LONG TEST IN EMPOWERMENT TECHNOLOGY
MULTIPLE CHOICE: Choose the best answer. Write in a capital letter.
1. One of the founder of Microsoft.
A. Bill ClintonC. Paul Allen
B. Blais PascalD. Wilhelm Shickard
2. Which of the following program that is used to record and analyze numerical data?
A. Microsoft Word C. Notepad
B. Microsoft Excel D. PowerPoint
3. These fonts do not have short lines at the end of the letters.
A. Sans SerifC. Decorative
B. SerifD. Super Serif
4. Houses all commands when using Word.
A. File Name C. Status Bar
B. RibbonD. Ruler
5. It is considered as the first programmable mechanical computer.
A. Abacus C. Pascaline
B. Analytical EngineD. Telephone
6. This device is invented by Alan Turing.
A. Morse CodeC. Telegraph
B. BombeD. Pascaline
7. It is composed of a group of transistors and circuit elements composed in a single package.
A. Integrated CircuitsC. Processors
B. Late Vacuum TubesD. Transfusers
8. Protects personal information and data from being divulged without consent.
A. Cyberbullying ActC. Cybercrime Prevention Act
B. Data Privacy ActD. Anti-Bullying Act
9. An employee receives an email that looks like it’s from their bank, asking them to click a link and enter their
account details, but the link actually leads to a fake website designed to steal their information. This refers to,
A. AdwareB. MalwareC. SpywareD. Trojan
10. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the
internet.
A. FolksonomyC. Mass Participation
B. Long TailD. Rich-user Experience
11. It allows user to categorize and classify information using freely chosen keywords.
A. FolksonomyC. Mass Participation
B. Long TailD. Rich-user Experience
12. These are our guides when positioning the content of our document.
A. File Name C. Status Bar
B. RibbonD. Ruler
13. It contains information about the current document such as the page number and word count.
A. File Name C. Status Bar
B. RibbonD. Ruler
14. This displays the name of the current document that we are editing.
A. File Name C. Status Bar
B. RibbonD. Ruler
15. A school librarian uses this application to design and print colorful flyers announcing the upcoming book fair.
A. ExcelC. Powerpoint
B. OneNoteD. Publisher
16. A sales manager uses this to record monthly sales data, create charts, and automatically calculate total revenue
for the quarter.
A. ExcelC. Powerpoint
B. OneNoteD. Publisher
17. A student uses an application to organize class notes, embed lecture videos, and collaborate with group
members on a shared project notebook in real time.
A. ExcelC. Powerpoint
B. OneNoteD. Publisher
18. It is a compilation of papers binded together.
A. Books C. Paper
B. Library D. Papyrus Plant
19. A manually operated device similar to the modern calculator.
A. Abacus C. Pascaline
B. Analytical EngineD. Telephone
20. Device that is composed of a group of transistors and circuit elements composed in a single package.
A. Integrated CircuitsC. Processors
B. Late Vacuum TubesD. Transfusers
21. Information that is coded in sounds of dots, spaces and dashes over wired media.
A. InternetC. Telegraph
B. Morse Code D. Wireless Fidelity
22. Olivetti Programma referred to as ________________.
A. Father of ComputerC. First Calculator
B. First Computer ProgrammerD. First Computer sold
23. The following, except one, are the sub-periods of Electronic periods
A. Integrated CircuitsC. Processors
B. Late Vacuum TubesD. Transfusers
24. This device was used to avoid information being intercepted by the enemy.
A. AbacusB. Telegraph
C. BombeD. Telephone
25. This law protects individual from various unwanted online and cyber acts that may harm or evade one’s
privacy and integrity.
A. R.A 10157C. R.A. 10627
B. R.A. 10175D. R.A. 10267
26. Which of the following best describes a threat of malicious software?
A. A student receives an email claiming they won a cash prize, but it asks
  for personal bank details to claim it.
B. While browsing for free photo editing software, Maria unknowingly
  downloaded a program that constantly displayed unwanted ads on her
  screen, a classic case of adware.
C. A student unknowingly installs a free game on their laptop, which
  secretly contains spyware that tracks their browsing history and steals
  login credentials.
D. A teacher’s laptop suddenly slows down and displays strange pop-up
  ads after opening an unknown email attachment, indicating possible
  malware infection.
27. A student publishes a blog post about climate change on a class website, and classmates leave comments and
add suggestions directly on the page. This refers to what kind of website version?
A. Read only webC. Read-zoom web
B. Read-write webD. Semantic Executing web
28. Which refers to rich user experience?
A. An online bookstore sells a few copies each of thousands of rare and
  niche books that aren’t available in local shops.
B. While shopping online, a user enjoys luxurious experience as the
  website instantly updates product colors, sizes, and prices when
  options are selected, and provides zoomable 360° product views.
C. During a nationwide online poll about the preferred design for the new
  school uniform, thousands of students from different regions submit
  their votes and share opinions on social media.
D. While researching for a school project, a student searches photos on
  Flickr and easily finds related images because users have tagged them
  with keywords like “beach,” “sunset,” and “vacation.”
29. A relational database management program used to manage structured data.
A. AccessC. OneNote
B. ExcelD. Outlook
30. The program can be freely used while its program codes are available to a community of developers.
A. Free SourceC. Open Source
B. Office SuiteD. Proprietary Source
       TRUE or FALSE: Write TRUE if the statement is correct, otherwise FALSE.
 1.    Social Media started together with the Web 1.0 and are used in communicating and socializing.
 2.    IBM 5150 the very unit which had set the standards for several PC platforms today.
 3.    A non- profit service designed to help people who have visual and reading impairments is an Assistive Touch.
 4.    Android use in apple devices such as iPhone and iPod
 5.    Bombe was used in the Second World War to avoid information being intercepted by the enemy.
 6.    The information is coded in sounds of dots, spaces and dashes over wired media is used by a telephone.
 7.    When paper was produced from the power plant, storing of information was revolutionized.
 8.    Telegraph is the first mode of communication in Pre mechanical Period.
 9.    Telephone is patented to Alexander Grahambell.
 10.   Folksonomy allows user to categorize and classify information using freely chosen keywords.
       IDENTIFICATION: Write your answer in your answer sheet.
1. This refers to the carvings on the rocks.
2. A desktop publishing software that is full of templates for users to easily create publication such as calling
   cards, greeting cards, etc.
3. Used to tabulate, calculate and process data, usually numbers.
4. It displays the name of the current document that is editing.
5. It is offered by companies in exchange for software updates and customer support.
6. GUI stands for ___________________.
7. A republic act that refers to Cybercrime Prevention Act of 2012.
8. The very first unit which had set the standards for several PC platforms.
9. A device used for the information to be coded in sounds of dots, spaces, and dashes over wired
    media.
10. It is considered the first data center.
LABELING-Label the Parts of the following images.
ANSWER KEY
I. MULTIPLE CHOICE
1. One of the founder of Microsoft.
C. Paul Allen
(Bill Gates & Paul Allen co-founded Microsoft. Bill Clinton is a former US president, Pascal & Shickard are inventors in computing history.)
2. Used to record and analyze numerical data.
B. Microsoft Excel
3. Fonts without short lines at end of letters.
A. Sans Serif
(Serif fonts have those small decorative lines; sans serif means “without serif”.)
4. Houses all commands in Word.
B. Ribbon
5. First programmable mechanical computer.
B. Analytical Engine (by Charles Babbage)
6. Invented by Alan Turing.
B. Bombe (used in WWII to decode Enigma)
7. Group of transistors & circuits in one package.
A. Integrated Circuits
8. Protects personal data from being divulged without consent.
B. Data Privacy Act
9. Fake email that tricks user into giving info.
BONUS answer is Phishing
10. Paying for time spent online.
B. Long Tail
11. Categorize/classify with keywords.
A. Folksonomy
12. Guides when positioning document content.
D. Ruler
13. Info about doc (word count, page no.)
C. Status Bar
14. Displays document name.
A. File Name
15. Librarian makes flyers.
D. Publisher
16. Sales manager records monthly data.
A. Excel
17. Student organizes notes, embeds videos.
B. OneNote
18. Compilation of papers binded together.
A. Books
19. Manually operated calculator.
A. Abacus
20. Group of transistors & circuits.
A. Integrated Circuits
21. Coded sounds of dots/dashes.
B. Morse Code
22. Olivetti Programma.
D. First Computer sold
23. NOT a sub-period of Electronic Period.
D. Transfusers
24. Device to avoid interception.
C. Bombe
25. Law protecting privacy online.
B. R.A. 10175 (Cybercrime Prevention Act)
26. Threat of malicious software.
D. Malware infection
27. Student posts & classmates comment.
B. Read-write web (Web 2.0)
28. Rich user experience.
B. Online shopping with instant updates, 360° view
29. Relational DBMS.
A. Access
30. Program freely used, code available.
C. Open Source
II. TRUE or FALSE
1. Social Media started together with the Web 1.0 and are used in communicating and socializing.
FALSE – Web 1.0 was “read-only” (static pages, no interaction). Social media came with Web 2.0 (read–write web).
2. IBM 5150 the very unit which had set the standards for several PC platforms today.
TRUE – The IBM 5150 (1981) is considered the first true personal computer that set the standard for PC architecture.
3. A non-profit service designed to help people who have visual and reading impairments is an Assistive Touch.
FALSE – AssistiveTouch is an Apple iOS accessibility feature, not a non-profit service. Tools like screen readers (JAWS, NVDA) are for visual
impairments.
4. Android use in apple devices such as iPhone and iPod.
FALSE – Apple devices use iOS, not Android.
5. Bombe was used in the Second World War to avoid information being intercepted by the enemy.
TRUE – The Bombe, invented by Alan Turing and team, was used to decrypt German Enigma codes.
6. The information is coded in sounds of dots, spaces and dashes over wired media is used by a telephone.
FALSE – That describes Morse Code, not the telephone.
7. When paper was produced from the power plant, storing of information was revolutionized.
FALSE – Paper came from the Papyrus Plant (ancient times), not a power plant.
8. Telegraph is the first mode of communication in Pre mechanical Period.
FALSE – The telegraph belongs to the Electromechanical Period, not Pre-mechanical. Pre-mechanical used tools like tally sticks and
papyrus.
9. Telephone is patented to Alexander Grahambell.
TRUE – The telephone was patented by Alexander Graham Bell in 1876.
10. Folksonomy allows user to categorize and classify information using freely chosen keywords.
TRUE – That’s the definition of folksonomy (tagging).
III. IDENTIFICATION
    1.    Heiroglyphics (carvings on rocks)
    2.    Microsoft Publisher (desktop publishing software with templates)
    3.    Excel (for tabulating and processing data)
    4.    File Name (displays the name of the current document)
    5.    Close or Proprietary Source (or Subscription)
    6.    Graphical User Interface
    7.    Republic Act 10175 (Cybercrime Prevention Act of 2012)
    8.    IBM 5150
    9.    Telegraph (uses dots, spaces, and dashes = Morse code)
    10.   Library
IV. LABELING
    1.    Function Keys
    2.    Main Keypad
    3.    Modifier Keys
    4.    Cursor Keys
    5.    Numeric Keypad
    1.    Document
    2.    Vertical/ Scroll bar
    3.    Status Bar
    4.    Ruler
    5.    Ribbon
5432