You are on page 1of 2

Department of Education

Cotabato Division
Antipas National High School
National Highway, Poblacion Antipas, North Cotabato

First Quarter Examination


Empowerment Technology

Name: ____________________________________________________ Date:___________________________


Grade & Section: GRADE 11 – GOOGLE Score: _________________________

Directions: Write your answer in a CAPITAL LETTER on a space provided before the number and NO ERASURES.

__________1. What is Digital Native?


A. From th e moment you were born, you were already surrounded already by technology and surrounded by ICT.
B. From the moment you were born, you were already surrounded already by gadgets and surrounded by buildings.
C. From the moment you were born, you were already surrounded already by plants and surrounded by animals.
D. From the moment you were born, you were already surrounded already by stars and surrounded by planets.
__________2. We were called by several international companies as a _________________?
A. ICT dub of Asia B.ICT hub of Asia C.ICT planet of Asia D.ICT capital of Asia
__________3. What magazine describes the Philippines as “the Selfiest Cities around the World”?
A. Time Magazine B. Vogue Magazine C.Candy Magazine D.FHM Magazine
__________4. A web that can be manipulated is called?
A. Dynamic B.Static C.W3C D. Semantic Web
__________5. A web that cannot be manipulated is called?
A. Dynamic B. Static C. W3C D. Semantic Web
__________6. What kind of features of web 2.0 that allows the user to categorized and classify/arrange information using freely chosen keywords
A. Folksonomy B.Rich User Experience C.User Participation D. Long Tail
__________7. This is a synonymous to subscribing to data plan that charges you for the amount of time you time spent the internet, or data plan
that changes you for the amount of bandwidth you used. It is called ___________?
A. Folksonomy B.Software as a Service C.User Participation D. Long Tail
__________8. Google Docs is a free web-based application that allows user to create and edit word processing and spreadsheet documents online.
It is called____________?
A. Folksonomy B.Software as a Service C.User Participation D.Long Tail
__________9. It is a movement led by the World Wide Web Consortium (W3C).
A. Semantic Wed B.Concept Web C.Semantic Web D.Concept Web
__________10. Who is the inventor of W3C?
A. Tim Berners-Leung B.Tim Bruners- Lee C. Tim Berner’s- Lea D. Tim Berner’s-Lee
__________11. What are the several problems in Web 3.0?
A. Compatibility, security, vastness, vagueness, logic B. Compatibility, safety, vashness, logic, clarity
C. Compatibility, security, clarity, vagueness, logic D. Compatibility, safety, vastness, vagueness, logic
__________12. It is the synergy of technological advancements to work on a similar goal or task, and using several technologies to accomplish a
ask conveniently. A. Technological Convergy B. Technological Covergence C.Technical Convergence D. Technical Convergy
__________ 13. It is a website, application or online channel that enables web users to create, co-create, discuss, modify and exchange user
generated content. A. Social status B.Social Networking C.Social Media D.Social Studies
___________14. A type of social networking site, that allows you to store and manage links to various websites and resources and most of these
sites allow you to create a tag that allows you and others to easily search or share them.
A. Social Networking B.Bookmaking Sites C.Social News D.Media Sharing
___________15. A type of social networking site, that allows you to upload and share media content like images, music, and video.
A. Social Networking B.Blogs and Forums C.Social News D.Media Sharing
__________16. This website allows user to post their content and other users are able to comment on the said topic.
A. Social Networking B.Blogs and Forums C.Social News D. Media Sharing
__________17. What is the fastest mobile network in the Philippines? A. 5G B.LTE C.4G D.3G
__________18. A type of media, where a nonprofit service designed to help people who have visual and reading impairments and database of
audio recordings is used to read to the user. A. Assisstive Media B.Assistive Media C.Assistant Media D.Assist Media
__________19. What OS is used in Iphones and Ipads? A. Android B. OS C.Symbian D.Web OS
__________20. What is used by nokia devices? A. Android B.IOS C.Symbian D.Window mobile
__________21. An OS, developed by microsoft for smartphones and pocket PCs.
A. Android B.IOS C.Symbian D.Window mobile
__________22. An open source operating system developed by google. Being open source means several mobile phone companies use this OS
for free. A. Android B.IOS C.Symbian D.Window mobile
__________23. What does ARPA stands for?
A. Advance Research Project Agency C. Advance Research Project Association
B. Advance Researcher Project Association D. Advance Research Project Agency
__________24. The purpose of ARPA is _______________.
A. For technological think-tank for American defence B. For safety
C. For internet connection D. For technological advancement
__________25. He is an American philosopher scientist and internet pioner, famous for having coined the term hypertext and hypermedia?
A. Ted Nelson B. Leinard Kleinrock C. Steve Crocker D. Claude Shannon
__________26. Who is the father of information technology?
A. Ted Nelson B.Leinard Kleinrock C. Steve Crocker D. Claude Shannon
__________27.He was born in New York City on June 13, 1934 and came from a Jewish family.
A. Ted Nelson B.Leinard Kleinrock C. Steve Crocker D. Claude Shannon
__________28. His biggest contribution to the project was the creation of the Request for Comments or RFC.
A. Ted Nelson B.Leinard Kleinrock C. Steve Crocker D. Claude Shannon
__________29. Which of the following is the function of Memex System?
A. a device in which an individual stores all his books, records, and communications,
B. which continuously variable physical quantities such as electrical potential, fluid pressure, or mechanical motion
C. computer designed to solve differential equations by integration, using wheel-and-disc mechanisms to perform the integration.
D. machines could not add, but then it was noticed that if you turn the two wheels of a rear differential, the drive shaft will compute the
average of the left and right wheels
__________30. How does differential analyzer works?
A. a device in which an individual stores all his books, records, and communications,
B. which continuously variable physical quantities such as electrical potential, fluid pressure, or mechanical motion
C. computer designed to solve differential equations by integration, using wheel-and-disc mechanisms to perform the integration.
D. machines could not add, but then it was noticed that if you turn the two wheels of a rear differential, the drive shaft will compute the
average of the left and right wheels
__________31. What is the name of the Shannon mouse? A. Thelsea B. Theseus C. Theseous D. Thelsa
__________32. Steve Crocker was born on ____________?
A. October 29, 1969 B. June 17, 1937 C. December 21, 1937 D. April 30, 1916
__________33. When was Lawrence Roberts’ birthday?
A. October 29, 1969 B. June 17, 1937 C. December 21, 1937 D. April 30, 1916
__________34. Claude Shannon was born on______?
A. October 29, 1969 B. June 17, 1937 C. December 21, 1937 D. April 30, 1916
__________35. Protecting computers, information, and services from unauthorized access, change or destruction.
A. Computer Security B.Internet Security C.Telnet Security D.Social Media Security
__________36. Who should be concern for computer and internet safety?
A. Friends who always reads books
B. Relatives who usually use DVD for viewing favourite films
C. Your brother who uses his cellphone
D. Your BF who plays portable playstation
__________37. A type of malicious code that tracks your habits on the internet without you knowing it; It usually collects personal information
It is called ____________? A.Virus B.Enable Firewalls C.Spyware D.Hoaxes
__________38. A program designed to infect your computer, replicates itself , and usually causes lost or corrupt data. It is called __________?
A. Virus B.Enable Firewalls C.Spyware D.Hoaxes
__________39. It protects computers by preventing unauthorized access.
A. Virus B.Enable Firewalls C.Spyware D.Hoaxes
__________40. How can you strengthen your computer security?
A. Downloading free software or files without validation C. Uses strong passwords
B. Click any web you’ll seen in web directories D. Leave your computer unshut down
__________41. What does GPS stands for?
A.Global Positive Security B.Global Position System C. Global Positioning Sytem D.Global Positive System
__________42. A mobile device where location-aware applications deliver online content to users based on their physical location. It is called
________? A. Location Sharing B.GPS C.Satellite Sharing D.Location Finding
__________43. What is the name of the location sharing used by facebook?
A. Blip B.Geotagging C.Check in D.Google Latitude
__________44. This are the guidelines for mobile security, except for ______.
A. Disable auto-lock B.Enable password protection
C.Keep the phone OS and apps up-to-date D.Enable remote wipe feature where possible
__________45. It is called a set of rules for behaving proper online.
A. Netiquette B.Computer Rules C.Computer Etiquette D.Internet Etiquette
__________46. Which is not included for email etiquette?
A. Check your email daily B.Save unwanted messages.
C. Keep messages in your box to a minimum D.Mail messages can be downloaded and save for future references.
__________47. How to make yourself good look online? Except for one.
A. Remember to always check your spelling and grammar before posting.
B. Always know what you are talking about and make sense saying it.
C. Be polite and pleasant to everyone.
D. Post the answers to your questions online because someone may have the same question you do.
__________48. Which is not belong in RULE # 8 (Respect other people’s privacy)
A. Do not read other people’s mail without their permission.
B. Going through other people’s things could cost you your job or you could even go to jail.
C. Not respecting other people’s privacy is bad Netiquette.
D. Ask questions online
__________49.Which of the following is belong to 10 commandments of computer ethics?
A. Thou shalt not appropriate other people’s intellectual output.
B. Thou shalt think about the social consequences of the program you write.
C. Thou shalt use a computer in ways that shows consideration and respect.
D. All of the Above
__________50. Which of the following is not belong in email etiquette ?
A. Check your email daily C. Keep messages in your box to a minimum
B. Delete unwanted messages D.None of the Above
__________51. Which of the following does not belong to communication ports?
A. Keyboard B. Mouse C. Case D. NIC
__________52. A expansion card that handles the graphical display and is central to system performance with graphic-demanding tasks like
gaming, video editing and graphic design. 
A. Sound Card B. Video Card C. Internet Card D. External card
__________ 53. What do you call the large circuit board which all other PC components connect to in some way?
A. Motherboard B. Central Processing Unit C. Read only Memory D. Random Access Memory
_________54. What is the brain of the computer?
A. Motherboard B. Central Processing Unit C. Read only Memory D. Random Access Memory

_________55. What do you call the device which is not lost when the power is removed from a PC and stores key instructions that the computer
needs to boot up and operate?

A. Motherboard B. Central Processing Unit C. Read only Memory D. Random Access Memory

You might also like