2. I. IDENTIFICATION
1. ___________ refers to the transfer or exchange of information from person to person or
from one place to another.
2. ___________ is a processed data. Could also be visualized as a commodity, which could
be or solid.
3. ___________ a series of actions conducted in a certain order to make sure the system
runs smoothly.
4. ___________ the acquisition, analysis, manipulation, storage and distribution of
information; and the design and provision of equipment and software.
5. ___________ refers to the use of scientific knowledge to invent tools that assist human
beings in their efforts to overcome environmental hazards and impediments to
comfort.
3. 6. ___________ A website to which you can upload your own video
clips and view video clips uploaded by others.
7. ___________ allows you to create slideshow presentations,
wherein you can format the texts & images, adding also
animaions.
8. ___________ Is a computer network connecting millions of
computers all over the world.
9. ___________ is the development of computer systems able to
perform tasks that normally require human intelligence, such
as visual perception, speech recognition, decision-making, and
translation between languages.
10. ___________ is the standard photo editing.
4. 11.___________ it is the name given to computer
programs.
12.___________ is the most popular productivity suites.
13.___________ it is the raw facts and figures.
14.___________ used to simulate a paper worksheet. It is
composed of cells that are represented in rows &
columns designed to perform basic arithmetic
operations.
15.___________ described as a state of being connected to
the cyberspace through a medium of internet.
5. 16. ________ ________ is a document commonly written in Hyper Text
Markup Language (HTML) that is accessible through the Internet or
other network using an Internet browser.
17. ________ considered to be electronic junk mail or junk newsgroup
postings.
18. ________ The act of sending an email to a user falsely claiming to be
an established legitimate enterprise in an attempt to scam the user
into surrendering private information that will be used for identity
theft.
19. ________ It makes it easier for users to interact, to collect, and use
the data from the user’s interactions for their own particular needs.
20. ________are online versions of information systems, which is “the
process of and tools for storing, managing, using, and gathering of
data and communications in an organization.
6. 21. _________ refers to software designed specifically to damage or
disrupt a system, such as a virus or a Trojan horse.
22. _________ is similar to a virus by design and is considered to be
a sub-class of a virus.
23. _________ at first glance will appear to be useful software but
will actually do damage once installed or run on your
computer.
24. _________ _________ is a program or piece of code that is loaded
onto your computer without your knowledge and runs
against your wishes.
25. _________is the common name used to describe software that is
given to the user with advertisements embedded in the
application.
7. 26.________ is the best productivity tool for them to
create formal letters and brochures?
27. ________ should be created first before starting a mail
merge?
28.________ where you are going to edit the recipient’s
name and address in creating mail merge?
29. _________ is a slide moves from one to another as the
slide shows runs.
30. _________ are set to animate to specific slides in a
presentation.
8. 31._________ is the animation that will occur at the same
time as the previous animation.
32. _________ is considered as high-quality image
format, where all color & data information are
stored
33. _________ is a copyrighted which can be used for free
and unlimited time.
34. ________ is a moving computer graphic effect that
can be added to the text, object or the entire slide
itself.
35. ________ is a link that will direct you to another page
or part of the same document.
9. 36.________ describes the placement of elements of equal
weight on the page.
37. _________ is the combination of opposing characteristics
of an element like color, size, thickness, etc.
38. _________ also known as data visualization, a visual image
such as a chart or diagram that is used to explain
information or data.
39. _________ The most popular image format used on the
web.
40. _________ is an image format that is limited to the 8-bit
palette with only 256 colors.
10. II. ENUMERATION
1-3. How to create a Hyperlink?
4-7. Give at least three (4) image file formats.
8-11 . Give at least four (4) basic techniques common to
all image editing program.
12-16 – Give at least five (5) software of Microsoft
Office
17-20 – what are the four (4) common online
platforms?