0% found this document useful (0 votes)
73 views5 pages

Ict - Ed Tech Reviewer B

The document discusses various topics related to information and communication technology including predictive policing, gigabytes, mail merge functions, computer troubleshooting, the internet, active learning, hyperlinks, distance learning, spreadsheet applications, Excel formulas, mail merge, critical thinking, spam, computer-aided design systems, technology applications, CSS, operating systems, peripheral devices, Microsoft, net neutrality, search engines, learning management systems, input devices, electronic classrooms, virtual reality, time shifting, artificial intelligence, copyright, blue light, flipped classrooms, website security, information technology, mobile devices, e-learning, and green computing.

Uploaded by

maryjeandolino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views5 pages

Ict - Ed Tech Reviewer B

The document discusses various topics related to information and communication technology including predictive policing, gigabytes, mail merge functions, computer troubleshooting, the internet, active learning, hyperlinks, distance learning, spreadsheet applications, Excel formulas, mail merge, critical thinking, spam, computer-aided design systems, technology applications, CSS, operating systems, peripheral devices, Microsoft, net neutrality, search engines, learning management systems, input devices, electronic classrooms, virtual reality, time shifting, artificial intelligence, copyright, blue light, flipped classrooms, website security, information technology, mobile devices, e-learning, and green computing.

Uploaded by

maryjeandolino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

INFORMATION AND COMMUNICATION TECHNOLOGY

LET REVIEWER UNIVERSITY

1. Law enforcement practice that involves analyzing data from traffic cameras, surveillance
footage, and social media postings for the purpose of preventing crimes before they are
actually committed.
a. Predictive Policing
b. Predictions
c. Preventing Crime
d. People Monitoring
2. What does GB (in ICT) stand for?
a. Gegatera
b. Gigabyte
c. Gigabits
d. Great Britain
3. Which is the most important reason why teachers preview materials to be used in class?
a. To gain confidence in using them.
b. To encourage viewers to be more focused.
c. To avoid potential problems that might occur while materials are in use
d. To ensure appropriateness of the materials with the objectives and target audience.
4. Where can you find the Start Mail Merge button?
a. File tab
b. Mailings tab
c. References tab
d. Home tab
5. What should you do if you have a problem with your computer in computer room?
a. Go to the attending personnel during a free period or lunch
b. Let it be secret for everyone
c. Let the teacher about what happened.
d. Call 911
6. What is a massive networking infrastructure in which any computer can communicate
with other computer as long as they are both connected to the internet?
a. Website
b. Web Page
c. Internet
d. Web
7. Students learn more when they see and read, hear and experience exercise design for
them.
a. Active Learning
b. Instructional Effectiveness
c. Cooperative Learning
d. Critical Thinking
8. Shortcut key for inserting hyperlinks?
a. Ctrl + I
b. Ctrl + K
c. Ctrl + J
d. Ctrl + H
9. Technology enables "Distance Learning Classes/ Training" to be held. Distance learning
classes/ training refers to?
a. A method where lesson, contents and educational tools can be managed and access easily
b. The ability for students to collaborate among themselves when doing their homework,
exercises or revisions
c. The ability to deliver and receive teaching and learning materials and sources from
anywhere around the world.
d. The use of computer hardware and software when teaching and learning
10. Which of the following computer application is used to enter mathematical calculation?
a. Microsoft Word
b. Microsoft PowerPoint
c. Microsoft Publisher

1 | LET REVIEWER UNIVERSITY


d. Microsoft Excel
11. In MS-Excel which of the following formulas will not be calculated?
a. +SUM (A1:A5)/ (10-10)
b. =SUM (A1:A5) *.5
c. =SUM (Sales)-A3
d. Both A and B
12. What feature of Microsoft Word allows you to efficiently create documents that have the
same general content but may have different recipients?
a. Print Merge
b. Mail Merge
c. Send Merge
d. View Merge
13. The structure and use of technology can promote higher-level thinking skills.
a. Active Learning
b. Cooperative Learning
c. Critical Thinking
d. Instructional Effectiveness
14. Unwanted email mostly from bots or advertisers and can be used to send malware.
a. Malware
b. Phishing
c. Spam
d. Virus
15. In which kind of submission can your teacher see your progress, even before you
submit?
a. Create
b. Upload from resources
c. Upload from O365
d. Download from YouTube
16. "This system enable designers to view 3d objects under a wide variety of representations
and to test these objects by simulating real-world conditions." The above description can
be described as _______.
a. Computer Aided Manufacturing System
b. Computer Aided Design System
c. Global Positioning System
d. Learning Management System
17. Machinery and equipment developed from the application of scientific knowledge.
a. Technology
b. Device
c. Technology Applications
d. Electronic Classroom
18. CSS means __________.
a. Computer Software Servicing
b. Computer Systems Servicing
c. Computer Systems Software
d. Computer Solutions System
19. A computer uses this to organize all of the different files and applications it contains.
a. Folders
b. Hard Drive
c. Motherboard
d. Operating System
20. The following are technologies or activities used by the Government except ________.
a. Websites that provides up-to-date information
b. One stop center where user can buy variety of products
c. Websites that provides online services
d. devices, readers and scanners that improve security
21. Extra devices plugged into the ports on the computer are known as _________.
a. Flash Drive
b. External Storage
c. Peripheral Devices
d. Ports

2 | LET REVIEWER UNIVERSITY


22. The following are computer elements except ________.
a. Hardware
b. Software
c. Commonware
d. Peopleware
23. Students enjoy playing games, solving problems and working interactively with computer
lesson, modules and practice exercise.
a. Active Learning
b. Critical Thinking
c. Instructional Effectiveness
d. Multisensory Delivery
24. The use of Internet and Web sites to provide and support pharmacy care.
a. Telemedicine
b. Telepharmacy
c. Tele surgery
d. Tele website
25. A thing made or adapted for a purpose, especially a piece of mechanical or electronic
equipment.
a. Device
b. Technology
c. e-learning
d. Integrate
26. Why should you save your work to your OneDrive instead of the desktop?
a. Your work will stay on your desktop forever
b. Office 365 isn't available from home
c. It's what all the cool kids use
d. You can access the work from any device
27. What do folders help for?
a. Saving Files
b. Sharing Files
c. Organizing Files
d. Deleting Files
28. Which leading computer software business created programs like Word, Excel and
PowerPoint?
a. Google
b. Apple
c. Microsoft
d. DELL
29. A government policy that required Internet Service Providers to allow equal access to all
web content.
a. Net Neutrality
b. Networking
c. Netscaping
d. Net Policies
30. What gadget allows you to make calls, send text messages and surf the Net?
a. Smart Watch
b. 3D Printer
c. Electronic Paper
d. Webcam
31. Embedded computers imitate functions of cochlea of the ear and allow a deaf person to
listen.
a. Electrodes Implant
b. Cochlear Implant
c. Cardiac Pacemaker Implant
d. Neural Network
32. This is a specialized website that's designed to help you find other websites.
a. URL address
b. Search Engine
c. Web Page
d. Microsoft

3 | LET REVIEWER UNIVERSITY


33. Software used for administering online assignments, schedules, examinations, and
grades.
a. Educational Software
b. Learning Management System
c. Online Tuition
d. E-test Registering Tool
34. Choose the device that can be categorized as Input Device
a. Monitor
b. Keyboard
c. Printer
d. Speaker
35. A classroom equipped with multimedia devices to enhance the learning experience.
a. Electronic Classroom
b. Flipped Classroom
c. Technology Applications
d. Science Laboratory Room
36. What is meant by Moral Right?
a. The right to be acknowledged
b. The right to be nice
c. The right to say what you think
d. The right to use work
37. Computer use to simulate a real or imagined environment that appears as 3 –
dimensional space.
a. Neural Network
b. Capsule Endoscopy System
c. Virtual Reality
d. Cochlear Implant
38. To record or download files so that you can view at a later date is called __________.
a. Private Use
b. Time Shifting
c. Fair Use
d. Moral Right
39. An area of computer science that focuses on intelligent machines.
a. Artificial Intelligence
b. Robotics
c. Chemist
d. Intellect
40. Content that is owned by a copyright holder.
a. Intellectual Property
b. Computer Science
c. Copyright Rights
d. Integrity
41. A range of the visible light spectrum, typically used to refer to light emitted from
electronic devices, which can lead to eyestrain, headaches, fatigue, and long-term vision
problems.
a. Blue Light
b. Red Light
c. Flash Light
d. Dark Light
42. Employees using their company's internet connection for personal use on company time.
a. Cyberbullying
b. Cyberloafing
c. Cybersurfing
d. Cybercrook
43. Shortcut key for the slideshow presentation?
a. F1
b. F3
c. F5
d. F7

4 | LET REVIEWER UNIVERSITY


44. Students learn lessons at home with the help of videos or other instructional materials
and spend their classroom time doing assignments with help from their instructor.
a. Flipped Classroom
b. Integrate
c. Technology Applications
d. Technology
45. A website is secure when it has ________.
a. A smiley face
b. A message saying it is secure
c. A padlock symbols
d. No bad language
46. A discipline that is dedicated to meeting the computer needs of businesses, schools,
governments, and other organizations.
a. Computer Science
b. Information Systems
c. Information Technology
d. Computer Programming
47. Computing device small enough to hold in your hand.
a. Mobile Computer
b. Embedded Computer
c. Mobile Device
d. Personal Computer
48. A web-based learning environment that allows instructors and students to interact
through the computer without worrying about time or place.
a. Technology
b. Device
c. e-Learning
d. Electronic classroom
49. Environmentally sound policies that prescribe energy efficiency, recycling, and eco-
friendly disposal of electronic equipment.
a. Green Computing
b. Green Systems
c. Going Green
d. Green Computers
50. Personal behaviors that build responsibility and trust. Computer ________ requires more
than just avoiding unlawful acts but also upholding standards such as confidentiality,
human dignity, civility, and property rights.
a. Ethics
b. Principles
c. Privacy
d. Rights

5 | LET REVIEWER UNIVERSITY

You might also like