Score
GRADE 12 EMPOWERMENT TECHNOLOGIES / 50
Name: __________________________________________ Date: __________________________________
Grade & Section __________________________________ Teacher: ________________________________
MULTIPLE CHOICE. Read and analyze each item carefully. Encircle the letter that corresponds to your answer. (1 point).
1. It allows the user to categorize and classify, arrange 10. It involves the use of technologies to display behavior
information using freely chosen keywords(tagging) which that harms another entity.
start with pound sign(#), referred to as hashtag. a. Cyberbullying c. Hacking
a. Folksonomy c. Semantic Web b. Sexting d. Phishing
b. Dynamic Website d. Long Tail
11. What shortcut key that is used to undo everything you do.
2. What symbol or keyword that find or excludes web pages a. CTRL + Z & B c. CTRL + Y
that contain a group of words? b. CTRL + Z d. CTRL + Y + Z
a. “” and & c. AND or &
b. ( ) d. ( ) or | 12. Which of the following is the correct formulated search
strings for the phrase “What are the formula in creating color
3. What symbol or keyword that find web pages that contain scheme”?
all the terms and phrases? a. “what” + “formula” and c. “what” + formula and
a. “” and & c. AND or & color scheme creating and color scheme
b. ( ) d. ( ) or | b. “formula” and color d. “formula” and “creating”
scheme and color scheme
4. This is a tool that filter information you get from the search
engine. 13. This control key is used to align center the documents.
a. Online Searching c. Advanced Search a. CTRL + E + C c. CTRL + E
b. Search Engine d. Search Help b. CTRL + C + E d. CTRL + C
5. It is used to record the keystrokes done by the users, which 14. What tool in Insert Tab that is linked from a hypertext
its main goal is to steal your username and password. file or document to another location or file, typically
a. Keyloggers c. Keylogers activated by clicking on a highlighted word or image on the
b. Keylogging d. Keyloging screen?
a. HyperText c. Hyperlink
6. This is the use specialized manipulation software running b. Hyperlinkages d. Linkages
on a computer or terminal that allows users to create, edit, .
store, and print out text documents. 15. It is an original creation, and grants the holder of the
a. PowerPoint Presentation c. Spreadsheet copyright exclusive control over when, how, and by whom
b. Microsoft Outlook d. Word processing their work may be copied, distributed, or exhibited..
a. Copyright Law Protect c. Pattern
7. It is a tab that offers several different ways to format a b. Copyright Infringement d. Trademark
document using Themes or by selecting a Style Set. Law
a. Design & Page layout Tab c. Theme Tab and Design
Tab 16. Which of the following the correct term for ICT?
b. Design Tab only d. Style Set Tab a.Information c. Information and
Communication Technology Communication Technology
8. What do you call an electronic document in which data is b.Information d. Information and
arranged in the rows and columns of a grid and can be Communication and Communications
manipulated and used in calculations? Technology Technology
a. PowerPoint Presentation c. Spreadsheet
b. Microsoft Outlook d. Word processing 17. This is a tool in Insert Tab that ordered a list of the
headings in a document, along with the page number on
9. This is the use of specialized manipulation software which the heading is found.
running on a computer or terminal that allows users to create, a. HyperText c. Hyperlink
edit, store, and print out text documents. b. Hyperlinkages d. Linkages
a. PowerPoint Presentation c. Spreadsheet
b. Microsoft Outlook d. Word processing 18. This is a tool in Insert Tab that is used to create a large
capital letter at the beginning of a paragraph.
a. Quick Parts c. Font style
b. Drop Cap d. Word Art
19. Which of the following is the correct term of DNS? 31. Which tab should be used to select format to insert citation?
a. Defense National System c. Domain Network System a. Reference Tab c. Insert Tab
b. Defense National Security d. Domain Name System b. Review Tab d. View Tab
20. Which of the following is the correct formulated search 32. This would indicate that the word is misspelled.
strings for the phrase “Radial side not center”? a. Red line c. Green line
a. “Radial” and side not c. “Radial” + side not center b. Blue line d. Dot line
center
b. “Radial” and “side” not d. “Radial” + “side” not 33. Which Microsoft Office products do you work with
center center animations?
a. Presentation c. Word Processor
21. Dubbed as the most common worm ever, spread its b. Spreadsheet d. Publisher
damage through Microsoft products by being inside email
attachments or part of e-mail messages. 34. This would indicate that there is grammatical error if using
a. Nimda c. Sobig Microsoft Office Word 2016
b. Klez d. Meliza a. Red line c. Green line
b. Blue line d. Dot line
22. What shortcut keys you used to change your font style in word
processor? 35. It is one way to protect your document.
a. ALT + H + FF c. ALT + H + FC a. Mark as final c. Restrict Access
b. ALT + H + FS d. ALT + H + FD b. Restrict Editing d. Encrypt with Password
23. What shortcut keys you used to change your font size in word 36. Which of the following is the correct formulated search strings
processor? for the phrase “What are the building blocks of graphics”?
a. ALT + H + FF c. ALT + H + FC a. “building blocks” and c. “what” and building block or
b. ALT + H + FS d. ALT + H + FD graphics graphics
b. “building blocks” or d. “what” and “building block”
24. What shortcut keys you used to highlight all your documents graphics not graphics
in word processor?
a. CTRL + Y c. CTRL + B 37. It refers to word processing component of the Microsoft
b. CTRL + A d. CTRL + Z Office Suite.
a. Word Document c. Microsoft Word
25. What shortcut keys you used to justify all your documents in b. Word Processor d. Microsoft Outlook
word processor?
a. CTRL + G c. CTRL + J 38. Among the following, which one is the correct term for
b. CTRL + K d. CTRL + L iOS?
26. It is a tool in View Tab that automate input sequence that a. Internet Operating c. iPhone Operating Systems
imitates keystrokes or mouse actions. Systems
a. MACROS c. SWITCH WINDOWS b. internet Operating d. Iphone Operating Syetems
b. MICROS d. SPLIT WINDOWS Systems
27. It is a method of acquiring sensitive personal information like 39. This type of function and corrects mistake in copies of
passwords and credit card details. printed text before the final copies are printed.
a. Pharming c. Security a. Microsoft Editor c. Track Changes
b. Adware d. Phishing b. Proof reading d. Spelling and Grammar
28. It is a useful tool for reports containing textual, numerical, and 40. What is the smallest font size tool in formatting toolbar?
presentation features. a. 2 c. 6
a. Program c. Microsoft Excel b. 4 d. 8
b. Microsoft Office d. Application Software
41. In what year DARPA founded?
29. It is a feature in Word where you can merge boilerplate a. 1957 c. 1958
information in a form of letter with a variable. b. 1947 d. 1948
a. Email Messages c. Mail Merge
b. Envelope Merges d. Envelope 42. A person who utilizes technology in an appropriate
manner including etiquette, communication, education,
30. This function adds all the value of cells in the arguments. access, commerce,
a. Average c. Count responsibility, rights, safety, and security.
b. Sum d. AutoSum a. Cyber Citizen c. Peopleware
b. Cyber Nitizen d. CyberHuman
43 This type of function and corrects mistake in copies of printed
text before the final copies are printed.
a. Microsoft Editor c. Track Changes
b. Proof reading d. Spelling and Grammar
44. It is a table used to store and display data. The tables are
arranged by rows and column.
a. Excel c. Microsoft Excel
b. Word d. Spreadsheet
45. An exclusive right granted for an invention, which is a product
or a process that provides, in general, a new way of doing
something, or offers a new technical solution to a problem.
a. Patent c. Copyright Infringement
b. Pattern d. Trademark
46. It is the address space allocated by inter INC to allow
organization to create their own private network
a. IP Address c. Private IP Address
b. Public IP Address d. Public IP Address and
Private IP Address
47. Which of the following is the correct formulated search
strings for the phrase “Emphasis express harmonious not
force”?
a. “Emphasis” + harmonious c. “Emphasis” + express and
not force harmonious not force
b. “Emphasis” + d. “Emphasis” +
“harmonious” not force “harmonious” not force
48. What was the foundation of Data Communication for the
WWW?
a. Batch Processing c. HTTPS
b. HTTP d. Semantic Web
49. It is a software system used to gather information in the World
Wide Web.
a. Search Engine c. Google Chrome
b. Browsers d. Mozilla Firefox
50. This symbol is used to begin all formulas.
a. = c. +
b. x d. sum