Code of the Philippines
The use of strength or power to intimidate someone into doing something that he does not
want or to make him feel bad "BULLYING"
In which of the following situations is it ok to use your mobile phone? None of these
According to the IP Code, how many types of works are covered by copyright protection?
15
Computers can create data and make decisions based on the user's actions through
Machine Learning
A Web 3.0 characteristic in which events and information are made available to users as
they happen.
Real-Time
Clicking on a search result using the _____ will open the link in a new tab.
Mouse wheel
In the spreadsheet above, what result will you get if you use the formula =C3-B2
110
What do you call software that are used to create information like documents, spreadsheet,
presentations, etc? Productivity tool
In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)
440
In LibreOffice Writer, what function did we have to open to view the registered databases
Datasources
In the LibreOffice home screen, the database app is called LibreOffice Base
In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)
1200
In the spreadsheet above, what result will you get if you use the formula
=SUM(A1,B1,C1,B3) 850
Adding information from a database to a document is called Mail Merge
In the spreadsheet above, what result will you get if you use the formula =A1*C1
30000
In the spreadsheet above, what result will you get if you use the formula =SUM(B1,B4)
430
The long textbox where you can write formulas is called Formula Line
Many trusted anti-virus companies give out free versions which are good enough to protect
your computer from malware True
Which is true?
Gmail uses a flag icon to mark important emails
All of the following types of malware can "infect" your computer except
Spam
You want to know if classes are suspended because of a storm. Which of the following
TLD's is most likely to have the correct information?
.gov
In LibreOffice, the sets of icons on the top part of the page are called
Toolbars
Which of the following is not an Internet Browser? Safari
The unauthorized copying of the material support, labels, artwork and packaging is called
Counterfeiting
It's ok to play loud music in public as long as you only play popular songs. False
CC Stands for Carbon Copy
What is the name of the spreadsheet tool that we made at the end of this chapter?
Savings Tracker
is the act of forcing or intimidating someone into doing something that he/she does not want
to. Bullying
apps are used to connect with other people and make interactions such as messaging,
writing comments and sharing pictures and videos.
Social Media