This document contains a summative test for students with multiple choice and enumeration questions about information and communication technology (ICT) topics like social media, the evolution of the web, online safety, and mobile technologies. The test has two parts - a 30 question multiple choice section and two short answer enumeration sections asking students to list trends in ICT, mobile technologies, features of Web 2.0, and online safety tips. The document provides the test questions, sections for students to write their answers and score, and identifies the teacher who prepared the assessment.
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
Group 1
1. Which of the following is NOT a basic computer operation?
a. Processing
b. Storage
c. Input
d. Throughput
2. The computer function in which raw data is received is known as:
a. processing.
b. output.
c. input.
d. storage.
3. The most important type of memory that a typical computer uses during the processing operation is ________ memory.
a. flash
b. storage
c. random access
d. read-only
4. Typing a document into the computer is an example of:
a. output.
b. processing.
c. storage.
d. input.
5. A feeling of anxiety and incapacity experienced when people are presented with more information than they can handle is known as:
a. digital distress.
b. digital anxiety.
c. computerized stress syndrome.
d. information overload.
6. Which of the following is a type of product that complements the human body’s best posture and functionality?
a. Esoteric
b. Ergocentric
c. Ergonomic
d. Natural
7. ________ is a portable, wireless, paperback-sized e-book reading device that includes a text-tospeech function.
a. Kindle 2
b. Netbook
c. Wiki
d. Digital e-book
8. The most widely used pointing device is the:
a. keyboard.
b. trackball.
c. mouse.
d. joystick.
9. The ________ is a pattern of bars printed on merchandise that stores information about the item.
a. MICR
b. OMR
c. EDI
d. UPC
10. A representation of an image as a matrix of pixels is called a ________ image.
a. digit recognition
b. scanned
c. digitized
d. bit-mapped
11. What is the resolution of an Ultra Extended Graphic Array adapter?
a. 800 x 600
b. 1,280 x 1,024
c. 1,024 x 768
d. 1,600 x 1,200
12. A pie-shaped wedge of a hard disk is called which of the following?
a. Track
b. Cluster
c. Platter
d. Sector
13. The amount of time it takes a device from the request for information to that information’s delivery is known as: a. cycle time.
b. cache time.
c. read time.
d. access time.
14. Starting a computer that is already turned on is called a:
a. power on.
b. warm load.
c. cold boot.
d. warm boot.
15. System utilities:
a. have to be accessed through applications.
b. are loaded before the operating system is loaded.
c. perform functions such as protecting your computer from viruses.
d. include features such as a word-processing program.
16. Virtual memory is an enhanced way to utilize the main memory by:
a. creating pages of variable size to use when the swap file is full.
b. using a part of ROM as an extension of RAM to conserve the main memory.
c. using a hard disk swap file when memory is full.
d. dividing data and instructions into multitasking units.
17. Which of the following computer interfaces is the most popular?
a. GUI
b. Menu-driven
c. Shortcut keystrokes
d. Command-line
18. ________ is a Windows 7 feature, which enables users to instantly see a list of relevant documents, pictures, music, and e-mails on their PCs that match the entered description.
a. Snap
b. Jump list
c. Windows Search
d. Pin
19. The right way to select a computer requires all of the following EXCEPT.
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Amber Espiritu
5th Slide video showing source: https://www.youtube.com/watch?v=rDkxsNmKDGk&t=5s
Feel free to change some content, but please be mindful about acknowledging the source .
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
Group 1
1. Which of the following is NOT a basic computer operation?
a. Processing
b. Storage
c. Input
d. Throughput
2. The computer function in which raw data is received is known as:
a. processing.
b. output.
c. input.
d. storage.
3. The most important type of memory that a typical computer uses during the processing operation is ________ memory.
a. flash
b. storage
c. random access
d. read-only
4. Typing a document into the computer is an example of:
a. output.
b. processing.
c. storage.
d. input.
5. A feeling of anxiety and incapacity experienced when people are presented with more information than they can handle is known as:
a. digital distress.
b. digital anxiety.
c. computerized stress syndrome.
d. information overload.
6. Which of the following is a type of product that complements the human body’s best posture and functionality?
a. Esoteric
b. Ergocentric
c. Ergonomic
d. Natural
7. ________ is a portable, wireless, paperback-sized e-book reading device that includes a text-tospeech function.
a. Kindle 2
b. Netbook
c. Wiki
d. Digital e-book
8. The most widely used pointing device is the:
a. keyboard.
b. trackball.
c. mouse.
d. joystick.
9. The ________ is a pattern of bars printed on merchandise that stores information about the item.
a. MICR
b. OMR
c. EDI
d. UPC
10. A representation of an image as a matrix of pixels is called a ________ image.
a. digit recognition
b. scanned
c. digitized
d. bit-mapped
11. What is the resolution of an Ultra Extended Graphic Array adapter?
a. 800 x 600
b. 1,280 x 1,024
c. 1,024 x 768
d. 1,600 x 1,200
12. A pie-shaped wedge of a hard disk is called which of the following?
a. Track
b. Cluster
c. Platter
d. Sector
13. The amount of time it takes a device from the request for information to that information’s delivery is known as: a. cycle time.
b. cache time.
c. read time.
d. access time.
14. Starting a computer that is already turned on is called a:
a. power on.
b. warm load.
c. cold boot.
d. warm boot.
15. System utilities:
a. have to be accessed through applications.
b. are loaded before the operating system is loaded.
c. perform functions such as protecting your computer from viruses.
d. include features such as a word-processing program.
16. Virtual memory is an enhanced way to utilize the main memory by:
a. creating pages of variable size to use when the swap file is full.
b. using a part of ROM as an extension of RAM to conserve the main memory.
c. using a hard disk swap file when memory is full.
d. dividing data and instructions into multitasking units.
17. Which of the following computer interfaces is the most popular?
a. GUI
b. Menu-driven
c. Shortcut keystrokes
d. Command-line
18. ________ is a Windows 7 feature, which enables users to instantly see a list of relevant documents, pictures, music, and e-mails on their PCs that match the entered description.
a. Snap
b. Jump list
c. Windows Search
d. Pin
19. The right way to select a computer requires all of the following EXCEPT.
Compare & contrast the nuances of varied online platforms-CS_ICT11/12-ICTPT-I...Amber Espiritu
5th Slide video showing source: https://www.youtube.com/watch?v=rDkxsNmKDGk&t=5s
Feel free to change some content, but please be mindful about acknowledging the source .
Enter your answers to each of the questions here. Just enter t.docxmealsdeidre
Enter your answers to each of the questions here.
Just enter the letter A, B, C, D, E, T or F, not the whole answer.
1.
26.
51.
76.
2.
27.
52.
77.
3.
28.
53.
78.
4.
29.
54.
79.
5.
30.
55.
80.
6.
31.
56.
81.
7.
32.
57.
82.
8.
33.
58.
83.
9.
34.
59.
84.
10.
35.
60.
85.
11.
36.
61.
86.
12.
37.
62.
87.
13.
38.
63.
88.
14.
39.
64.
89.
15.
40.
65.
90.
16.
41.
66.
91.
17.
42.
67.
92.
18.
43.
68.
93.
19.
44.
69.
94.
20.
45.
70.
95.
21.
46.
71.
96.
22.
47.
72.
97.
23.
48.
73.
98.
24.
49.
74.
99.
25.
50.
75.
100.
Multiple Choice
1. What is a term that is often used unilaterally to describe any "online" content but ultimately includes digital transmittable text, graphics, audio, or video content?
A. Consumable Content
B. Digital Media
C. Web 2.0 Media
D. Social Media
2. Graphics that employ video and animation to present the appearance of motion are called:
A. Videos
B. Infographics
C. Motion Graphics
D. Animated Gifs
3. The mission of the World Wide Web Consortium is to:
A. Guide the development of the World Wide Web through the creation and endorsements of protocols to help content creators and consumers better understand the internet.
B. Provide a list of best practices for people who create websites and applications.
C. Protect the rights of people with disabilities by ensuring that the World Wide Web remains available to all no matter what their circumstance.
D. To allow individuals who represent technology companies from around the globe to come together and discuss the trends and history of the World Wide Web.
4. Beliefs and actions that reflect and align with societal and individual values are:
A. Digital Stewardship
B. Online Honest Policy
C. Digital Dogma
D. Ethical Behavior
5. The effect that digital media has had on the reporting on and consumption of news and how political methodology, communication to and perception by the general public has changed as a result of new media.
A. Communication Theory
B. Social Networking
C. Digital Media Impact on News & Politics
D. Impact of Interface Design
6. The term Web 2.0 was coined in 2004 by:
A. Tim O'Reilly
B. Tim Berners-Lee
C. Tim Tebow
D. Tim McGraw
7. In our weekly discussion, your classmate, Matt Gomez brought up the Arab Spring and the civil unrest in Ferguson to give examples of the double edge sword of social media. What issue related to social media did he bring up?
A. The growing number of social media platforms
B. The lack of bandwidth in rural communities
C. The lack of privacy of social media
D. The speed that information can travel
8. A term first introduced by Gareth White at the University of Sussex describes people who are left behind the innovation curve with respect to new advances in technology. When it comes to the Internet, this term could refer to people who are unable to perform a function, such as making a purchase .
L1 Introduction to Information and Communication Technology.pptxizarahmendoza
Information and communication are fundamental components of human interaction and the functioning of societies, economies, and the global community. They form the backbone of modern civilization, facilitating the exchange of knowledge, ideas, and resources across geographical boundaries and cultural divides. Let's break down each of these concepts:
Information:
Information refers to data that has been processed, organized, and structured to convey meaning and provide insight into a particular subject or context. It can take various forms, including text, images, audio, video, and numerical data. Information is essential for decision-making, problem-solving, learning, and innovation in all aspects of life.
Characteristics of Information:
Accuracy: Information should be reliable and free from errors or distortions to ensure its credibility and usefulness.
Relevance: Information should be pertinent to the subject or context at hand to fulfill its intended purpose.
Timeliness: The timeliness of information is crucial, as outdated or obsolete information may lose its value or relevance over time.
Accessibility: Information should be easily accessible to those who need it, whether through traditional means like books and libraries or digital platforms like the internet.
Security: Protecting sensitive or confidential information from unauthorized access, manipulation, or disclosure is essential to maintain trust and integrity.
Communication:
Communication involves the exchange of information, ideas, thoughts, and feelings between individuals or groups through various channels and mediums. It is a fundamental aspect of human interaction and plays a central role in building relationships, fostering collaboration, and promoting understanding and cooperation.
Modes of Communication:
Verbal Communication: The use of spoken language to convey messages, ideas, or instructions, either face-to-face or through mediums like telephone calls or video conferencing.
Written Communication: The use of written language, such as letters, emails, reports, or memos, to communicate information over time and space.
Nonverbal Communication: The transmission of messages through gestures, facial expressions, body language, and other nonverbal cues, which often convey emotions and attitudes.
Visual Communication: The use of visual elements like images, graphs, charts, diagrams, and videos to communicate complex information quickly and effectively.
Importance of Information and Communication:
Knowledge Sharing: Information and communication enable the dissemination and sharing of knowledge, fostering learning, innovation, and intellectual growth.
Decision Making: Access to timely and accurate information facilitates informed decision-making at individual, organizational, and societal levels.
Social Interaction: Communication connects people, communities, and cultures, fostering social cohesion, empathy, and mutual understanding.
Economic Development: Information and communicati
Building Your Own Instagram Clone A Comprehensive Guide (1).pdfOmninosSolution2
Instagram is undoubtedly one of the most popular social media platforms in the world, with billions of users sharing photos and videos every day. Its success has inspired many entrepreneurs and developers to create their own versions of the platform, commonly referred to as "Instagram clones
Enter your answers to each of the questions here. Just enter t.docxmealsdeidre
Enter your answers to each of the questions here.
Just enter the letter A, B, C, D, E, T or F, not the whole answer.
1.
26.
51.
76.
2.
27.
52.
77.
3.
28.
53.
78.
4.
29.
54.
79.
5.
30.
55.
80.
6.
31.
56.
81.
7.
32.
57.
82.
8.
33.
58.
83.
9.
34.
59.
84.
10.
35.
60.
85.
11.
36.
61.
86.
12.
37.
62.
87.
13.
38.
63.
88.
14.
39.
64.
89.
15.
40.
65.
90.
16.
41.
66.
91.
17.
42.
67.
92.
18.
43.
68.
93.
19.
44.
69.
94.
20.
45.
70.
95.
21.
46.
71.
96.
22.
47.
72.
97.
23.
48.
73.
98.
24.
49.
74.
99.
25.
50.
75.
100.
Multiple Choice
1. What is a term that is often used unilaterally to describe any "online" content but ultimately includes digital transmittable text, graphics, audio, or video content?
A. Consumable Content
B. Digital Media
C. Web 2.0 Media
D. Social Media
2. Graphics that employ video and animation to present the appearance of motion are called:
A. Videos
B. Infographics
C. Motion Graphics
D. Animated Gifs
3. The mission of the World Wide Web Consortium is to:
A. Guide the development of the World Wide Web through the creation and endorsements of protocols to help content creators and consumers better understand the internet.
B. Provide a list of best practices for people who create websites and applications.
C. Protect the rights of people with disabilities by ensuring that the World Wide Web remains available to all no matter what their circumstance.
D. To allow individuals who represent technology companies from around the globe to come together and discuss the trends and history of the World Wide Web.
4. Beliefs and actions that reflect and align with societal and individual values are:
A. Digital Stewardship
B. Online Honest Policy
C. Digital Dogma
D. Ethical Behavior
5. The effect that digital media has had on the reporting on and consumption of news and how political methodology, communication to and perception by the general public has changed as a result of new media.
A. Communication Theory
B. Social Networking
C. Digital Media Impact on News & Politics
D. Impact of Interface Design
6. The term Web 2.0 was coined in 2004 by:
A. Tim O'Reilly
B. Tim Berners-Lee
C. Tim Tebow
D. Tim McGraw
7. In our weekly discussion, your classmate, Matt Gomez brought up the Arab Spring and the civil unrest in Ferguson to give examples of the double edge sword of social media. What issue related to social media did he bring up?
A. The growing number of social media platforms
B. The lack of bandwidth in rural communities
C. The lack of privacy of social media
D. The speed that information can travel
8. A term first introduced by Gareth White at the University of Sussex describes people who are left behind the innovation curve with respect to new advances in technology. When it comes to the Internet, this term could refer to people who are unable to perform a function, such as making a purchase .
L1 Introduction to Information and Communication Technology.pptxizarahmendoza
Information and communication are fundamental components of human interaction and the functioning of societies, economies, and the global community. They form the backbone of modern civilization, facilitating the exchange of knowledge, ideas, and resources across geographical boundaries and cultural divides. Let's break down each of these concepts:
Information:
Information refers to data that has been processed, organized, and structured to convey meaning and provide insight into a particular subject or context. It can take various forms, including text, images, audio, video, and numerical data. Information is essential for decision-making, problem-solving, learning, and innovation in all aspects of life.
Characteristics of Information:
Accuracy: Information should be reliable and free from errors or distortions to ensure its credibility and usefulness.
Relevance: Information should be pertinent to the subject or context at hand to fulfill its intended purpose.
Timeliness: The timeliness of information is crucial, as outdated or obsolete information may lose its value or relevance over time.
Accessibility: Information should be easily accessible to those who need it, whether through traditional means like books and libraries or digital platforms like the internet.
Security: Protecting sensitive or confidential information from unauthorized access, manipulation, or disclosure is essential to maintain trust and integrity.
Communication:
Communication involves the exchange of information, ideas, thoughts, and feelings between individuals or groups through various channels and mediums. It is a fundamental aspect of human interaction and plays a central role in building relationships, fostering collaboration, and promoting understanding and cooperation.
Modes of Communication:
Verbal Communication: The use of spoken language to convey messages, ideas, or instructions, either face-to-face or through mediums like telephone calls or video conferencing.
Written Communication: The use of written language, such as letters, emails, reports, or memos, to communicate information over time and space.
Nonverbal Communication: The transmission of messages through gestures, facial expressions, body language, and other nonverbal cues, which often convey emotions and attitudes.
Visual Communication: The use of visual elements like images, graphs, charts, diagrams, and videos to communicate complex information quickly and effectively.
Importance of Information and Communication:
Knowledge Sharing: Information and communication enable the dissemination and sharing of knowledge, fostering learning, innovation, and intellectual growth.
Decision Making: Access to timely and accurate information facilitates informed decision-making at individual, organizational, and societal levels.
Social Interaction: Communication connects people, communities, and cultures, fostering social cohesion, empathy, and mutual understanding.
Economic Development: Information and communicati
Building Your Own Instagram Clone A Comprehensive Guide (1).pdfOmninosSolution2
Instagram is undoubtedly one of the most popular social media platforms in the world, with billions of users sharing photos and videos every day. Its success has inspired many entrepreneurs and developers to create their own versions of the platform, commonly referred to as "Instagram clones
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. ALEJANDRO FIRMEZA MEMORIAL NATIONAL HIGH SCHOOL
Aguiauan, Miagao, Iloilo
ETECH
Summative Test
Name:____________________________ Grade/Section:___________Date:___________Score:________
Test I. Multiple Choice: Write the letter of the correct answer on the space before each number.
______________1. A web page that allows interaction from the user.
a. Static b. dynamic c. social d.comment
______________2. This refers to the feature where users are able to categorize and locate information through tagging.
a. Hashtags b. folksonomy c. taxonomy d.rich user experience
______________3. A feature of dynamic website that allows users to put their own content
a.Hashtags b. folksonomy c. taxonomy d.rich user experience
______________4. It provides common framework to allow data to be shared and reused across platform, enterprise,
and community boundaries
a. W3C b. Semantic web c. Web 1.0 d.Web 2.0
______________5. A malicious program disguised as a useful program but once downloaded or installed, leaves PC
unprotected and allows hackers to get your information.
a. trojan b. worm c. virus d. spyware
______________6. A program that runs in the background without knowing it. It has the ability to monitor that you
a. currently doing and typing through keylogging.
a. trojan b. worm c. virus d. spyware
______________7. According to this magazine,two Philippine cities are part of the top ten in the research about “the
Selfiest Cities around the World”.
a. People b. Time c. Readers digest d. Candy
______________8. This is the operating system for blackberry phones.
a.Blackberry os b. Symbian c. Windows mobile d. ios
______________9. Pinterest is a social media website that can be classified as
a. Bookmarking site b. media sharing c. microblogging d. blogs and forums
______________10. Currently, this is the fastest mobile network.
a.2G b.3G c. 4G d.5G
______________11. This media is designed to help people who have visual and reading impairments.
a. blogging b.microblogging c. social media d. hashtagging
______________12.What harmful online program is used to record key strokes done by users to steal passwords.
a.Adware b.Spyware c. Worms and Virus d. Cyberstalking
______________13. What type of threat happens when attacker uses electronic devices to do surveillance against its victim
a. Cyberbullying b.Spoofing c. Scamming d. Cyberstalking
______________14. What is flame in cyber space?
A person follows rule of netiquette
b. An expert programmer
c. An online chain letter
d. A post email message that expresses a strong opinion of critism
______________15. What do you call the second stage of development of the World Wide Web, characterized especially
by the change from static web pages to dynamic or user-generated content and the growth of
social media.
a.Web 4.0 b. Web 3.0 c. Web 1.0 d. Web 2.0
______________16. What do you call the type of web as connective intelligence; connecting data, concepts, and
applications of people?
a. Web 4.0 b. Web 3.0 c. Web 1.0 d. Web 2.0
______________17. What particular media which are evolving rapidly and while mobile phones will continue to be the
mainstay?
a. Etiquette b. Social media c. Internet safety d. Mobile media
_____________18. What do you call the knowledge of maximizing the user's personal safety and security risks to
Private information and property associated with using the internet, and the self-protection
from computer crime in general?
a. Etiquette b. Social media c. Internet safety d. Mobile media
2. SCORE:
______________19. What is a set of effects which can be applied to objects in PowerPoint so that they will animate in
the Slide Show Power Point?
a. complex formulas b. embed file c. hyperlinking d. custom animation
______________20. What refers to the use of multiple mathematical operators, as well as those that use absolute and
relative references?
a.complex formulas b. embed file c. hyperlinking d. custom animation
______________21 A link from a hypertext file or document to another location or file, typically activated
by clicking on a highlighted word or image on the screen?
a.complex formulas b. embed file c. hyperlinking d. custom animation
______________22. What refers to the visual image such as a chart or diagram used to represent information or data?
A.Infographics b. application platform c. open source d.image hosting
______________23. What particular computer software with its source code made available with a license in which the
copyright holder provides the rights to study, change, and distribute the software to anyone
and for any purpose?
I A. infographics b. application platform c. open source d.image hosting
______________24. What particular slide hosting service that can allow users to upload files privately or publicly in the
following file formats: PowerPoint, PDF, Keynote or Open Document presentations?
a.LinkedIn SlideShare b. cloud computing c.Prezi d. Google drive
______________25. What is a particular cross-platform, freemium app designed for note taking, organizing, and
archiving?.
a.Social media b. overnote c. dropbox d.twitter
______________26. What do you call the computer-mediated technologies that facilitate the creation and sharing of
, ideas, career interests and other forms of expression via virtual communities and
a. Social media b. overnote c. dropbox d.twitter
______________27. What are the particular online news and social networking service where users post and interact
with messages, "tweets", restricted to 140 characters?
a. Social media b. overnote c. dropbox d.twitter
______________28. What is a popular free social networking website that allows registered users to create profiles,
upload photos and video, send messages and keep in touch with friends, family and colleagues.?
a.Social media b. overnote c. dropbox d.twitter
______________29. Particular type of software that manages data files in a computer system that has limited capabilities
and is designed to manage individual or group files, such as special office documents and records?
a. Tumblr b. wix.com c. weebly d.file management system
______________30. What is a particular web mapping service developed by Google in which it offers satellite imagery,
street maps, 360° panoramic views of streets (Street View), real-time traffic conditions
(Google Traffic), and route planning for traveling by foot, car, bicycle (in beta), or public transportation?
a. Wikimapia b. google maps c. Zamzar d.mswordpdf
Test II. Write SO if the social media website is a social network, BS for bookmarking site, SN for social news, MS for media sharing, MI for
microblogging, and BF for blogs and forums.
______________1. Stumble upon
______________2. Plurk
______________3. Twitter
______________4. Facebook
______________5. Reddit
______________6. Google+
______________7. Instagram
______________8.Pinterest
______________9. Blogger
______________10. Tumblr
______________11.Google suites
______________12.Wordpress
______________13. Hangouts
______________14.Youtube
______________15.Canva
Test II. Enumeration:
1-5 Online Safety Measures
1-10 Core Rules of Netiquette
Good Luck & God Bless!!!
Prepared by :
Miss Jonadhe C. Mondeja
Subject Teacher
Noted by :
____________________________
Parent/Guardian Name and Signature
Etech/2022/jonadhe.mondeja@deped.gov.ph
#first summative test
3.
4. Test II. Enumeration: Write the correct answer.
1-4 Trends in ICT
1.________________________________________
2.________________________________________
3.________________________________________
4.________________________________________
5-7 Mobile Technologies
5. _______________________________________
6._______________________________________
7._______________________________________
8-15 Features of Web 2.0
8. ______________________________________
9. ______________________________________
10.______________________________________
11.______________________________________
12.______________________________________
13.______________________________________
14-20 Tips to Stay Safe Online
14. ______________________________________
15.______________________________________
16.______________________________________
17.______________________________________
18.______________________________________
19.______________________________________
20._____________________________________
Mil/2019/jonadhe.mondeja@deped.gov.ph
#summative SCORE: