You are on page 1of 2

NOTRE DAME OF BANGA, INC.

Augustinian Recollect Sisters


Banga, South Cotabato
SECOND MID QUARTER EXAMINATION IN COMPUTER
Grade 5 30
Ms. Mae Ann A. Ramos
SCORE
NAME GRADE & SECTION DATE

Test I: MULTIPLE CHOICE (15pts)


Direction: Read each question and encircle the letter that corresponds to the correct
answer.
1. A hacker or a person who does bad things online like stealing personal information
and spreading malware.
A. Cybercrime B. Cybercriminal C. Thief

2. Is an attempt by a cybercriminal to steal our information and send viruses to our


devices when we are using the internet.
A. Network Security B. Network Attack C. Malware

3. It is the practice of protecting networks and data from being accessed by


cybercriminals.
A. Network Security B. Phishing C. Malware

4. It pretends to be a regular application or software and steals our data by staying in


our devices.
A. Phishing B. Malware C. MITM

5. Is a type of netwok attack that crashes our devices and websites to keep us from
browsing online.
A. Phishing B. Man-in-the-middle C. Denial of Service (DoS) attack

6. It is a common cybersecurity threat were someone tries to steal our information by


pretending to be someone we can trust.
A. Malware B. Phishing C. Man-in-the-middle

7. It happens when someone spies on our conversations with other people. They can
pretend to be us by interrupting our conversation without us knowing.
Malware B. Phishing C. Man-in-the-middle

8. Refers to the time range or hoe long something happens.


A. Special Effects B. Timing C. Duration

9. It helps make our videos more interesting.


A. Special Effects B. Animation C. Transition

10. Princess wants to make a video on her computer, so she uses Window 10’s ____
app.
A. Photo App B. Video App C. Music App

11. It provides brief information about the source in our reference list.
A. Superscript B. Bibliography C. In-text Citation

12. It is a style guide used to cite sources in papers written for the humanities like
languages and literature.
A. MLA B. APA C. CMOS

Page 1 Second Mid Quarter Examination in Computer - 5


13. It is a style guide used to cite sources in papers written for the cocial sciences like
economic, history, and psychology.
A. MLA B. APA C. CMOS

14. One of the more advanced ways to fight against cybercriminals. It disguises our
location and protects our personal information by hiding our activity in the websites
we visit.
A. NVP B. VSP C. VPN

Test II: TRUE or FALSE


Direction: State if the following sentences are TRUE or FALSE. Write your answer in
the blank provided before the number.
_______15. Public Wi-Fis are safe because they do not ask us for password.
_______16. We do not have to log out our online accounts when we are using a public
computer.
_______17. Devices can get infected just by connecting to unsafe Wi-Fi networks.
_______18. A spyware is a type of malware that lets cybercriminals stalk our activity online and
get our information.
_______19. The URL of websites we visit must have HTTP, which protects against man-in-y-
the-middle attacks (MITN).

Test III: SEQUENCING


Direction: Arrange the following steps in the correct order. Write 1,2,3, 4 or 5 on the
blank before the number.

A. Saving a Project
_______20. Click Add Title card from the toolbar
_______21. Right-click on the video clip that appears and go to Edit.
_______22. Click on either Text or Background to edit our title card and click Done.

B. Add Citations Using MS Word


_______23. The in-text citation will be added.
_______24. Fill out the dialog box with source’s information and click OK.
_______25. Click Insert Citation and select Add New Sources.
_______26. Click References and select a citation style in the Style drop-down menu.
_______27. Place the cursor at the end of the text that needs to be cited.

C. Adding Footnotes or Endnotes


_______28. Click References and select either Insert Footnote or Insert Endnote.
_______29. Place the cursor right after the word or the sentence that needs a note.
_______30. Type the footnote or endnote.

“Efforts and courage are not enough without purpose and direction.”
― JOHN F. KENNEDY, 35TH US PRESIDENT

Page 2 Second Mid Quarter Examination in Computer - 5

You might also like