Nothing Special   »   [go: up one dir, main page]

Ict - Ed Tech Reviewer A

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

INFORMATION AND COMMUNICATION TECHNOLOGY

LET REVIEWER UNIVERSITY

1. _________ is the use of scientific knowledge for practical purposes or applications,


involving a specific equipment that we use in industry or in our everyday lives.
a. Phishing
b. Technology
c. Muscular Skeletal Disorders
d. Telecommuting
2. ICT can be described as _________.
a. Informative and Communist Technology
b. Information and Calibration Technology
c. Information and Communications Technology
d. Information and Collaboration Technology
3. In Excel, which of the following would not be stored in a cell?
a. Chart
b. Text
c. Numbers
d. Formulas
4. Which of the following is not a benefit of technology in education?
a. Improves critical-thinking abilities.
b. Unlimited access to games and other internet sites.
c. Allows cooperative learning.
d. Increases self-expression.
5. This is considered to be the first manual data processing device developed in China in
the 12th century A.D.
a. Hieroglyphics
b. Papyrus
c. Printing Press
d. Abacus
6. Hannah uses passwords to access her online accounts. To keep her passwords secure,
Hannah should _______.
a. Use the same password for all online accounts
b. Write her passwords down
c. Tell her best friend her passwords
d. Regularly change her passwords
7. Type of social media that allows the user to connect with other people with the same
interests of background.
a. Blogs
b. Social Networks
c. Social News
d. Microblogging
8. Personal data is often transmitted over the internet. One method of securing the data
before transmission is _________.
a. Using encryption
b. Filtering
c. Streaming
d. Using a firewall
9. He is considered to be the “Father of Computing” because of his contributions to the
basic design of computer
a. John Napier
b. William Oughtred
c. Blaise Pascal
d. Charles Babbage
10. Used in Apple devices such as iPhone and iPad.
a. Symbian
b. Android
c. BlackBerry
d. iOS

1 | LET REVIEWER UNIVERSITY


11. The most appropriate type of software for writing a letter is _________.
a. Spreadsheet Software
b. Control Software
c. Word Processing Software
d. Database Software
12. Mary has a new dishwasher. The dishwasher has an in-built device that controls the
water level. This type of device is known as:
a. An Embedded Computer
b. A Console
c. A Super Computer
d. A Laptop
13. The software used to find information on the internet is _________.
a. Image Editing Software
b. Presentation Software
c. Web Browsing Software
d. Web Authoring Software
14. Which one of these measures the quality of a screen display?
a. Window Size
b. Resolution
c. Contrast
d. Icon Size
15. A school has a network of computers connected to a server on a single site. This type of
network is a _________.
a. Virtual Private Network
b. Wide Area Network
c. Peer-To-Peer Network
d. Local Area Network
16. Describe the features of an intranet.
a. An external internet
b. LAN within the organization
c. An output storage device
d. An input storage device
17. Which of the following app displays satellite images of the Earth's surface?
a. Translate
b. Docs
c. Google Earth
d. G Drive
18. Phishing is an inappropriate attempt to collect personal information from a computer
user. Identify one action that a computer user could take to prevent phishing.
a. Use a strong password to restrict computer access.
b. Ensure anti-virus software is up to date.
c. Do not click on links in emails from unknown users.
d. Do not download from untrustworthy sites.
19. The most appropriate input device for freehand drawing is _________.
a. A Graphics Tablet
b. An OMR
c. A Joystick
d. A Graphics Card
20. WMA is which file format?
a. Audio File Format
b. Document File Format
c. Compressed File Format
d. Video File Format
21. When an online order is received an automatic confirmation, message is sent to the
customer. Name the method of communication used to send the confirmation.
a. Letter
b. Article
c. Email
d. Gmail

2 | LET REVIEWER UNIVERSITY


22. Mike has a user account in his school's computer lab. Any student can access their files
on any computer. To prevent other students from accessing Mike's files when he leaves a
computer, he should _________.
a. Close all software applications
b. Disconnect from the internet
c. Log out of the network
d. Switch off the monitor
23. An input device needed to control the humidity in a greenhouse is a ________.
a. Sensor
b. Control Device
c. Scanner
d. Touchscreen
24. When did men start to use pointed sticks to in-script signs and symbols on the leaves of
trees and knives for the bark of trees?
a. During the medieval era
b. During the Ancient Times
c. During the Renaissance period
d. During the age of naturalism
25. Amazon.com is an example of what feature in Web 2.0?
a. Rich User Experience
b. User Participation
c. Folksonomy
d. Social Alteration
26. The type of software that monitors activity on a computer without the user's permission
is ________.
a. Shareware
b. Encryption
c. Licensing
d. Spyware
27. Technology adds immeasurable possibilities to developing your career by enriching your
skills in your profession by __________.
a. Enhancing your learning
b. Fostering efficient work practices
c. Augmenting your networking and business media skills
d. All of these
28. This period has three main lines of concern: intellectual, aesthetic, scientific.
a. Renaissance
b. 19th to 20th century
c. Contemporary times
d. Medieval era
29. Who invented the printing press?
a. Frederick I of Bologna
b. Edward Thorndike
c. Johannes Gutenberg
d. Francis Bacon
30. Which one of these is used to link two networks?
a. Modem
b. Booster
c. Browser
d. Gateway
31. He was recognized for developing the first picture book—the Orbis Pectus and was
considered the pioneer in instructional technology development.
a. Jason Herbart
b. Johann Amos Comenius
c. John Locke
d. Francis Bacon
32. Which one of these would provide the largest storage capacity?
a. 250 megabytes
b. 5 terabytes
c. 50 kilobytes

3 | LET REVIEWER UNIVERSITY


d. 500 gigabytes
33. What is Information Technology
a. The use of computer hardware and software to store, retrieve and manipulate
information
b. To store, retrieve and manipulate information.
c. The use of hardware and software to access data.
d. The use of computer hardware and software to help human accomplish everyday task.
34. An open source OS developed by Google.
a. iOS
b. Android
c. Symbian
d. BlackBerry
35. What period highlights interculturalism and multiculturalism; mobile devices and media
platforms; self-paced and individual study plans; a variety of available resources and
technologies.
a. Renaissance
b. Medieval Era
c. 19th to 20th Century
d. Contemporary Times
36. A bank uses a variety of computer systems. Customer accounts are stored on _________.
a. A PC
b. An Embedded Computer
c. A Mainframe Computer
d. A Laptop
37. In today's society, ________ is replacing manual labor, and future workers must
continually educate themselves and increase their skills to maintain their value in the
workplace.
a. Telecommuting
b. Brainpower
c. Telework
d. Ergonomics
38. Publishing the private contact information of one's political opponents online.
a. Doxing
b. Boxing
c. Invading Privacy
d. Cyberbullying
39. Full Form of TIFF is ________.
a. Tagged File Format
b. Tagged Image File Format
c. Tagged Image File Format
d. Tagged Image Format File
40. What is a software program that allows a user to locate, access, and display web pages?
a. Web Browser
b. Website
c. Dynamic
d. Semantic
41. With the increasing use of educational technology inside the classroom, what role is
expected of the teacher?
a. Facilitator
b. Researcher
c. Knowledge Giver
d. Source of information
42. _________ is the use of computers and telecommunications equipment to work at home
or in other locations away from a conventional, centralized office.
a. Telecommuting
b. Telework
c. Technology
d. Ergonomics
43. What does CPU stand for?
a. Clever Peoples University

4 | LET REVIEWER UNIVERSITY


b. Central Puppies Unit
c. Central Processing Unit
d. Computer Problems Unite
44. Name a device that can be used to connect to the internet
a. Internet
b. Microsoft
c. Web Processor
d. Modem
45. "Educators and Teaching institutions use technology to assist with education" Choose
the activities that fit the above description.
a. Student watch educational content from a television set.
b. Student learn and communicate with their teacher and friends through the internet
c. Lesson and quizzes distributed using modular printed type.
d. Students experiment with electricity using wires, batteries and light bulbs
46. Malicious attacks on networks and websites for the purpose of promoting social change,
regarded by some as civil disobedience and others as cyberterrorism.
a. Hacktivism
b. Dark Web
c. Cyberwriting
d. Cyberplace
47. Full form of BMP is _________.
a. Bitmap File Format
b. Bitmap Image File .doc
c. Bitmap Image File Format
d. Bitmap Image File .exe
48. In MS-Excel which of the following formulas is not entered correctly?
a. =D3 - D5
b. =11 + 65
c. =C7 * C9
d. 18 + 89
49. A curriculum that includes the teaching and learning of technology skills and the use of
computers and other related electronic tools.
a. Technology Applications
b. Device
c. E-Learning
d. Technology
50. What do you open when you click on the waffle?
a. Office 365
b. The Internet
c. A Portal to Narnia
d. Microsoft Word

5 | LET REVIEWER UNIVERSITY

You might also like