Ict 1st Quarter Exam 45
Ict 1st Quarter Exam 45
Ict 1st Quarter Exam 45
Local part
All the forms of piracy are violations of _____ which is the legal right to own an original work.
Copyright
The _____ is usually the name of the website that provides the email service
Domain part
_____ may appear in web search engines, address bars, and search bars while you are typing a keyword
Suggestions
It is considered ok to use your phone in a movie theater as long as you use earphones
False
A _____ can be a single program or a system of programs designed to look for information in the Internet.
Cell
Mail Merge
What is the name of the LibreOffice version with the latest features?
LibreOffice Fresh
It's bad to receive a lot of _____ because they are annoying take up memory space
Spam
Ad-blockers are browser add-ons that prevent advertisements from being displayed in your browser.
True
Wiki is derived from the Hawiian work wikiwiki, which means ____
Quick
A group of programs used to create, edit, view, and print computer graphics is called aA group of programs
used to create, edit, view, and print computer graphics is called a
graphics suite
In the spreadsheet application that you learned about, what sign is used for multiplication?
*
HTML stands for
A1*B5-A5
950
False
It is a list of detailed information provided by a website and displayed in a web browser to a user.
Websites
B2/C2-D1
-107
is the generation of the Internet that is characterized by the increased focus on user participation and the
prevalence of dynamic websites.
web 2.0
In Calc, what is the default name of the cell in the fifth row and the fourth column?
E4
The alias that you use when you sign up in a website is called a _____.
Username
Server
__________is a term used to define applications and websites that people use to make online social interactions.
Social Media
UNESCO
Web applications
An office has one computer that is connected to a printer. It prints documents that are sent to it by other
computers via Local Area Network In this setup, the computer connected to printer is the _____.
Server
Information stolen via _____ such as credit card and bank account information can be used in identity theft and
stealing money.
Phishing
The _____ lists 15 types of works that are covered by copyright protection.
Com
Edu
_____ are unruly members who deliberately break the rules of an online community.
Trolls
A program designed to interfere with your computer, device or network's normal operation is called a
Virus
___ allows you to use multiple keywords and entire phrases and narrow down your search by selecting
language, region, date, etc.
Advanced Search
What is the name of the open-source productivity suite that we used in Chapter 5?
LibreOffice
The ".gov" TLD was originally intended to be used solely by government agencies but today anyone can
purchase and use it.
False
A computer virus can spread when the infected computer makes contact with another computer.
True
What do you call an application that needs to be installed to a device or computer before it can be used?
Native applications
Columns
True
Spreadsheet
The vertical groupings in a spreadsheet are called _____.
Columns
Adware are browser add-ons that prevent advertisements from being displayed in your browser.
False
Quick
What is the name of the of spreadsheet application that was used in Chapter 5?
LibreOfficeCalc
Cloud
False
Trolls use _____, which are fake accounts so that they can post as different users.
Sock puppets
A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.
Productivity tool