EMPOWERMENT TECHNOLOGY

A flat, static web pages where a user can only read.
Web 1.0
Web 2.0
Web 3.0
It is named and referred to by web experts as semantic web or data driven web content and response
Web 1.0
Web 2.0
Web 3.0
It is a dynamic web pages were added where a user can interact, participate and contribute contents.
Web 1.0
Web 2.0
Web 3.0
It is an evolution of technological developments that merge into a new system bringing together different types of applications and media.
Technological Covergence
Social Media
Assistive Media
It was the first internet-based audio reading service for persons with barriers.
Technological Convergence
Social Media
Assistive Media
In this area of ICT, computers use for research and learning by students, use for instructions, CBT, Online instructions and keep track all the information about the school and its students.
Government
Communication
Education
This is a program that duplicates itself and then infects the computer.
Computer Virus
Spyware
Computer Worm
It helps in protecting your computer from unauthorized entries, viruses, or worms from the Internet or network.
Virus Protection
Firewall
Automatic Updates
It is an attempt to be more precise in providing the list of documents according to the words used by the user to search the Internet.
Contextual Search
Research Skills
Contextualized Search
A well-planned design of database of all the research materials either inside the computer or hard copies. o
Problem Solving Capability
Organized data mining
Computer Literacy
Known as a collaboration tool for financial analysis and modeling.
Publication
Word Processing
Spreadsheet
It contains functions, references, operators and constants and always start with equal sign.
Cell References
Formula
Mathematical Operators
It is the ability to present solutions or solve problems by presenting a decision based on the given information.
Analytical Skill
Problem Solving capability
Critical Thinking
This is a guide to the right attitude when using computer.
Computer Ethics
Netiquette
GMRC
This is deceitful email practice of getting confidential information making appear from trustworthy source.
Email Spoofing
Phishing
Pharming
Most operating system has a feature that allows you to lock the computer even when the computer is in a screen saver mode.
Screen Saver Security
Security Center
Security Password
This person who is able to enter and control other people's computer without authorization.
Hacker
Tim Berners Lee
Spy
This window allows you to monitor a cell value.
Ribbon
Watch Window
Restore Window
It is used to automatically add mailing address or personalized information in your documents and publication.
Mail List
Mailing Stubs
Mail Merge
Excel formula always begin with _____________.
Equal sign
Minus Sign
Comma Sign
This function of excel applies logical test and results in a true or false
IF
Nested If
Text functions combines text from multiple fields into one cell.
Clean
Concatenate
This function calculates the sum of the values of a range of cell.
SUM
AVERAGE
It calculates the arithmetic mean of a range of cells and values.
SUM
AVERAGE
This function disregards any space in a cell except for the single spaces.
TRIM
CONCATENATE
{"name":"EMPOWERMENT TECHNOLOGY", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A flat, static web pages where a user can only read., It is named and referred to by web experts as semantic web or data driven web content and response, It is a dynamic web pages were added where a user can interact, participate and contribute contents.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker