Loading documents preview...
ICT-2112-2012S Empowerment Technologies (E-Te Quarter 1: Performance Task 1 10/10
_____ are programs that are directly installed in a computer or device Native applications
Which of the following is NOT true? Google's only server is located in California
The following are benefits of cloud computing except _____ Proficiency
A computer that does a task for other computers is called a _____ Server
Which of the following statements is NOT true? Only your full name can be used as a username.
Which of the following can be used in identity theft? All
Which of the following is NOT true about passwords? Passwords should not be memorized Which of the following does not help you avoid getting a virus? Downloading pirated programs
is your alias, which is used by websites to represent your online presence. Username
_____ websites change appearance and behavior based on users' action Dynamic
Quarter 1: Written Work 1 18/20
You want to know if classes are suspended because of a storm. Which of the following TLD's is most likely to have the most credible information .gov
Clicking on a search result using the _____ will open the link in a new tab. Mouse wheel
People who send unwanted and unsolicited emails are called _____ Spammers
Which of the following TLD's is most likely to be owned by a university? .edu
Which of the following can be used in identity theft? All
While you are typing your keyword in the address bar or the search bar, several _____ may appear bellow it Suggestions
Which of the following TLD's is most likely to be used by non-profit groups? .org
A _____ page is about a single topic and can be edited by anyone with the right credentials Wiki
You copied an essay that you found online and submitted it in an essay writing contest. You have committed _____. Plagiarism
A member of an online community constantly sends messages about products that he is selling. You can report this person for _____. Spamming
.edu stands for
Education
Which of the following details is NOT essential in citing a source article's address or URL
_____ Internet-based networks that are used to store, manage, and share resources and information Cloud Computing
Servers are housed in centralized locations called _____ Data centers
You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is a _____ Server
You can check an article's _____ to know if the information that it contains is updated. Publication date
Which of the following is not a factor that can be used to determine a source's credibility? The article's length
_____ is a secret group of characters used to unlock your account Password
.org stands for Organization
Which of the following statements is NOT true? Phishing is a type of virus that can make copies of itself
Quarter 1: Performance Task 2 10/10
In a spreadsheet, the vertical groupings are called _____. Columns
What is the name of the of spreadsheet application that was used in this chapter? LibreOfficeCalc
A group of programs used to view, manipulate, and print computer graphics is called a _____. Graphics suite
What sign is used for multiplication? *
In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1 25500
A program used to create, store, and manage data in tables. Spreadsheet
In Calc, what sign can be seen in the beginning of the formulas? C
A program used to create, edit, and print documents is called a _____ Word processor
What do you call software that are used to create information like documents, spreadsheet, presentations, etc? Productivity tool
Adding information from a database to a document is called _____. Mail Merge
Quarter 1: Written Work 2
Bcc stands for _____ Blind Carbon Copy
_____ is the legal right to own an original work Copyright
You bought an artist's album then you made and sold copies of it. What you did is called _____. Counterfeiting
Which of the following is TRUE? By default, Gmail will delete a message in the Trash after 30 days.
Which of the following is true? The domain part comes before the @ sign
_____ is derived from a Hawaiian word that means super fast. Wiki
Web 2.0 websites were _____. Static
Web 2.0 websites is best described by which of the following? Ubiquitous