Summative For Empowerment Technology
Summative For Empowerment Technology
EMPOWERMENT TECHNOLOGY
(1ST and 2ND)
I. DIRECTIONS: Read each item carefully. Shade the letter of the correct answer.
1. What is designed to provide students with the foundation of knowledge and skills needed to succeed in
environments that require the use of computer and Internet?
A. Empowerment Technology C. Statistics and Probability
B. Personality Development D. All of the above
2. Which of the following describes ICT?
A. It is defined as the study or use of electronic equipment.
B. The process of sending, receiving and exchanging information.
C. The term referring to technologies, which are being used for collecting, storing, editing, and passing
on information in various forms.
D. It is the study of sample and population.
3. What webpage that allows interaction from the user?
A. Comment B. Dynamic C. Social D. Static
4. What refers to the feature where users are able to categorize and locate information through tagging?
A. Folksonomy B. Hashtags C. Rich user experience D. Taxonomy
5. What does it mean when world wide web uses certain words which are imprecise?
A. Compatibility B. Security C. Vagueness D. Vastness
6. What provides a common framework to allow data to be shared and reused across platform, enterprise, and
community boundaries?
A. Semantic Web B. W3C C. Web 1.0 D. Web 2.0
7. What is used to categorize posts in a website?
A. Hashtag # B. Web 1.0 C. Web 2.0 D. Web 3.0
8. What magazine include the two Philippine cities as part of the top 10 in their research about “The Selfiest Cities
around the World”?
A. Candy C. Reader’s Digest
B. People Magazine D. Time Magazine
9. What country is known as “ICT Hub of Asia”?
A. Cambodia C. Philippines
B. Laos D. Venezuela
10. What trend in ICT refers to the synergy of technological advancements to work on a similar goal or task? For
example, besides using your personal computer to create word documents, you can now use smartphones.
A. Convergence B. Nonconvergence C. Social Media D. Social Networks
11. What trend in ICT give emphasis to the popularities of smartphones and tablets which has taken a major rise
over the years, because of the devices capability to do the tasks that were originally found in PCs?
A. Android B. Blackberry OS C. iOS D. Mobile Technologies
12. What feature of a dynamic website that allows user to put their own content?
A. Long tail C. Software as services
B. Rich user experience D. User participation
13. Who created the World Wide Web?
A. Albert Nielsen C. Tim- Berners- Lee
B. John Dewey D. Zoe Hedger
14. Which of the following refers to a mobile operating system for Apple devices?
A. Android C. Symbian
B. iOS D. Windows Phone
15. Which of the following refers to a non-profit service designed to help people who have visual and reading
impairments?
A. Assistive Media C. Windows Mobile
B. Computers D. All of the above
16. Which refers to sites that allow users to post their own news items or links to other news sources where the
users can also comment on the post and comments may also be rank?
A. Bookmarking Sites C. Social Networks
B. Media Sharing D. Social News
17. Which refers to sites that allow you to upload and share media content like images, music and video?
A. Bookmarking Sites C. Social Networks
B. Media Sharing D. Social News
18. What could you install on your computer in order to keep it safe and secure from viruses?
A. Download an Anti-Virus program C. Download Spyware
B. Download Malware D. All of the above
19. Which of the following states that anyone who uses your work without your consent is punishable by law?
A. Adware B. Copyright C. Spam D. Spyware
20. Which of the following is not a tip for online security?
A. Avoid logging in to public networks/Wi-Fi.
B. Do not let other people know about future vacations.
C. Know the security features of the social networking site you use.
D. Share password with anyone.
21. What browser feature is known as synonymous to “private” browsing?
A. Adware B. Incognito C. Internet D. Spyware
22. What refers to a program that runs in the background without you knowing it. It has ability to monitor what you
are currently doing and typing through keylogging?
A. Adware B. Incognito C. Internet D. Spyware
23. Which of the following refers to the unwanted email mostly from bots or advertisers which can be used to send
malware?
A. Adware B. Phishing C. Spam D. Virus
24. What feature of Microsoft word allows you to efficiently create documents that have the same general content
but may have different recipients or purpose?
A. Mail merge C. View Merge
B. Print merge D. All of the Above
25. Which key should be pressed to undo typing in Microsoft Office?
A. Ctrl + B B. Ctrl + D C. Ctrl + U D. Ctrl + Z
26. What are the steps in creating a simple mail merge?
A. Create form document; preview; insert merge field; print
B. Preview; insert merge field; create form document; print
C. Create main document; create recipient list; insert merge field; preview
D. Create data source; insert placeholders; preview; print
27. Where can you find the mail merge button?
A. File tab B. Home tab C. Mailings tab D. References tab
28. What button allows you to see the result of your mail merge even before you print or send it out?
A. Address block C. Insert merge field
B. Greeting line D. Preview results
29. What number format that puts a dollar symbol before each value by default?
A. Accounting C. Date/time
B. Comma D. Percent
30. What function that allows you to add a range of cells?
A. ADD B.PLUS C. SUM D. TOTAL
31. What is the Tab in the Format Cells dialog box where you can change the orientation of a text?
A. Alignment B. File C. Orientation D. View
32. What function that gets the average of a range of cells?
A. AVERAGE B. MEDIAN C. MEAN D. SUM
33. What program is designed to create spreadsheets which can later be used to analyze statistical data?
A. Microsoft Excel C. Microsoft Silverlight
B. Microsoft PowerPoint D. Microsoft Word
34. Which of the following refers to a moving computer graphic effect that can be added to the text, object, or the
entire slide itself?
A. Golden Ratio B. Mail Merge C. Online Videos D. Slide Animation
35. What makes your presentation more dynamic and interactive?
A. Golden Ratio B. Mail Merge C. Slide Animation & Transition D. View Technique
36. What will happen if you will press Esc key during a slideshow in MS PowerPoint?
A. Displays the last slide. C. Displays slide 1.
B. Displays the previous slide. D. Ends the slideshow.
37. How do you make text appear on a slide letter by letter using a custom animation effect?
A. Apply the animation scheme Fade in one by one.
B. Apply an entrance effect, and then set in to by letter in the effect options dialog box.
C. Apply the Fly In entrance effect to the text, and then set its speed to very slow.
D. None of the above
38. Which of the following is an example of a spreadsheet software?
A. Microsoft Excel C. WordPad
B. Microsoft Silverlight D. All of the above
39. What do you do to make one section of slides in your presentation use a different design template from the
other slides?
A. Select the slide thumbnails in that section and apply a different color scheme.
B. Select the slide thumbnails in that section and apply a different design template.
C. Customize fonts and colors.
D. Both A and C.
40. What technique tries to take information from the user, but the user actively gave the information where
common things taken are credit cards, usernames, passwords, and home addresses?
A. Fishing B. Pharming C. Phishing D. Scam
41. How would you be able to protect yourself from phishing?
A. Call your local fish store.
B. Change passwords every four to six months.
C. Get an anti-virus program.
D. Both B and C.
42. How does identity theft cause problems for online users?
A. Locates where you live and all information.
B. Steals bank information.
C. Steals social security.
D. All of the above
43. Many malware programs gather information that leads to loss of privacy. How can you generally be protected
from this?
A. Close window
B. Download an Anti-Virus Program
C. Never use your computer
D. Turn off computer
44. If Sara is deaf, what form of technology would help her in her everyday life?
A. Assistive media C. Social News
B. Convergence D. none of the above
45. What does WWW stand for?
A. Wacky World Web C. World Web Writing
B. Words With Waves D. World Wide Web
46. Which of the following statements is true about internet research?
A. Everything on the internet is true and valid.
B. If the URL ends with .org then it is a good website.
C. The only search engine you should use is Google.
D. You have to make sure a website is reliable and valid.
47. Instant communication is one great benefit of the internet. Which of the following is NOT an example of that?
A. Chat rooms C. Instant messaging
B. E-mail D. Searching Google
48. Which of the following is NOT an example of a risk on the internet?
A. Financial risks C. Online Shopping
B. Loss of privacy D. Viruses
49. Andrew searched on the internet for certain information he will use for the commentary in the Philippine Daily
Tribune. Being new in the mass communication industry, what must he do?
A. Seek consent in order not to violate the copyright law.
B. Seek consent and approval in accordance with the policy of fair use.
C. Use the information without consent if it falls within the policy of fair use.
D. Use the information without consent if it does not fall within the policy of fair use.
50. Christian, the secretary is task to send invitation to valued suppliers to the different parts of the country for a
summit which will be held in a private resort. The invitation needs confirmation immediately for booking
purposes. How would he most likely complete the task of sending the invitation?
A. Ask the email address of the suppliers and send the invitation.
B. Print and post the invitation in conspicuous are.
C. Use mail merge feature in MS Word and print the document then deliver to the supplier.
D. Use mail merge feature and mail electronically to suppliers.
Summative Test in
EMPOWERMENT TECHNOLOGY
(1ST and 2ND)
TABLE OF SPECIFICATION
What will I assess? How will I assess?
COMPETENCIES How will I score?
POST-TEST ITEMS BY COGNITIVE PROCESSES
Knowledge Understanding Applying Analyzing Evaluating Creating
Prepared by:
LYRA C. BITAYO
Special Science Teacher I
Approved by:
AGAPITO B. DEGOLLACION
Principal I (SHS)