LS 6 Digital Citizenship Flashcards

1
Q

Emma was inputting a formula using Microsoft Excel when an error #DIV/0! appeared in
the cell she was working on. Which of the following describes the reason for the error?
(A) The divisor in the formula is the cell that is blank.
(B) The error occurs when the referred cell was deleted.
(C) The dividend in the formula is the cell containing a zero.
(D) The error appears when data is incorrectly typed in the range name.

A

(C) The dividend in the formula is the cell containing a zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What formatting mark in Microsoft Word will Jacob use if he wants to have a caption
beside a picture and end it with a text-wrapping break?
(A) line breaks
(B) space marks
(C) tab characters
(D) paragraph marks

A

(A) line breaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shiela is giving a report in class using a PowerPoint presentation. In one of her slides, her
friend commented that the content was copied from the internet without citing the source.
How should Shiela react to her friend?
(A) She will accuse her friend of libel.
(B) She will ignore her friend’s comment.
(C) She will thank her friend for correcting her.
(D) She will unfriend her in her social media account

A

(C) She will thank her friend for correcting her.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mark bought a licensed version of Windows 10 operating system intended for a single user
only. After installing it on his PC, he made a copy and installed it on his brother’s laptop,
although he is aware that doing this is illegal. Which of the following will NOT be the result
of his action?
(A) The operating system will run but might be unstable.
(B) The operating system will restrain the laptop’s performance.
(C) The operating system will run but will ask for a license product key.
(D) The operating system will run smoothly without a license product key.

A

(C) The operating system will run but will ask for a license product key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(C) She will blame herself for not saving the document from time to time. Sarah is making an invitation for her friend’s wedding using a Microsoft Word template
without an AutoSave feature. She was almost done when she accidentally clicked the close
button without saving her document. What is likely to happen next?
(A) She will call her friend and ask for help.
(B) She will have to create a new document.
(C) She will blame herself for not saving the document from time to time.
(D) She will not worry because the document will be saved automatically.

A

(C) She will blame herself for not saving the document from time to time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nelia owns a smartphone and uses this to pay her bills. However, she got locked out of her
phone and unintentionally wiped out all the data containing all the passwords and
information of her bank account. How may this possibly affect the way she pays her bills?
(A) She may buy a new smartphone.
(B) She may not be able to pay her bills anymore.
(C) She may ignore her bills and let them incur penalties.
(D) She may opt to go directly to the bank to settle her accounts.

A

(B) She may not be able to pay her bills anymore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Joe was surfing the internet when he saw some interesting sites. He decided to save some
of the websites so that he can easily go back to them. Which icon should he use to bookmark
the sites?

A

(A) (Bookmark icon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Boyet needs a fast and reliable internet connection at home. Which of the following internet
connection is the best for him to use?
(A) fibre optic
(B) pocket wi-fi
(C) data internet
(D) digital subscriber line

A

(A) fibre optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Jake was preparing the sales report when he noticed that there is some data in his chart
that need to be changed. Which of the following steps should he do?
(A) Click the Insert tab then choose the type of Chart to use
(B) Click the Chart then click the select Data button on the Design tab
(C) Click the Chart then on the Layout tab, click the Chart Title or Data labels
(D) Click the Chart then click the Switch Row/Column button on the Design tab

A

(B) Click the Chart then click the select Data button on the Design tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I. Click Insert tab on the Ribbon
II. Choose the type of Chart to use
III. Select the cells that contain the data

Tina already prepared her sales report in a spreadsheet. Her team leader asked her to
present it in a chart so that they can easily see the project sales. Which order of steps in
making a chart, as shown above, should she follow to perform the task?
(A) I, II, III
(B) I, III, II
(C) II, III, I
(D) III, I, II

A

(A) I, II, III

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

June is working on a report for his online business in an MS Word document. He inserted
a basic table but realized that he needs another table to compute his earnings for the whole
year. Which of the following procedures should he execute?
(A) Click Insert> Table> Draw Table
(B) Click Insert> Table> Insert Table
(C) Click Insert> Table> Quick Tables
(D) Click Insert> Table> Excel Spreadsheet

A

(B) Click Insert > Table > Insert Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. =AVERAGE(A1:A4,number)
  2. =AVERAGE(A1:A4)
  3. =SUM(A1)/COUNT(A1:A4)
  4. =SUM(A1:A4)/COUNT(A1:A4)

Mrs. Ramirez is working on the final grades of her students using MS Excel. Which of the
formulas given above should she used to calculate the average?
(A) 1 and 3 only
(B) 1 and 4 only
(C) 2 and 3 only
(D) 2 and 4 only

A

(D) 2 and 4 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

John received an email announcing that he won Php 1,000,000.00 from an e-raffle. In
order to claim his prize, he must access the given link immediately. He was redirected to a
site that asked for his full name, contact number, address, and bank details. He answered
the form right away, out of excitement. A day after, his bank notified him of an unauthorized
withdrawal of a large amount from his account. What could John learn from his experience?
(A) If he receives an email, he should not open it.
(B) If he receives an email, he should respond immediately.
(C) If he clicks on a link, he should check its credibility first.
(D) If he clicks on a link, he should fill out his details immediately.

A

(C) If he clicks on a link, he should check its credibility first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Aya is active in social media. She has hundreds of friends in her account, whom she may
not know in real life. She just accepts anyone who sends her a request. One day, her account
has been reported because of duplicate identity. Which explanation could Aya derive from
this occurrence?
(A) If she accepts every friend request, she would not offend anyone.
(B) If she is active in social media, she would have a lot of friend requests.
(C) If she is active in social media, she would be in danger of identity theft.
(D) If she accepts every friend request, she would run the risk of identity theft.

A

(D) If she accepts every friend request, she would run the risk of identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sheryl’s best friend posted a news blog online stating that a person is being accused of being
a drug lord. Her friend asked her to copy this on her own social media account. Which of the
following best explains Sheryl’s hesitation to follow her friend’s request?
(A) If she will follow her friend’s request, people will enjoy her post.
(B) If she will not post the news, her friend will think she’s not a real friend.
(C) If she will not follow her friend’s request, her friend will still be proud of her.
(D) If she will post the news blog on her account, she may be charged with libel.

A

(D) If she will post the news blog on her account, she may be charged with libel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Janet joined a social media group with her village community members. After a season of
wholesome communications, she started reading some very disrespectful hate comments,
insulting some personalities. She thought that sending a suggestion for members to avoid
such behavior might help, but it was generally ignored. If Janet wants to reduce the
discomfort she experienced in this situation, which of the following will most probable help?
(A) file charges against the erring member
(B) stop using her social media account
(C) ignore the negative comments
(D) unfollow the group account

A

(D) unfollow the group account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

. Social media offers a way to connect with others and share information, but it also comes
with risks such as online victimization, public shaming, and the spread of fake news or
embarrassing content. To protect oneself from becoming a victim of these negative online
behaviors, which of the following actions is most important to AVOID on social media?
(A) Posting motivational quotes and positive messages to uplift others.
(B) Participating in online groups and using social media to promote or sell items.
(C) Engaging in discussions by liking and commenting on significant social events.
(D) Sharing personal details, sensitive information, or awkward photos that could
be misused.

A

(D) Sharing personal details, sensitive information, or awkward photos that could be misused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A family member seems to be experiencing psychological, social, and educational difficulties
due to excessive internet use. You suspect this may be affecting their well-being and overall
productivity. How can you approach this issue to verify your concern and provide
constructive feedback?
(A) Regularly monitor their online accounts to observe their internet activities.
(B) Track and analyze their internet usage over time to identify patterns and potential
issues.
(C) Suggest developing a habit of using the internet only when necessary and for
specific purpose.
(D) Encourage them to turn off electronic devices like computers, smartphones,
laptops, and tablets more.

A

(C) Suggest developing a habit of using the internet only when necessary and for specific purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Tony travels most of the time carrying all his needed documents. He sometimes forgets
some important documents, which makes it difficult for him to do his work. He decided to
purchase a mobile device that can scan and edit his documents and even send them thru
email. Which of the following devices best suits his needs?
(A) laptop
(B) smartwatch
(C) smartphone
(D) personal digital assistant

A

(C) smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The errors #NAME?, #VALUE!, #REF! are some of the errors which appear when using
Microsoft Excel. Which statement does NOT explain the reason for these errors?
(A) The user misspells the function name.
(B) The user inputs a text where a number is expected.
(C) The user begins every formula using the equal sign.
(D) The user transfers formula to a new location where a needed column was deleted.

A

(C) The user begins every formula using the equal sign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Desktop computer problems are classified into three: computer viruses, hardware
malfunctions and software issues. Which of the following desktop computer problems is
organized correctly according to each category?
(A) Computer viruses – malware, unusual noise, corrupted files
(B) Hardware malfunction - blue screen, sudden shut off, graphical error
(C) Software issues - pop-up ads, attachment won’t open, download is very slow
(D) Hardware issues - internet is slow, computer freezes, app command is not
working

A

(B) Hardware malfunction - blue screen, sudden shut off, graphical error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Elena’s co-worker sent her a file for their product research. Upon downloading, the file
attachment does not open. Which type of desktop computer problem is she encountering?
(A) software issues
(B) computer viruses
(C) computer peripherals
(D) hardware malfunction

A

(A) software issues

23
Q
  1. Press ALT + V + Z
  2. Press Enter key
  3. Press Arrow up or down to select 75%.

Keyboard key combinations that zoom in and out of a worksheet involve using the ALT key.
Which of the following is the correct sequence of steps in using the keyboard shortcut to open
the Zoom dialog box and activate it to 75% view?
(A) 1, 3, 2
(B) 2, 1, 3
(C) 2, 3, 1
(D) 3, 1, 2

A

(A) 1, 3, 2

24
Q

The Magnifier tool on Windows helps users zoom in on parts of the screen for better visibility
during presentations or other tasks. To use this feature, you can activate and control it
using keyboard shortcuts. Below are the steps to manage the Magnifier tool:
1. Press the Windows key and tap ESC to close the Magnifier and return to the normal
display.
2. Press the Windows key and tap the plus sign (+) to turn the Magnifier on.
3. Press the Windows key and tap the minus sign (-) to zoom back out to the normal
magnification.
(A) Close the Magnifier, turn it on, then zoom out.
(B) Turn the Magnifier on, close it, then zoom out.
(C) Turn the Magnifier on, zoom out, then close it.
(D) Zoom out first, then close the Magnifier and turn it on again.

A

(C) Turn the Magnifier on, zoom out, then close it.

25
Q

Christian successfully presented to the board of directors his new marketing strategy and
he will now let the CEO view it for final approval. He will be showing this to him face-toface. What is the best way for him to present his presentation to the CEO?”
(A) normal view
(B) outline view
(C) reading view
(D) slideshow view

A

(D) slideshow view

26
Q

Clara’s presentation was rearranged by Mark, but she was uncomfortable with the resulting
series of slides that were saved. She wanted to have the original sequence back. Which type
of view will allow her to see the slides altogether while rearranging them?
(A) normal view
(B) outline view
(C) slideshow view
(D) slide sorter view

A

(D) slide sorter view

27
Q

Gina works as an encoder at XYZ Advertising Company. Her boss requested her to create a
new design for their brochures to be distributed. Which Microsoft Office application is best
for her needs?
(A) Microsoft Excel
(B) Microsoft Word
(C) Microsoft Publisher
(D) Microsoft PowerPoint

A

(C) Microsoft Publisher

28
Q

Which of the following pertains to the behavior of computer users, their compliance with
standards in program creation and usage, and the impact of these practices on individuals
and society?
(A) cyber ethics
(B) cyber safety
(C) cyber security
(D) cyber wellness

A

(A) cyber ethics

29
Q

May was given a spreadsheet file about the number of students in a class who have mobile
phones. Based on the tabular data shown above, which of the following statements is true?
(A) More males have mobile phones in all levels.
(B) More females have mobile phones for each school level.
(C) Preschool pupils have the largest number of mobile phones.
(D) Senior High School students have the least number of mobile phones.

A

(A) More males have mobile phones in all levels.

30
Q
  1. A businessman uses spreadsheet to track the trend of his retail business sales. What is a
    correct statement based on the line graph above?
    (A) There is a constant decline on the 2nd quarter to the 4th quarter.
    (B) The lowest decline in sales is from the 3rd quarter to the 4th quarter.
    (C) There is a constant increase from the 2nd quarter to the 3rd quarter.
    (D) The highest increase in sales is from the 1st quarter to the 2nd quarter.
A

(D) The highest increase in sales is from the 1st quarter to the 2nd quarter.

31
Q

Clyde’s research work about the consumption of bananas in Sitio Maybunga was approved
by his superior. He has printed his report and is ready to present it to the marketing heads.
To make it impressive, he will use a PowerPoint presentation. Which of the following will he
LEAST likely do?
(A) Use transition on the slides
(B) Add animation on the slides
(C) Customize the show of the slides
(D) Insert different sounds on the slides

A

(D) Insert different sounds on the slides

32
Q

Barangay Captain Lea is presenting her community project proposal to the city mayor, and
she wants her file to be protected. In what document format should she save her proposal to
retain its original contents?
(A) Excel
(B) PDF
(C) Publisher
(D) Word

A

(B) PDF

33
Q

Which of the following shows the correct arrangement of procedures in inserting an MS
Word document as an object to a new PowerPoint presentation template?
(A) Click Insert> Select Object> Select Create New> Select Object type> Click OK
(B) Click Insert> Select Object> Select Create New> Click Browse to locate Word
document> Click OK
(C) Click Insert> Select Object> Select Create from file> Click Browse to locate Word
document> Click OK
(D) Click Insert> Select Object> Select Create from file> Click Browse to locate Word
document> Click Link > Click OK

A

(A) Click Insert > Select Object > Select Create New > Select Object type > Click OK

34
Q

David’s bimonthly sales proposal was saved in a document. He needs to transfer it to a
portable document format to make sure that the original contents are preserved. Which of
the following procedures does he need to follow?
(A) Click File tab, choose Save As, change filename then Save
(B) Click File tab, choose New document, change filename, then Save As
(C) Check File tab, choose Save As, change filename and type, then Save
(D) Click File tab, choose existing document, change filename and then Save

A

(C) Check File tab, choose Save As, change filename and type, then Save

35
Q
  1. Click File Menu, then select Save As
  2. Type the filename on the dialog box and click Save
  3. Insert the flash drive to USB port
  4. Click location and select USB Drive
  5. Save As dialog box appears

If Bea wants to save a copy of her presentation on a flash drive using her filename, which is
the correct order of steps for her to follow?
(A) 1, 2, 5, 3, 4
(B) 1, 3, 4, 2, 5
(C) 3, 1, 5, 4, 2
(D) 3, 4, 5, 1, 2

A

(B) 1, 3, 4, 2, 5

36
Q

Jose is saving his presentation in a portable document format. Which of the following steps
should he do first?
(A) Click File tab, then select Save As
(B) Select Save to save the document
(C) Select Save as, then name the file
(D) Under Save As, select local drive

A

(A) Click File tab, then select Save As

37
Q

Helen leads the group in a research study. Each member is tasked to give her/his views and
opinions on the World Wide Web. While Helen is reading each output, she found many
similarities in information. Which of the following characteristics should Helen consider in
evaluating the different information regarding the internet?
(A) scope
(B) fairness
(C) quality and reliability
(D) purpose and function

A

(C) quality and reliability

38
Q

Luisa is looking for the contact number of the school where her son is enrolled, because she
needs to get the documents for registration. She tried to find out the school’s information on
the internet but she got the wrong information. Which of the following must have happened?
(A) wrong data input
(B) reliable data entry
(C) updated information
(D) weak internet connection

A

(A) wrong data input

39
Q

(B) Advise Francis to copy the whole article.
Diane and Francis were given an assignment to provide insights about the article “Impact
of Social Media on the Youth.” Diane saw that Francis copied some parts from another
published article. Which action should Diane NOT consider if she wants Francis to avoid
committing plagiarism?
(A) Advise Francis to paraphrase his sentences.
(B) Advise Francis to copy the whole article.
(C) Advise Francis to cite his references.
(D) Advise Francis to quote his source.

A

(B) Advise Francis to copy the whole article.

40
Q

There are some pirated copies of software that are sold in the market. What should a buyer
do to avoid purchasing a pirated copy?
(A) Buy only expensive software.
(B) Buy only recommended software.
(C) Buy software from the official distributor only.
(D) Buy software known for reliable and stable results.

A

(C) Buy software from the official distributor only.

41
Q

Paulo was given a task to verify topics about current events. After typing the keywords in
www.google.com, different websites were generated. Which of the following statements will
he LEAST likely consider in completing his task?
(A) Check if it is secured.
(B) Verify if the website is real.
(C) Verify the source of the data.
(D) Choose any of the generated websites.

A

(D) Choose any of the generated websites.

42
Q

Mona is doing research for her class project. She is using Google to find online references.
How would she determine which websites are credible?
(A) The website should be up-to-date.
(B) The website should be from commercial sites.
(C) The website should be by an anonymous author.
(D) The website should be from an established institution.

A

(D) The website should be from an established institution.

43
Q

. Kristine was boarding the plane when she received an email from her boss informing her
about a new project for her team. To inform her team, she quickly started to connect through
the Wi-Fi of the plane to access the internet. Which of the following would be the easiest
way for her to inform the team?
(A) Send a new email to the team.
(B) Forward the same email to the team.
(C) Message the team on social networking sites.
(D) Create a new instruction through social networking sites.

A

(A) Send a new email to the team.

44
Q

Nelson received an email from an unknown sender claiming that he had won a large cash
prize. The email instructed him to provide his personal and financial details to claim his
winnings. Believing the message, Nelson shared his sensitive information, but he never
received the promised prize and even lost money from his bank account as a result?
If Nelson had evaluated the source of the email more critically, which type of cybercrime
could he have identified and avoided?
(A) hacking
(B) malware
(C) phishing
(D) scams

A

(C) phishing

45
Q

. Jojo created a research project in ICT. His teacher sent the template via email. When he
opened the file, he found that the attachment contained a virus. What must he do to protect
his computer from virus infection?
(A) Install up-to-date antivirus on the laptop.
(B) Bring the laptop to a technician for repair.
(C) Ask a friend to open his account and retrieve the data.
(D) Open attachments in email even if he doesn’t know the source.

A

(A) Install up-to-date antivirus on the laptop.

46
Q

Josie is browsing online when suddenly an advertisement for a new application pops up. It
gives her the option to easily install the new application by just clicking DOWNLOAD from
the pop-up window. Which is the best action that Josie could take if she does not want to
be bothered by such ads?
(A) Share and advertise the new application.
(B) Run a security scan and change password.
(C) Click “DOWNLOAD” and install the new application.
(D) Close the pop-up window advertisement and go back to browsing

A

(D) Close the pop-up window advertisement and go back to browsing.

47
Q
A

(C) 2 and 4 only

48
Q

Sharing the password of your account to others makes your mobile devices more vulnerable
to data theft. It enables unauthorized access to control over computer network security.
What should you do to avoid this?
(A) Return to your old password.
(B) Use a password that is hard to guess.
(C) Make it a point to change password from time to time.
(D) Use a combination of letter and numbers in your password

A

(B) Use a password that is hard to guess.

49
Q

Cyber violence cases are alarmingly increasing, and most of the victims are the youth. Which
statement is the best reminder to protect oneself from becoming a victim of cyber violence?
(A) Don’t install antivirus in the computer.
(B) Don’t use password with special keys.
(C) Don’t report sites that share untrusted content.
(D) Don’t share private information and sensitive images.

A

(D) Don’t share private information and sensitive images.

50
Q

One of the common risks online is cyberbullying. If Susan is just starting to use social
media, which of the following actions should she AVOID to prevent becoming a victim of
cyberbullying?
(A) ignoring angry messages
(B) double checking messages
(C) thinking before giving opinions
(D) sharing and posting private information

A

(D) sharing and posting private information

51
Q

Rex spends 6 to 8 hours browsing the internet at home and often skips meals. Which of the
following could best inhibit him from internet addiction?
(A) Give him a new mobile phone.
(B) Inform him of the negative effects.
(C) Require him to do more household chores.
(D) Discontinue and cut the internet connection.

A

(B) Inform him of the negative effects.

52
Q

When Leah opened her social media account, she saw a nude photo of herself that had been
liked and shared online. What should be her first move in response to this incident?
(A) Stop using her social media account.
(B) Block all the accounts of her online friends.
(C) Report the account to the social network provider.
(D) Inform all her online friends that the picture they saw was edited

A

(C) Report the account to the social network provider.

53
Q

. Tristan learned to play a mobile game and spent most of his time playing. Slowly his
behavior changed. He became impatient, had less sleep and spent little time on his studies.
Tristan failed all his subjects. What conclusion can be drawn, based on the incident?
(A) Playing mobile games causes failure in class.
(B) One can become a top player in mobile games.
(C) More online friends can be made in playing mobile games.
(D) Excessive playing mobile games can have a negative effect on a student.

A

(D) Excessive playing mobile games can have a negative effect on a student.

54
Q

. A junior high school student posted an article on his social media wall, complaining about
the attitude of his teacher, stating it as a terrible working attitude. This was seen and
commented on by his social media friends. Can the post be considered libelous and be a
legitimate cause for disciplinary action?
(A) Yes, because it will make his teacher famous.
(B) No, because it is his right as a social media user.
(C) Yes, because what he did injured his teacher’s reputation.
(D) No, because he posted the article based on his observation.

A

(C) Yes, because what he did injured his teacher’s reputation.