LS 6 Digital Citizenship Flashcards
Emma was inputting a formula using Microsoft Excel when an error #DIV/0! appeared in
the cell she was working on. Which of the following describes the reason for the error?
(A) The divisor in the formula is the cell that is blank.
(B) The error occurs when the referred cell was deleted.
(C) The dividend in the formula is the cell containing a zero.
(D) The error appears when data is incorrectly typed in the range name.
(C) The dividend in the formula is the cell containing a zero.
What formatting mark in Microsoft Word will Jacob use if he wants to have a caption
beside a picture and end it with a text-wrapping break?
(A) line breaks
(B) space marks
(C) tab characters
(D) paragraph marks
(A) line breaks
Shiela is giving a report in class using a PowerPoint presentation. In one of her slides, her
friend commented that the content was copied from the internet without citing the source.
How should Shiela react to her friend?
(A) She will accuse her friend of libel.
(B) She will ignore her friend’s comment.
(C) She will thank her friend for correcting her.
(D) She will unfriend her in her social media account
(C) She will thank her friend for correcting her.
Mark bought a licensed version of Windows 10 operating system intended for a single user
only. After installing it on his PC, he made a copy and installed it on his brother’s laptop,
although he is aware that doing this is illegal. Which of the following will NOT be the result
of his action?
(A) The operating system will run but might be unstable.
(B) The operating system will restrain the laptop’s performance.
(C) The operating system will run but will ask for a license product key.
(D) The operating system will run smoothly without a license product key.
(C) The operating system will run but will ask for a license product key.
(C) She will blame herself for not saving the document from time to time. Sarah is making an invitation for her friend’s wedding using a Microsoft Word template
without an AutoSave feature. She was almost done when she accidentally clicked the close
button without saving her document. What is likely to happen next?
(A) She will call her friend and ask for help.
(B) She will have to create a new document.
(C) She will blame herself for not saving the document from time to time.
(D) She will not worry because the document will be saved automatically.
(C) She will blame herself for not saving the document from time to time.
Nelia owns a smartphone and uses this to pay her bills. However, she got locked out of her
phone and unintentionally wiped out all the data containing all the passwords and
information of her bank account. How may this possibly affect the way she pays her bills?
(A) She may buy a new smartphone.
(B) She may not be able to pay her bills anymore.
(C) She may ignore her bills and let them incur penalties.
(D) She may opt to go directly to the bank to settle her accounts.
(B) She may not be able to pay her bills anymore.
Joe was surfing the internet when he saw some interesting sites. He decided to save some
of the websites so that he can easily go back to them. Which icon should he use to bookmark
the sites?
(A) (Bookmark icon)
Boyet needs a fast and reliable internet connection at home. Which of the following internet
connection is the best for him to use?
(A) fibre optic
(B) pocket wi-fi
(C) data internet
(D) digital subscriber line
(A) fibre optic
Jake was preparing the sales report when he noticed that there is some data in his chart
that need to be changed. Which of the following steps should he do?
(A) Click the Insert tab then choose the type of Chart to use
(B) Click the Chart then click the select Data button on the Design tab
(C) Click the Chart then on the Layout tab, click the Chart Title or Data labels
(D) Click the Chart then click the Switch Row/Column button on the Design tab
(B) Click the Chart then click the select Data button on the Design tab.
I. Click Insert tab on the Ribbon
II. Choose the type of Chart to use
III. Select the cells that contain the data
Tina already prepared her sales report in a spreadsheet. Her team leader asked her to
present it in a chart so that they can easily see the project sales. Which order of steps in
making a chart, as shown above, should she follow to perform the task?
(A) I, II, III
(B) I, III, II
(C) II, III, I
(D) III, I, II
(A) I, II, III
June is working on a report for his online business in an MS Word document. He inserted
a basic table but realized that he needs another table to compute his earnings for the whole
year. Which of the following procedures should he execute?
(A) Click Insert> Table> Draw Table
(B) Click Insert> Table> Insert Table
(C) Click Insert> Table> Quick Tables
(D) Click Insert> Table> Excel Spreadsheet
(B) Click Insert > Table > Insert Table
- =AVERAGE(A1:A4,number)
- =AVERAGE(A1:A4)
- =SUM(A1)/COUNT(A1:A4)
- =SUM(A1:A4)/COUNT(A1:A4)
Mrs. Ramirez is working on the final grades of her students using MS Excel. Which of the
formulas given above should she used to calculate the average?
(A) 1 and 3 only
(B) 1 and 4 only
(C) 2 and 3 only
(D) 2 and 4 only
(D) 2 and 4 only
John received an email announcing that he won Php 1,000,000.00 from an e-raffle. In
order to claim his prize, he must access the given link immediately. He was redirected to a
site that asked for his full name, contact number, address, and bank details. He answered
the form right away, out of excitement. A day after, his bank notified him of an unauthorized
withdrawal of a large amount from his account. What could John learn from his experience?
(A) If he receives an email, he should not open it.
(B) If he receives an email, he should respond immediately.
(C) If he clicks on a link, he should check its credibility first.
(D) If he clicks on a link, he should fill out his details immediately.
(C) If he clicks on a link, he should check its credibility first.
Aya is active in social media. She has hundreds of friends in her account, whom she may
not know in real life. She just accepts anyone who sends her a request. One day, her account
has been reported because of duplicate identity. Which explanation could Aya derive from
this occurrence?
(A) If she accepts every friend request, she would not offend anyone.
(B) If she is active in social media, she would have a lot of friend requests.
(C) If she is active in social media, she would be in danger of identity theft.
(D) If she accepts every friend request, she would run the risk of identity theft.
(D) If she accepts every friend request, she would run the risk of identity theft.
Sheryl’s best friend posted a news blog online stating that a person is being accused of being
a drug lord. Her friend asked her to copy this on her own social media account. Which of the
following best explains Sheryl’s hesitation to follow her friend’s request?
(A) If she will follow her friend’s request, people will enjoy her post.
(B) If she will not post the news, her friend will think she’s not a real friend.
(C) If she will not follow her friend’s request, her friend will still be proud of her.
(D) If she will post the news blog on her account, she may be charged with libel.
(D) If she will post the news blog on her account, she may be charged with libel.
Janet joined a social media group with her village community members. After a season of
wholesome communications, she started reading some very disrespectful hate comments,
insulting some personalities. She thought that sending a suggestion for members to avoid
such behavior might help, but it was generally ignored. If Janet wants to reduce the
discomfort she experienced in this situation, which of the following will most probable help?
(A) file charges against the erring member
(B) stop using her social media account
(C) ignore the negative comments
(D) unfollow the group account
(D) unfollow the group account
. Social media offers a way to connect with others and share information, but it also comes
with risks such as online victimization, public shaming, and the spread of fake news or
embarrassing content. To protect oneself from becoming a victim of these negative online
behaviors, which of the following actions is most important to AVOID on social media?
(A) Posting motivational quotes and positive messages to uplift others.
(B) Participating in online groups and using social media to promote or sell items.
(C) Engaging in discussions by liking and commenting on significant social events.
(D) Sharing personal details, sensitive information, or awkward photos that could
be misused.
(D) Sharing personal details, sensitive information, or awkward photos that could be misused.
A family member seems to be experiencing psychological, social, and educational difficulties
due to excessive internet use. You suspect this may be affecting their well-being and overall
productivity. How can you approach this issue to verify your concern and provide
constructive feedback?
(A) Regularly monitor their online accounts to observe their internet activities.
(B) Track and analyze their internet usage over time to identify patterns and potential
issues.
(C) Suggest developing a habit of using the internet only when necessary and for
specific purpose.
(D) Encourage them to turn off electronic devices like computers, smartphones,
laptops, and tablets more.
(C) Suggest developing a habit of using the internet only when necessary and for specific purpose.
Tony travels most of the time carrying all his needed documents. He sometimes forgets
some important documents, which makes it difficult for him to do his work. He decided to
purchase a mobile device that can scan and edit his documents and even send them thru
email. Which of the following devices best suits his needs?
(A) laptop
(B) smartwatch
(C) smartphone
(D) personal digital assistant
(C) smartphone
The errors #NAME?, #VALUE!, #REF! are some of the errors which appear when using
Microsoft Excel. Which statement does NOT explain the reason for these errors?
(A) The user misspells the function name.
(B) The user inputs a text where a number is expected.
(C) The user begins every formula using the equal sign.
(D) The user transfers formula to a new location where a needed column was deleted.
(C) The user begins every formula using the equal sign.
Desktop computer problems are classified into three: computer viruses, hardware
malfunctions and software issues. Which of the following desktop computer problems is
organized correctly according to each category?
(A) Computer viruses – malware, unusual noise, corrupted files
(B) Hardware malfunction - blue screen, sudden shut off, graphical error
(C) Software issues - pop-up ads, attachment won’t open, download is very slow
(D) Hardware issues - internet is slow, computer freezes, app command is not
working
(B) Hardware malfunction - blue screen, sudden shut off, graphical error