1st Quarterly Examination Carlos Balanga HUMSS-XI
  • 1. The objective of Information and Communication Technologies.
A) Communicate
B) Play Games
C) Surf The Net
  • 2. The ICT hub of Asia.
A) Japan
B) USA
C) Philippines
  • 3. In NSO, in 2010, the ICT industry shares the total employment population in the Philippines.
A) 35.7%
B) 21.6%
C) 19.3%
  • 4. Which web version has static web pages?
A) 2.0
B) 1.0
C) 3.0
  • 5. The author who coined Web v2.
A) Mike Sendall
B) Darcy DiNucci
C) Tim Berners-Lee
  • 6. This feature categorizes and arranges information.
A) Rich User Experience
B) User Participation
C) Folksonomy
  • 7. Which symbol is used to categorize and arrange information? (Example: X AKA Twitter)
A) @
B) #
C) !
  • 8. This feature saves your search data, even if you accidentally close your browser.
A) Folksonomy
B) Rich User Experience
C) User Participation
  • 9. This feature involves the audience to judge your content.
A) User Participation
B) Rich User Experience
C) Folksonomy
  • 10. This feature uses time-based pricing. If it expires, you have to pay again with the same or different price.
A) Long Tail
B) Mass Participation
C) Software as a Service
  • 11. This feature enables subscription to a software, but ownership is limited.
A) Software as a Service
B) Mass Participation
C) Long Tail
  • 12. This feature has universal access.
A) Long Tail
B) Software as a Service
C) Mass participation
  • 13. Which organization is created by Tim Berners-Lee?
A) CERN
B) W3C
C) MIT
  • 14. This issue means some files cannot support Web v3.
A) Security
B) Compatibility
C) Vastness
  • 15. This issue questions if his/her preferences are saved or not.
A) Compatibility
B) Security
C) Vastness
  • 16. This issue contains billions of web pages.
A) Vastness
B) Compatibility
C) Security
  • 17. This article is the reason how Web v2 is created.
A) The Internet and You
B) Information Reality
C) Fragmented Future
  • 18. This issue has imprecise words.
A) Vagueness
B) Logic
C) Vastness
  • 19. This issue caused certain limitations for a computer to predict the user's intentions.
A) Logic
B) Security
C) Vastness
  • 20. "Many devices, one goal."
A) Assistive Media
B) Convergence
C) Social Media
  • 21. A website, application, or online channel that makes users talk about whatever they want.
A) Convergence
B) Social Media
C) Mobile Technologies
  • 22. This social media creates his/her account before chatting.
A) Social News
B) Social Networks
C) Bookmarking Sites
  • 23. This social media allows you to store and manage links.
A) Bookmarking Sites
B) Media Sharing
C) Social Networks
  • 24. This social media keeps you updated, but other users can comment and rate
A) Social Buzz
B) Social Networks
C) Social News
  • 25. This social media uploads any content.
A) Bookmarking Sites
B) Media Sharing
C) Microblogging
  • 26. This social media focuses small updates.
A) Forums
B) Blogs and Forums
C) Microblogging
  • 27. This social media focuses on discussion while posting content.
A) Blogs and Forums
B) Microblogging
C) Social Networks
  • 28. Which OS has this logo?
A) Android
B) Symbian
C) iOS
  • 29. Which OS has this brand?
A) Blackberry OS
B) Symbian
C) Android
  • 30. Which OS has this brand?
A) Blackberry OS
B) Android
C) WebOS
  • 31. You cannot just walk in a room and introduce yourself.
A) Siblings' Names
B) Middle Name
C) First Name
  • 32. Matching a name with a face as your profile picture is a modus to identity theft.
A) Last Name
B) First Name
C) Middle Name
  • 33. Never post this information or random strangers will call you.
A) Cellphone Number
B) OTP Number
C) Home Phone Number
  • 34. This information is used as a secret question if you lost your password. Never disclose this.
A) Parents' Names
B) Friends' Names
C) Siblings' Names
  • 35. This information makes criminals easy to find you.
A) Birthday
B) Address
C) Home Phone Number
  • 36. This is the browser's Private Mode.
A) Guest
B) Incognito
C) Private
  • 37. Malware that replicates and corrupts your computer.
A) Virus
B) Worm
C) Spyware
  • 38. This malware acts innocent but leaves you vulnerable when opened.
A) Worm
B) Trojan
C) Rogue Security Software
  • 39. This malware transfers from one computer to another and it uses a computer network to spread itself.
A) Virus
B) Trojan
C) Worm
  • 40. This malware sees you typing and record it.
A) Keyloggers
B) Worm
C) Spyware
  • 41. What does spam bring you?
A) Updates
B) Suspicious Emails
C) Job Requests
  • 42. What is phishing's true goal?
A) To catch fish
B) To steal your money
C) To acquire sensitive information
  • 43. What is this symbol?
A) Trademark
B) Copyright
C) Fair Use
  • 44. What is this symbol?
A) Fair Use
B) Copyright
C) Trademark
  • 45. In Bing, Microsoft's Search Engine, which symbol finds the exact words in a phrase?
A) +
B) ( )
C) " "
  • 46. This image format has 16.7 million colors and are mostly used as background images or backdrops.
A) .jpg/jpeg
B) .gif
C) .png
  • 47. This image format has 256 base colors and can animate pictures.
A) .jpg/jpeg
B) .gif
C) .png
  • 48. This image format has 16 million colors and supports transparency.
A) .gif
B) .jpg/jpeg
C) .png
  • 49. This new selection makes an organizational chart based on the process flow or ranking system.
A) Clip Art
B) Smart Art
C) Art
  • 50. This image placement puts the text in front of the image. This makes images turn into background images.
A) In Front of Text
B) Square
C) Behind Text
Students who took this test also took :

Created with That Quiz — where test making and test taking are made easy for math and other subject areas.