You are on page 1of 3

Republic of the Philippines

Department of Education
Region III
Division of Aurora
San Luis, Aurora
Empowerment Technologies
Third Periodic Test
Second Semester
S.Y. 2018- 2019
Name: __________________________________ Date: _______________________
Track and Strand: _________________________ Score: ______________________
“EVERYTHING you do now is for your future. THINK about that.”

Notes:
FINISH THE EXAM WITHIN 1 HOUR – Alam mo dapat kung kelan ka susuko. Pag TAPOS NA, TAPOS NA!
DO NOT CHEAT – Huwag tumulad sa ex mong akala mo loyal sayo, paiyak iyak pa nung nagbreak kayo pero kinabukasan may
bago ng iba.

I. Directions: Read and analyze the questions carefully. Encircle the letter of your answer.
11. DNS means __________________________.
1. It is a network etiquette, the do’s and don’ts of online
communication. a. De Na Sis c. Domain Name Server
b. Do Not Shout d. Domain Not Server
a. Internet b. Ticket
c. Netiquette d. Etiquette 12. It is an electronic device or computer software
2. It refers to the online security or safety of people and application that performs the task of composing, editing,
their information when using the internet formatting, and printing of documents.
a. Internet safety c. safety a. MS Excel c. MS Powerpoint
b. Internet cafe d. HTTP b. Word Procerssor d. None of the above

3. What is the meaning of HTTP? 13. It refers to the arrangement of text, images, and other
objects on a page.
a. Hyper- Text Transport Protocol
b. Hypa- Text Transfer Protocol a. page layout tab c. insert tab
c. Hyper- Text Transfer Photoshop b. home tab d. tables
d. Hyper – Text Transfer Protocol 14. It is used to insert different feature such as tables,
4. It stands for malicious software. pictures, clip art, shapes, etc.
a. virus c. malware a. page layout tab c. insert tab
b. Trojan d. spyware b. home tab d. tables
5. It is a set of instructions that run on your computer and 15. It allows you to change document settings, such as the
make your system do something that an attacker wants it to font properties, adding bullets or a numbered list.
do. a. page layout tab c. insert tab
a. virus c. malware b. home tab d. tables
b. Trojan d. spyware 16. It organized information into rows and columns.
6. It is a piece of malicious computer code that attaches a. tables c. text wrap
itself to a software program, email or computer file without b. mail merge d. auto format
your permission.
17. It is a feature that allows you to create a document and
a. virus c. malware merge them with another document or data file.
b. Trojan d. spyware a. tables c. text wrap
7. It is a malicious program that is disguised as a useful b. mail merge d. auto format
program but once downloaded or installed, leaves your PC 18. It allows you to adjust how the image behaves around
unprotected and allows hackers to get your information. other objects or text..
a. virus c. malware a. tables c. text wrap
b. Trojan d. spyware b. mail merge d. auto format
8. It is used to record the keystroke done by the user. 19. It applies formatting text, number listing, bullet and
a. virus c. keyloggers hyperlinks in automatic mode.
b. Trojan d. spyware a. tables c. text wrap
9. It refers to the transmission of unsolicited messages from b. mail merge d. auto format
various origins using electric messaging. 20. It proofreads document for grammar, writing style,
a. spam c. malware sentence structure errors and reading statistics.
b. Trojan d. keyloggers a. text wrap c. thesaurus
10. It is a program designed to send your advertisement, b. template d. grammar checker
mostly pop- ups. 21. It is a document that contains the formatting necessary
a. spam c. keyloggers for a specific document type.
b. adware d. spyware a. text wrap c. thesaurus
b. template d. grammar checker
22. It provides synonyms for a word in a document.
a. text wrap c. thesaurus
b. template d. grammar checker
23. These are sites that allow you to store and manage links
to various websites and resources.
a. Bookmarking Sites c. Media Sharing.
b. Social News. d. Microblogging
24. These are sites that allow users to post their own news
items or links to other news sources..
a. Bookmarking Sites c. Media Sharing.
b. Social News. d. Microblogging
25. What do you mean by EmTech?
a. Empowerment TechVoc
b. Empowerment Technology
c. Empowerment Technicality
d. Empowerment Technologies
II. Identification.
Directions. Identify the following keyboard shortcuts by
writing its corresponding shortcut key.

26. paste a copied text ________________.


27. cut a selected text ________________.
28. undo the last selection _______________.
29. select all ________________.
30. bold text ________________.
31. Align text to center ________________.
32. Italize text ________________.
33. justify text ________________.
34. align text to left ________________.
35. create new document ________________.
36. open a document ________________.
37. save a document ________________.
38. underline text ________________.
39. close a document ________________.
40. display find dialog box ________________.

III. Enumeration.
Directions. Enumerate the following.

41 – 45. Different kinds of Malware (in any order)


46 – 50 Types of Information (in any order)
51 – 56 Features of Web 2.0
3rd PERIODIC TEST 1819(EmTech)

ANSWER KEY

1. C
2. A
3. D
4. C
5. C
6. A
7. B
8. C
9. A
10. B
11. C
12. B
13. A
14. C
15. B
16. A
17. B
18. C
19. D
20. D
21. B
22. C
23. A
24. B
25. D
26. CTRL + V
27. CTRL + X
28. CTRL + U
29. CTRL + A
30. CTRL + B
31. CTRL + E
32. CTRL + I
33. CTRL + J
34. CTRL + L
35. CTRL + N
36. CTRL + O
37. CTRL + S
38. CTRL + U
39. CTRL + X
40. CTRL + F
41. virus
42. worm
43. trojan
44. spyware
45. adware
46. first name
47. last name
48. middle name
49. current and previous school/s
50. your cellphone number

You might also like