ICT-2112-2012S Empowerment
Technologies (E-Te
             Quarter 1: Performance Task 1 10/10
    _____ are programs that are directly installed in a computer or device
    Native applications
    Which of the following is NOT true?
    Google's only server is located in California
    The following are benefits of cloud computing except _____
    Proficiency
    A computer that does a task for other computers is called a _____
    Server
    Which of the following statements is NOT true?
    Only your full name can be used as a username.
    Which of the following can be used in identity theft?
    All
    Which of the following is NOT true about passwords?
    Passwords should not be memorized
    Which of the following does not help you avoid getting a virus?
    Downloading pirated programs
    is your alias, which is used by websites to represent your online presence.
    Username
    _____ websites change appearance and behavior based on users' action
    Dynamic
             Quarter 1: Written Work 1 18/20
       You want to know if classes are suspended because of a storm. Which of the
       following TLD's is most likely to have the most credible information
        .gov
    Clicking on a search result using the _____ will open the link in a new tab.
       Mouse wheel
    People who send unwanted and unsolicited emails are called _____
       Spammers
    Which of the following TLD's is most likely to be owned by a university?
       .edu
    Which of the following can be used in identity theft?
       All
    While you are typing your keyword in the address bar or the search bar, several _____
    may appear bellow it
       Suggestions
    Which of the following TLD's is most likely to be used by non-profit groups?
        .org
    A _____ page is about a single topic and can be edited by anyone with the right
    credentials
       Wiki
    You copied an essay that you found online and submitted it in an essay writing contest.
    You have committed _____.
       Plagiarism
    A member of an online community constantly sends messages about products that he is
    selling. You can report this person for _____.
       Spamming
    .edu stands for
   Education
Which of the following details is NOT essential in citing a source
    article's address or URL
_____ Internet-based networks that are used to store, manage, and share resources and
information
   Cloud Computing
Servers are housed in centralized locations called _____
   Data centers
You used your smartphone to access Yahoo mail and send an email. In this scenario,
your smartphone is a _____
   Server
You can check an article's _____ to know if the information that it contains is updated.
   Publication date
Which of the following is not a factor that can be used to determine a source's
credibility?
   The article's length
_____ is a secret group of characters used to unlock your account
   Password
.org stands for
   Organization
Which of the following statements is NOT true?
   Phishing is a type of virus that can make copies of itself
           Quarter 1: Performance Task 2 10/10
       In a spreadsheet, the vertical groupings are called _____.
        Columns
    What is the name of the of spreadsheet application that was used in this chapter?
       LibreOfficeCalc
    A group of programs used to view, manipulate, and print computer graphics is called a
    _____.
       Graphics suite
    What sign is used for multiplication?
       *
    In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1
       25500
    A program used to create, store, and manage data in tables.
       Spreadsheet
    In Calc, what sign can be seen in the beginning of the formulas?
        C
    A program used to create, edit, and print documents is called a _____
       Word processor
    What do you call software that are used to create information like documents,
    spreadsheet, presentations, etc?
        Productivity tool
    Adding information from a database to a document is called _____.
       Mail Merge
          Quarter 1: Written Work 2
    Bcc stands for _____
       Blind Carbon Copy
    _____ is the legal right to own an original work
       Copyright
    You bought an artist's album then you made and sold copies of it. What you did is
    called _____.
       Counterfeiting
    Which of the following is TRUE?
       By default, Gmail will delete a message in the Trash after 30 days.
    Which of the following is true?
       The domain part comes before the @ sign
    _____ is derived from a Hawaiian word that means super fast.
       Wiki
    Web 2.0 websites were _____.
       Static
    Web 2.0 websites is best described by which of the following?
       Ubiquitous