100% found this document useful (3 votes)
2K views6 pages

Pre-Test ICT

Uploaded by

Ronna Mae Sayman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
2K views6 pages

Pre-Test ICT

Uploaded by

Ronna Mae Sayman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

General Education: Information and Communication Technology (ICT) Pre- Test

This is a 50 item test on General Education: Information Communication and Technology.


Instruction: Read the questions carefully and choose the correct answer. God Bless!

1. One of the services, that can be used on the Internet and refers to browsing and searching
content in the form of web pages, is called:
A. LAN
B. FTP
C. WWW
D. ISDN
2. Which of the following is not a hardware?
A. Printer
B. Internet browser
C. Network Card
D. Monitor
3. Which of the following devices is used for printing blueprints?
A. Touch-Screen
B. Scanner
C. Plotter
D. Digital Camera
4. Software for digital photo editing is called:
A. OpenOffice.org
B. Adobe Photoshop
C. Microsoft Office
D. Mozilla Firefox
5. Which of the following is not an operating system?
A. Internet Explorer
B. Mac OS X
C. Linux
D. Windows XP
6. Which of the following is not a benefit of technology in education?
A. Improves critical-thinking abilities.
B. Unlimited access to games and other internet sites.
C. Allows cooperative learning.
D. Increases self-expression.
7. What type of computer application is used for calculations?
A. Antivirus Software
B. Databases
C. Spreadsheet calculation program
D. Internet browser
8. Which situation shows that technology can be used to motivate students to learn?
A. Teacher Eric employs educational games related to the lesson they are taking.
B. Miss Cleo designs lessons which use cooperative learning with technology integration.
C. Mr. Jimmy utilizes computer assisted instruction programs so that students will learn at
their own pace.
D. Teacher Sarah assigns projects to her class where self-expression and creativity is
acknowledged.
9. Computers in a firm are connected to a network, so the staff could work together on files
and share printers. That network is called:
A. LAN
B. FTP
C. WAN
D. ISDN
10. Which of these concepts describes the use of the Internet intended for sending and
receiving e-mails?
A. e-data exchange
B. e-commerce
C. e-mail
D. e-retail
11. What is the name of the software, which is a core program on a computer, and is
automatically loaded when the computer is turned on?
A. Shareware
B. Freeware
C. Operating System
D. Licensed software
12. Hardware component that integrates other components into a computer is:
A. Motherboard
B. Graphics card
C. Hard Disk Drive (HDD)
D. Keyboard
13. Physical parts of the computer are called:
A. Hardware
B. Network computer
C. Personal computer (PC)
D. Software
14. He is considered as the “Father of Modern Media in Education”.
A. Jean Piaget
B. Rene Descartes
C. Rene Descartes
D. Edgar Dale
15. Type of malware, that can replicate autonomously and can corrupt data on your computer,
is called:
A. Mouse
B. Worm
C. Lion
D. Sparrow
16. What is Copyright?
A. inhibit software piracy
B. protect software against viruses
C. disable the firewall
D. protect software author's rights (from unauthorized copying and distribution)
17. What type of applications are used to protect your computer from viruses?
A. Antivirus software
B. Databases
C. Spreadsheet calculator program
D. Accounting program
18. Which of the following is the best way to protect your computer against data loss?
A. Create database
B. Create backup copies on storage media
C. "Surfing" the internet
D. Often change password
19. Which of the following is not a medium for data storage?
A. Keyboard
B. Hard disk
C. USB stick
D. DVD disk
20. Which of the following issues is the result of a low monitor refresh rate or viewing a screen
from an improper distance:
A. RSI (Repetitive strain injury)
B. Visual impairment
C. Spinal problem
D. Virus infection
21. It is a term to denote a whole range of technologies associated with processing information
and with sending and receiving messages.
A. Educational Technology
B. Information and Communication Technology
C. Media Technology
D. Instructional Systems Design
22. A methodology widely used for developing new training programs.
A. Microsoft
B. World Wide Web
C. Instructional Systems Design
D. Computer Technology
23. Every computer connected directly to the network via cable or a phone line, with at least
one computer, is called:
A. Hardware
B. Network Computer
C. ISDN
D. ADSL
24. This is considered to be the first manual data processing device developed in China in the
12th century A.D.
A. Hieroglyphics
B. Papyrus
C. Printing Press
D. Abacus
25. He is considered to be the “Father of Computing” because of his contributions to the basic
design of computer.
A. John Napier
B. William Oughtred
C. Blaise Pascal
D. Charles Babbage
26. Which is the standard input device that accepts letters, numbers and commands from the
user?
A. Trackpad
B. Lightpen
C. Mouse
D. Keyboard
27. The input device, designed for digitizing, i.e. direct input of paintings, drawings or text,
usually from paper to computer, is called:
A. Touch screen
B. Scanner
C. Plotter
D. Digital Camera
28. Mr. Rico carefully studies the materials he acquired from the internet. He always examines if
the author is qualified to present the material. This practice is?
A. necessary to ensure that the materials are reliable.
B. unethical because he does not trust the author.
C. unnecessary because all resources from the internet are dependable.
D. just a waste of time.
29. Which of the following in not a pointing device?
A. mouse
B. joystick
C. trackball
D. monitor
30. When a teacher asks the consistency of a material taken from the internet with other
available materials, he/she is concerned with its?
A. Relevance
B. Accuracy
C. Coverage
D. Currency
31. Due to virus threat, we should not:
A. connect computer to the Internet or any other computer network
B. install anti-virus programs that are used to detect viruses on the computer
C. open e-mails and pages from an unknown sender
D. change passwords
32. Which of the following is not a software?
A. Printer
B. Internet browser
C. Windows 95
D. Operating system
33. The most common health problems, associated with computer use, do not include:
A. Sprain (dislocation)
B. Spinal problems
C. Visual impairment
D. Virus infection
34. It is a device used to project a computer image or other images from independent devices,
such as DVD players, Blu-ray player, etc. onto canvas or a wall.
A. Printer
B. Plotter
C. Projector
D. USB
35. Which of the following is not a benefit of teleworking:
A. reduced travel time to work or it is not needed
B. lack of human contact
C. increased ability to concentrate on the job
D. flexible working hours
36. The symptoms of virus infected computers do not include:
A. slow performance
B. faster performance
C. cessation of response to commands
D. crash and re-start the operating system
37. Monitor is:
A. input device
B. output device
C. input and output device
D. input and output
38. Which of the following is used for safely shutting the computer down ?
A. Control Panel
B. Start Menu
C. My computer
D. Internet Explorer or Mozilla Firefox
39. What is the function of Firewall?
A. organizes the software installed o your computer
B. Creates complex documents
C. Monitors and enables control of incoming and/or outgoing data traffic
D. does complex accounting calculations
40. One of the advantages of e-mail is:
A. working hours are 9-19 every day
B. it is always available
C. allows face-to-face contact
D. viruses are commonly spread through e-mail attachments
41. A software (or network device) that is used to control authorized access and protect against
unauthorized access to your computer.
A. Firewall
B. Security Cable
C. Malware
D. Freeware
42. It is a software, which infiltrates an operating system in a seamless manner, whether by
human mistake or due to shortcomings of the operating system and software support, with
malicious intentions.
A. Firewall
B. Malware
C. Virus
D. Spyware
43. It encompasses a group of people who communicate via social networks, forums, IM service,
blogs.
A. Social Networks
B. Forum
C. Virtual Community
D. Chatroom
44. It is a form of Internet media in which users can re-post or write their opinion on any topic.
It can be personal (a form of Internet diary), thematic, or in the form of journals.
A. e-mail
B. Podcast
C. Blog
D. RSS
45. It consists of all forms of learning and/or knowledge transfer that are based on electronic
technologies. This term will mostly be used to describe learning and/or dissemination of
knowledge without direct teacher-student contact, while using ICT technology
A. e-mail
B. e-learning
C. e-banking
D. e-government
46. The following are ways to connect to the internet except:
A. Dial-up
B. Broadband
C. Wifi
D. Blog
47. It is a private network of an organization to which only authorized employees have access
(login and password).
A. Internet
B. Intranet
C. Extranet
D. Bitrate
48. A global system comprised of interconnected computers and computer networks, which
communicate by means of using TCP/IP protocols.
A. Internet
B. Intranet
C. Extranet
D. Bitrate
49. The following are types of networks except:
A. LAN
B. WLAN
C. WAN
D. WIFI
50. The following are output devices except:
A. Monitor
B. Projector
C. Printer
D. Keyboard

You might also like