This document is a final examination for Grade 3 Computer class at San Carlos Preparatory School for the school year 2021-2022. It contains 30 multiple choice questions reviewing topics from Chapter 4 such as application software, binary numeral system, computer programmer, electronic mail, fonts, hardware, icons, internet, and more. Students are instructed to encircle the letter of the correct answer for each question. The exam was prepared by the computer teacher Reymond Bhong M. Manzon.
This document is a final examination for Grade 3 Computer class at San Carlos Preparatory School for the school year 2021-2022. It contains 30 multiple choice questions reviewing topics from Chapter 4 such as application software, binary numeral system, computer programmer, electronic mail, fonts, hardware, icons, internet, and more. Students are instructed to encircle the letter of the correct answer for each question. The exam was prepared by the computer teacher Reymond Bhong M. Manzon.
This document is a final examination for Grade 3 Computer class at San Carlos Preparatory School for the school year 2021-2022. It contains 30 multiple choice questions reviewing topics from Chapter 4 such as application software, binary numeral system, computer programmer, electronic mail, fonts, hardware, icons, internet, and more. Students are instructed to encircle the letter of the correct answer for each question. The exam was prepared by the computer teacher Reymond Bhong M. Manzon.
Final Examination School Year 2021-2022 JUNE NAME: ____________________________________ DATE RECEIVED: JUNE 15, 2022 SECTION: JACINTO DATE RETURNED: __________________________ GRADE 3 - COMPUTER
POINTERS TO REVIEW: CHAPTER 4
A. ENCIRCLE THE LETTER OF THE CORRECT ANSWER.
1. A software that allows end users to 6. A method of exchanging digital
perform specific tasks, like writing a messages across the Internet or other document, browsing the Internet, computer networks. editing a picture, playing computer a. Desktop Themes game, or even doing a simulation. b. Download a. Application Software c. Electronic Mail b. Automatic Voltage Regulator d. Computer Technician c. Binary Numeral System 7. In typography, it is traditionally d. Computer Programmer defined as a quantity of sorts 2. An electrical regulator designed to composing a complete character of a automatically maintain a constant single size and style of a particular voltage level. typeface. a. Application Software a. Hardware b. Automatic Voltage Regulator b. Font c. Binary Numeral System c. Indents d. Computer Programmer d. Input 3. A person who devotes his or her time 8. It refers to the physical parts of the in creating or writing a code for computer. These are tangible things. specific client. a. Hardware a. Application Software b. Highlighting b. Automatic Voltage Regulator c. Internet c. Binary Numeral System d. Input d. Computer Programmer 9. It is used for emphasizing text but 4. It represents numeric values using two also for editing. symbols, 0 and 1. a. Hardware a. Application Software b. Highlighting b. Automatic Voltage Regulator c. Internet c. Binary Numeral System d. Input d. Computer Programmer 10. These are small graphical 5. A person in charge of repairing representation of a certain program, computers whenever they need to be file directory, or even a command. repaired. a. Icons a. Desktop Themes b. Highlighting b. Download c. Indents c. Electronic Mail d. Input d. Computer Technician
PREPARED BY: REYMOND BHONG M. MANZON
COMPUTER TEACHER 11. In word processing, this is used to b. Italic describe the distance, or number or c. Microprocessor blanks spaced used to separate a d. Margins paragraph from the left or right 18. A device that connects a computer to margins. the Internet. a. Icons a. Online b. Highlighting b. Online Chat c. Indents c. Modem d. Input d. Network Card 12. A term denoting either the entrance 19. A device that connects a computer to or changes which are inserted into a another computer. This device sends system and which activate or modify a and receives a packet of data over a process. network. a. Icons a. Online b. Highlighting b. Online Chat c. Indents c. Modem d. Input d. Network Card 13. A global system of interconnected 20. A group of programs that helps the computer networks that use the computer components function standard IPS referred to as TCP/IP to together smoothly. serve billion of user worldwide. a. Online a. Icons b. Online Chat b. Highlighting c. Modem c. Internet d. Operating System d. Input 21. A term denoting either an exit or 14. A cursive typeface based on a changers which exit a system and stylized form of calligraphic which activate or modify a process. handwriting. a. Output a. Lower Case b. Programming Software b. Italic c. Software c. Microprocessor d. System Administrator d. Margins 22. A programming language used by 15. A smaller form of letters, as opposed those who want to write a system or a to upper case or capital letters, as used program. in European alphabets. a. Output a. Lower Case b. Programming Software b. Italic c. Software c. Microprocessor d. System Administrator d. Margins 23. A set of instructions that guides to 16. In typography, it is a space that software to do their job. surrounds the content of a page. a. Output a. Lower Case b. Programming Software b. Italic c. Software c. Microprocessor d. System Administrator d. Margins 24. One of the main task of this person is 17. It is the brain of a computer, a taking care of the servers (main computing engine embedded in a computers). small semiconductor chip. a. Output a. Lower Case b. Programming Software PREPARED BY: REYMOND BHONG M. MANZON COMPUTER TEACHER c. Software a. Web Browser d. System Administrator b. Wi-Fi 25. They manage a pool of computer c. Uppercase programmers, the head of all the d. Upload programmer and usually orients the 29. The Alliance has generally enforced programmers on a new program to be its use to describe only a narrow range made. of connectivity technologies including a. Output wireless local area network. b. Programming Software a. Mobile Data c. System Analyst b. Web Browser d. System Administrator c. Wi-Fi 26. A semiconductor device used to d. Upload amplify and switch electronic signals. 30. A malware that appears to perform a a. Transistor desirable function to the user prior to b. Trojan run or install but instead facilitates c. Wi-Fi unauthorized access of the user’s d. Upload computer system. 27. This process is to transmit data from a. Transistor a computer to a bulletin board service, b. Trojan mainframe, or network. c. Wi-Fi a. Transistor d. Upload b. Trojan c. Wi-Fi d. Upload
28. A software application for retrieving,
presenting, and traversing information resources on the World Wide Web. PREPARED BY: REYMOND BHONG M. MANZON COMPUTER TEACHER
Branding: What You Need to Know About Building a Personal Brand and Growing Your Small Business Using Social Media Marketing and Offline Guerrilla Tactics
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing