ICT

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

ICT

Reference:
LET Reviewers (Complete Compilation) General Education. (2019). PRC Board Reviewer.
https://www.prcboardreviewers.com/
b. Defragmenting a computer’s hard disk
c. Installing software from a disk created by a friend
d. Shutting down a computer improperly
7. Like a typewriter, the computer has a ________.
a. Keyboard
b. Screen
c. Disk drive
d. Cursor
8. Which refers to a single phrase or word that tells the computer to do something with a
program or file?
a. Computer language
b. Command
c. Computer program
d. Password
9. A secret word or phrase that must be entered into the computer before a person is
allowed to get or change information is called _________.
a. Statement
b. Password
c. Program
d. Input
10. The search for related literature by accessing several data bases by the use of a telephone
line to connect a computer library with other computers that have database is termed
_________.
a. compact disk search
b. on-line search
c. manual search
d. computer search
1. What is implied about the place of our country in technology?
a. Filipinos are at par with any country in I.T
b. Filipino scores behind at computers
c. Filipinos are abreast in I.T.
d. Filipinos have to learn more from Singapore
2. In teaching, devices have been classified as hardware and software. Which of these
computer terms?
a. Data
b. Program
c. Byte
d. Information
3. Which one links the computer to base computer making it possible to share software
materials?
a. Modem
b. Interface
c. Hypermedia
d. Local Area Network
4. Which enables the computer to communicate with other computers over the telephone?
a. Modem
b. Network
c. Internet
d. Hypermedia
5. Which desktop icon can be used to access the files and programs in the computer?
a. Taskbar
b. My briefcase
c. My Documents
d. My computer
6. When is it most important to scan a computer’s drives for viruses immediately after
_______.
a. Downloading a text file from a government website
6. When is it most important to scan a computer’s drives for viruses immediately after _______.
a. Downloading a text file from a government website
b. Defragmenting a computer’s hard disk
c. Installing software from a disk created by a friend
d. Shutting down a computer improperly
7. Like a typewriter, the computer has a ________.
a. Keyboard
b. Screen
c. Disk drive
d. Cursor
8. Which refers to a single phrase or word that tells the computer to do something with a
program or file?
a. Computer language
b. Command
c. Computer program
d. Password
9. A secret word or phrase that must be entered into the computer before a person is
allowed to get or change information is called _________.
a. Statement
b. Password
c. Program
d. Input
10. The search for related literature by accessing several data bases by the use of a telephone
line to connect a computer library with other computers that have database is termed _________.
a. compact disk search
b. on-line search
c. manual search
d. computer search
11. Which is the brain of computer?
a. CPU
b. Peripheral
c. Software
d. RAM
12. In writing a letter, which productivity tool is used?
a. Word processing
b. Publisher
c. Spreadsheet
d. Page Maker
13. Which mail directed to an address is sent from one computer to another through modems?
a. Telegram
b. Publisher
c. Spreadsheet
d. e-mail
14. Which application program provides users with a means to organize and present information through the use of
text, numbers, graphs, sounds and visual images?
a. Powerpoint Presentation
b. Publisher
c. Spreadsheet
d. Word processing
15. Which one of the following is a result of compressing a file?
a. The file is deleted.
b. The file size is smaller
c. The three-character extension is hidden.
d. All file properties are lost.
16. A computer system is actually made up of actual physical machines known as:
a. Computer
b. Hardware
c. Printer
d. Software
17. Which of the following shows file size from smallest to largest?
a. Gigabyte, Megabyte, Kilobyte, Byte
b. Megabyte, Gigabyte, Kilobyte, Byte
c. Byte, Kilobyte, Megabyte, Gigabyte
d. Kilobyte, Megabyte, Byte, Gigabyte
18. The entry of data and commands into the computer system is made possible through the:
a. Keyboard
b. Diskette
c. Printer
d. Monitor
19. When ##### replaces numbers in the cell, _______.
a. Use the custom format
b. Return to the general format
c. Indicate a formula error
d. Increase column with
20. In order to use an on-line database service, which of the following are needed?
a. Computer, tele-computing software and printer
b. Computer, phone line, printer and CD-ROM drive
c. Phone line, tele-computing software, modem and computer
d. Tele-computing software, phone line and modem
21. Someone wrote: “Environment relates to the profound relationship between matter, nature, and society, and in
such a context ICTs bring new ways of living in a more interconnected society, all of which reduces our dependency on
matter and affects our relationships with nature”. What do these sentences convey?
a. Environment and ICT are poles apart.
b. ICT impacts on environment.
c. Environment affects ICT.
d. ICT brings us away from interconnected society.
22. To reduce electronic waste, implement a recycling system. Which belong to an e-waste recycling system?
I. Repair
II. Reuse
III. Upgrading of existing equipment
a. I, II, III
b. II only
c. I, II, III
d. II only
23. Which situation shows that technology can be used to motivate students to learn?
a. Teacher Eric employs educational games related to the lesson they are taking.
b. Miss Cleo designs lessons which use cooperative learning with technology integration
c. Mr. Jimmy utilizes computer assisted instruction programs so that students will learn at their own pace.
d. Teacher Sarah assigns projects to her class where self-expression and creativity is acknowledged.
24. Mr. Rico carefully studies the materials he acquired from the internet. He always
examines if the author is qualified to present the material. The practice is?
a. Necessary to ensure that the materials are reliable.
b. Unethical because he does not trust the author.
c. Unnecessary because all resources from the internet are dependable.
d. Just a waste of time.
25. If you opened a document from your folder and added a new paragraph to it, how would you save the changes
that you mean?
a. Select “Save as” and select a new folder and file name for it.
b. Just click the “Save” icon on the toolbar or press Ctrl + S.
c. Just close the program. It will save automatically.
d. Any of the above would work.
26. When would you use the “Save As” function?
a. When you are saving a document for the first time and you need to choose a
folder for the document and create a file name for it.
b. Every time you want to save something.
c. Only when working with a Microsoft Word document.
d. Only when you want to bum the file onto a CD.
27. If you accidentally deleted some text from a document, and you want it back, you should:
a. Select “Redo” or press Ctrl + Y.
b. Immediately close the document and reopen it.
c. Restart the computer.
d. Select “Undo” or press Ctrl + Z.
28. Why do you think you should log-off your computer when you leave?
a. You should not log-off your computer when you leave class
b. To prevent it from getting virus.
c. If you don’t log-off, anyone can go on that computer and access your folder and files.
d. It helps to make sure that your work gets saved.
29. The best way to move some text to another part of an essay would be:
a. Delete the text and then re-type it.
b. Highlight the text, and then drag it into place with the mouse.
c. Highlight the text, and press the up or down arrows to move it.
d. Highlight the text, right-click, and use the “Cut” and “Paste” functions.
30. Why should you be cautious when downloading files using file-sharing that is used to download files, music, and
videos?
a. It is illegal to download music using these programs due to copyright laws.
b. These files may contain viruses which can harm your computer.
c. You might have to pay money in damages if you are caught.
d. All of the above are true.
31. If you are doing research for an essay, and you use some information from a website in your essay, you must:
a. Do nothing. You can use this material in your essay freely.
b. List the Website in a bibliography at the end of your essay.
c. Type the information in bold letters.
d. Type information in italic letters.
32. Why is a website like Wikipedia NOT the best choice for researching information about a topic?
a. Wikipedia and other “wikis” allow anyone to type information on their pages, which may be inaccurate.
b. It is the best choice.
c. There is too much information on the site to sort through which complicates things.
d. There are not enough images on the site.
33. If you wanted to create an animated presentation, what would be the BEST program to use among the following
choices?
a. Microsoft Excel
b. Microsoft Power Point
c. Microsoft Word
d. Microsoft Access
34. What is the meaning of RAM?
a. Rendering Access Momentum
b. Random Access Member
c. Random Access Memory
d. Radio Access Memory
35. When a teacher asks the consistency of a material taken from the internet with other available materials, he/she
is concerned with its?
a. Relevance
b. Accuracy
c. Coverage
d. Currency
36. Which desktop icon can be used to access the files and programs in the computer?
a. Taskbar
b. My briefcase
c. My Documents
d. My computer
37. Which one of the following is a result of compressing a file?
a. All file properties are lost.
b. The three-character extension is hidden.
c. The file is deleted
d. The file size is smaller.
38. Which enables the computer to communicate with other computers over the telephone?
a. Modem
b. Network
c. Internet
d. Hypermedia
39. What is the meaning/acronym of LCD?
a. Light chemical Display
b. Laser Circuit Device
c. Least Common Denominator
d. Liquid Crystal Display
40. Which of the following is not an example of secondary storage device?
a. CD
b. Flash Drive
c. RAM
d. Hard disk
41. You are tracking your household’s expenses and income through tables whose cells are set to compute for totals
and other operations in your finances. Which productivity tool are you using?
a. Multimedia
b. Word processing
c. Publisher
d. Spreadsheet
42. Which of the following is not an internet search engine?
a. Yahoo
b. Windows
c. MSN
d. Google
43. Which of the following devices is required to connect to a computer to the internet?
a. Modem
b. Hard drive
c. Mouse
d. Keyboard
44. The information highway is called the ______.
a. ICT
b. Deep Web
c. Google
d. Internet
45. On the computer screen, what indicates the position of the mouse?
a. Click
b. Cursor
c. Start
d. Scroll
46. Which of the following searches websites by keyword(s)?
a. Spyware
b. Web bugs
c. Portals
d. Search engine
47. What is the meaning/acronym of USB?
a. Universal Serial Bus
b. Unlimited Source Bus
c. Universal Secrete Bus
d. Uniform Serial Bus
48. He is considered to be the “Father of Computing” because of his contributions to the basic design of computer.
a. John Napier
b. William Oughtred
c. Blaise Pascal
d. Charles Babbage
49. What key combination will you use to open the TASK MANAGER?
a. Alt + F4
b. Ctrl + Alt + Del
c. Alt + Tab
d. Shift + F3
50. Which of the following is an example of an operating system?
a. Firefox
b. Avira
c. Notepad
d. Windows XP
51. When you start your computer, which component works first?
a. Hard disk
b. Processor
c. CD-ROM
d. BIOS
52. DNS in internet technology stands for?
a. Domain Name System
b. Dynamic Name System
c. Disturbed Name System
d. None of these
53. What is RA 10173?
a. Cybercrime Prevention Act of 2012
b. Data Privacy Act of 2012
c. Anti-Bullying Act of 2013
d. DICT Act of 2015
54. Which one of the following is an extension of video file format in computer?
a. .exe
b. .jpg
c. .mpg
d. .bmp
55. Who is the first computer programmer?
a. Charles Babbage
b. George Atanasoff
c. Lady Ada Agusta Bayron
d. Blaise Pascal
56. What does GUI means?
a. General Using Interface
b. Graphical User Interface
c. General User Interface
d. Graphics User Instruction
57. Computer basically performs some functions. Which one is said to be the systematically true?
a. Input, Process, Organize, Output
b. Input, Output, Store, Organize
c. Input, Process, Output, Store
d. Input, Process, Output
58. A byte consists of how many bits?
a. 2
b. 16
c. 8
d. 4
59. Which of the following cannot be done using e-mail?
a. Send an attachment
b. Reply to an e-mail
c. Forward an e-mail
d. Copy file from a remote computer
60. Which one of the following is an appropriate routine to shut down a non-responding application?
a. Press CTRL+ALT+DELETE, select the application in the task manager window and click End task.
b. Pull-out the power cable from the back of the computer
c. Click Shutdown on the Start menu.
d. Close all open documents and press the power button until the computer automatically switches off.
61. This is considered to be the first manual data processing device developed in China in the 12th century A.D.
a. Hieroglyphics
b. Printing Press
c. Papyrus
d. Abacus
62. What software helps run the computer hardware and computer system?
a. Application software
b. System software
c. Utilities
d. Operating system
63. Which of the following is not a benefit of technology in education?
a. Unlimited access to games and other internet sites
b. Improves critical-thinking abilities.
c. Increases self-expression
d. Allows cooperative learning
64. He is considered as the “Father of Modern Media in Education”.
a. Jean Piaget
b. Robert Gagne
c. B.F. Skinner
d. Edgar Dale
65. It is a term to denote a whole range of technologies associated with processing information and sending and
receiving messages.
a. Educational Technology
b. Information and Communication Technology
c. Media Technology
d. Instructional Systems Design
66. Which is the standard input device that accepts letters, numbers, and commands from the user?
a. Trackpad
b. Lightpen
c. Mouse
d. Keyboard
67. What does BIOS mean?
a. Basic Input Output System
b. Basic Industry Online Standards
c. Basic Induct Online System
d. Basic Insular Open Source
68. It is the hardware in a computing device where the operating system (OS), application programs and data in
current use are kept so they can be quickly reached by the device’s processor.
a. RAM
b. Operating system
c. CPU
d. HDD
69. In MS Office, Shapes are on ____ tab in _____ group.
a. Home, Insert
b. Design, Page
c. Insert, Illustrations
d. Insert, Symbols
70. It is the process of removing unwanted part of a picture.
a. Cropping
b. Correction
c. Style
d. Effect
71. “https://facebook.com” is an example of:
a. URL
b. Protocol
c. HTML
d. IP Address
72. On the keyboard of computer each character has an “ASCII” value which stands for:
a. Adaptable Standard Code for Information Change
b. American Stock Code for Information Interchange
c. African Standard Code for Information Interchange
d. American Standard Code for Information Interchange
73. Which part of the Central Processing Unit (CPU) performs calculation and makes decisions?
a. Alternate Local Unit
b. American Logic Unit
c. Alternating Logic Unit
d. Arithmetic Logic Unit
74. Which of the following is not a computer language?
a. UNIX
b. PASCAL
c. COBOL
d. FORTRAN
75. Which of the following is not a hardware?
a. Printer
b. Internet browser
c. Network Card
d. Monitor
76. Software for digital photo editing is called:
a. OpenOffice.org
b. Adobe Photoshop
c. Microsoft Office
d. Mozilla Firefox
77. One of the services, that can be used on the Internet and refers to browsing and searching content in the form of
web pages, is called:
a. LAN
b. FTP
c. WWW
d. ISDN
78. Which of the following devices is used for printing blueprints?
a. Touch-Screen
b. Scanner
c. Plotter
d. Digital Camera
79. Which of the following is not a benefit of technology in education?
a. Improves critical-thinking abilities.
b. Unlimited access to games and other internet sites.
c. Allows cooperative learning.
d. Increases self-expression.
80. What type of computer application is used for calculations?
a. Antivirus Software
b. Databases
c. Spreadsheet calculation program
d. Internet browser
81. Computers in a firm are connected to a network, so the staff could work together on files and share printers. That
network is called:
a. LAN
b. FTP
c. WAN
d. ISDN
82. Which of these concepts describes the use of the Internet intended for sending and receiving e-mails?
a. e-data exchange
b. e-commerce
c. e-mail
d. e-retail
83. What is the name of the software, which is a core program on a computer, and is automatically loaded when the
computer is turned on?
a. Shareware
b. Freeware
c. Operating System
d. Licensed software
84. Hardware component that integrates other components into a computer is:
a. Motherboard
b. Graphics card
c. Hard Disk Drive (HDD)
d. Keyboard
85. Physical parts of the computer are called:
a. Hardware
b. Network computer
c. Personal computer (PC)
d. Software
86. He is considered as the “Father of Modern Media in Education”.
a. Jean Piaget
b. Rene Descartes
c. Rene Descartes
d. Edgar Dale
87. Type of malware, that can replicate autonomously and can corrupt data on your computer, is called:
a. Mouse
b. Worm
c. Lion
d. Sparrow
88. What is Copyright?
a. Inhibit software piracy
b. Protect software against viruses
c. Disable the firewall
d. Protect software author’s rights (from unauthorized copying and distribution)
89. What type of applications are used to protect your computer from viruses?
a. Antivirus software
b. Databases
c. Spreadsheet calculator program
d. Accounting program
90. Which of the following is not a medium for data storage?
a. Keyboard
b. Hard disk
c. USB stick
d. DVD disk
91. It is a term to denote a whole range of technologies associated with processing information and with sending and
receiving messages.
a. Educational Technology
b. Information and Communication Technology
c. Media Technology
d. Instructional Systems Design
92. A methodology widely used for developing new training programs.
a. Microsoft
b. World Wide Web
c. Instructional Systems Design
d. Computer Technology
93. Which is the standard input device that accepts letters, numbers and commands from the user?
a. Trackpad
b. Lightpen
c. Mouse
d. Keyboard
94. The input device, designed for digitizing, i.e. direct input of paintings, drawings or text,usually from paper to
computer, is called:
a. Touch screen
b. Scanner
c. Plotter
d. Digital Camera
95. Due to virus threat, we should not:
a. connect computer to the Internet or any other computer network
b. installs anti-virus programs that are used to detect viruses on the computer
c. open e-mails and pages from an unknown sender
d. change passwords
96. Which of the following is not a software?
a. Printer
b. Internet browser
c. Windows 95
d. Operating system
97. It is a device used to project a computer image or other images from independent devices, such as DVD players,
Blu-ray player, etc. onto canvas or a wall.
a. Printer
b. Plotter
c. Projector
d. USB
98. The symptoms of virus infected computers do not include:
a. slow performance
b. faster performance
c. cessation of response to commands
d. crash and re-start the operating system
99. Monitor is:
a. input device
b. output device
c. input and output device
d. input and output
100. One of the advantages of e-mail is:
a. working hours are 9-19 every day
b. it is always available
c. allows face-to-face contact
d. viruses are commonly spread through e-mail attachments

ANOTHER

1. In the email address juandelacruz2015@psu.palawan.edu.ph , juandelacruz2015 is the:


a. domain c. site
b. URL d. user ID

2.(Excel) Which of the following is NOT true about creating formula/function?


a. A formula starts with an equal(=) sign
b. A formula should follow a required format of a particular function
c. A formula as much as possible must contain spaces in between characters
d. A formula can be created using the shortcut Shift + F2

3. Ctrl + J will apply what alignment format?


a. Left Align c. Justify Alignment
b. Right Align d. Invalid Keys

4.Which statement describes input device?


a. A device that shows outputs.
b. Any device that displays finish products.
c. Any peripheral that allows information to be entered in a computer
d. All of the above

5. The keyboard shortcut for Save As is __________.


a. Ctrl + S c. Alt + S
b. F12 d. Ctrl + F12

6. (PowerPoint) Keyboard shortcut for change case of characters.


a. Shift + F3 c. Ctrl + [
b. Ctrl + ] d. Shift + ]
7. Which of the following keyboard shortcuts in MS Word 2007 and above (versions), allows copying of a selection?
a. Ctrl + V c. Ctrl + S
b. Ctrl + C d. Ctrl + X

8. Ctrl + Z is the keyboard shortcut for ____________.


a. Undo c. Zip
b. Redo d. Select All

9. Any computer is controlled by _______________.


a. Hardware c. Instruction
b. Information d. Interface

10. A/an _________________ is a University, government agency, or company that stores web pages.
a. Internet Service Providers c. Website
b. Cyberspace d. Internet Shops

11. Which control tab allows users to create table of contents?


a. References c. Home
b. Insert d. Table of Contents

12. Keyboard shortcut for new slide (PowerPoint).


a. Ctrl + N c. Ctrl + S
b. Ctrl + M d. Ctrl + D

13. A/an _______ is the process of transferring documents, graphics and other objects from your computer to a server
on the Internet.
a. Social Networking c. Downloading
b. Uploading d. Blogging

14. This refers to a directory which a location on a disk used for storing and organizing information about files.
a. Folder c. Installer
b. Drive d. Programs

15. (Excel) This keyboard shortcut will hide selected columns.


a. Ctrl + 0 c. Ctrl + Spacebar
b. Ctrl + 9 d. Alt + Spacebar

16. Which one of the following is an appropriate routine to shut down a non-responding application?
a. Close all open document and press the power button until the computer automatically switches off.
b. Press Ctrl + Alt + Delete, select the application in the Task Manager window and click end task
c. Pull out the power cable from the back of the computer
d. Click Shut Down on the Start menu and choose Shut Down from the Shut Down Window drop-down list

17. What does digital divide refer to?


I. The gap between people with effective access to digital and information technology and those with very limited or no
access at all
II. The imbalance both in physical access to technology and the resources and skills needed to for effective participation
III. The gap in the ages of ICT users
a. I and II c. I only
b. II only d. III only

18. Clicking Ctrl + Home will essentially bring the cursor to the _____________ from any part of the document.
a. first line c. beginning of the selected word
b. beginning of the document d. beginning of the paragraph

19. Which type of software can you download and duplicate without any restrictions whatsoever and without fear of
legal prosecution?
a. commercial software c. pirated software
b. public domain software d. rentalware
20. The following are general examples of networks (in terms of coverage), EXCEPT:
a. LAN c. WAN
b. MAN d. Intranet/Extranet

21. The following are elements of an information system, EXCEPT:


a. People c. Systems Analysis and Design
b. Data and Procedure d. Hardware and Software

22. Which statement/s on ICT is/are TRUE?


I. The use of ICT has negative effects.
II. The use of ICT has a lot of benefits.
III. The use of ICT is effective only in industrialized countries.
a. I and II c. III only
b. II only d. I and III

23. To reduce electronic waste, implement a recycling system. Which belongs to an e-waste recycling system?
I. Repair
II. Reuse
III. Upgrading of existing equipment
a. I, II and III c. I and II
b. I only d. II only
24. Which of the following media type holds the most information?
a. Blu-ray disc c. DVD
b. CD d. Floppy diskette

25. Which one is an output device?


a. Joystick c. monitor
b. keyboard d. hard disk
26. A location on the internet is called (a)n ______________:
a. network browser c. domain
b. user ID d. web

27. (PowerPoint) Keyboard shortcut for View Show (from the first slide).
a. Ctrl + F5 c. Alt + F5
b. F5 d. Shift + F5

28. These are dynamic diagrams that update automatically according to the type of information you want to include.
a. SmartArt diagrams c. Ribbons
b. Drawing Toolbar d. Smart Shapes

29. A/an ______________ is a series of organized instructions that directs a computer to perform tasks.
a. Hardware c. Program
b. Utilities d. Database

30. This is the physical material on which data, instructions, and information are stored.
a. Storage Device c. USB
b. CPU d. Storage Media

31. Which one of the following is a result of compressing a file?


a. The file is deleted.
b. The file is smaller.
c. The three-character extension is hidden.
d. All file properties are lost.

32. Which application program provides users with a mean to organize and present information through the use of
text, number s, graphs, sounds and visual images?
a. Multimedia c. Spreadsheets
b. Publisher d. Word processing
33. Which option of the save/save as dialog box allows users to apply password to the document?
a. options c. passwords
b. general options d. save options

34. What is the common consumer computer interface used today?


a. command-driven interface c. menu-driven
b. graphical user interface d. electronic user interface

35. This feature of excel keeps columns and rows visible while the rest of the rest of worksheet scrolls (based on the
current selection)
a. Print Titles c. Freeze Panes
b. Repeat Header Rows d. Header and Footer

36. This feature of excel restrict visible records (rows) to those that match a criterion. If desired, criteria can be chosen
from multiple columns.
a. Sort Ascending c. Filtering
b. Sort Descending d. Find and Replace

37. The following are obvious reasons to network computers, EXCEPT:


a. To save time
b. To share resources
c. To save money
d. To minimize risk of IT implementation failure

38. Which refers to a single phrase or word that tells the computer to do something with a program or file?
a. Password c. Computer language
b. Computer program d. Command

39. A/an ___________________ is a worldwide collection of networks that connects millions of computers
a. Local Area Network c. Webpage
b. Internet d. Hyperlinks

40. Keyboard shortcut to align the selected text to the center.


a. Ctrl + E c. Ctrl + C
b. Ctrl + Center d. Ctrl + L

41. This is a set of words, symbols, and code that enables human to communicate with computers.
a. hardware c. peopleware
b. programming Language d. software

42. Which one of the following shows the file size from smallest to largest?
a. Gigabyte, Megabyte, Kilobyte, Byte c. Byte, Kilobyte, Megabyte, Gigabyte
b. Megabyte, Gigabyte, Kilobyte, Byte d. Kilobyte, Megabyte, Byte, Gigabyte

43. Which of the following is another term for primary storage?


a. ROM c. CPU
b. ALU d. RAM

44. This refers to a copyrighted software that is distributed free of charge. This different from free software, or public-
domain software, which has no restrictions on use, modification, or redistribution.
a. commercial software c. bespoke software
b. freeware d. rentalware

45. (Excel) Keyboard shortcut for Print Preview in Excel (2007) ?


a. Ctrl + F2 c. Ctrl + F4
b. Alt + F2 d. Alt + F4

46. Which of the following is considered an application software?


a. internet c. Microsoft office word
b. windows explorer d. windows 7 or vista

47. What is the leading compression standard for still images?


a. MPEG c. compressed
b. JPEG d. zip

48. This is also called a processor. It carries out instructions that tell computer what to do – Fetch, Decode, Execute,
Store.
a. Memory c. System Unit
b. Input/output Unit d. CPU

49. _______ is/are the delivery of education at one location while the learning takes place at other locations.
a. e-learning c. Web-based training
b. Distance Learning d. Online Learning

50. This means arranging an entire table based on the contents of one or more fields (columns) either on an ascending
or descending order.
a. filter c. group
b. sort d. merge

ANSWER KEY
1. D. 2. C 3. C 4. D 5. B 6. A 7. A 8. A 9.C 10. A 11. A 12. B 13. B 14. A 15. A 16. B 17. A 18. B 19. B 20. D 21. C
22. A 23. A 24. A 25. C 26. C 27. B 28. A 29. C 30. D 31. B 32. A 33. B 34. B 35. C 36. C 37. D 38. D 39. B 40. A
41.B 42. C 43. D 44. B 45.A 46. C 47. B 48. D 49. B 50. B

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy