0% found this document useful (0 votes)
2 views

POST TEST

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

POST TEST

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 52

The current state of

ICT Technologies
ROMEL JASON F. BIBOSO, MIT
POST - TEST
MULTIPLE CHOICE
1. It happens when someone intentionally abused,
harass, and mistreated by other person using
electronic communication.

A. Sexting C. Cyber Bullying

B. Phishing D. Cyber Stalking


2. Jethro was tasked to report a topic in one of his
subjects. He wants to apply one of the hyperlink options
where he could jump to a specific slide in his
presentation. Which of the following hyperlink options
will he use?
A. Create a New Document
B. Existing File or web Page
C. Place in This Document
D. E-mail Address
3. The following are benefits of
planning a presentation, except
A. improves the quality of presentation
B. saves time and effort
C. makes presentation slightly effective
D. makes presentation more enjoyable
4. A program that steals user credentials
and confidential information and send back
to hack by recording every keystroke that a
user makes on their computer or device.

A. Malware C. Worm

B. Bootnet D. Key logger


5. Which of the following shortcut keys
will you use if you want to start your
presentation from the beginning of the
slides?
A. CTRL + F5
B. SHIFT + F5
C. F5
D. F7
6. Which is NOT one of the basic characteristics
of life? What feature of Microsoft Word allows
you to efficiently create documents that have the
same general content but may have different
recipients or purpose?
A. Mail Merge
B. Print Merge
C. Send Merge
D. View Merge
7. To Broaden a search for
advertising, you will search the
term __________.
A. advertising OR commercial
B. advertising AND commercial
C. advertising BUT commercial
D. advertising NOT commercial
8. An unwanted advertisement that
will pop-up several times on victim’s
computer then behave abnormally and
tedious to close them.

A. Rootkit C. Malware

B. Botnet D. Adware
9. A collection of infected internet–
connected devices such as PC and
mobile phone that are controlled by a
common type of malware.

A. Malware C. Worm

B. Botnet D. Key logger


10. Luke wants to include videos in his
presentation. He wants to play those videos
without going out from his current presentation.
Which of the following could be his best option?
A. Use hyperlink to navigate those videos.
B. Use another computer in playing the videos.
C. Open the presentation and the videos to be
played and then use Alt + Tab.
D. Embed those videos as object in your slides.
11. A software tools used by
hackers to gain control over a
computer on a network without
being exposed.
A. Rootkit C. Malware

B. Botnet D. Adware
12. A cyberattack method using
deceptive emails and websites to
acquiring sensitive personal
information.
A. Adware C. Keylogger

B. Cybercrime D.
Phishing
13. Also known as junk email or
unwanted email send by advertiser
or bot. It can be used to send
malware.
A. Worm C. Trojan Horse

B. Spam D. Cyber Bullying


14. What version of the world wide web that allows
interactivity between the users and the website?

A. Web 1.0 C. Web 3.0

B. Web 2.0 D. Web 4.0


15. A website that allows you to
broadcast short message.
A. Social News C.
Microblogging

B. Bookmarking Sites D. Media


Sharing
16. a malicious program that
disguised as legitimate program
that user will accept and use but
take control of your computer.
A. Worm C. Trojan Horse

B. Spam D. Cyber Bullying


17. A platform that assist person
with disability.
A. Assistive Media C.
Convergence

B. Social Media D.
Semantic Web
18. A reliable source of information
from the internet is
_________________.

A. Biased C. Trying to sell something

B. Trusted D. Google Chrome


19. Which of the following do you
not need to include in a citation?
A. author, if available
B. title of the article
C. date of publication
D. call number
20. Which of the following is not
a component of the mail merge?
A. Address
B. Filename
C. Main document
D. Data Source
21. Any information coming from
these domain types are usually
reliable except
A. .com
B. .org
C. .edu
D. .gov
22. Where can you find the Start
Mail Merge button?
A. File Tab
B. Mailings Tab
C. Reference Tab
D. Home Tab
23. A web application where a user can communicate,
create and share content, and participate in online
communities?

A. Convergence C. Mobile
Technologies

B. Social Media D. Assistive Media


24. What are the steps in
creating a simple mail merge?
A. Create form document, preview, insert place holders,
print
B. Preview, insert place holders, create form document,
print
C. Create main document, create data source, insert place
holders, preview
D. Create data source, insert place holders, preview, print
25. What symbol will you use to
search for the exact term or
phrase?
A. ( )
B. “ “
C. &
D. -
26. What essential component of
mail merge is required from users
when generating?
A. Data file
B. Form document
C. Place holder
D. Merge field
27. The act of sending sexually explicit
text messages, images, and videos.

A. Sexting C. Cyber Bullying

B. Phishing D. Cyber Stalking


28. The following are types of
document you can create using
mail merge, except
A. Envelopes
B. Letters
C. Posters
D. Labels
29. What file contains the
information you need to merge
with your main document?
A. Address block
B. Contact list
C. Data file
D. Directory
30. What tells the Microsoft Word
exactly where to place the
information coming
from the data file to the main
document?
A. Data Source
B. Insertion Line
C. Place Holder
D. Insertion Tag
31. What image compression/file
type is capable of displaying simple
animation?
A. .bmp
B. .gif
C. .jpg
D. .png
32. The following are the buttons
used for switching views, except
A. Normal view
B. Slide sorter view
C. Slide show view
D. Thumbnails view
33. A criminal practice where electronic
communication is used to stalk or harass individual
or group.

A. Sexting C. Cyber Bullying

B. Phishing D. Cyber Stalking


34. The following are things to
consider in creating an effective
presentation, except
A. Clarity
B. Simplicity
C. Consistency
D. Creativity
35. Under what ribbon group does
Insert  Smart Art fall?
a. Apps
b. Illustrations
c. Media
d. Pages
36. What button allows you to see
the result of your mail merge even
before you print or send it out?
A. Preview results
B. Insert merge fields
C. Address block
D. Greeting line
37.When inserting charts on your
document, what Microsoft office
application pops up to allow you to
enter and manage the parameters of
your chart?
A. Access
B. Excel
C. Note
D. Word
38. What external material allows you to
insert organizational or structural template
like organizational charts and flow charts
on your document?
A. Chart
B. Pictures
C. Screenshot
D. Smart art
39. PowerPoint is best described as
________.
A. Presentation software
B. Database software
C. Drawing software
D. Publishing software
40. Which of the following
statements is NOT true about a
linked object?
A. Linked object is stored in the source file.
B. Information in the destination file doesn't change if you modify the
source file.
C. Information in the destination file is updated whenever the source file
is modified.
D. The data in the destination file changes whenever the source file is
modified.
41. Evelyn would like to put motion effects on
each slide in her presentation when she moves
from one slide to the next slide. Which of the
following
features of MS PowerPoint will she use?
A. Animation
B. Custom Animation
C. Custom Slideshow
D. Transition
42. A file which contains
readymade styles that can be used
for a presentation is _______
A. AutoStyle
B. Template
C. Wizard
D. Pre-formatting
43. To make her presentation more
effective, Kiana used different
animation styles. Which of the
following is NOT an animation Style?
A. Entrance
B. Emphasis
C. Motion
D. Exit
44. Which of the following best
describes a text hyperlink?
A. color black and underlined
B. color blue and underlined
C. bold and underlined
D. color blue and bold
45. Which of the following
statements is true about creating
an effective presentation?
A. Use as many slides as you can so that the audience can
clearly
understand your message.
B. Use dark fonts on dark backgrounds to gain proper
contrast.
C. Use bullets to simplify your message.
D. Use serif fonts to make your presentation more attractive.
46. What is the markup language for
designing and developing websites?
A. DNS C. HTTP

B. URL D. HTML
47. Which of the following is an
easy way to navigate slides during
your presentation?
A. Use hyperlinks
B. Flood your slides with text
C. Use a mouse instead of arrow keys
D. Press escape to locate the slides
48. Marco used bullets and short
sentences in his presentation. What
tip in creating an effective
presentation did he apply?
A. Contrast
B. Clarity
C. Consistency
D. Simplicity
49. What external material is best
to use if you want to present the
data on how stock market price
changes over time?
A. Chart
B. Smart Art
C. Clip Art
D. Screenshot
50. Which image compression type
allows you to display images in full
color just like in digital pictures?
A. .bmp
A. .gif
C. .jpg
D. .png

You might also like