Professional Documents
Culture Documents
5. Software in computer
a. Enhances the capabilities of the hardware machine
b. Increase the speed of central processing unit
c. Both of above
d. None of above
7. Before a disk drive can access any sector record, a computer program has to provide the
record’s disk address. What information does this address specify?
a. Track number
b. Sector number
c. Surface number
d. All of above
13. The terminal device that functions as a cash register, computer terminal, and OCR
reader is the:
a. Data collection terminal
b. OCR register terminal
c. Video Display terminal
d. POS terminal
1. One of the services, that can be used on the Internet and refers to browsing and
searching content in the form of web pages, is called:
a. LAN
b. FTP
c. WWW
d. ISDN
9. Computers in a firm are connected to a network, so the staff could work together on
files and share printers. That network is called:
a. LAN
b. FTP
c. WAN
d. ISDN
10. Which of these concepts describes the use of the Internet intended for sending and
receiving e-mails?
a. e-data exchange
b. e-commerce
c. e-mail
d. e-retail
11. What is the name of the software, which is a core program on a computer, and is
automatically loaded when the computer is turned on?
a. Shareware
b. Freeware
c. Operating system
d. Licensed software
12. Hardware component that integrates other components into a computer is:
a. Motherboard
b. Graphics card
c. Hard disk drive (HDD)
d. Keyboard
15. Type of malware, that can replicate autonomously and can corrupt data on your
computer, is called:
a. Mouse
b. Worm
c. Lion
d. Sparrow
16. Copyright –
a. inhibits software piracy
b. protects software against viruses
c. disables the firewall
d. protects software author's rights (from unauthorized copying and distribution)
17. What type of applications are used to protect your computer from viruses?
a. Antivirus software
b. Databases
c. Spreadsheet calculation program
d. accounting program
18. Which of the following is the best way to protect your computer against data loss?
a. Create database
b. Create backup copies on storage media
c. “Surfing” the Internet
d. Often change password
19. Which of the following is not a medium for data storage?
a. Keyboard
b. Hard disk
c. USB Stick
d. DVD disk
20. Every computer connected directly to the network via cable or a phone line, with at
least one computer, is called:
a. Hardware
b. Network computer
c. Personal Computer – PC
d. Software
1. Due to virus threat, we should not:
a. connect computer to the Internet or any other computer network
b. installs anti-virus programs that are used to detect viruses on the computer
c. open e-mails and pages from an unknown sender
d. change passwords
3. The most common health problems, associated with computer use, do not include:
a. Sprain (dislocation)
b. Spinal problems d
c. Visual impairment
d. Virus infection
7. Monitor is:
a. input device
b. input and output device
c. output device
d. none of these answers
8. Which of the following is used for safely shutting the computer down?
a. Control Panel
b. My computer
c. Start menu
d. Internet Explorer or Mozilla Firefox
1. A process is a ________.
a. single thread of execution.
b. program in the execution.
c. program in the memory.
d. task
2. The word processing feature that catches most random typographical errors and
misspellings is known as __________.
a. Grammar checker
b. Spell checker
c. Word checker
d. None of these
5. Which of the following programs enables you to calculate numbers related to rows and
columns
a. Window program
b. Spreadsheet program
c. Graphics program
d. Word program
9. BIOS is used
a. By operating system
b. By compiler
c. By interpreter
d. By application software
11. Which type of program act as an intermediary between a user of a computer and the
computer hardware?
a. Operating system
b. User thread
c. Superuser thread
d. Application program
Answer: A
13. Which of the following software applications would be the most appropriate for
performing numerical and statistical calculations?
a. Database
b. Document processor
c. Graphics package
d. Spreadsheet
18. Which of the following statement is correct regarding a template prepared by a word
processing package?
a. Any document can be saved as a template.
b. Default template is used when you create a new file.
c. Many templates contain text that gives one advice on how to use the template.
d. Default settings are reflected by the normal document template and cannot be
overwritten.
Answer: A
2. The physical parts of a computer and related devices. Examples: Internal devices which
include motherboards, hard drives, and RAM; external devices which include monitors,
keyboards, mice, printers and scanners.
a. Hardware
b. Software
c. Physical Structure
d. MAC
3. Set of instructions that tells the hardware what to do. It is what guides the hardware and
tells it how to accomplish each task.
a. Hardware
b. CPU
c. Software
d. Motherboard
5. Small handled input device that controls a computer screen’s cursor or pointer in
conjunction with the way it is moved on a flat surface.
a. Apple watch
b. Mouse
c. Wearables
d. Video Card
6. A computer designed for use by one person at a time. In its more general usage, this
device is a microcomputer designed for use by one person at a time.
a. Laptop
b. Specialized computer
c. Personal computer
d. Desktop
9. Also known as a computer chassis, tower, system unit, CPU, or cabinet, is the enclosure
that contains most of the components of a personal computer (usually excluding the
display, keyboard, and mouse), except.
a. Tower
b. Computer Case
c. Desktop Computer
d. Desktop Case
11. Input device that allows a person to enter letters, numbers, and other symbols into a
computer. It is one of the most used input devices for computers.
a. Tablet
b. Apple Phone
c. Keyboard
d. Wearable
12. Portable computer that uses a touchscreen as its primary input device. These devices
are slightly smaller and weigh less than the average laptop.
a. MAC
b. Laptop
c. Tablet
d. Wearable
13. Computer that provides data to other computers. It may serve data to systems on a
local area network (LAN) or a wide area network (WAN) over the internet. Each type runs
software specific to the purpose of the server.
a. Computer
b. Server
c. Game consoles
d. All-in-One computer
14. A mobile phone that performs many of the functions of a computer, typically having a
touchscreen interface, internet access and an operating system capable of running
downloaded applications.
a. Smartphones
b. Tablet
c. Video Card
d. Game Consoles
7. A microprocessor is __________.
a. A combined unit of monitor and keyboard.
b. A combined unit of ALU and CU.
c. A combined unit of CPU and UPS.
1. A small program that gets installed on a computer while browsing the Internet. The
basic function of active content is to provide an interactive Internet experience through
videos and toolbars. Sometimes, active content is used to gain unauthorized access to a
computer, and then damage the data stored on it or install malicious software on it.
a. active content
b. cache memory
c. cookie
d.
2. The act or instance of making a duplicate copy of a program, a disk, or data. The
duplicate copy is called a backup.
a. cache memory
b. backup
c. copyright
d. encryption
3. Temporary memory on your computer that is sometimes used to store local copies of files
opened when you browse the Internet.
a. backup
b. firewall
c. cache memory
d. encryption
4. Keeping a user’s data, including personal files and e-mail messages, such that the data is
not accessible by anyone without appropriate permission.
a. encryption
b. copyright
c. computer privacy
d. hacker
5. A small file on a computer that is created when a user visits a Web site. A Web site uses
cookies to identify users who visit the site, and also track the preferences of the users.
a. cache memory
b. active content
c. firewall
d. cookie
6. A method of protecting the rights of an originator of a creative work, such as text, piece
of music, painting, or computer program, through law.
a. copyright
b. encryption
c. computer privacy
d. decryption
8. The process of converting data into an unreadable and unusable form. _______ is done
to prevent unauthorized access of data, especially during data transmission over the
Internet.
a. encryption
b. decryption
c. cookie
d. backup
9. A filter that blocks unreliable and unauthorized information from the Internet before it
reaches your computer or a private network. It provides additional protection against
threats such as hackers and viruses. A _______ also helps to ensure computer privacy by
restricting external access by any unauthorized user.
a. cookie
b. active content
c. firewall
d. encryption
10. A person who uses computer expertise to gain unauthorized access to a computer, and
then misuses or tampers the programs and data stored on the computer.
a. hacker
b. encrypts
c. firewall
d. programmer
11. Any information available on the Internet is a _______, which is legally owned by the
person who created it. The owner of a _______ has the exclusive rights to control the use of
this information.
a. hacker
b. firewall
c. administrator
d. intellectual property
12. A company that provides Internet connectivity to individuals, businesses, and
organizations.
a. cookie
b. hacker
c. Internet Service Provider (ISP)
d. world wide web
13. An individual who develops contact with Internet users, through chat rooms, online
forums, or e-mail, to exploit them financially or involve them in dangerous relationships.
a. encryptor
b. online predator
c. firewall
d. computer security
15. The act of extracting personal information, such as passwords and credit card details,
from computer users and then use the information for malicious purposes.
a. phishing
b. intellectual property
c. computer security
d. online predator
1. Act of copying someone’s work and using it as if it is own work, without mentioning the
source.
a. Plagiarism
b. Computer safety.
c. Phishing
d. Hacking
Answer: A
2. A sudden increase in line voltage, which may lead to the damage of electronic devices,
such as computers.
a. Online predator
b. Firewall
c. Hacking
d. Power surge
3. An internet security protocol that ensures secure data communication by encrypting the
information transmitted. The ______ protocol certifies that a website is genuine and
ensures that the data provided to the site is not misused.
a. Decrypt
b. Encryption
c. Secure Sockets Layer (SSL)
d. Hacker
6. An irrelevant and unsolicited email message sent by an unknown sender. A spam is sent
to distribute a message to many recipients at one time.
a. Spam
b. Software piracy
c. Slander
d. Secure sockets layer (SSL)
11. A computer program that propagates itself across computers, usually by creating copies
of itself in each computer’s memory. A _________ might duplicate itself in one computer so
often that it causes the computer to crash.
a. Worm
b. Snake
c. Trojan Horse
d. Virus
13. A method of protecting the rights of an originator of a creative work, such as text, piece
of music, painting, or computer program, through law.
a. copyright
b. encryption
c. computer privacy
d. decryption
====================================================================
Application
Self-Test. To challenge what you have understand, questions below is prepared for you to recap
what you have learned.
2. Place where you can rename each worksheet. Located at the bottom of the worksheet
window.
a. Sheet tab
b. Formula
c. Name box
d. Chart
7. The box to the right of the Name Box that displays a formula when the cell of a
worksheet contains a calculated value (or the results of a formula).
a. Formula Bar
b. Worksheet
c. Name Box
d. Formula
8. The cell reference area located below the Ribbon, which displays the cell reference of the
active cell.
a. Name Box
b. Row
c. Workbook
d. Cell
9. What feature of Excel will expand the row height to fit the text by wrapping the text
within the cell worth?
a. Merge and center
b. AutoFit
c. Wrap text
d. Formula bar
10. What is the feature of Excel that will automatically expand the column width to fit the
longest text in the column?
a. Fill text
b. AutoFit
c. Merge and center
d. Wrap text
11. The feature of Excel that will allow you to copy content of a cell to adjacent cells simple
by dragging?
a. Fill handle
b. AutoFit
c. AutoFill
d. AutoSum
12. The fill handle feature is capable of copying text or formulas to what areas of the
worksheet?
a. non-adjacent cells
b. Adjacent cells
c. Adjacent sheet tab
d. anywhere in the worksheet.
13. When inserting a row into a worksheet, the data in the active row will be moved where?
a. To the right
b. Up
c. Down
d. To the left
2. What function should a sales manager use to indicate whether a salesperson met the goal
of P6,000 sales this month?
a. Count
b. Fill Series
c. CountA
d. If
3. The cell range that starts in cell A1 and goes over to column J and down to row 15 is
____.
a. A1-J15
b. A1:J15
c. A1:J15
d. A1,J5
4. What tab would you find a list of functions and formulas on in Excel?
a. Home
b. Page Layout
c. Insert
d. Formulas
:D
5. What function should you use to count cells that only fall in a certain range: Example
100.
a. SUMIF
b. TOTALIF
c. AVERAGEIF
d. COUNTIF
6. What function will produce results that indicate whether a student has passed or failed a
course by entering the text “Pass” or “Fail”?
a. Count
b. If
c. CountA
d. Sum
7. Which function in Excel tells how many numeric entries are there?
a. NUM
b. COUNT
c. SUM
d. MAX
8. The features that displays only the data in column (s) according to specified criteria
a. Formula
b. Graphs
c. Filtering
d. Pivot
10. How many sheets are there, by default, when we create a new Excel file?
a. 1
b. 3
c. 2
d. 4
5. You have decided to center the text within a cell. What have you done?
a. Changed Alignment
b. Wrapped text
c. Merged cells
d. Autofit content
6. Which of these number formats would you want to apply to a cell showing the total sales
for the month?
a. Percentage
b. Currency
c. Date
d. Decimals
9. To display the Letter Garde Equivalent, we can use the _____ function.
a. If
b. count
c. average
d. sum
10. The cell in the worksheet in which you can type data.
a. Active cell
b. Formula
c. Landscape
d. Range
13. The feature of Excel that will allow you to copy content of a cell to adjacent cells simple
by dragging?
a. Fill handle
b. AutoFit
c. AutoFill
d. AutoSum
14. The fill handle feature is capable of copying text or formulas to what areas of the
worksheet?
a. non-adjacent cells
b. Adjacent cells
c. Adjacent sheet tab
d. anywhere in the worksheet.
15. When inserting a row into a worksheet, the data in the active row will be moved where?
a. To the right
b. Up
c. Down
d. To the left
1. In MS Excel, to protect a worksheet you can choose Protection and the Protect Sheet
from the …. menu
a. Edit
b. Tools
c. Format
d. All of the above
4. Statistical calculations and preparation of tables and graphs can be done using.
a. Adobe Photoshop
b. Notepad
c. Excel
d. PowerPoint
8. A worksheet is a
a. A command used for data modeling
b. A range of values such as from 23 to 234
c. A group of cells
d. A group of worksheets
9. To activate the previous cell in a pre-selected range, press
a. The alt key
b. The tab key
c. The enter key
d. None of the above
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
7. What tab do you use in MS PowerPoint to add color and background to you slides?
a. Insert
b. Home
c. Review
d. Design
8. You press what tab in MS PowerPoint to add Online Pictures to your slides?
a. Insert
b. Home
c. Slideshow
d. Format
4. In PowerPoint, the header and footer button can be found on the insert tab in what
group?
a. Tables group
b. Text group
c. Object group
d. Illustration
6. The slide that is used to introduce a topic and set the tone for the presentation is called
the
a. Title slide
b. Bullet slide
c. table slide
d. Graph slide
7. The PowerPoint view that displays only text (title and bullets) is
a. Outline view
b. Notes page view
c. Slide sorter
d. Slide show
14. Which PowerPoint view displays each slide of the presentation as thumbnail and is
useful for rearranging slides?
a. Slide Master
b. Slide Show
c. Slide Sorter
d. Notes Page
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Multiple Choice Questions:
1. What is LMS?
a. Learner Management System
b. learner Managing System
c. Learning Managed System
d. Learning Management System
2. An online platform that will allow teachers to create virtual classes where they can assign
the activities that the learners need to go through, monitor if the activities have been
completed, grade submissions, and conduct online quizzes to assess comprehension in
conditions where face-to-face classes are not allowed.
a. google classroom
b. Google meet
c. Learning management system
d. Microsoft Teams
5. As a teacher, what technological element (s) you will not apply to your class?
a. Gamification
b. Learning management system
c. Collaborative activities
d. Online Business
6. What are the types of quizzes the teacher can create using LMS, except?
a. Sequence
b. Word Bank
c. Language – Oral
d. None of the above
7. What is the name of the company the school have collaborated with that made
ULearning?
a. Huawei
b. Samsung
c. Ched
d. Oppo
8. What is used to communicate with you about the practicalities of your course.
a. LMS
b. Courseware
c. Announcement
d. Google meet
9. A technique that assists teachers in breaking down large groups of students into smaller
course sections.
a. Courseware
b. Courses
c. Discussion
d. Assignments
10. Is a tool that helps the teachers separate students into smaller course units.
a. Groups
b. Discussion
c. Members
2. A section of your account where a message is left for the entire class, called _______.
a. Announcements
b. Comment
c. Course Home Page
d. None of the above
4. In a courseware the following are the structured four layers: course navigation
homepage, module, topic and page, except?
a. Course navigation homepage
b. Module
c. Topic
d. Page
6. As a teacher, what technological element (s) you will not apply to your class?
a. Gamification
b. Learning management system
c. Collaborative activities
d. Online Business
7. What is the name of the company the school have collaborated with that made
ULearning?
a. Huawei
b. Samsung
c. Ched
d. Oppo
8. What is used to communicate with you about the practicalities of your course.
a. LMS
b. Courseware
c. Announcement
d. Google meet
9. What is LMS?
a. Learner Management System
b. learner Managing System
c. Learning Managed System
d. Learning Management System
10. A technique that assists teachers in breaking down large groups of students into smaller
course sections.
a. Courseware
b. Courses
c. Discussion
d. Assignments