You are on page 1of 62

SUMMATIVE TEST

EMPOWERMENT TECHNOLOGY
1

It means of devoting to create new tools to accomplish various


tasks in our daily lives. Typically, technology can be described
as a product, processes, organization, models, prototypes,
arts and services.
 Computers
 Information
 Technologies
 Communication
2

It refers to the conveying of information between two or more


people in different places. Technically, it facilitates the
communication between individuals and groups using smart
phones, features phones, tablets, radio, television, and all
computer based technology.
 Technologies
 Computers
 Communication
 Information
3

It means valuable context that gives meaning and relevance to


many people such as name of place, birth date, colour, money,
your name, depending on the context. Technically, it is
referred as data (once processed in a computer) which is
accurate and timely committed and organized for a purpose.
 Communication
 Information
 Technologies
 Computers
4

It is the use of information and communication technology and


other web-based technology to enhance access of information
and improve delivery, efficiency and effectiveness of services
to the public.
 E-commerce
 E-government
 E-learning
 E-mail
5

It defines the government’s policies on electronic


business and transactions.
 E-commerce
 E-learning
 E-mail
 E-government
6

Computerized key frontline and common government


services and operations.
 Information Technology and eCommerce Council
 The electronic Commerce Act
 Directives for Government Agencies Internet
Connectivity
 Government Information System Act
7

Open PH to foreign telcos to speed up internet


connections.
 Estrada administration
 Arroyo administration
 Aquino administration
 Duterte administration
8

It is the global system of interconnected computer


networks that use the Internet protocol suite to link
billions of devices worldwide.
 Mobile Technology
 Social Media
 Internet
 Website
9

It is an information space where documents and other


web resources are identified by URLs, interlinked by
hypertext links, and can be accessed via the Internet.
 Website
 Web page
 Internet
 World wide web
10

It is a location connected to the Internet that


maintains one or more pages on the World Wide Web.
 Web page
 Internet
 Website
 World wide web
11

It is a software application used to access internet and


for retrieving, presenting, and traversing information
resources on the World Wide Web.
 Search engines
 Web browsers
 Internet
 Website
12

It is a website, application, or online channel that


enables web users to create, co-create, discuss,
modify, and exchange user-generated content.
 Social media
 Search engines
 Web browsers
 Mobile technologies
13

It is the popularity of smartphones and tablets. Latest


mobile devices use 4G Networking LTE, which is
currently the fastest mobile network. Mobile devices
use different operating systems.
 Social media
 Search engines
 Web browsers
 Mobile technologies
14

It refers to any product, device, or equipment that is


used to maintain, increase, or improved the functional
capabilities of individuals or with disabilities.
 Artificial intelligence
 Assistive media
 Mobility
 Convergent technology
15

It is the knowledge of maximizing the user’s personal


safety and security risk to private information, and
self-protection for computer crime in general.
 Netiquette
 Safety and security
 Online safety
 Computer commandments
16

EDGE stands for __________.


17

Replicates and can transfer from one computer


to another.
 Virus
 Spyware
 Spam
 Malware
18

It is an unwanted acquisition of sensitive personal


information like passwords and credit card details.
 Spam
 Pharming
 Phishing
 Virus
19

It is a group of compromised computer


connected to a network.
 Adware
 Spam
 Phishing
 Botnet
20

The do’s and don’ts of online communications.


 Online safety
 Online security
 Netiquette
 Computer commandments
21

Open Help
 F1
 F2
 F3
 F4
22

Do not steal someone else’s idea.


 Don’t spam
 No flaming
 Obey golden rule
 Obey copyright laws
23

Treat others as you would like to be treated.


 Don’t spam
 No flaming
 Obey golden rule
 Obey copyright laws
24

Errors diminish the credibility of the message.


 Be honest
 Follow the terms of service
 Shop secure sites
 Use proper grammar and spelling
25

Tell the truth, do not pretend to be someone else.


 Be honest
 Follow the terms of service
 Shop secure sites
 Use proper grammar and spelling
26

Rules and policy of the website.


 Be honest
 Follow the terms of service
 Shop secure sites
 Use proper grammar and spelling
27

Aligns the line or selected text to the center of


the screen.
 Ctrl + A
 Ctrl + C
 Ctrl + B
 Ctrl + E
28

Open find box


 Ctrl + J
 Ctrl + F
 Ctrl + I
 Ctrl + E
29

Insert hyperlink
 Ctrl + H
 Ctrl + J
 Ctrl + I
 Ctrl + K
30

Opens new, blank document window


 Ctrl + K
 Ctrl + N
 Ctrl + M
 Ctrl + O
1

It means of devoting to create new tools to accomplish various


tasks in our daily lives. Typically, it can be described as a
product, processes, organization, models, prototypes, arts
and services.
 Computers
 Information
 Technologies
 Communication
2

It refers to the conveying of information between two or more


people in different places. Technically, it facilitates the
communication between individuals and groups using smart
phones, features phones, tablets, radio, television, and all
computer based technology.
 Technologies
 Computers
 Communication
 Information
3

It means valuable context that gives meaning and relevance to


many people such as name of place, birth date, colour, money,
your name, depending on the context. Technically, it is
referred as data (once processed in a computer) which is
accurate and timely committed and organized for a purpose.
 Communication
 Information
 Technologies
 Computers
4

It is the use of information and communication technology and


other web-based technology to enhance access of information
and improve delivery, efficiency and effectiveness of services
to the public.
 E-commerce
 E-government
 E-learning
 E-mail
5

It defines the government’s policies on electronic


business and transactions.
 E-commerce
 E-learning
 E-mail
 E-government
6

Computerized key frontline and common government


services and operations.
 Information Technology and eCommerce Council
 The electronic Commerce Act
 Directives for Government Agencies Internet
Connectivity
 Government Information System Act
7

Open PH to foreign telcos to speed up internet


connections.
 Estrada administration
 Arroyo administration
 Aquino administration
 Duterte administration
8

It is the global system of interconnected computer


networks that use the Internet protocol suite to link
billions of devices worldwide.
 Mobile Technology
 Social Media
 Internet
 Website
9

It is an information space where documents and other


web resources are identified by URLs, interlinked by
hypertext links, and can be accessed via the Internet.
 Website
 Web page
 Internet
 World wide web
10

It is a location connected to the Internet that


maintains one or more pages on the World Wide Web.
 Web page
 Internet
 Website
 World wide web
11

It is a software application used to access internet and


for retrieving, presenting, and traversing information
resources on the World Wide Web.
 Search engines
 Web browsers
 Internet
 Website
12

It is a website, application, or online channel that


enables web users to create, co-create, discuss,
modify, and exchange user-generated content.
 Social media
 Search engines
 Web browsers
 Mobile technologies
13

It is the popularity of smartphones and tablets. Latest


mobile devices use 4G Networking LTE, which is
currently the fastest mobile network. Mobile devices
use different operating systems.
 Social media
 Search engines
 Web browsers
 Mobile technologies
14

It refers to any product, device, or equipment that is


used to maintain, increase, or improved the functional
capabilities of individuals or with disabilities.
 Artificial intelligence
 Assistive media
 Mobility
 Convergent technology
15

It is the knowledge of maximizing the user’s personal


safety and security risk to private information, and
self-protection for computer crime in general.
 Netiquette
 Safety and security
 Online safety
 Computer commandments
16

EDGE stands for __________.

Enhanced Data rates for Global Evolution


17

Replicates and can transfer from one computer


to another.
 Virus
 Spyware
 Spam
 Malware
18

It is an unwanted acquisition of sensitive personal


information like passwords and credit card details.
 Spam
 Pharming
 Phishing
 Virus
19

It is a group of compromised computer


connected to a network.
 Adware
 Spam
 Phishing
 Botnet
20

The do’s and don’ts of online communications.


 Online safety
 Online security
 Netiquette
 Computer commandments
21

Open Help
 F1
 F2
 F3
 F4
22

Do not steal someone else’s idea.


 Don’t spam
 No flaming
 Obey golden rule
 Obey copyright laws
23

Treat others as you would like to be treated.


 Don’t spam
 No flaming
 Obey golden rule
 Obey copyright laws
24

Errors diminish the credibility of the message.


 Be honest
 Follow the terms of service
 Shop secure sites
 Use proper grammar and spelling
25

Tell the truth, do not pretend to be someone else.


 Be honest
 Follow the terms of service
 Shop secure sites
 Use proper grammar and spelling
26

Rules and policy of the website.


 Be honest
 Follow the terms of service
 Shop secure sites
 Use proper grammar and spelling
27

Aligns the line or selected text to the center of


the screen.
 Ctrl + A
 Ctrl + C
 Ctrl + B
 Ctrl + E
28

Open find box


 Ctrl + J
 Ctrl + F
 Ctrl + I
 Ctrl + E
29

Insert hyperlink
 Ctrl + H
 Ctrl + J
 Ctrl + I
 Ctrl + K
30

Opens new, blank document window


 Ctrl + K
 Ctrl + N
 Ctrl + M
 Ctrl + O

You might also like