You are on page 1of 32

Multiple Choice Questions:

2. An application suitable for sequential processing is


a. Processing of grades
b. Payroll processing
c. Both a and b
d. All of above

3. Which of the following is not processing?


a. arranging
b. manipulating
c. calculating
d. gathering

4. The digital computer was developed primarily in


a. USSR
b. Japan
c. USA
d. UK

5. Software in computer
a. Enhances the capabilities of the hardware machine
b. Increase the speed of central processing unit
c. Both of above
d. None of above

7. Before a disk drive can access any sector record, a computer program has to provide the
record’s disk address. What information does this address specify?
a. Track number
b. Sector number
c. Surface number
d. All of above

8. The arranging of data in a logical sequence is called


a. Sorting
b. Classifying
c. Reproducing
d. Summarizing

9. What is the responsibility of the logical unit in the CPU of a computer?


a. To produce result
b. To compare numbers
c. To control flow of information
d. To do math’s works
10. Abacus was the first
a. electronic computer
b. mechanical computer
c. electronic calculator
d. mechanical calculator

12. Instructions and memory address are represented by


a. Character code
b. Binary codes
c. Binary word
d. Parity bit

13. The terminal device that functions as a cash register, computer terminal, and OCR
reader is the:
a. Data collection terminal
b. OCR register terminal
c. Video Display terminal
d. POS terminal

15. People often call ______ as the brain of computer system


a. Control Unit
b. Arithmetic Logic Unit
c. Central Processing Unit
d. Storage Unit

1. One of the services, that can be used on the Internet and refers to browsing and
searching content in the form of web pages, is called:
a. LAN
b. FTP
c. WWW
d. ISDN

2. Which of the following is not a hardware?


a. Printer
b. Internet browser
c. Network Card
d. Monitor

3. Which of the following devices is used for printing blueprints?


a. Touch-screen
b. Scanner
c. Plotter
d. Digital camera

4. Software for digital photo editing is called:


a. OpenOffice.org
b. Adobe Photoshop
c. Microsoft Office
d. Mozilla Firefox

5. Which of the following would be the typical size of a hard disk?


a. 1 byte
b. 130 MB
c. 70 kilobytes
d. 80 GB

6. Which of the following is not an operating system?


a. OpenOffice.org
b. DOS
c. Linux
d. Windows XP

7. What type of computer application is used for calculations?


a. Antivirus software
b. Databases
c. Spreadsheet calculation program
d. Internet browser

8. Which of the following is not application software?


a. OpenOffice.org
b. Mozilla Firefox
c. Sophos Antivirus
d. Windows Vista

9. Computers in a firm are connected to a network, so the staff could work together on
files and share printers. That network is called:
a. LAN
b. FTP
c. WAN
d. ISDN

10. Which of these concepts describes the use of the Internet intended for sending and
receiving e-mails?
a. e-data exchange
b. e-commerce
c. e-mail
d. e-retail

11. What is the name of the software, which is a core program on a computer, and is
automatically loaded when the computer is turned on?
a. Shareware
b. Freeware
c. Operating system
d. Licensed software

12. Hardware component that integrates other components into a computer is:
a. Motherboard
b. Graphics card
c. Hard disk drive (HDD)
d. Keyboard

13. Physical parts of the computer are called:


a. Hardware
b. Network computer
c. Personal Computer – PC
d. Software

14. Acronym for Integrated Services Digital Network is:


a. PSTN
b. WWW
c. ISDN
d. ADSL

15. Type of malware, that can replicate autonomously and can corrupt data on your
computer, is called:
a. Mouse
b. Worm
c. Lion
d. Sparrow

16. Copyright –
a. inhibits software piracy
b. protects software against viruses
c. disables the firewall
d. protects software author's rights (from unauthorized copying and distribution)

17. What type of applications are used to protect your computer from viruses?
a. Antivirus software
b. Databases
c. Spreadsheet calculation program
d. accounting program

18. Which of the following is the best way to protect your computer against data loss?
a. Create database
b. Create backup copies on storage media
c. “Surfing” the Internet
d. Often change password
19. Which of the following is not a medium for data storage?
a. Keyboard
b. Hard disk
c. USB Stick
d. DVD disk

20. Every computer connected directly to the network via cable or a phone line, with at
least one computer, is called:
a. Hardware
b. Network computer
c. Personal Computer – PC
d. Software
1. Due to virus threat, we should not:
a. connect computer to the Internet or any other computer network
b. installs anti-virus programs that are used to detect viruses on the computer
c. open e-mails and pages from an unknown sender
d. change passwords

2. Which of the following is not a software?


a. Printer
b. Internet browser
c. Windows 95
d. Operative system

3. The most common health problems, associated with computer use, do not include:
a. Sprain (dislocation)
b. Spinal problems d
c. Visual impairment
d. Virus infection

4. Tasks that are more suitable for a human than a computer


a. tasks that are repetitive and easy to automate
b. mathematical operations
c. understanding the context of the situation
d. hazardous situations

5. Which of the following is not a benefit of teleworking


a. reduced travel time to work or it is not needed
b. lack of human contact
c. increased ability to concentrate on the job
d. flexible working hours

6. The symptoms of virus infected computers do not include:


a. slow performance
b. faster performance
c. cessation of response to commands
d. crash and re-start the operating system

7. Monitor is:
a. input device
b. input and output device
c. output device
d. none of these answers

8. Which of the following is used for safely shutting the computer down?
a. Control Panel
b. My computer
c. Start menu
d. Internet Explorer or Mozilla Firefox

9. What is the function of Firewall?


a. organizes the software installed on your computer
b. creates complex documents
c. monitors and enables control of incoming and/or outgoing data traffic
d. does complex accounting calculations

10. One of the advantages of e-mail is:


a. working hours are 9 - 19 every day
b. it is always available
c. allows face-to-face contact
d. viruses are commonly spread through e-mail attachments

1. A process is a ________.
a. single thread of execution.
b. program in the execution.
c. program in the memory.
d. task

2. The word processing feature that catches most random typographical errors and
misspellings is known as __________.
a. Grammar checker
b. Spell checker
c. Word checker
d. None of these

3. What is the smallest unit of the information?


a. A bit
b. A byte
c. A block
d. A nibble
Answer: A

5. Which of the following programs enables you to calculate numbers related to rows and
columns
a. Window program
b. Spreadsheet program
c. Graphics program
d. Word program

6. Which of the following is structured programming techniques that graphically


represents the detailed steps required to solve a program?
a. Object-oriented programming
d. Pseudocode
c. Flowchart
d. Top-down design

7. Which of the following is an output device?


a. Keyboard
b. Mouse
c. Light pen
d. VDU

8. Which of the following is an input device?


a. Plotter
b. Printer
c. VDU
d. Mouse

9. BIOS is used
a. By operating system
b. By compiler
c. By interpreter
d. By application software

10. The central processing unit is located in the _________.


a. Hard disk
b. System unit
c. Memory unit
d. Monitor

11. Which type of program act as an intermediary between a user of a computer and the
computer hardware?
a. Operating system
b. User thread
c. Superuser thread
d. Application program
Answer: A

12. What is the speed of computer measured in?


a. Nanoseconds
b. Kilo-seconds
c. Gigahertz
d. Megabytes

13. Which of the following software applications would be the most appropriate for
performing numerical and statistical calculations?
a. Database
b. Document processor
c. Graphics package
d. Spreadsheet

14. Which of the following is not considered hardware?


a. Operating system
b. CPU
c. Keyboard
d. Hard disk

15. Which of the following is exclusively a sequential access storage device?


a. Hard disk
b. Floppy disk
c. Magnetic tape
d. DVD

16. What is five main components of computer system?


a. CPU, CD-ROM, Mouse, Keyboard, Sound card
b. Memory, Video card, Monitor, Software, Hardware
c. Modem, Keyboard, Word Processor, Printer, Screen
d. CPU, Memory, System bus, Input, Output

17. Which of the following numbers is a binary number?


a. 1 and 2
b. 0 and 0.1
c. 2 and 0
d. 0 and 1

18. Which of the following statement is correct regarding a template prepared by a word
processing package?
a. Any document can be saved as a template.
b. Default template is used when you create a new file.
c. Many templates contain text that gives one advice on how to use the template.
d. Default settings are reflected by the normal document template and cannot be
overwritten.
Answer: A

19. Which of the following is not input device?


a. Keyboard
b. Mouse
c. Speaker
d. Scanner

20. The central processing unit is located in the _________.


a. Hard disk
b. System unit
c. Memory unit
d. Monitor

1. An electronic device for storing and processing data.


a. Server
b. Computer
c. TV
d. CPU

2. The physical parts of a computer and related devices. Examples: Internal devices which
include motherboards, hard drives, and RAM; external devices which include monitors,
keyboards, mice, printers and scanners.
a. Hardware
b. Software
c. Physical Structure
d. MAC

3. Set of instructions that tells the hardware what to do. It is what guides the hardware and
tells it how to accomplish each task.
a. Hardware
b. CPU
c. Software
d. Motherboard

4. Software application for accessing information on the World Wide Web.


a. Web Browser
b. Search Box
c. Search Engine
d. GUI

5. Small handled input device that controls a computer screen’s cursor or pointer in
conjunction with the way it is moved on a flat surface.
a. Apple watch
b. Mouse
c. Wearables
d. Video Card

6. A computer designed for use by one person at a time. In its more general usage, this
device is a microcomputer designed for use by one person at a time.
a. Laptop
b. Specialized computer
c. Personal computer
d. Desktop

7. A computer suitable for use at an ordinary desk.


a. Desktop computer
b. Laptop
c. MAC
d. PC

8. A computer that is portable and suitable for use while travelling.


a. Mouse
b. Laptop
c. Desktop Computer
d. Specialized Computer

9. Also known as a computer chassis, tower, system unit, CPU, or cabinet, is the enclosure
that contains most of the components of a personal computer (usually excluding the
display, keyboard, and mouse), except.
a. Tower
b. Computer Case
c. Desktop Computer
d. Desktop Case

10. An output device that displays information in pictorial form.


a. Printer
b. Monitor
c. Projector
d. TV

11. Input device that allows a person to enter letters, numbers, and other symbols into a
computer. It is one of the most used input devices for computers.
a. Tablet
b. Apple Phone
c. Keyboard
d. Wearable

12. Portable computer that uses a touchscreen as its primary input device. These devices
are slightly smaller and weigh less than the average laptop.
a. MAC
b. Laptop
c. Tablet
d. Wearable

13. Computer that provides data to other computers. It may serve data to systems on a
local area network (LAN) or a wide area network (WAN) over the internet. Each type runs
software specific to the purpose of the server.
a. Computer
b. Server
c. Game consoles
d. All-in-One computer

14. A mobile phone that performs many of the functions of a computer, typically having a
touchscreen interface, internet access and an operating system capable of running
downloaded applications.
a. Smartphones
b. Tablet
c. Video Card
d. Game Consoles

15. A digital television that is essentially, an internet-connected, storage-aware computer


specialized for entertainment.
a. TV
b. Smartphone
c. Tablet
d. Laptop

1. Hardware is the ________.


a. Parts of the computer that can’t be seen.
b. Parts of the computer that can be seen
c. None of these.

2. Software is the __________.


a. Parts of the computer that can’t be seen
b. Parts of the computer that can be seen
c. None of these.

3. Which of the following is the Software?


a. Monitor
b. MS Paint
c. Hard Disk

4. Which one of the following is not an example of Software?


a. MS Word
b. Monitor
c. MS Paint
5. ALU stands for __________.
a. Algorithm logical unit
b. Automatic logical unit
c. Arithmetic logic unit

6. CU stands for _________.


a. Compressed unit
b. Color unit
c. None of these.

7. A microprocessor is __________.
a. A combined unit of monitor and keyboard.
b. A combined unit of ALU and CU.
c. A combined unit of CPU and UPS.

8. Find the odd one:


a. MS word
b. MS paint
c. System Software

9. Find the odd one:


a. Monitor
b. Software
c. CPU

10. Which part is known as Backbone of the Computer?


a. CPU
b. Mother Board
c. Software

11. Which of the following is required to run MS Paint?


a. Application software
b. System software
c. Multimedia software

12. _______ is the brain of the computer.


a. Monitor
b. Software
c. CPU

13. ________ is the set of instructions.


a. Application Software
b. System Software
c. Both a and b
Answer: C
14. Which of the following is the part of CPU?
a. ALU
b. CU
c. Both 1 and 2

15. CPU stands for ________.


a. Control processing unit
b. Central processing unit
c. Computer processing unit

1. ________ can be reinstalled when it is damaged.


a. Software
b. Hardware
c. CPU
d. UPS

2. ________ is an example of an operating system.


a. CPU
b. ALU
c. Windows
d. CU

3. ALU is the part of ________.


a. Hard disk
b. Mother board
c. CPU
d. UPS

4. _______ is used to take pictures and supplies to the computer.


a. Modem
b. Microphone
c. Digital camera
d. None of these

5._______ is present on the motherboard


a. UPS
b. CPU
c. Web camera
d. None of these

6. Graphic tablet is a/an ________.


a. Input device
b. Output device
c. Process
d. None of these

7. MICR stands for ________.


a. Magnetic indicator camera recorder
b. Memory induced card recognition
c. Magnetic ink chips recognition
d. Magnetic ink character recognition

8. The chip/chips present on the motherboard is/are:


a. RAM
b. ROM
c. MICR
d. Both a and b

9. RAM stands for _________.


a. Read access memory
b. Random access memory
c. Read access modem
d. None of these

10. ROM stands for ________.


a. Read only memory
b. Reusable only memory
c. Read only modem
d. None of these

11. Which of the following is a data storage device?


a. RAM
b. ROM
c. Hard disk
d. None of these

12. OS stands for _______.


a. Output system
b. Operating system
c. Output software
d. Operating software

13. DBMS stands for _______.


a. Database mouse system
b. Database mounted software
c. Database management system
d. Database management software
Answer: C

14. Multimedia software helps in ________.


a. Allowing users to manipulate
b. Allowing users to create new designs and layouts of books and journal
c. Allowing users to combine images
d. Allowing users to store a large amount of data.

15. Computer understands machine language which comprises of:


a. Zeroes
b. Ones
c. Twos
d. Both 1 and 0

1. A small program that gets installed on a computer while browsing the Internet. The
basic function of active content is to provide an interactive Internet experience through
videos and toolbars. Sometimes, active content is used to gain unauthorized access to a
computer, and then damage the data stored on it or install malicious software on it.
a. active content
b. cache memory
c. cookie
d.

2. The act or instance of making a duplicate copy of a program, a disk, or data. The
duplicate copy is called a backup.
a. cache memory
b. backup
c. copyright
d. encryption

3. Temporary memory on your computer that is sometimes used to store local copies of files
opened when you browse the Internet.
a. backup
b. firewall
c. cache memory
d. encryption

4. Keeping a user’s data, including personal files and e-mail messages, such that the data is
not accessible by anyone without appropriate permission.
a. encryption
b. copyright
c. computer privacy
d. hacker
5. A small file on a computer that is created when a user visits a Web site. A Web site uses
cookies to identify users who visit the site, and also track the preferences of the users.
a. cache memory
b. active content
c. firewall
d. cookie

6. A method of protecting the rights of an originator of a creative work, such as text, piece
of music, painting, or computer program, through law.
a. copyright
b. encryption
c. computer privacy
d. decryption

8. The process of converting data into an unreadable and unusable form. _______ is done
to prevent unauthorized access of data, especially during data transmission over the
Internet.
a. encryption
b. decryption
c. cookie
d. backup

9. A filter that blocks unreliable and unauthorized information from the Internet before it
reaches your computer or a private network. It provides additional protection against
threats such as hackers and viruses. A _______ also helps to ensure computer privacy by
restricting external access by any unauthorized user.
a. cookie
b. active content
c. firewall
d. encryption

10. A person who uses computer expertise to gain unauthorized access to a computer, and
then misuses or tampers the programs and data stored on the computer.
a. hacker
b. encrypts
c. firewall
d. programmer

11. Any information available on the Internet is a _______, which is legally owned by the
person who created it. The owner of a _______ has the exclusive rights to control the use of
this information.
a. hacker
b. firewall
c. administrator
d. intellectual property
12. A company that provides Internet connectivity to individuals, businesses, and
organizations.
a. cookie
b. hacker
c. Internet Service Provider (ISP)
d. world wide web

13. An individual who develops contact with Internet users, through chat rooms, online
forums, or e-mail, to exploit them financially or involve them in dangerous relationships.
a. encryptor
b. online predator
c. firewall
d. computer security

14. A unique string of characters that a user types in as an identification code. It is a


security measure used to restrict access to computer systems and sensitive files.
a. encrypts
b. decrypt
c. ISP
d. password

15. The act of extracting personal information, such as passwords and credit card details,
from computer users and then use the information for malicious purposes.
a. phishing
b. intellectual property
c. computer security
d. online predator

1. Act of copying someone’s work and using it as if it is own work, without mentioning the
source.
a. Plagiarism
b. Computer safety.
c. Phishing
d. Hacking
Answer: A

2. A sudden increase in line voltage, which may lead to the damage of electronic devices,
such as computers.
a. Online predator
b. Firewall
c. Hacking
d. Power surge
3. An internet security protocol that ensures secure data communication by encrypting the
information transmitted. The ______ protocol certifies that a website is genuine and
ensures that the data provided to the site is not misused.
a. Decrypt
b. Encryption
c. Secure Sockets Layer (SSL)
d. Hacker

4. Verbal defamation. This is punishable by offense.


a. Firewall
b. Encrypt
c. Slander
d. Libel

5. Unauthorized copying of copyrighted software without obtaining the license or


permission of its copyright owner.
a. Secure sockets layer (SSL)
b. Software piracy
c. Slander
d. Libel

6. An irrelevant and unsolicited email message sent by an unknown sender. A spam is sent
to distribute a message to many recipients at one time.
a. Spam
b. Software piracy
c. Slander
d. Secure sockets layer (SSL)

7. A computer program that is installed on your computer without your knowledge.


Spyware can secretly send out information about your web browsing habits or other
personal details to another computer through the network.
a. Phishing
b. Slander
c. Spyware
d. Software piracy

8. A destructive computer program disguised as a game, utility, or software. When run, a


trojan horse does something harmful to the computer system while appearing to do
something useful.
a. Trojan Horse
b. Spyware
c. Software piracy
d. Spam
9. The name by which a user is identified to a computer system or network. To access a
computer protected by username and password, a user needs to enter the correct
combination of username and password.
a. Trojan horse
b. Username
c. Password
d. Spam

10. A computer program that is designed to cause malfunctioning of a computer or damage


the data stored on the computer.
a. Worm
b. Virus
c. Trojan horse
d. Online predator

11. A computer program that propagates itself across computers, usually by creating copies
of itself in each computer’s memory. A _________ might duplicate itself in one computer so
often that it causes the computer to crash.
a. Worm
b. Snake
c. Trojan Horse
d. Virus

13. A method of protecting the rights of an originator of a creative work, such as text, piece
of music, painting, or computer program, through law.
a. copyright
b. encryption
c. computer privacy
d. decryption

====================================================================
Application
Self-Test. To challenge what you have understand, questions below is prepared for you to recap
what you have learned.

1. An excel file with one or more worksheets.


a. Workbook
b. Worksheet
c. Formula
d. Row

2. Place where you can rename each worksheet. Located at the bottom of the worksheet
window.
a. Sheet tab
b. Formula
c. Name box
d. Chart

3. A single sheet contained in an excel workbook.


a. Worksheet
b. Workbook
c. Chart
d. Sheet tab

4. The cell in the worksheet in which you can type data.


a. Formula
b. Cell
c. Name box
d. Active cell

5. The intersection of a column and row in a table or worksheet.


a. Chart
b. Row
c. Cell
d. Column.

6. The horizontal placement of cells in table worksheet.


a. Range
b. Row
c. Column
d. Cell

7. The box to the right of the Name Box that displays a formula when the cell of a
worksheet contains a calculated value (or the results of a formula).
a. Formula Bar
b. Worksheet
c. Name Box
d. Formula

8. The cell reference area located below the Ribbon, which displays the cell reference of the
active cell.
a. Name Box
b. Row
c. Workbook
d. Cell

9. What feature of Excel will expand the row height to fit the text by wrapping the text
within the cell worth?
a. Merge and center
b. AutoFit
c. Wrap text
d. Formula bar

10. What is the feature of Excel that will automatically expand the column width to fit the
longest text in the column?
a. Fill text
b. AutoFit
c. Merge and center
d. Wrap text

11. The feature of Excel that will allow you to copy content of a cell to adjacent cells simple
by dragging?
a. Fill handle
b. AutoFit
c. AutoFill
d. AutoSum

12. The fill handle feature is capable of copying text or formulas to what areas of the
worksheet?
a. non-adjacent cells
b. Adjacent cells
c. Adjacent sheet tab
d. anywhere in the worksheet.

13. When inserting a row into a worksheet, the data in the active row will be moved where?
a. To the right
b. Up
c. Down
d. To the left

1. Which function automatically counts cells that meet a specific condition?


a. COUNTIF
b. COUNTIFS
c. COUNT
d. SUMIFS

2. What function should a sales manager use to indicate whether a salesperson met the goal
of P6,000 sales this month?
a. Count
b. Fill Series
c. CountA
d. If
3. The cell range that starts in cell A1 and goes over to column J and down to row 15 is
____.
a. A1-J15
b. A1:J15
c. A1:J15
d. A1,J5

4. What tab would you find a list of functions and formulas on in Excel?
a. Home
b. Page Layout
c. Insert
d. Formulas
:D

5. What function should you use to count cells that only fall in a certain range: Example
100.
a. SUMIF
b. TOTALIF
c. AVERAGEIF
d. COUNTIF

6. What function will produce results that indicate whether a student has passed or failed a
course by entering the text “Pass” or “Fail”?
a. Count
b. If
c. CountA
d. Sum

7. Which function in Excel tells how many numeric entries are there?
a. NUM
b. COUNT
c. SUM
d. MAX

8. The features that displays only the data in column (s) according to specified criteria
a. Formula
b. Graphs
c. Filtering
d. Pivot

9. The _____ feature of MS Excel quickly completes a series of data.


a. Auto Complete
b. Fill Handle
c. Auto Fill
d. Sorting

10. How many sheets are there, by default, when we create a new Excel file?
a. 1
b. 3
c. 2
d. 4

1. A _____ is a set of mathematical equations used to calculate values.


a. Formula
b. Average
c. Count

2. The ____ function calculates the arithmetic means on a range of cells.


a. Average
b. Formula
c. Financial

3. The sum function provides a quick way to _____ numbers in Excel.


a. Add
b. Subtract
c. Calculate

4. Formulas in Excel always start with a _____ sign.


a. Equal
b. Minus
c. Plus

5. You have decided to center the text within a cell. What have you done?
a. Changed Alignment
b. Wrapped text
c. Merged cells
d. Autofit content

6. Which of these number formats would you want to apply to a cell showing the total sales
for the month?
a. Percentage
b. Currency
c. Date
d. Decimals

7. What term refers to mathematical equations used in Excel to perform calculations?


a. Cell
b. Format
c. Formulas
d. Summations
8. What symbol is used to designate an absolute cell reference?
a. #
b. !
c. $
d. @

9. To display the Letter Garde Equivalent, we can use the _____ function.
a. If
b. count
c. average
d. sum

10. The cell in the worksheet in which you can type data.
a. Active cell
b. Formula
c. Landscape
d. Range

11. A line around the edges of a cell


a. Cell reference
b. Fill Handle
c. Cut
d. Border

12. The intersection of a column and a row in a table or worksheet.


a. Workbook
b. Column
c. Sheet tab
d. Cell

13. The feature of Excel that will allow you to copy content of a cell to adjacent cells simple
by dragging?
a. Fill handle
b. AutoFit
c. AutoFill
d. AutoSum

14. The fill handle feature is capable of copying text or formulas to what areas of the
worksheet?
a. non-adjacent cells
b. Adjacent cells
c. Adjacent sheet tab
d. anywhere in the worksheet.

15. When inserting a row into a worksheet, the data in the active row will be moved where?
a. To the right
b. Up
c. Down
d. To the left

1. In MS Excel, to protect a worksheet you can choose Protection and the Protect Sheet
from the …. menu
a. Edit
b. Tools
c. Format
d. All of the above

2. The software which contains rows and columns is called ___________.


a. Spreadsheet
b. Database
c. Word processing
d. None of the above

3. What type of chart is useful for comparing values over categories?


a. Pie Chart
b. Line Chart
c. Column Chart
d. Dot Chart

4. Statistical calculations and preparation of tables and graphs can be done using.
a. Adobe Photoshop
b. Notepad
c. Excel
d. PowerPoint

5. You can active a cell by:


a. Pressing the Tab key
b. Pressing an arrow key
c. Clicking the cell
d. All of the above

6. Which of following is not one of Excel’s what-if function?


a. Goal seek
b. Solver
c. Scenario manager
d. Auto Outline

7. To delete an embedded object, first


a. Double click the object
b. Select the object by clicking it
c. Press the Shift + Delete keys
d. Select it and then press the delete key

8. A worksheet is a
a. A command used for data modeling
b. A range of values such as from 23 to 234
c. A group of cells
d. A group of worksheets
9. To activate the previous cell in a pre-selected range, press
a. The alt key
b. The tab key
c. The enter key
d. None of the above

10. The accounting style shows negative numbers in


a. Bold
b. Brackets
c. Parenthesis
d. Quotes

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

1. The movement on a slide is called what in PowerPoint?


a. Animation
b. Transition
c. Image
d. Video

2. This box allows you to write on a slide in MS PowerPoint.


a. Square Box
b. Round Box
c. Graphic Box
d. text Box

3. What is the style of writing known as?


a. Formatted
b. Size
c. Font
d. Color

4. To add a picture what tab do you press?


a. Insert
b. Home
c. Design
d. File

5. What are movements between the slides in MS PowerPoint called?


a. Animation
b. Slideshow
c. Transition
d. Video

6. What is the audio of a slide?


a. Sound or recording
b. Movement
c. Video
d. Podcast

7. What tab do you use in MS PowerPoint to add color and background to you slides?
a. Insert
b. Home
c. Review
d. Design

8. You press what tab in MS PowerPoint to add Online Pictures to your slides?
a. Insert
b. Home
c. Slideshow
d. Format

9. What are you doing when you resize an image?


a. Changing the size of the picture.
b. Changing the size of the slide.
c. Changing the size of the font.
d. Changing the background.

10. Multimedia means…


a. Doing one thing at a time
b. Doing more than one thing at a time.
c. Using Audio in your media.
d. Using Video in your media.

1. What tab do you click to add a new slide in MS PowerPoint?


a. Insert
b. Design
c. Home
d. Format

2. How do you write in MS PowerPoint?


a. Add a background
b. Add a Design
c. Add a text box
d. Add Animation.
3. _______ is a presentation program.
a. U-torrent
b. Mozilla Firefox
c. MS PowerPoint
d. Slide Panel

4. In PowerPoint, the header and footer button can be found on the insert tab in what
group?
a. Tables group
b. Text group
c. Object group
d. Illustration

5. Which is not the valid edition of MS PowerPoint?


a. MS PowerPoint 2003
b. MS PowerPoint 2007
c. MS PowerPoint 2010
d. MS PowerPoint 2019

6. The slide that is used to introduce a topic and set the tone for the presentation is called
the
a. Title slide
b. Bullet slide
c. table slide
d. Graph slide

7. The PowerPoint view that displays only text (title and bullets) is
a. Outline view
b. Notes page view
c. Slide sorter
d. Slide show

8. What is the default PowerPoint standard layout?


a. Blank
b. Title slide
c. Title only
d. Comparison

9. To center the selected text, the shortcut key is _________.


a. CTRL + C
b. CTRL + E
c. CTRL + O
d. CTRL + U

10. Which type of view is not present in MS PowerPoint?


a. Extreme animation
b. Slide show
c. Slide sorter
d. Normal

11. Which feature is not in MS PowerPoint?


a. Scan a virus
b. Zoom
c. Background color
d. Slide show

12. Which key helps to move to the beginning of a line?


a. Page Up
b. Page Down
c. Home
d. Insert

13. To make the selected text Italic, the shortcut key is


a. CTRL + Z
b. CTRL + ALT +I
c. CTRL + K
d. CTRL + I

14. Which PowerPoint view displays each slide of the presentation as thumbnail and is
useful for rearranging slides?
a. Slide Master
b. Slide Show
c. Slide Sorter
d. Notes Page

15. Press ________ to delete one word to the right.


a. CTRL + delete
b. CTRL + Enter
c. CTRL + Tab
d. CTRL + Backspace

///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Multiple Choice Questions:
1. What is LMS?
a. Learner Management System
b. learner Managing System
c. Learning Managed System
d. Learning Management System

2. An online platform that will allow teachers to create virtual classes where they can assign
the activities that the learners need to go through, monitor if the activities have been
completed, grade submissions, and conduct online quizzes to assess comprehension in
conditions where face-to-face classes are not allowed.
a. google classroom
b. Google meet
c. Learning management system
d. Microsoft Teams

3. Learning management system is the same as DepEd Commons?


a. True
b. False
c. I don’t know
d. None of the above. Information is insufficient.

4. The following are the three features of LMS, except?


a. Personalized Learning Features
b. Parent Involvement features
c. Interactive Discussions and Activities
d. Online store

5. As a teacher, what technological element (s) you will not apply to your class?
a. Gamification
b. Learning management system
c. Collaborative activities
d. Online Business

6. What are the types of quizzes the teacher can create using LMS, except?
a. Sequence
b. Word Bank
c. Language – Oral
d. None of the above

7. What is the name of the company the school have collaborated with that made
ULearning?
a. Huawei
b. Samsung
c. Ched
d. Oppo
8. What is used to communicate with you about the practicalities of your course.
a. LMS
b. Courseware
c. Announcement
d. Google meet

9. A technique that assists teachers in breaking down large groups of students into smaller
course sections.
a. Courseware
b. Courses
c. Discussion
d. Assignments

10. Is a tool that helps the teachers separate students into smaller course units.
a. Groups
b. Discussion
c. Members

1. It is the first page that student see in a course.


a. Grades
b. Course Home Page
c. Course Navigation
d. Courseware

2. A section of your account where a message is left for the entire class, called _______.
a. Announcements
b. Comment
c. Course Home Page
d. None of the above

3. _________ is a digital learning content created by the teacher.


a. Grades
b. Course Home Page
c. Course Navigation
d. Courseware

4. In a courseware the following are the structured four layers: course navigation
homepage, module, topic and page, except?
a. Course navigation homepage
b. Module
c. Topic
d. Page

5. The following are the three features of LMS, except?


a. Personalized Learning Features
b. Parent Involvement features
c. Interactive Discussions and Activities
d. Online store

6. As a teacher, what technological element (s) you will not apply to your class?
a. Gamification
b. Learning management system
c. Collaborative activities
d. Online Business

7. What is the name of the company the school have collaborated with that made
ULearning?
a. Huawei
b. Samsung
c. Ched
d. Oppo

8. What is used to communicate with you about the practicalities of your course.
a. LMS
b. Courseware
c. Announcement
d. Google meet

9. What is LMS?
a. Learner Management System
b. learner Managing System
c. Learning Managed System
d. Learning Management System

10. A technique that assists teachers in breaking down large groups of students into smaller
course sections.
a. Courseware
b. Courses
c. Discussion
d. Assignments

You might also like