Empowerment Technologies

  • Uploaded by: Sun Tea Seguin
  • 0
  • 0
  • January 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Empowerment Technologies as PDF for free.

More details

  • Words: 729
  • Pages: 5
Loading documents preview...
ICT-2112-2012S Empowerment Technologies (E-Te  Quarter 1: Performance Task 1 10/10



_____ are programs that are directly installed in a computer or device Native applications

Which of the following is NOT true? Google's only server is located in California

The following are benefits of cloud computing except _____ Proficiency

A computer that does a task for other computers is called a _____ Server

Which of the following statements is NOT true? Only your full name can be used as a username.

Which of the following can be used in identity theft? All

Which of the following is NOT true about passwords? Passwords should not be memorized Which of the following does not help you avoid getting a virus? Downloading pirated programs

is your alias, which is used by websites to represent your online presence. Username

_____ websites change appearance and behavior based on users' action Dynamic

 Quarter 1: Written Work 1 18/20



You want to know if classes are suspended because of a storm. Which of the following TLD's is most likely to have the most credible information  .gov

Clicking on a search result using the _____ will open the link in a new tab. Mouse wheel

People who send unwanted and unsolicited emails are called _____ Spammers

Which of the following TLD's is most likely to be owned by a university? .edu

Which of the following can be used in identity theft? All

While you are typing your keyword in the address bar or the search bar, several _____ may appear bellow it Suggestions

Which of the following TLD's is most likely to be used by non-profit groups?  .org

A _____ page is about a single topic and can be edited by anyone with the right credentials Wiki

You copied an essay that you found online and submitted it in an essay writing contest. You have committed _____. Plagiarism

A member of an online community constantly sends messages about products that he is selling. You can report this person for _____. Spamming

.edu stands for

Education

Which of the following details is NOT essential in citing a source  article's address or URL

_____ Internet-based networks that are used to store, manage, and share resources and information Cloud Computing

Servers are housed in centralized locations called _____ Data centers

You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is a _____ Server

You can check an article's _____ to know if the information that it contains is updated. Publication date

Which of the following is not a factor that can be used to determine a source's credibility? The article's length

_____ is a secret group of characters used to unlock your account Password

.org stands for Organization

Which of the following statements is NOT true? Phishing is a type of virus that can make copies of itself

Quarter 1: Performance Task 2 10/10



In a spreadsheet, the vertical groupings are called _____.  Columns

What is the name of the of spreadsheet application that was used in this chapter? LibreOfficeCalc

A group of programs used to view, manipulate, and print computer graphics is called a _____. Graphics suite

What sign is used for multiplication? *

In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1 25500

A program used to create, store, and manage data in tables. Spreadsheet

In Calc, what sign can be seen in the beginning of the formulas?  C

A program used to create, edit, and print documents is called a _____ Word processor

What do you call software that are used to create information like documents, spreadsheet, presentations, etc?  Productivity tool

Adding information from a database to a document is called _____. Mail Merge



Quarter 1: Written Work 2

Bcc stands for _____ Blind Carbon Copy

_____ is the legal right to own an original work Copyright

You bought an artist's album then you made and sold copies of it. What you did is called _____. Counterfeiting

Which of the following is TRUE? By default, Gmail will delete a message in the Trash after 30 days.

Which of the following is true? The domain part comes before the @ sign

_____ is derived from a Hawaiian word that means super fast. Wiki

Web 2.0 websites were _____. Static

Web 2.0 websites is best described by which of the following? Ubiquitous

Related Documents

Empowerment Technologies
January 2021 1
Empowerment
January 2021 1
Tos Empowerment
January 2021 0
Youth Empowerment
February 2021 0
Ganesha Empowerment
January 2021 1

More Documents from "koochimetal"