0% found this document useful (0 votes)
13 views4 pages

Empowerment Tech-11-1stquarter

The document is a periodical exam for the Empowerment Technology subject at Emilio Jacinto National High School in the Philippines for the 2024-2025 academic year. It includes general instructions regarding exam conduct and a series of multiple-choice questions covering topics such as malware, internet safety, and design principles. The exam is prepared and reviewed by designated school staff.

Uploaded by

jomari.rafael001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

Empowerment Tech-11-1stquarter

The document is a periodical exam for the Empowerment Technology subject at Emilio Jacinto National High School in the Philippines for the 2024-2025 academic year. It includes general instructions regarding exam conduct and a series of multiple-choice questions covering topics such as malware, internet safety, and design principles. The exam is prepared and reviewed by designated school staff.

Uploaded by

jomari.rafael001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Republic of the Philippines

Department of Education
National Capital Region
Schools Division Office-Quezon City
EMILIO JACINTO NATIONAL HIGH SCHOOL
Pingkian Road, Pasong Tamo, Quezon City

Periodical Exam
Empowerment Technology
2024-2025

GENERAL INSTRUCTIONS:
¨ The use of all types of electronic gadgets during the conduct of examinations is strictly prohibited.
¨ Kindly use a No. 2 pencil with eraser, in accomplishing the Answer Sheet.
¨ Refrain from looking/staring from others’ examination paper, asking anything or borrowing something from one’s seatmates.
Doing so is tantamount to cheating. Violators will be apprehended and will be endorsed to the Guidance Unit/School
Principal’s Office for appropriate corrective action.
Instruction: Read and understand carefully and, Choose the best answer

1. It is malicious software a blanket term for viruses, worms and trojans designed to damage the computer?
A. Adware C. Phishing
B. Spam D. Malware
2. A malicious program set of commands designed to replicate itself and transfer from one computer to another neither
through internet and local network data storage and flash drive.
A. Malware C. Virus
B. Trojan D. Worm
3. A standalone malware replicate itself transfer from one computer to another without a human interaction
A. Virus C. Malware
B. Worm D. All of the above
4. It is invented by Onel De Guzman to destroy all kinds of files including photographs, audio files documents.
A. Fake website C. Spam email
B. Love bug worm D. Social Network
5. Who is the creator of malware, virus, worm, trojan designed to damage the computer and gain unathorized access.
A. Computer Engineer C. Web developer
B. Computer Technician D. Hacker
6. It’s a goal to acquire sensitive personal information, like password and credit card details.
A. Pharming C. Spam
B. Phishing D. Spyware
7. One of the most dangerous malware types, disguised as a useful program.
A. Adware C. Trojan
B. Spyware D. Royal Audencia
8. It is an unwanted software designed to advertisements up on your screen. Example, pop-up ads and banner
A. Spyware C. Adware
B. Malware D. Phishing
9. It is happening when a hacker directs an internet user to a fake website instead of a legitimate one. Usually focus on
websites in the financial sector, including banks, online payment platforms, or other e-commerce destinations.
A. Pharming C. Spam
B. Phishing D. Malware
10. Unwanted email mostly comes from bots or advertisement, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent.
A. Malware C. Spam
1st Periodical Exam – Empowerment Technology page 1 of
4
B. Adware D. Phishing
11.What is Netiquette?
A. Using a net to catch fish C. Presenting proper manners at the dinner table
B. Being mean to other people on Facebook D. Showing manners and etiquette on the Internet
12. What is the operating system of Nokia?
A. Andriod C. Symbian OS
B. IOS D. Window 10
13. Your social media friends list should only be composed of __________.
A. Your favorite brands C. Anyone who sends you a friend request
B. Family and friends D. Foreigners
14. Which of the following should you never give on the internet?
A. Your age C. Your address
B. Your name D. All of the above
15. What should you do if you feel you are being cyber-bullied?
A. Call the police C. Tell a trusted adult like a parents or teacher
B. Tell no one, its embarrassing D. Just delete anything referring to you on the internet
16. What should you avoid doing in a chat room?
A. Posting your address C. Revealing financial information
B. Posting your phone number D. All of the above.
17. The Golden Rule of Netiquette is _________
A. Remember the human C. Don’t follow the rules of netiquette
B. A smiley in every message D. Type in all caps when you’re angry.
18. You’ve been sent a virus warning, what should you do now?
A. Ignore it. C. Forward it to everyone in your address book.
B. Forward it within your company D. Go to a security website to learn if it is a real virus
19. A flame is ____________
A. An online chain letter C. A person who consistenly breaks the rules of netiquette
B. An expert programmer D. A post message that expresses a strong opinion or criticism
20. What should you never do if you get an embarrassing picture from someone?
A. Talk to the person again C. Tell to your parents or a teacher
B. Send it on to other friends D. Discourage the person from sending pictures like that
21. What is considered shouting over the Internet?
A. Screaming at your computer C. Putting a lof of exclamation marks at the end of the
sentence.
B. Writing in all CAPS D. Not answering a friend request on Facebook.
22. Uses GPS to detect location and used for navigation. Example: Google map and waze
A. Mapping C. Social Media
B. Cloud Computing D. Presentation or Visualization
23. Allows large group of people to create, share or exchange information, interest. Example: Facebook and Twitter
A. Social Media C. Mapping
B. Cloud computing D. File Management
24. Originally used for smartphone, now used for smart TV.
A. Symbian OS C. Windows
B. Web OS D. Andriod
25. A way of using satellite data to show where something is on a map, give users directions.
A. Social Media C. Cloud Computing
B. Presentation of Visualization D. GPS
26. It is the practice of using network of remotes hosted on the internet. Example: Google drive
A. File Management C. Presentation or Visualization
B. Cloud Computing D. Mapping
27. Allows you to present, share presentations, and infographics. Example: Canva
A. Mapping C. Presentation or Visualization
B. File Management D. Cloud Computing

1st Periodical Exam – Empowerment Technology page 2 of


4
28. This referred to as read only web, static page, not allowed for comments, editing and account creation.
A. World Wide Web C. Web 1.0
B. Online Platform D. Web 2.0
29. It is dynamic webpage users can interact with the sites, users may able to comment or create account.
A. Web 1.0 C. Information Communication and Technology
B. Web 2.0 D. Internet
30. What is the function of Microsoft Excel using addition?
A. MIN C. AVERAGE
B. SUM D. CONCATENATE
31. What is the function of Microsoft Excel using subtraction?
A. SUM C. MIN
B. AVERAGE D. CONCATENATE
32. Function of Microsoft Excel using list of names?
A. AVERAGE C. SUMIF
B. CONCATENATE D. COOUNTIF
33. The function is used to reverse a mistake, such as deleting the wrong word in a sentence.
A. REDO C. UNDO
B. Control Alt Delete D. Control P
34. The blinking vertical line in the document screen indicates where text will appear when you begin typing.
A. Insertion Point C. Title Bar
B. Ruler D. File Tab
35. A basic design principle that make certain element of a design stand out.
A. Balance C. Alignment
B. Emphasis D. Contrast
36. It refers to the proper placement of an element to your design, just like invisibly placing we apply are center, right,
left and justified.
A. Balance C. Alignment
B. Emphasis D. Graphics
37. Which font color is best to use if the background on your valentine card is red?
A. Blue C. Violet
B. Green D. White
38. What other elements of design can be repeated aside from color, header style, and fonts?

39. Which of the following refers to the plan of creating an idea through a combination of texts, images, and other
elements that are placed together artistically?
A. Design C. Layout
B. Graphic D. Message
40. It deals with the use of different communication technologies such as mobile phone, telephone and internet.
A. World Wide Web C. Internet
B. Information Communication and Technology D. Social Media
41. These are sites that allows you to upload and share media content like images, music and video
A. Social News C. Media Sharing
B. Social Media D. Microblogging
42. Arrange information using freely choosen keywords tagging. Example: Twitter
A. Folksonomy C. User Participation
B. Long tail D. Rich user experience
43. Android is for smartphone IOS is for?
A. Symbian OS C. Iphone
B. Web OS D. Blackberry
44. Subscribe a data plan that changes you the time you spent. Example: Youtube Premium, Netflix
A. Mass Participation C. Longtail
B. Folksonomy D. User Participation
45.

1st Periodical Exam – Empowerment Technology page 3 of


4
Prepared by: Reviewed by: Noted:

JOMARI T. RAFAEL Norvin Aquerido AMMAR N. TORREVILLAS, Ed.D.


Subject Teacher Subject Coordinator School Principal II

1st Periodical Exam – Empowerment Technology page 4 of


4

You might also like