You are on page 1of 103

ICT2112-2016S Empowerment Technologies (E-Tech): ICT for Professional Tracks

WEEK 3:

Which of the following is NOT true about worms? A: A worm needs human action to spread

You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of ______

A: Spam

Which of the following information is ok to share with other people? A: Email address

The following are benefits of cloud computing except _____ A: Proficiency

Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a _____

A: Trojan

At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi,which you connect to using your phone.. In this scenario, Dad's laptop is a _____.

A: Server (CORRECT)

Network (INCORRECT)

_____ are apps and websites used by people to interact with one another by sharing information,
sending messages, and exchanging ideas

A: Social Media

Which of the following is NOT true? A: The cloud is not an actual cloud
_____ is a program that is designed to cause harm to your computer or device A: Virus

A task that is done by a computer for another computer is called a _____ The correct answer is: Service

Server (INCORRECT)

Malware is short for _____ A: Malicious software

A Web 3.0 characteristic in which events and information are made available to users as they happen.

A: Real-Time

The name Trojan is derived from a fictional wooden _____ A: Horse

Programs that can only be accessed using a browser are called _____ A: Web applications

Which of the following should not be shared with anyone? A: Password

Which of the following can contain malware? A: All

Real-time, ubiquitous, and machine learning are the defining elements of _____ A: Web 3.0

Which of the following does not help you avoid getting a virus? A: Downloading pirated programs

Which of the following statements is NOT true? A: Phishing is a type of virus that can make copies of
itself (CORRECT)

-Phishing can be used to steal your credit card number (INCORRECT)


Tricking people to submit their personal details is called _____ A: Phishing

Computers can create data and make decisions based on the user's actions through _____ A: Machine
Learning

Which of the following can be used in identity theft? A: All

At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi, which you connect to using your phone. In this scenario, your phone is a _____.

A: Client

Which of the following is TRUE? A: Mobile phone apps are native apps because they are installed

In our lesson, we visited the website of which movie? A: Space Jam

A computer that does a task for other computers is called a _____ A: Server

_____ is a type of malware that is disguised as a harmless or useful program or file. A: Trojan

Which of the following is NOT true about Cloud-based services?

A: Subscribing to cloud-based services is more expensive than building your own programs and buying
your own servers. (CORRECT)

-People from different places can work with one another through the cloud. (INCORRECT)

You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called _____

A: Phishing
_____ is a secret group of characters used to unlock your account

Email address (INCORRECT)

People who send unwanted and unsolicited emails are called _____ A: Spammers

A _____ page is about a single topic and can be edited by anyone with the right credentials A: Wiki

Is your alias, which is used by websites to represent your online presence. A: Username

Which of the following is NOT a safe practice? A: Submitting your phone number every time you are
asked.

_____ is a browser add-on that prevents ads from being displayed in your browser. A: Ad blocker

Which of the following mobile apps is not a native application? A: None of these

_____ websites encourage user participation by allowing them share videos, music, articles, etc.

A: Web 2.0

In the Internet, your _____ is as good as your actual name. A: Username

Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program.

A: Adware
_____ Internet-based networks that are used to store, manage, and share resources and information

A: Cloud Computing

Wiki is derived from the Hawiian work wikiwiki, which means _____ A: Quick

Which of the following CANNOT infect your computer? A: Spam

Which of the following is NOT true about passwords? A: Passwords should not be memorized

_____ Websites change appearance and behavior based on users' action A: Dynamic

Which of the following statements is true? A: A computer virus can spread whenever a computer makes
contact with another computer.

_____ are programs that are directly installed in a computer or device A: Native applications

WEEK 5:

Which of the following does not apply to Netiquette? A: Expect the unexpected (CORRECT)

-Do unto others as you would have them do unto you. (INCORRECT)

Which of the following is not true? A: Real-life etiquette does not apply online.

You can make an online search by entering your keywords in the browser's _____

A: Address bar (CORRECT) Keyword bar (INCORRECT)

Which of the following is an ethical thing to do while commuting? A: Listen to music using headphones
The cloud enables people in different locations to work on the same project. This enables _____.

A: Better collaboration

If you break the rules of an online community, _____ may revoke your access/membership. A: Admins

Which of the following is not a factor that can be used to determine a source's credibility? A: The
article's length

_____ are multiple accounts used by the same person A: Sock puppets

The use of strength or power to intimidate someone into doing something that he does not want or to
make him feel bad is called ____

A: Bullying

_____ is the most common TLD A: .com

You copied an essay that you found online and submitted it in an essay writing contest. You have
committed _____.

A: Plagiarism

Which of the following is TRUE?

A: Mobile phone apps are native apps because they are installed (CORRECT)

-Mobile apps are all web apps because they can only be accessed using an Internet browser
(INCORRECT)

Which of the following is NOT true? A: Google's only server is located in California
.org stands for A: organization You used your smartphone to access Yahoo mail and send an email. In
this scenario, your smartphone is a _____

A: Client

_____ is the legal right to own an original work A: Copyright

A Web 3.0 characteristic in which users are always connected to the Internet. A: Ubiquitous

_____ is bullying that is done using electronic technology. A: Cyberbullying

Which of the following is TRUE about Cloud-based services? A: Some cloud-based services can be used
for free

What do you call the unauthorized copying of the material support, labels, artwork and packaging?

A: Counterfeiting

While you are typing your keyword in the address bar or the search bar, several _____ may appear
bellow it

Answer: Suggestions

The URL and design of a website’s homepage changes depending on the preferences of the current user.
This website is _____

A: Dynamic

_____ is a web browser owned by Apple A: Safari


______ is harmful because it denies the rightful owners the proper compensation/payment for their
work.

A: Piracy

HTML means _____ A: Hypertext Markup Language

Netiquette is short for _____ A: Network Etiquette

Which of the following is a polite thing to do? A: Asking permission before taking pictures of other
people

Someone keeps posting cat pictures in a forum about car maintenance. This act is called

A: Trolling (CORRECT)

Spamming (INCORRECT)

Websites that belong to the Web 1.0 generation were mostly _____ A: Static

In which of the following situations is it ok to use your mobile phone? A: None of these

Servers are housed in centralized locations called _____ A: Data centers

Which of these is NOT ok to do while driving? A: All of these

"IP Code" stands for A: Intellectual Property Code of the Philippines (CORRECT)

-Internet Protocol Code of the Philippines (INCORRECT)


.gov stands for A: government

Netiquette involves a set of rules that are imposed by online groups A: formal

REPUBLIC ACT NO. 8293 is also know as _____ A: Intellectual Property Code of the Philippines

Reproducing and distributing materials without the owner's consent is called Answer: Piracy

Contents of _____ websites like Wikipedia can be edited by anyone A: open-source

You can check an article's _____ to know if the information that it contains is updated. A: Publication
date

Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law but are
expected to be followed by everyone.

A: Informal Netiquette

You recorded a song on the radio and sent copies to your friends. What you did is called A: Bootlegging

According to the IP Code, how many types of works are covered by copyright protection? A: 15

Which of the following is NOT true?

A: Some types of malware can spread through offline means such as flash drives and local area networks

TLD stands for _____ A: Top-level domain

A member of an online community constantly sends messages about products that he is selling. You can
report this person for _____.
A: Spamming

.net stands for _____ A: network

Which of the following is safe practice? A: Use a combination of letters, numbers, and symbols as a
password

google.com.ph You can go to to make a/an _____

A: Basic search

Which of the following is NOT true about worms? A: A worm needs human action to spread (CORRECT)

-A worm doesn't need human action to spread (INCORRECT)

_____ is a single program or a system of programs designed to look for information in the Internet.

A: Web search engines

Which following actions are normally banned in online communities except _____ A: Joking

Clicking on a search result using the _____ will open the link in a new tab. A: Mouse wheel

Anyone can use the following TLD's except _____ A: .gov

Which of the following TLD's is most likely to be owned by a university? A: .edu

What is the official website of the Intellectual Property Code of the Philippines? A: ipophil.gov.ph
Which of the following does not need human action to spread? A: Worm

Which of the following is true? A: .Safari web browser's address bar doubles as the search bar
(CORRECT)

-Google Chrome connects to Google search by default (INCORRECT)

.info stands for A: information

IP Code stands for A: Intellectual Property Code of the Philippines

Week 4: Online Search Learning Activity 3 .com stands for _____ A: commercial

Short Quiz 3

You can make online searches in Mozilla Firefox by typing your keywords in the _____ located on the
upper right corner

A: Search bar

Most web search engines have an _____ feature which can be used to make complex web searches

A: Advanced Search

Which of the following details is NOT essential in citing a source A: name of the researcher

Which of the following is not a factor that can be used to determine a source’s credibility? A: The
article’s length

You want to know if classes are suspended because of a storm. Which of the following TLD’s is most
likely to have the most credible information
A: .gov

Which of the following is NOT a reason why you should give credit to your sources? A: To make the
author notice you

.edu stands for A: Education

Week 6: Online Communication: Short Quiz 4

It is a unique name that represents a destination where emails can be delivered to and sent from.

A: email address

These are sections of an email client that are used to store different kinds of email. A: Email folders

What is an email client? A: an application used for sending, receiving, and organizing emails

Which of the following is/are true about email address? A: It is a destination for emails (CORRECT)

Outbox (INCORRECT)

This email folder contains the finished or unfinished emails that you have composed but did not send.

A: Drafts

This email folder is where suspicious emails are kept. This is done as a security measure to prevent you
from accidentally opening these emails.

A: Spam
In an email client, instead of permanently deleting an email, it is sent to the A: Trash

It contains the messages you have received. A: Inbox

Email is short for A: electronic mail

_____ Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law
but are expected to be followed by everyone.

A: Informal Netiquette

Which of the following TLD's is most likely to be used by non-profit groups? A: .org

Which of the following is not a malware? A: Ad blocker

Your mom is calling you during class. In this situation, which of the following is the ethical thing to do?

A: Ask for your teacher's permission to go outside so you can answer the call.

Which of the following is not a search engine? A: Advanced Search

Several members of a forum are a having a heated debate. Eventually, they started posting insults and
threats against other members. The debate has escalated into a _____

A: Flame war

You can make online searches in Mozilla Firefox by typing your keywords in the _____ located on the
upper right corner.
A: Search bar

Which of the following statements is NOT true? A: Only your full name can be used as a username.

Which of the following is not true? A: In your project, your teacher will decide which applications you
will use.

Which of the following is NOT true? The correct answer is: A spam is a type of virus

_____ is a generation of the Internet when websites were mostly static A: Web 1.0

_____ Netiquette involves a set of rules that are imposed by online groups A: formal

Which of the following is not true? A: All TLD's contain credible information

WEEK 7:

In Calc, what is the default name of the cell that belongs to the second row and the third column?

A: C2

What sign is used for division? A: /

What is the name of word processor that we used in this chapter

A: LibreOffice Writer (CORRECT)

LibreOffice Word (INCORRECT)


A program that is developed by a public community of developers and is made available to the public for
free is described as _____

A: Open-source

In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)

A: 3 (CORRECT) 440 (INCORRECT)

In the LibreOffice home screen, the database app is called _____.

A: Base Database (CORRECT) LibreOffice Base (INCORRECT)

What sign is used for multiplication? A: *

In LibreOffice Writer, what function did we have to open to view the registered databases A:
Datasources

In the spreadsheet above, what result will you get if you use the formula =SUM(A1,B1,C1,B3)

A: 820 (CORRECT)

850 (INCORRECT)

What is the name of the of spreadsheet application that was used in this chapter?

A: LibreOfficeCalc (CORRECT) Microsoft Excel (INCORRECT)


In the spreadsheet above, what result will you get if you use the formula =SUM(B1,B4)

A: 430

In Calc, what sign can be seen in the beginning of the formulas?

A: = or c (CORRECT)

What is the name of the spreadsheet tool that we made at the end of this chapter? A: Savings Tracker

In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1

A: 25500

A group of programs used to view, manipulate, and print computer graphics is called a _____. A:
Graphics suite

The long textbox where you can write formulas is called _____. A: Input Line (CORRECT)

Formula Line (INCORRECT)

In LibreOffice, the sets of icons on the top part of the page are called _____. A: Toolbars

In a spreadsheet, the vertical groupings are called _____.

A: Columns (CORRECT) rows (INCORRECT)


In a spreadsheet, the horizontal groupings are called _____. A: Rows (CORRECT)

Columns (INCORRECT)

In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)

A: 860 (CORRECT) 1200 (INCORRECT)

In the spreadsheet above, what result will you get if you use the formula =C3-B2

A: 110

Productivity tools are normally made available in software bundles called _____. A: Office productivity
suite

In this chapter, the data that we linked to the document was created using what application? A: Calc

In a spreadsheet, each box in a table is called a _____. A: Cell

A program used to create, store, and manage data in tables. A: Spreadsheet

A mathematical equation that can be applied to one or multiple cells is called a _____. A: Formula

WEEK 9:

Email stands for _____ A: Electronic mail


Dummy accounts used by one person are called _____. A: Sock puppets

What word best describes Web 1.0 websites and web pages? A: Static

Which of the following does not infect your computer? A: Spam (CORRECT)

Worm (INCORRECT)

A network of servers that work together to provide a centralized service is called a _____. The correct
answer is: Cloud

Local Area Network (INCORRECT)

You bought an artist's album then you made and sold copies of it. What you did is called _____.

A: Counterfeiting (CORRECT) Bootlegging (INCORRECT)

Adding information from a database to a document is called _____. A: Mail Merge

_____ is done by tricking people into submitting their personal information. A: Phishing

CAPTCHA stands for "Completely Automated Public _____ To Tell Computers and Humans Apart"

A: Turing Test

The _____ is the part of the email address that is chosen by the client. It follows strict naming rules.

A: Local part

You can click on a link with the _____ to immediately open it in a new tab. A: Mouse wheel
Multiple fake accounts are called _____. A: Trolls

Which of the following is NOT true? A: Emails that are sent to Trash are immediately deleted

_____ deliberately break the rules in an online community to cause trouble or to get attention.

A: Trolls

Some websites refer to you by your _____ instead of your actual name. A: Username

Illegally copying and distributing copyrighted materials is called A: Piracy (CORRECT)

Plagiarism (INCORRECT)

It's ok to use your phone while driving as long as you keep your eyes on the road. A: False

Which of the following is not true? A: A web search engine can't be accessed using Internet browsers

What do you call software that are used to create information like documents, spreadsheet,
presentations, etc?

A: Productivity tool

A heated argument that escalates into threats and personal insults is called a _____. A: Flame wars
(CORRECT)

Troll (INCORRECT)

In the spreadsheet above, what result will you get if you use the formula =A1*C1 A: 30000
Which is true? A: Gmail uses a flag icon to mark important emails

You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the correct information?

A: .gov

While typing a keyword, several _____ may appear bellow it. A: Suggestions

_____ represents a destination where emails can be sent fro or delivered to. A: Email address

_____ are people who send unwanted and unsolicited messages. A: Spammers

In the part of this chapter where we learned to create an email address, which information is required?

A: Birthday

Clicking a link with the mouse wheel will cause it to open in _____ A: A new tab

_____ apps are used to connect with other people and make interactions such as messaging, writing
comments and sharing pictures and videos.

A: Social Media

What do you call an app used for sending, receiving, and organizing emails. A: Email client

Which is NOT true? A: You cannot manually mark an email as spam

Emails can be sent to the _____ instead of permanently deleting them A: Trash
_____ causes unwanted advertisements to appear in your screen? A: Adware

Which of the following is not an Internet Browser? A: Cloud

_____ is done by tricking people into submitting their personal information. A: Phishing

Websites that belong to _____ generation encourages a give-and-take relationship between the
websites and the users by allowing them to leave comments, upload files and to publish their own
contents.

A: Web 2.0

Causing trouble in an online community by deliberately breaking the rules is called _____. A: Trolling

Which is true? A: Gmail uses a star icon to mark important emails (CORRECT)

-Gmail uses a flag icon to mark important emails (INCORRECT)

It's ok to play loud music in public as long as you only play popular songs. A: False

The unauthorized copying of the material support, labels, artwork and packaging is called _____.

A: Counterfeiting

What is the Local Part in "aaaaa@bbbbb.com" A: Aaaaa

Use _____ to make complex web searches. A: Advanced Search

Several _____ may appear below the search bar or address bar while you are typing a keyword.
A: Suggestions

All of the following types of malware can "infect" your computer except _____. A: Spam

_____ aresections of an email client that are used to store different kinds of email. A: Folders

Web 1.0 websites is best described by which of the following? A: Static

What is the sign that separates the two parts of the email address? A: At sign

A _____ is a program that is designed to cause harm to your computer or device A: virus

Bcc stands for _____ A: Blind Carbon Copy

Which of the following is TRUE? A: By default, Gmail will delete a message in the Trash after 30 days.

Which is NOT true? A: Emails in the trash cannot be recovered=

What generation of the internet is defined by characteristics such as real time, ubiquitous, and machine
learning?

A: Web 3.0

Chrome's default search engine is Google Search. A: True (CORRECT)

False (INCORRECT)

_____ contains emails that have been composed but were not sent. A: Drafts
A virus needs to be copied and sent by people in order to spread while a _____ can spread and replicate
itself automatically

A: Worm

You can install an _____ to prevent unwanted advertisements to appear in your browser or computer
screen?

A: Adblocker

Web 2.0 websites were _____. A: Dynamic

_____ is the act of recording a live performance without the consent of the owner. A: Bootlegging

_____ can be received by your email account and contain other types of malware. A: Trojan

Which of the following is NOT true? A: The local part is on the right of the @ sign

What's is type of malware that causes unwanted advertisements to appear in your screen?

A: Adware

Web 2.0 websites is best described by which of the following? A: Dynamic

Non-profit groups prefer to use which TLD? A: .org

Google.com is an example of a dynamic website A: True


Which of the following personal information should not be shared with other people? A: Password

_____ deliberately break the rules in an online community to cause trouble or to get attention.

A: Trolls

_____ is the act of forcing or intimidating someone into doing something that he/she does not want to.

A: Bullying

WEEK 10: First Quarter Exam

1st Attempt 47/50

Chrome, Firefox, and Internet explorer are examples of Answer: Web browser

_____ websites can change their appearance and behavior based on the users' actions.

A: Dynamic

Reproducing and distributing materials without the owner's consent is called A: Piracy

In the spreadsheet app that you learned about in Chapter 5, what is the default name of the cell that
belongs to the second row and the third column?

A: C2

.com stands for _____ A: commercial

What do you call a program that is used to create, view, edit, and print documents? A: Word processor
What is the name of the of spreadsheet application that was used in Chapter 5? A: LibreOfficeCalc

Some search engines have _____ features that can be used to do complex web search.

A: Advanced Search

Anyone who knows your username can open your account A: False

Other than the search bar, you can also enter your search keywords in your browser's _____. A: Address
bar

In the First Chapter, we visited the website of what 90's movie? A: Space jam

Unwanted and unsolicited messages are called _____ A: Spam

Based on the spreadsheet above, give the answers to the following formula:

=SUM(B1:B5) A: 300

Based on the spreadsheet above, give the answer to the following formula:

5. =B2/C2-D1

A: -107

The names of _____ are numbers A: Rows

Which generation of the internet is defined by characteristics such as real-time, ubiquitous, and machine
learning?

A: Web 3.0
With Google Chrome and Mozilla Firefox, you can make an online search by typing the keywords in the
_____

A: Address bar

What is the group of characters that when combined with your username or email address, can be used
to open your online account?

A: Password

The ".gov" TLD can only be used by government agencies A: True

By default, Gmail will delete a message in the Trash after 30 days. A: True

Based on the spreadsheet above, give the answer to the following formula:

=A1*B5-A5 A: 950

The _____ is usually the name of the website that provides the email service. A: Domain part

The _____ of the email address is on the left. A: Local part

A Web A

is an Internet-based application that can be accessed using browsers.

A: Web Applications
The most common acts of _____ include posting inappropriate or banned contents, posting off topic
messages

A: Trolling

Web 1.0 websites are defined as read-only or _____ A: Static

Adware are browser add-ons that prevent advertisements from being displayed in your browser.

A: False

The _____ of an email address is on the right. A: Domain part

It is considered ok to use your phone in a movie theater as long as you use earphones

A: False

It is ok to post your passwords in your social media accounts so you won't forget them.

A: False

Ad-blockers are browser add-ons that prevent advertisements from being displayed in your browser.

A: True

The practice of tricking people into submitting their personal details is called _____. A: Phishing

By default, Gmail will delete a message in the Trash after 50 days. A: False
Web 1.0 websites are defined as static or _____ A: Read-only

People who send unwanted and unsolicited emails are called _____ A: Spammers

Data centers are centralized locations for _____ A: Servers

A link will open in a new tab if you click on it with your _____ A: Mouse wheel

Based on the spreadsheet above, give the answer to the following formula:

2. =D3/A3

A: 11.1

Based on the spreadsheet above, give the answer to the following formula:

=B2/C2+B4 A: 84

A group of programs used to create, edit, view, and print computer graphics is called a

A: Graphics suite

A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.

A: Productivity tool

Based on the spreadsheet above, give the answer to the following formula:

=B3*C1/B4

A: 3.75
People who try to cause trouble by posting inappropriate or banned contents and off-topic messages
are called _____

A: Trolls

.com stands for _____ A: commercial

_____ is the act of claiming someone else's work as your own. A: Plagiarism

All the forms of piracy are violations of _____ which is the legal right to own an original work.

A: Copyright What name is given to a network of servers that provide different services? A: Cloud

What is the name given to a program or a set of programs used to look for information in the internet.

A: Browser

Fake accounts that belong to the same person are called _____ A: Sock puppets

The ".gov" TLD was originally intended to be used solely by government agencies but today anyone can
purchase and use it.

A: False

2nd Attempt 46/50

Based on the spreadsheet above, give the answer to the following formula: =SUM(C1:C5) A: 75

A computer that does a task for other computers is called a A: Server


REPUBLIC ACT NO. 8293 is also know as _____ A: Intellectual Property Code of the Philippines

A _____ is a computer that does tasks for other computers. A: Server

_____ is a TLD that was created for online communities, open-source projects and non-profit entities.

A: .org

LibreOffice _____ is an example of a word processor A: Writer

A _____ can be a single program or a system of programs designed to look for information in the
Internet.

A: Web search engine

Recording live performances or broadcasts without permission from the owner is called _____.

A: Bootlegging

Web 1.0 websites are static A: True

LibreOffice Calc is an example of _____ A: Spreadsheet

_____ is a type of malware that causes unwanted advertisements to appear in your screen.

A: Adware

A household has four laptops but only dad's laptop has direct access to the internet. To share the
Internet connection, he turns his laptop into a Wifi hotspot for the rest of the family to connect to. In
this scenario, dad's laptop is the _____
A: Server

Websites that belong in different generations of the internet cannot co-exist in a given time period

A: False

Unwanted and unsolicited messages are called _____ A: Spam

You can use _____ to create multiple letters with the same body or message but are addressed to
different people.

A: Mail Merge

The alias that you use when you sign up in a website is called a _____. A: Username

_____ is a type of malware that is named after a fictional horse. A: Trojan

What is the name of the LibreOffice version with the latest features? A: LibreOffice Fresh

What is the sign that separates the two parts of the email address? A: At sign

In many cases, _____ occurs when someone uses a quote or a part of a published work without
mentioning who originally wrote it and which publication it belongs to.

A: Plagiarism

A program used to create, store, and manage data in tables. A: Spreadsheet


The vertical groupings in a spreadsheet are called _____. A: Collumns

The legal right to own an original work is called _____ A: Copyright

Information stolen via _____ such as credit card and bank account information can be used in identity
theft and stealing money.

A: Phishing

What do you call an application used for sending, receiving, and organizing emails? A: Email Client

The World Anti-Piracy Observatory is operated by _____ A: UNESCO

What do you call a program that is used to create, view, edit, and print documents? A: Word processor

In the spreadsheet application that you learned about, what sign is used for division? A: /

An office has one computer that is connected to a printer. It prints documents that are sent to it by
other computers via Local Area Network In this setup, the computer connected to printer is the _____.

A: Server

When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called _____

A: Streaming

REPUBLIC ACT NO. 8293 is also known as the World Anti-Piracy Observatory A: False

Based on the spreadsheet above, give the answer to the following formula:
4. =D1*B5+A5

A: 11150

_____ is a type of malware that does not need human action to spread A: Worm

The apps in your smart phone are web-based apps because they connect to the Internet.

A: True

Spam can spread when the infected computer makes contact with another computer. A: False

Some search engines have _____ features that can be used to do complex web search.

A: Advanced Search

Wiki is derived from the Hawiian work wikiwiki, which means _____ A: Quick

Adding information from a database to a document is called _____. A: Mail Merge

While typing a keyword in a search bar, _____ may appear below it. A: Suggestions

Based on the spreadsheet above, give the answer to the following formula: 2. =D3/A3 A: 11.1

A computer that receives a service in a network is called a _____ A: Client

REPUBLIC ACT NO. 8293, also known as the IP Code governs the protection of intellectual property and
online etiquette in the Philippines.

A: True
The _____ lists 15 types of works that are covered by copyright protection. A: Intellectual Property Code
of the Philippines

What is the name of word processor that we used in Chapter 5? A: LibreOffice Writer

_____ is a TLD that was originally intended for non profit entities. A: .org

Clicking on a search result using the _____ will open the link in a new tab. A: Mouse wheel

HTML stands for A: Hypertext Markup Language A centralized location for numerous servers is called a
_____ A: Data center

In a spreadsheet, a box in a table is called a _____. A: Cell

_____ is the sign that separates the 2 parts of an email A: @

Many trusted anti-virus companies give out free versions which are good enough to protect your
computer from malware True

All of the following types of malware can "infect" your computer except

Spam

Which of the following is not an Internet Browser? Safari

The unauthorized copying of the material support, labels, artwork and packaging is called

Counterfeiting

It's ok to play loud music in public as long as you only play popular songs. False
CC Stands for Carbon Copy

is a feature that can be used to make complex web search.

Advanced Search

is the act of forcing or intimidating someone into doing something that he/she does not want to.
Bullying

is the legal right to own an original work Copyright

Bcc stands for Blind Carbon Copy

apps are used to connect with other people and make interactions such as messaging, writing comments
and sharing pictures and videos.

Social Media

Multiple fake accounts are called Trolls

While typing a keyword in a search bar, _____ may appear below it.

= Suggestions

What is the name given to a program or a set of programs used to look for information in the internet.

= Web Search Engine

What is the name given to applications that allow people to interact with one another in online
communities

= Social Media

What is the name of the LibreOffice version with the latest features?
= LibreOffice Fresh

What do you call an application used for sending, receiving, and organizing emails?

= Email Client

Information stolen via _____ such as credit card and bank account information can be used in identity
theft and stealing money.

= Phishing

A _____ is a computer that does tasks for other computers.

= Server

_____ is a type of malware that does not need human action to spread

= Worm

A _______ is an Internet-based application that can be accessed using browsers.

= Web Application

Web 1.0 websites are static

= True

A centralized location for numerous servers is called a _____

= Data Center

Yahoo, Google, and Bing are examples of a _____.

= Web Search Engine

_____ is a type of malware that disguises itself as a harmless program or file.


= Trojan

The Hawaiian word wikiwiki, means _____

= Quick

A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.

= Productivity tool

What is the name of word processor that we used in Chapter 5?

= LibreOffice Writter

When you sign up to an app or website, you normally have to set an alias. This alias is called a _____.

= Alias

Unwanted and unsolicited messages are called _____

= Spamming

Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are web apps.

= True

What is the name given to software used to create, store and collections of information?

= Database management system

Websites from the 2.0 or later generations of the internet that can change their appearance and
behavior depending on the user's action, location, preferences, etc. are called _____ websites.
= Dynamic Websites

A website that allows users to edit its contents and structure is called a _____.

= Wiki

_____ is a type of malware that causes unwanted advertisements to appear in your screen.

= Adware

Other than the search bar, you can also enter your search keywords in your browser's _____.

= Address Bar

In the First Chapter, we visited the website of what 90's movie?

= space Jam

LibreOffice is an open-source _____

= Office productivity suite

With Google Chrome and Mozilla Firefox, you can make an online search by typing the keywords in the
_____

= Address Bar

When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called _____
= Streaming

_____ relies on users to contribute web contents.

= Social Media

Adware are browser add-ons that prevent advertisements from being displayed in your browser.

= False

The names of _____ are numbers

= Rows

A link will open in a new tab if you click on it with your _____

= Mouse Wheel

Data centers are centralized locations for _____

= Cloud

Web 1.0 websites are defined as read-only or _____

= Static

The most common acts of _____ include posting inappropriate or banned contents, posting off topic
messages
Select one:

= Trolling

_____ allows you to use multiple keywords and entire phrases and narrow down your search by
selecting language, region, date, etc.

= Advanced Search

Bcc Stands for

= Blind Carbon Copy

Web 2.0 websites are mostly dynamic

= True

While typing a keyword in a search bar, _____ may appear below it.

= Suggestions

What is the name given to a program or a set of programs used to look for information in the internet.

= Web Search Engine

What is the name given to applications that allow people to interact with one another in online
communities

= Social Media

What is the name of the LibreOffice version with the latest features?
= LibreOffice Fresh

What do you call an application used for sending, receiving, and organizing emails?

= Email Client

Information stolen via _____ such as credit card and bank account information can be used in identity
theft and stealing money.

= Phishing

A _____ is a computer that does tasks for other computers.

= Server

_____ is a type of malware that does not need human action to spread

= Worm

A _______ is an Internet-based application that can be accessed using browsers.

= Web Application

Web 1.0 websites are static

= True

A centralized location for numerous servers is called a _____

= Data Center

Yahoo, Google, and Bing are examples of a _____.

= Web Search Engine


_____ is a type of malware that disguises itself as a harmless program or file.

= Trojan

The Hawaiian word wikiwiki, means _____

= Quick

A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.

= Productivity tool

What is the name of word processor that we used in Chapter 5?

= LibreOffice Writter

When you sign up to an app or website, you normally have to set an alias. This alias is called a _____.

Unwanted and unsolicited messages are called _____

= Spamming

Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are web apps.

= True

What is the name given to software used to create, store and collections of information?
= Database management system

Websites from the 2.0 or later generations of the internet that can change their appearance and
behavior depending on the user's action, location, preferences, etc. are called _____ websites.

= Dynamic Websites

A website that allows users to edit its contents and structure is called a _____.

= Wiki

_____ is a type of malware that causes unwanted advertisements to appear in your screen.

= Adware

Other than the search bar, you can also enter your search keywords in your browser's _____.

= Address Bar

In the First Chapter, we visited the website of what 90's movie?

= space Jam

LibreOffice is an open-source _____

= Office productivity suite

With Google Chrome and Mozilla Firefox, you can make an online search by typing the keywords in the
_____

= Address Bar
When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called _____

= Streaming

_____ relies on users to contribute web contents.

= Social Media

Adware are browser add-ons that prevent advertisements from being displayed in your browser.

= False

The names of _____ are numbers

= Rows

A link will open in a new tab if you click on it with your _____

= Mouse Wheel

Data centers are centralized locations for _____

= Cloud

Web 1.0 websites are defined as read-only or _____

= Static
The most common acts of _____ include posting inappropriate or banned contents, posting off topic
messages

Select one:

= Trolling

_____ allows you to use multiple keywords and entire phrases and narrow down your search by
selecting language, region, date, etc.

= Advanced Search

Bcc Stands for

= Blind Carbon Copy

Web 2.0 websites are mostly dynamic

= True

Short Quiz 7

GIMP's official website is ______.

The correct answer is: gimp.org

In this chapter, what online document were you instructed to consult in order to learn more in-depth
details about GIMP?

The correct answer is: GIMP User Manual

In the exercise that we did, what tool did we use to add color to the entire background layer?
The correct answer is: Bucket Fill Tool

What image format is ideal for online use?

The correct answer is: JPEG

PNG stands for _____.

The correct answer is: Portable Network Graphics

The fonts in a word processor is an example of a _____

The correct answer is: Vector image

Today, GIMP stands for ______.

The correct answer is: GNU Image Manipulation Program

With _____, some of the data that makes up the image are discarded to make the make it smaller.

The correct answer is: Lossless compression

A _____ is composed of a grid of dots.

The correct answer is: Raster image

In GIMP, a/an _____ is considered as a single file such as a JPEG or a GIF

The correct answer is: Image


When GIMP was first released back in 1996, the G stood for _____

The correct answer is: GNU

JPEG stands for _____.

The correct answer is: Joint Photographic Experts Group

In this lesson, we learn about the unit of measurement for resolution. What is it called?

The correct answer is: Pixels per inch

GIF supports _____ colors.

The correct answer is: 256

PNG supports _____ colors.

The correct answer is: 16 million

When you create a new file, it will be displayed in the

The correct answer is: Image window

GIF stands for _____.

The correct answer is: Graphics Interchange Format


Reducing the size of a file is called _____

The correct answer is: Compression

Which image format is ideal for images with few colors and sharp edges?

The correct answer is: GIF

_____is the ratio between the size of the image in pixels and its physical size when printed on paper.

The correct answer is: Resolution

Short Quiz 8

The _____ is the series of steps or phases that web content has to go through before and after it is
published.

The correct answer is: Web Content Lifecycle

Which of the following qualifies as web content?

The correct answer is: All of these

Which of the following is true?

The correct answer is: Modern CMS's have collaborative environments, which allow multiple users to
work on a single project.

_____ is a software application or a set of software applications that is used to create, publish, and
manage online content.
The correct answer is: Content Management System

_____ is the process of planning, researching, creating, publishing, and maintaining information for
online publication.

The correct answer is: Web Content Development

A part of the Internet that is under the control of a particular person or group is called a _____.

The correct answer is: Domain

Outdated web contents are unpublished moved to a different location for future use. This practice is
called _____.

The correct answer is: Archiving

A _____ is a set of design elements such as font, colors and icons that work together to your blog a
certain style.

The correct answer is: theme

Text, sounds, images, videos, and other media that are published in a website are called ______.

The correct answer is: web content

SEO stands for _____.

The correct answer is: Search Engine Optimization

Which one is true?


The correct answer is: If the domain that you want is already taken, WordPress will suggest a name close
to the one that you chose.

Which of the following is true?

The correct answer is: Blogs can be hosted by a CMS for free.

Blog is short for _____.

The correct answer is: weblog

A website can promote its content by sending emails to potential viewers. This is called _____.

The correct answer is: Email Advertisement

You can give other websites permission to publish your content. This is called _____

The correct answer is: web syndication

Which of the following is true?

The correct answer is: As of 2016, there are more than 1 billion websites in the Internet.

Which one does not belong to the group?

The correct answer is: Archiving

After the web content is finished and approved for publication, we are now ready for the _____ stage.
The correct answer is: Deployment

Long Quiz 4

What is the name given to text, sounds, images, videos, and other media that are published in a
website?

The correct answer is: web content

A part of the Internet that is under the control of a particular person or group is called a _____.

The correct answer is: Domain

Traditional postal mail is also called _____.

The correct answer is: Snail mail

Bcc stands for _____.

The correct answer is: Blind Carbon Copy

The fonts in a word processor is an example of a _____

The correct answer is: Vector image

The 2 parts of an email address is separated by what sign?

The correct answer is: At sign


Software that are used to create new information like documents, spreadsheet, presentations are called
_____.

The correct answer is: Productivity tool

A program used to create, edit, and print documents is called a _____

The correct answer is: Word processor

Sent emails are found in the _____.

The correct answer is: Outbox

An app that is used to write, send and modify emails is called a/an _____.

The correct answer is: Email client

_____ is the arrangements of the elements of your blog.

The correct answer is: layout

The vertical groupings of cells in a spreadsheet are called _____.

The correct answer is: Columns

What type of compression discards some of the data that makes up the image?

The correct answer is: Lossless compression


Emails are stored in sections called _____.

The correct answer is: Folders

What is the name of word processor that comes with LibreOffice?

The correct answer is: Writer

Giving other websites permission to publish your web content is called _____.

The correct answer is: web syndication

A set of matching design elements such as fonts and colors is called a _____.

The correct answer is: theme

Blog is short for _____.

The correct answer is: weblog

What type of compression retains the quality of the image?

The correct answer is: Lossless compression

What image format is ideal for online use?

The correct answer is: JPEG


What do you call a form of communication that uses visual elements like text and pictures to express an
idea or send a message?

The correct answer is: Graphics design

PNG supports _____ colors.

The correct answer is: 16 million

Reducing the size of a file is called _____

The correct answer is: Compression

What is the name of the spreadsheet app that comes with Libreoffice?

The correct answer is: Calc

CC Stands for _____.

The correct answer is: Carbon Copy

Which image format was created as an open-source alternative?

The correct answer is: PNG

The part of the email address that is located on the right is called the _____.

The correct answer is: Domain part


Instead of being permanently erased, emails can be sent to the _____.

The correct answer is: Trash

The part of the email address that is located on the left is called the _____.

The correct answer is: Local part

What do you call a program or group of programs that is created by a community of developers and is
made available to the public for free?

The correct answer is: Open-source

_____ is the name given to several techniques used to make web content more visible to search
engines.

The correct answer is: Search Engine Optimization

A _____ is composed of a pixels

The correct answer is: Raster image

A _____ is a digital image composed of points, lines, and shapes.

The correct answer is: Vector image

Emails that were written but not sent are saved in _____.

The correct answer is: Drafts


A collection or a bundle of productivity tools is celled

The correct answer is: Office productivity suite

When GIMP was first released back in 1996, the G stood for _____

The correct answer is: GNU

Which of the following qualifies as web content?

The correct answer is: All of these

Short Quiz 9

FAQ stands for _____.

The correct answer is: frequently asked questions

As a free user, your Weebly domain will include _____.

The correct answer is: .weebly.com

_____ are grouped into categories such as Business, Personal, and Online Store.

The correct answer is: Themes

If you want to see information about the author or the owners of a website, the best place to look is in
the _____.
The correct answer is: About us

By using a/an _____, you can immediately fill your pages with matching elements.

The correct answer is: layout

In Weebly, what type of page is the most commonly used?

The correct answer is: Standard Page

The _____ is the interactive list that contains the names of the web pages in the website.

The correct answer is: navigation

Software tools called _____ can be used to create websites without having to deal with computer code.

The correct answer is: Website builders

The website's office address and phone number is normally found in the _____.

The correct answer is: contact section

In the activity at the end of this chapter, what's the name of the Weebly website that we made?

The correct answer is: empowertechlessons.weebly.com

The _____ is a section that displays a message such as "Register now!""Click here for more
information."or "Donate now."
The correct answer is: call to action

An online location that points to a group of web pages is called a _____

The correct answer is: website

The header is also known as the _____.

The correct answer is: masthead

In Weebly, text, image, gallery, and slideshow are called _____.

The correct answer is: Elements

Which of the following is TRUE?

The correct answer is: You can always change the theme of your website

The _____ usually contains links to Terms of Service and Copyright Information.

The correct answer is: footer

A _____ is important for websites that aim to get public response such as buying a product or
supporting an advocacy.

The correct answer is: call to action

The _____ takes up the largest space in the web page. It may contain articles, images, videos, etc.
The correct answer is: content section

What will you find written below the header of a new blank page?

The correct answer is: "Start with a Layout"

Weebly relies primarily on its _____feature to place and manipulate design elements.

The correct answer is: Drag-and-drop

The _____ is usually found on the top of the web page and contains the websites name and logo.

The correct answer is: header

Short Quiz 10

The Undo and the Redo buttons are located in the _____

The correct answer is: Top Menu

Which is NOT way to zoom in and out of the canvas?

The correct answer is: Press the Enter button

Moving around the canvas is called _____

The correct answer is: Panning

Where can you find the zoom in, zoom out, and home icon?
The correct answer is: middle-right part of the screen

In Prezi's home page, click the _____ to strt the signup process

The correct answer is: GET STARTED

What is the name of the presentation program that we learned about in this chapter?

The correct answer is: Prezi

The save button/icon is located in the _____

The correct answer is: Top Menu

What part of the Prezi editor can be used to change the frame's color?

The correct answer is: Transformation tool

After you have successfully signed up to Prezi, what will you see when you click Get Started?

The correct answer is: A short tutorial

Which of the following is NOT a good practice?

The correct answer is: Use different colors, fonts, and animations for each slide.

In this lesson which of Prezi's pricing plans were you instructed to use?

The correct answer is: Free


Which of the following is a good practice?

The correct answer is: Plan your design from the beginning and stick to it throughout your presentation.

In Prezi, you can use _____ to set the theme of your presentation without having to design it yourself

The correct answer is: Templates

What happens when you us your mouse's scroll wheel?

The correct answer is: You zoom in and out of the canvas

What do you click if you don't want to use a template in creating a new prezi?

The correct answer is: Start blank prezi

Unlike a slideshow that is made up of multiple slides, a prezi is just a single page or _____

The correct answer is: Canvas

The _____ is the order in which your frames are displayed.

The correct answer is: Path

Where can you click to add a textbox?

The correct answer is: Anywhere in the canvas


What is the main difference between free and paid Prezi accounts

The correct answer is: Everyone can view Prezis created using free accounts while those made using
paid accounts can be made private.

What is Prezi's official website?

The correct answer is: prezi.com

Long Quiz 5

_____ is Google Drive's main page.

The correct answer is: My Drive

ICT can be used to spread _____ by informing the public about important issues.

The correct answer is: Social Awareness

What is the name of the word processor that comes with Google Drive?

The correct answer is: Google Docs

What is the name of the cloud-based file storage and sharing service owned and operated by Google?

The correct answer is: Google Drive

Skype is an example of _____.

The correct answer is: Videoconferencing


_____ enables two or more people to send and receive short messages instantly.

The correct answer is: Online Chat

What is the name of the spreadsheet app that comes with Google Drive?

The correct answer is: Google Sheets

Circle, Bracket, Rectangle, and Invisible are types of _____

The correct answer is: Frame

A _____is a document that aims to persuade a person or a group to fund or sponsor a project.

The correct answer is: Concept Paper

What happens when you click the house icon on the right side of the screen?

The correct answer is: The whole canvas is displayed

Websites where people can post and reply to messages are called _____.

The correct answer is: Online Forums

What is the other name given to forums?

The correct answer is: Message boards


What do you call a website where contents can be edited by other members of the community?

The correct answer is: Wiki

The header is also known as the _____.

The correct answer is: masthead

The following are types of synchronous groupware except _____.

The correct answer is: Email

Instead of slides, the contants of a Prezi are all displayed in a single page or a _____.

The correct answer is: Canvas

_____ contains information that can be used to get in touch with the owners of the website.

The correct answer is: contact section

Which web application was created after the Haiti Earthquake?

The correct answer is: Google Person Finder

What is the name of the presentation app that comes with Google Drive?

The correct answer is: Google Slides

_____ are boxes in a prezi that act as slides.


The correct answer is: Frames

In Prezi, the pre-made designs that you can add to your presentation are called _____.

The correct answer is: Templates

FAQ stands for _____.

The correct answer is: frequently asked questions

What is the other name for groupware?

The correct answer is: Collaborative software

"Buy now!" "Click here download." And "Donate now." Are examples of _____.

The correct answer is: call to action

_____ is an organizational structure in which decision-making and leadership responsibilities are


distributed to every member of the team.

The correct answer is: Holacracy

_____ is a social media app feature that enables people from disaster-affected areas to mark themselves
as safe.

The correct answer is: Facebook Safety Check

What is the name given to a program or a set of programs used by people to work together and achieve
a common goal?
The correct answer is: Groupware

Which of Prezi's pricing plans were you instructed to use?

The correct answer is: Free

In Weebly, text, image, gallery, and slideshow are called _____.

The correct answer is: Elements

What part of a website is usually found at the top of the page and contains the website's name and
logo?

The correct answer is: header

A _____ is a document that asks for change or action to be made.

The correct answer is: Petition

The delivery of a topic to an audience using a combination of speaking and visual elements is called

_____.

The correct answer is: Presentation

Information shared using _____ are not instantly displayed to other members of the group.

The correct answer is: Asynchronous groupware


Links to Terms of Service and Copyright Information are often located in the _____.

The correct answer is: footer

A _____ is a list of web pages in your blog or website.

The correct answer is: Site map

A _____ is an online location that points to a group of web pages.

The correct answer is: website

What part of a website contains articles, images, videos, etc?

The correct answer is: content section

_____ can be used to coordinate time and schedule activities.

The correct answer is: Shared Calendar

Online applications have been developed for _____ during natural and man-made calamities.

The correct answer is: Disaster Response

_____ contains links to other web pages in the website.

The correct answer is: navigation


Learning Activity 11

_____is a cloud-based file storage and sharing service owned and operated by Google.

-Google Drive

Of all the applications that you have learned about in the previous chapters, which one looks a lot like
Google Sheets?

-LibreOfficeCalc

A/An _____ can be edited by members of an online community.

-Wiki

All the applications that we used in this chapter is owned by which company?

-Google

Which of the following is TRUE? Select one:

a. The only way to upload a file is by dragging and dropping it to the My Drive page

b. Google Drive can be accessed without a Google account

c. Some apps have both synchronous and asynchrounous features.

d. The only way to upload a file is to click the NEW button

-Some apps have both synchronous and asynchrounous features.

Short Quiz 11

_____is a cloud-based file storage and sharing service owned and operated by Google.

-Google Drive

_____ is practically an Internet-powered telephone service. -VoIP


_____ is Google's presentation app -Google Slides

Which of the following have a lot in common with Microsoft Excel?

-Google Sheets

_____ is Google Drive's word processor -Google Docs

_____ allows people to make voice calls through the Internet.

-VoIP

_____ is Google Drive's word processor

-Collaborative software

All the applications that we used in this chapter is owned by which company?

-Google

Which of the following cannot be used to share documents?

-None of these

Google Docs, Sheets, and Slides are collaborative _____. -Productivity apps

Learning Activity 12

A _____is a document that aims to persuade a person or a group to sponsor your project.

-Sales Pitch
In what part of the concept paper do you give a brief but clear description of the issue that you wish to
address? -Introduction

In your concept paper, in which part do you ask for permission to use school facilities? -Support

In what part of the concept paper do you state how your project can make a difference and who will
benefit from it?

-Purpose

During this stage, you present your accomplishments to the public.

-Release and Promotion

Short Quiz 12

ICT is used to inform the public about important issues with the goal of spreading _____.

-Social Awareness

Sending monetary donations via online money transfer is an example of how ICT can be used for _____.
-Charity

In this chapter, we learned about a team structure in which decision-making and leadership
responsibilities are distributed to every member of the team. What shape did we compare it to?

-Circle

In what part of the concept paper do you give a brief but clear description of the issue that you wish to
address? -Introduction
In what part of your concept paper do you include your email address?

-Contact Information

The Internet has proven to be an effective way to collect and share information during emergency
situations. Because of this, online applications have been developed for _____ during natural and man-
made calamities. -Disaster Response

We compared the traditional team structure to what shape?

-Triangle

_____ is a feature that is activated during and after natural and man-made disasters which enables users
in disaster stricken areas to let people know that they are safe.

-Facebook Safety Check

In this chapter, we learned about a team structure where every member gets to leader at some point.
What's it called?

-Holacracy

In what part of the concept paper do you explain you plan to accomplish your goal? -Description

Long Quiz 6

A biography of the author or owner of the website can most likely be found in the _____.

-Header

Which shape can Holacracy be compared to? -Circle


The horizontal groupings in a spreadsheet are called _____. -Rows

Received emails can be found in the _____.

-Inbox

Software tools called _____ can be used to create websites without having to deal with computer code.

-Website builders

A _____ is an alias that can be your name or a combination of your name, words and characters. -
Username

_____ is the act of illegally recording, copying, and/or distributing copyrighted works.

-Piracy

What is the process of adding information from a database to a word document?

-Mail Merge

A/An _____ is a destination where emails can be sent from or delivered to.

-Email address

You used your laptop open your Facebook account. In this scenario, your laptop is called a _____. -Client

What is the name of the presentation program that we learned about in Chapter 10?
-Prezi

What movement was able to collect millions of dollars and raise awareness about Lou Gehrig's Disease?
-ALS Ice Bucket Challenge

The act of tricking people into submitting their personal information is called _____.

-Phishing

A _____ is a group of characters that is used to unlock your account.

-Password

_____ are programs that can be accessed using an Internet browser. -Web applications

CAPTCHA stands for "Completely Automated Public Turing Test To Tell _____Apart"

-Computers and Humans

In wordPress, you are askedto select a _____ that best describes your website.

-Category

What do you call groupware that allow the sharing of information in real-time?

-Synchronous groupware

A university is most like to use which TLD? -.edu


What do you call people who send unwanted and unsolicited messages?

-Spammers

Which image format is ideal for images with few colors and sharp edges?

-Gif

_____ is the name given to the task done by a computer for other computers.

-Service

GIF supports _____ colors. -256

ICT can be used for _____ by sending donations through online money-transfer.

-Charity

_____ is an online petition website. -Change.org

VoIP stands for _____ -voice over Internet protocol

_____ is basically an Internet-powered telephone service. -VoIP

Second Quarter Exam

As a free user, ".weebly.com" will be included in your Weebly website address.

-True
Paid ads, email advertising and web syndication are strategies used in ( ), which is a step in Web Content

Lifecycle? -Promotion

_____ is a lot like using a telephone except it is powered by the Internet

-VoIP

( ) is the second step in Web Content Lifecycle -Creation

In Prezi, _____ is used to move around the canvas -Panning

The ( ) mode is GIMP's default mode. -Single-Window Mode

( ) is Google Drive's main page where you can access your files and files that others have shared with
you. -My Drive

A GIMP file can have one or several ( ) which are stacked on top of each other.

-Layers

In a _____ each member can have the chance to lead at some point.

-Holacracy

In Weebly, the ( ) is first page that you will see after you log in.

-Dashboard or Homepage

Prezi uses _____ instead of slides -Canvas

( ) is the name of the CMS that was discussed in Chapter 8.


-Content Management System

Which of the following is a word processor? -Weebly

_____is measured in ppi -Resolution

A web content that is published in a blog is called a ( ). -Post

Web syndication is used to measure the popularity of websites and web contents.

-False

In GIMP, the parts of the image that are isolated are called _____ -selection

A _____ is a collection of web pages that can be accessed through the Internet. -website

( ) is the fifth step in Web Content Lifecycle -Maintenance

The ( ) is at the bottom of the web page and displays important information such as Terms of Service,
Copyright information, FAQ's, etc.

-Footer

( ) is the method of reducing the file's size.

-Compression

The ALS Ice Bucket Challenge was used to raise social awareness and gather donations for the research
about Lou Gehrig's Disease.

-True

In the first step of creating a Wordpress blog, you have to choose a ( ) that best describes the type of
contents that you will be creating.
-Category

In GIMP, the ( ) displays the image that the user is currently working on

-Image window

( ) is an image format that is ideal for images with sharp edges and few colors such as letters and logos.

-GIF

Text, sounds, images and videos that are published online are called

-web content

A ( ) is a message or instruction that urges the users to do something. Examples are "Click here" or
"Watch this video".

-Call to Action

Traffic signs, product logos, and posters are examples of -Graphics design

_____ is a file storage and sharing service that can be used by anyone with a Google account.

-Google Drive

Web contents are planned, created, and published using which process?

-Web Content Lifecycle

A _____ is composed of pixels -Raster Image


_____ is a Facebook feature that is activated during and after natural and man-made disasters. -Safety
Check

_____ is used instead of permanently deleting old and outdated web contents.

-Archiving

PNG supports 16 million colors -True

As of 2016, there are over 1 billion websites in the Internet

-True

At the bottom of GIMP's ( ), you will see the foreground and background colors. -Main Toolbox

The ( ) mode is another GIMP mode which is not the default

-Single-Window Mode

Prezis created using free accounts can be viewed by pther people without the owner's permisiion -True

PPI stands for _____ -Pixels per inch

An app cannot be synchronous and asynchrounous at the same time.

-True

Which of the following can be used to create a blog? -WordPress


_____ is a web-based presentation program. -Prezi

The only way to sign up to Change.org is by using your email address

-False

_____ does not allow real-time information sharing -Asynchronous groupware

_____ is another name for Collaborative Software -Groupware

Files made using _____ can be downloaded in Microsoft Excel or PDF format -Google Sheets

Which of the following can be used to create and sign petitions?

-Change.org

Google Drive app similar to Microsoft Powerpoint -Google Slides

WeeblyWhich of the following can be used to build a website?

-Weebly

Weebly is an example of software tools called -Website builder

A web content that is published on a blog is called a _____.

-c. post
A _____ is composed of points, lines, and shapes.

-Vector Image

At the bottom of the ______, you will find the foreground and the background colors.

-C, main toolbox

Web _____ is the number of visitors in a website and the number of web pages that they visit.

-web traffic

During the _____ stage, old web contents are either deleted or archived.

-retirement

Which of the following is not found in the top menu?

-add frame

Which one is true?

-c. Web traffic is used to measure the popularity of websites and web contents.

What can you use to change the frame type?

-a. Transformation tool

When creating a WordPress blog, the first step is to select a _____ that best describes your website.
-category

Once you're done creating or editing your Weebly website, what button do you click to make your
website available to the public?

- A.) PUBLISH

Groupware that allow the sharing of information in real-time are called _____.

- Synchronous groupware

Google Drive's main page is called _____

-My drive

Which of the following is NOT a feature of Google Docs?

-d. Your documents are automatically downloaded as MS Word or PDF

The website's articles, images, videos, and other media are normally located in the _____.

-navigation

You can use _____ to send short messages which will be instantly seen by the other party

-online chat

During which stage do you execute your planned tasks and activities?

- Development

FAQ stands for frequently asked questions


-true

Online forums are also called _____

-message boards

_____ allows 2 or more people to communicate through real-time audio and video.

-videoconferencing

What is the name of the web-based word processor that we learned about in Chapter 11?

-google docs

You cannot edit uploaded Microsoft Word files using Google Docs.

-true

_____ is an open source graphics editor

-gimp

_____ is an open source web application created by volunteer engineers after the Haiti earthquake.

-google person finder

Which Google Drive productivity tool is similar to Microsoft Excel?

-google slides
You can sign up to Change.org using your Facebook account

_____ is the practice of moving outdated web content away from the main website.

-archiving

In Prezi, the action of moving around the canvas is called _____

-panning

What do you call text, sounds, images, videos, and other media that are published online?

-web content

GNU is the name of the organization that created GIMP.

-true

_____ is the delivery of a topic to an audience using a combination of speaking and visual aids.

-presentation

What is the name of the online petition site that we learned about in Chapter 12?

-changes.org

To persuade a person or a group to sponsor your project, you have to write a _____.
-Concept Paper

Unlike a slideshow that is made up of multiple slides, a prezi is composed of a single page called a _____

-b. Frame

A _____ is a program or a set of programs used by people to achieve a common goal.

-groupware

The Presentation app included in Google Drive is called _____.

-google slides

Groupware is also known as _____

- Collaborative Software

What web-based presentation program did we use in Chapter 10?

-prezi

The unit unit of measurement for image resolution is called _____

-pixels per inch

Prezis created using free accounts can be viewed by anyone while paying users can make their
presentations private.

-false
_____ is a social media feature that is activated during and after natural and man-made disasters which
enables users in disaster stricken areas to let people know that they are safe.

-facebook safety check

A team structure where leadership responsibilities can be given to different members of the team is
called a _____.

-Team environment

In GIMP, you can make a _____ by isolating an area of the image so that your actions will apply to that
area alone.

-selection

_____ is the practice of giving other websites the permission to publish your original contents.

-web marketing

What is the name of Google Drive's word processor

-Google Docs

GIF supports 16 million colors

-false

What is the name of Google's cloud-based file storage and sharing service?

-google drive

_____ is a form of communication that uses visual elements like text and pictures to express an idea or
send a message.
-Graphics design

Software tools that are used to create websites without having to deal with computer code are called
_____.

-Website Builder

_____ is a technology that enables two or more people to send and receive short messages instantly.

- D. online chat

With _____, the quality of the file is retained.

=lossless

You can give other websites permission to publish your content. This is called _____.

=web syndication When creating a WordPress blog, you have to select a ______ that best describes
what your blog is about. Select one:

=Layout

By default, the _____ can be found below the main toolbox

=Tool options

The _____ determines how the parts of your blog will be arranged.

=layout

_____ are horizontal groups of cells.

=coloumn
_____ are vertical groups of cells.

=rows

_____ are used by groups to coordinate time and schedule activities.

=shared calendar

Which of the following can be launched from My Drive?

=all of the choices

Which of the following program is a lot like Google Docs?

= Microsoft Powerpoint

What is the URL that you should use to directly access My Drive?

= drive.google.com

Visit the _____ if you want to know how to get in touch with the owner(s) of the website.

=contact section

Apps like Person Finder and Safety check are designed for _____.

= Disaster Response

In this chapter, we learned about a movement that was able to collect millions of dollars and raise
awareness about Lou Gehrig's Disease. What is this movement called?

= ALS Ice Bucket Challenge


Which of the following is NOT a type of synchronous groupware?

= Email

What content management system did we use to create a blog?

=wordpress

The ALS Ice Bucket Challenge was used to raise social awareness and gather donations for the treatment
of the ZIKA Virus.

Select one:

True

In Chapter 9, we learned to use a website building tool. What is it called?

=weebly

___ is the total number of visitors in a website and the number of web pages that they visit.

Select one:

a. Web traffic

Holacracy can be compared to what shape?

Select one:

a. Triangle

PNG Can only recognize 256 colors


Select one:

False

REMEDIAL EXAM

Give the shortcut keys of the following actions: New Document.

The correct answer is: Ctrl + N

Give the shortcut keys of the following actions: Underline.

The correct answer is: Ctrl + U

It is a type of malware that launches unwanted advertisements in the internet browser of your desktop.

The correct answer is: ADWARE/adware

It is the fraudulent practice of stealing important information from users such as passwords, pin codes,
and credit card numbers.

The correct answer is: PHISHING

Which of the following is NOT true about passwords?

The correct answer is: Passwords should not be memorized

The URL and design of a website's homepage changes depending on the preferences of the current user.
This website is _____
The correct answer is: Dynamic

Which of the following does not need human action to spread?

The correct answer is: Worm

You had to enter your email address in order to play a free game. A few dayslater, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of ______

The correct answer is: Spam

The original smartphone OS; used by Nokia devices.

The correct answer is: SYMBIAN/ Symbian

A _____ is a type of malware that automatically spreads in a computer or a system even without human
interaction.

The correct answer is: Worm

This refers to the feature where users can categorize and locate information through tagging.

The correct answer is: Folksonomy

Give the shortcut keys of the following actions: Right Alignment .

The correct answer is: Ctrl + R


It is use in Apple devices such as iPhone and iPad.

The correct answer is: iOS/ ios

A number format the puts a dollar symbol before each value by default.

The correct answer is: Accounting

A website that contains articles written by users and can be edited by other users is called a _____.

The correct answer is: Wiki

_____ is a type of malware that is disguised as a harmless or useful program or file.

The correct answer is: Trojan

A network of servers that work together to provide a centralized service is called a _____.

The correct answer is: Cloud

A Web 3.0 characteristic in which users are always connected to the Internet.

The correct answer is: Ubiquitous

Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a _____

The correct answer is: Trojan


A closed source and proprietary operating system developed by Microsoft.

The correct answer is: WINDOWS PHONE OS / Windows Phone OS

This is where one writes the text in the MS PowerPoint Presentation.

The correct answer is: Slide

A _____ is a computer that does a task for other computers.The correct answer is: Server

These websites allow user to post their content. Other users are able to comment on the said topic.

The correct answer is: BLOGS AND FORUMS / Blogs and Forums

PNG is a file extension for pictures which can be transported on the Internet at a faster rates. PNG
stands for Answer: Portable Network Graphics

Portable Netw ork Graphic .

The correct answer is: Portable Network Graphics

It is unwanted and solicited message / email.

The correct answer is: SPAM

Which of the following is not a factor that can be used to determine a source's credibility?

The correct answer is: The article's length


PowerPoint presentation is a form of Answer: visual aid visual aid

The correct answer is: Visual Aid

Which of the following is not a malware?

The correct answer is: Ad blocker

It is a type of malware that launches unwanted advertisements in your internet browser of your desktop

The correct answer is: ADWARE / adware

Clicking on a search result using the _____ will open the link in a new tab.

The correct answer is: Mouse wheel

These are sites that allow you to upload and share media content like images,music and video.

The correct answer is: MEDIA SHARING / media sharing

Give the shortcut keys of the following actions: Open.

The correct answer is: Ctrl + O

Give the shortcut keys of the following actions: Paste.

The correct answer is: Ctrl + V

The keyboard shortcut in inserting Hyperlinks is Answer: Ctrl + K Ctrl + K


The correct answer is: CTRL + K

Give the shortcut keys of the following actions: Justify.

The correct answer is: Ctrl + J

Give the shortcut keys of the following actions: Bold.

The correct answer is: Ctrl + B

It is the synergy of technological advancements to work on a similar goal or task. For example, besides
using your personal computer to create word documents, you can now use your smartphone.

The correct answer is: CONVERGENCE

Give the shortcut keys of the following actions: Center Alignment

The correct answer is: Ctrl + e / Ctrl + E

Which of the following is NOT true?

The correct answer is: A spam is a type of virus

It is considered as a type of virus. Like a virus, it can make copies of itself in computers that it comes in
contact with

The correct answer is: WORM / Worm


Which of the following is NOT true?

The correct answer is: Google's only server is located in California

is your alias, which is used by websites to represent your online presence.

The correct answer is: Username

Give the shortcut keys of the following actions: Italic.

The correct answer is: CTRL + I / Ctrl + I

Give the shortcut keys of the following actions: Cut.

The correct answer is: Ctrl + X

_____ is a program that is designed to cause harm to your computer or device The correct answer is:
virus

A _____ is a program that is designed to cause harm to your computer or device

The correct answer is: virus

This is a more complicated way of phishing where exploiting the DNS system happens.

The correct answer is: pharming

Give the shortcut keys of the following actions: Select All.


The correct answer is: Ctrl + a / Ctrl + A

These are sites that allow you to store and manage links to various website and resources. Most of these
sites allow you to create a tag and that will allow you to easily share them.

The correct answer is: BOOKMARKING SITES

What image compression/file type is capable of displaying simple animation?

The correct answer is: GIF

Which of the following is not a search engine?

The correct answer is: Advanced Search

It is a movement led by the World Wide Web Consortium.

The correct answer is: SEMANTIC WEB

These are sites that allow users to post their own news items or links to other news sources. The users
can also comment on the post and comments may also be through commentaries. These are sites that
focus on short updates from the user. Those that subscribed to the user will be able to receive these
updates.

The correct answer is: SOCIAL NEWS

A function that gets the average of a range of cells.

The correct answer is: average


Which of the following is TRUE?

The correct answer is: Mobile phone apps are native apps because they are installed

Several Problems Why Web 3.0 is Yet to be Fully Realized

The correct answer is: Folksonomy

You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is
a _____

The correct answer is: Client

Which of the following details is NOT essential in citing a source

The correct answer is: name of the researcher

This is the operating system of Apple phones.

The correct answer is: iOS

This is a browser feature that is synonymous to "private" browsing.

The correct answer is: incognito

Give the shortcut keys of the following actions: Undo.

The correct answer is: Ctrl + z / Ctrl + Z


This a website, application, or online channel that enables web users to create, co-create, discuss,
modify, and exchange user generated content.

The correct answer is: SOCIAL MEDIA / Social media

Give the shortcut keys of the following actions: Save Document.

The correct answer is: Ctrl + S

You can go to google.com.ph to make a/an _____

The correct answer is: Basic search

_____ apps are used to connect with other people and make interactions such as messaging, writing
comments and sharing pictures and videos.

The correct answer is: Social Media

.edu stands for

The correct answer is: education

.info stands for

The correct answer is: information

While you are typing your keyword in the address bar or the search bar, several _____ may appear
bellow it

The correct answer is: Suggestions


This is a feature that allows the person to create documents and combine or merge them with another
document.

The correct answer is: Mail Merge

These are sites that allows you to connect with other people with the same interests or background.
Once the user creates his / her account, he / she can set up a profile, add people, share content, etc.

The correct answer is: SOCIAL NETWORKS

What button allows you to see the result of your mail merge even before youprint or send it out?

The correct answer is: Preview Results

Give the shortcut keys of the following actions: Copy.

The correct answer is: Ctrl + C

According to this magazine, three Philippine cities are part of the top 10 in their research about "The
Selfiest Cities Around the World."

The correct answer is: Time / Time magazine

Wiki is derived from the Hawiian work wikiwiki, which means _____

The correct answer is: Quick

Give the shortcut keys of the following actions: Print.


The correct answer is: Ctrl + P

A task that is done by a computer for another computer is called a _____

The correct answer is: Service

_____ is the most common TLD

The correct answer is: .com

Which of the following TLD's is most likely to be owned by a university?

The correct answer is: .edu

Several of these devices are capable of using high – speed internet. Today the latest model devices use
4G Networking(LTE), which is currently the fastest mobile network.

The correct answer is: MOBILE TECHNOLOGIES

Give the shortcut keys of the following actions: Left Alignment.

The correct answer is: Ctrl + L

The best approach to filter out unwanted information using search engines.

The correct answer is: Advanced Search

Originally used in smartphones; now used in Smart TVs.


The correct answer is: WebOS

.com, .edu, and .net are examples of _____

The correct answer is: Top-level domain

Which of the following is TRUE about Cloud-based services?

The correct answer is: Some cloud-based services can be used for free

In our lesson, we visited the website of which movie?

The correct answer is: Space Jam

_____ Internet-based networks that are used to store, manage, and share resources and information

The correct answer is: Cloud Computing

The cloud enables people in different locations to work on the same project. This enables _____.

The correct answer is: Better collaboration

_____ websites encourage user participation by allowing them share videos, music, articles, etc.

The correct answer is: Web 2.0

It is an open source OS developed by Google. Being open source means this mobile phone companies
use this OS for free.
The correct answer is: ANDROID / Android

A program designed to create spreadsheets which can later be used to analyzestatistical data.

The correct answer is: MS Excel

It is a type of malware that disguises itself as a useful and / or harmless program or file.

The correct answer is: TROJAN

Computers can create data and make decisions based on the user's actions through _____

The correct answer is: Machine Learning

Pinterest is a social media website that can be classified as Answer:

bookmarking site

bookmarking s

The correct answer is: bookmarking site

Which of the following statements is NOT true?

The correct answer is: Only your full name can be used as a username.

Which of the following should not be shared with anyone?

The correct answer is: Password


_____ are programs that are directly installed in a computer or device

The correct answer is: Native applications

Give the shortcut keys of the following actions: Redo.

The correct answer is: Ctrl + Y

This media is designed to help people who have visual and reading impairments.

The correct answer is: Assistive

A provision that allows you to use copyrighted work without consent with certain limitations.

The correct answer is: Fair Use

It provides a common framework to allow data to be shared and re-used across platform, enterprise,
and community boundaries.

The correct answer is: Semantic Web

You might also like