You are on page 1of 6

Table of Specification

First Quarter
(S.Y. 2017-2018)
COMPUTER EMPOWERMENT- XI
Learning Competencies Remembering Understanding Applying Analyzing Evaluating Creating Total

40% 40% 20% 100%

1. I can determine how ICT evolve 1 2 1 4


( 5 days)

2. I can determine the importance


of ICT (5 days) 2 2 1 1 1 7
3. I can distinguish how
components of ICT help me more 2 3 1 3 9
productively (6 days)

4. I can identify the use and


purpose of the different research
and information seeking (6 days) 1 1 1 2 3 1 9

5. I can build awareness in knowing


online safety and security and 2 2 1 1 6
government provisions (5 days)
6. I identify the parts and functions
of the CPU (10 days) 3 3 1 4 3 1 15

TOTAL 10 12 4 13 8 3 50
CLARET SCHOOL OF TUMAHUBONG
CLARETIAN MISSIONARIES
TUMAHUBONG SUMISIP, BASILAN
1st QUARTER EXAM
COMPUTER EMPOWERMENT GRADE -XI
NAME: SCORE:
YEAR/SECTION: DATE:

TEST-I- MULTIPLE CHOICE


Directions: Read and understand each question. Encircle
the letter of the best answer. Erasure means wrong.
1. RAM is short term memory, RAM stands for? 7. What is true about Random Access Memory?
A. Real Access Memory A. It is part of a computer in which information is stored
B. Random Access Mapping temporarily when a program is being used
C. Read Access Mapping B. It is part of a computer in which information cannot be
D. Random Access Memory changed when it stored
2. CPU can be described as ___________. C. Stores the program required to initially boot the
A. Heart of a computer computer
B. Soul of a computer D. Carries out all the information
C. Brain of a computer 8. It carries out all the computation, it also performs the
D. Eye of a computer “decision making” operations such as comparing two
3. Control unit is the “BOSS” and coordinates all of the values and determining whether one is greater than, less
CPU’s activities. How control unit works in processing than or equal to another.
information? A. Arithmetic Logic Unit (ALU)
A. It is a temporary storage location inside the CPU B. Random Access Memory (RAM)
B. It is a section of CPU responsible for all transfer of data C. Read- Only Memory (ROM)
between CPU and other components and for fetching, D. Central Processing Unit
decoding and executing instructions 9. How ROM and RAM differ in storage?
C. It is a special purpose register A. ROM stores more data than RAM
D. To fetch instructions from user’s demand B. RAM stores multiple data than ROM
4. Jamila encode her thesis and after saved the file in C. RAM and ROM are equal in storage
ROM suddenly the current is turned off. What happen to D. A & B
Jamila’s file? 10. What is the correct process of information when
A. The file retain and retrieve entering Central Processing Unit?
B. The file was lost A. Main memory ALU Control Unit main
V V
C. The file was being corrupted memory
D. The file transfer into other storage B. Control Unit ALU Main memory
5. CPU is part of the computer system, it is located on C. Main memory V V
Control Unit ALU
the _______. D. ALU Main memory V Unit
Control
V
A. Motherboard of the computer 11. Why we can store large amount in Random Access
B. Washboard of the computer Memory?
C. Hard drive of the computer A. Because it allows the computer to read data quickly to
D. Monitor of the computer run applications, it allows reading and writing
6. A component of a computer system that performs the B. Because it stores the program required to initially boot
basic operations as processing data, exchanges data with the computer, it only allows reading
system memory and manages the systems other C. Because it search directly
component. D. All of the above
A. RAM 12. Maverick is encoding his report after searching in the
B. CPU internet and he didn’t yet saving the file. What memory
C. Control Unit controlled his work?
D. ALU A. RAM
C. Control Unit
B. ROM 19. We have the power to make the information we
D. My Computer gather using different forms of media that are beneficial
13. Rica makes a slide presentation to defend their case to us. The following situations are beneficial for us from
study. Unfortunately the laptop she uses is being social media, except ___________.
corrupted after she saved the file on her flash drive. What A. Hasna registered online business because she want to
happen to her file? earn money
A. It will lost because of virus B. Honey Mae recommended as online teacher so she
B. It will retrieve and retain need to use Skype to communicate her students in other
C. Save at recycle bin country
D. It will be corrupted by malware C. Hujaima use facebook every night and she have no
14. The following are TRUE about main memory, except time at all for her assignments.
____________. D. Mark- Kevin always updated his facebook account and
A. It is constructed from integrated circuits and needs to he share photos full of information about their topic
have electrical power in order to maintain its information. 20. It refers to the technologies, both hardware and
B. Retains its contents even when the computer is turned software that enable humans to communicate with one
off. another.
C. Fetching instruction to ALU and store instruction A. Educational Technology
D. Decode instructions B. Computer Learning
15. The following can be done by the CPU, C. Information and Communication Technology
except_____________. D. All of the above
A. Synthesize data or information 21. Is it true that Information and Communication
B. Computing problem solving Technology is using internet and computer alone?
C. It gives accurate information A. No, because basically it is any form of technology that
D. Decode instruction enables you to communicate
16. In pre-mechanical period ABACUS and numerical B. Yes, because it also use to communicate and to inform
system were discovered they use words and pictograph C. Yes, because it is accessible to all whatever you want to
curved in rocks before papyrus was discovered. Is their do with
communication sent easier and faster? 22. In what period the use of electricity for information
A. No, because they only use paper to send messages handling and transfer bloomed but not as fast nowadays,
B. Yes, because even if they wrote in rocks still easier and the need and the urgency to share information with one
faster another in a faster yet reliable manner over long
C. Yes, because they use pictograph curved in rocks distances aroused?
D. B & C A. Pre-mechanical
17. How starting period, pre-mechanical gives importance B. Mechanical
to all periods? C. Electromechanical
A. Because without discovering pictograph, papers, D. Electronic
numerical and ABACUS, technologies wont evolve and 23. Who discovered the World Wide Web?
well improved A. Tim Berners Lee 1989
B. Because it is important to connect generations B. William Cooke
C. Because without the first period, we have no papers C. Charles Wheatstone
nowadays D. Alexander Graham Bell
D. None of the above 24. A system that enables you to access hypertext
18. The devices, technologies, and processes that humans documents and other files over the internet.
enjoy today are products of centuries of improvements A. World Wide Web
and innovations built on foundations prepared by the B. Social Media
early humans. Why do people need to learn and know C. Electronic Commerce
how to use technologies? D. Wide Area Network
A. In order to be a literate in technologies and globally 25. The Web 3.0 is what we are using nowadays. How this
competitive Web works?
B. In order to learn something A. Enable a wider range of search in a fast manner
C. In order to know about technologies B. Enable to edit the content
D. In order to be creative C. Enable to read the information
D. Enable to view the content
26. What is the different between Web 1.0 and Web 2.0? B. Massive Online Open Course
A. The Web 1.0 can read only while Web 2.0 can read and C. Electronic Commerce
write D. Web Search Engine
B. The Web 1.0 can read and write while 2.0 can read 34. If you have plan to build business someday. What
only particular websites that may help you in introducing your
C. The Web 1.0 can read and write while Web 2.0 can trading products?
search and execute C. Massive Online Open Course
D. The Web 1.0 can execute while Web 2.0 can read and D. Employment Websites
write E. Electronic Commerce
27. If Web 1.0 can read, Web 2.0 can read and write. How D. Web Search Engines
about the Web 3.0? 35. Nadzmie wants to learn more about English because
A. It can access by the user he is poor in language subjects? What particular website
B. It can interact to view the content he will use?
C. It can execute a semantic Web A. Research Indexing sites
D. It can edit the content B. Massive Online Open Course
28. What is the evidence that a certain social media is C. Web Search Engines
effective? D. Employment websites
A. It depends upon on users’ enjoyment 36. How can you determine that the information is valid,
B. It depends upon on users and its virality credible and legitimate?
C. It depends upon on benefits A. When the author’s name is included in the information
D. It depends upon on availability of an application B. When it is clear and readable
29. The following are the advantages of social media, C. When it is concise
except? D. When it well arrange
A. Used in communicating and socializing with other 37. Before searching information. Why is it important to
application user view rating and comments from other researchers?
B. Reaching people, prospects and customers across the A. In order to know the quality and validity of the
globe information
C. Larger sales, fatter profits B. In order to interact those comments
D. It consume time especially you enjoyed using C. In order to communicate other friends
30. The more viral their ads become the better or more D. In order to enjoy what you are searching
effective their publication will be. The following are the 38. It is where the international or local companies
main benefactors of virality, except? involved in the field you are searching for, government
A. Businesses connected and government maintained web sites.
B. Non-profit organization A. Credible Websites
C. Special Interests groups B. Reference and Related Articles
D. Students C. Employment Websites
31. It is programs designed to search or mine the www D. Electronic Commerce
based on keywords provided by the user. 39. This refers to the transmission of unsolicited
A. Research Indexing sites messages from various origins using electronic messaging
B. Web Search Engines systems such as emails and chat messengers.
C. Massive Online Open Course A. Spamming
D. Employment Website B. Phishing
32. These are websites dedicated to compile and index C. Malware
researches done by academic researchers, engineers and D. Security
social scientists. 40. Why do you need to secure your sensitive information
A. Electronic Commerce like username, password and credit card?
B. Employment Websites A. Because attackers inflict viruses on your account
C. Research Indexing sites B. Because attackers will obtain and get information from
D. Massive Online Open Course your account
33. After you finished your degree in college, you will be C. Because it transmits unsolicited messages
able to find job. What particular websites those enable D. Because it is your personal account
you to apply? 41. The following are ways of avoiding or lessen viruses,
A. Employment Websites except ______________.
A. Choose obsolete antivirus and use it every time
B. Do not easily download those available applications
C. Be aware of those advertisement that appears on the
screen
D. Do not open websites
42. The following is the negative effects on too much of
using technologies, except _____________
A. Loss of hearing and eye sight
B. Depression
C. Poor sleep habits
D. Low self-esteem
43. The following situations shows” internet has become
an integral part of every individual’s life” except ______.
A. Hujaima is searching a topic for their thesis
B. Irfan is downloading a music video for their
presentation
C. Zaldy is sending a file to his teacher for their
performance task
D. Amna is uploading a picture of the “unseen beauty of
Claret School of Tumahubong”
44. Which of the following laws protects an individual’s
privacy online?
A. Cybercrime Prevention Act
B. Anti-Bullying Act
C. Republic Act 10628
D. Republic Act 9292
45. The following are the effects of Cyberbullying, except
__________.
A. Have more health problems
B. Be unwilling to attend school
C. Receive poor grades
D. Physically damage
TEST-II- TRUE OR FALSE
Write FALSE if the statement is correct and TRUE if it is not correct. Write your answer on the space provided.
________1. An illiterate in 21st century learners are those who cannot read, write and calculate.

________2. . ICT can contribute to universal access to education, equity and the delivery of teaching learning process.
________3. There is negative ways of ICT in the mind of many people; schools play an important role to eliminate that
impact.
________4. ICT has given wings to empower the use of technology related activities in the world of education.
________5. Using technology in education boosts the interest of the students.

You might also like