You are on page 1of 21

Empowerment Technologies

G11 ICT 112 WEEK 1 TO 9

The cloud enables people in different locations to work on the same project. This enables

Better collaboration

Websites that belong to the Web 1.0 generation were mostly

Static

Programs that can only be accessed using a browser are called

Web applications

Which of the following is TRUE about Cloud-based services?

Some cloud-based services can be used for free

Which of the following is NOT a safe practice?

Submitting your phone number every time you are asked.

Which of the following is not a malware?

Worm

A Web 3.0 characteristic in which users are always connected to the Internet.

Ubiquitous

Which of the following can contain malware?

All

Which of the following is TRUE?

Mobile apps are all web apps because they can only be accessed using an Internet browser
Internet-based networks that are used to store, manage, and share resources and information

Cloud Computing

are apps and websites used by people to interact with one another by sharing information, sending
messages, and exchanging ideas

Social Media

Which of the following is NOT true about passwords?

Passwords should not be memorized

Which of the following statements is NOT true?

Some apps and websites address you by your username.

is a secret group of characters used to unlock your account

Email address

People who send unwanted and unsolicited emails are called

Spammers

is a generation of the Internet when websites were mostly static

Web 1.0

Tricking people to submit their personal details is called

Phishing

Which of the following information is ok to share with other people?

Email address

HTML means HyperText Markup Language


is a type of malware that is disguised as a harmless or useful program or file.

Trojan

In our lesson, we visited the website of which movie?

Space Jam

You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the most credible information

.gov

Which of the following does not apply to Netiquette?

Do unto others as you would have them do unto you.

Which of the following is NOT true?

Google's only server is located in California

What do you call the unauthorized copying of the material support, labels, artwork and packaging?
Counterfeiting

A task that is done by a computer for another computer is called a

Server

page is about a single topic and can be edited by anyone with the right credentials

Wiki

Netiquette is short for Network Etiquette

You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of Spam
.net stands for network

You can make an online search by entering your keywords in the browser's

Address bar

Which of the following is NOT true?

Some types of malware can spread through offline means such as flash drives and local area networks

is the most common TLD

.com

The cloud enables people in different locations to work on the same project. This enables

Better collaboration

Which of the following is not a factor that can be used to determine a source's credibility?

The article's length

Netiquette involves a set of rules that are imposed by online groups

Formal

Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law but are
expected to be followed by everyone.

Informal Netiquette

Servers are housed in centralized locations called Data centers

Which of the following mobile apps is not a native application? None of these

You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is
a Client
In the Internet, your _____ is as good as your actual name. Username

The name Trojan is derived from a fictional wooden Horse

You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called Pharming

You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of Spam

REPUBLIC ACT NO. 8293 is also know as Intellectual Property Code of the Philippines

Malware is short for Malicious hardware

.info stands for information

The use of strength or power to intimidate someone into doing something that he does not want or to
make him feel bad "BULLYING"

In which of the following situations is it ok to use your mobile phone? None of these

Which of the following is NOT true about worms?

A worm doesn't need human action to spread

is a program that is designed to cause harm to your computer or device virus

According to the IP Code, how many types of works are covered by copyright protection? 15

"IP Code" stands for Internet Protocol Code of the Philippines


Which of the following is not true?

A web search engine can't be accessed using Internet browsers

Computers can create data and make decisions based on the user's actions through

Machine Learning

A Web 3.0 characteristic in which events and information are made available to users as they happen.

Real-Time

Clicking on a search result using the _____ will open the link in a new tab.

Mouse wheel

TLD stands for Top-Level Domain.

In a spreadsheet, the horizontal groupings are called Columns

A program used to create, store, and manage data in tables. Spreadsheet

In the spreadsheet above, what result will you get if you use the formula =C3-B2

110

What do you call software that are used to create information like documents, spreadsheet,
presentations, etc? Productivity tool

In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)

440

In LibreOffice Writer, what function did we have to open to view the registered databases

Datasources
In the LibreOffice home screen, the database app is called LibreOffice Base

What sign is used for multiplication? *

In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)

1200

In the spreadsheet above, what result will you get if you use the formula =SUM(A1,B1,C1,B3) 850

Adding information from a database to a document is called Mail Merge

A program that is developed by a public community of developers and is made available to the public for
free is described as Open-source

In a spreadsheet, the vertical groupings are called Columns

Productivity tools are normally made available in software bundles called

Office productivity suite

In the spreadsheet above, what result will you get if you use the formula =A1*C1

30000

In Calc, what sign can be seen in the beginning of the formulas?

In the spreadsheet above, what result will you get if you use the formula =SUM(B1,B4)

430

What is the name of word processor that we used in this chapter


LibreOffice Word

What sign is used for division?

The long textbox where you can write formulas is called Formula Line

Many trusted anti-virus companies give out free versions which are good enough to protect your
computer from malware True

Which is true?

Gmail uses a flag icon to mark important emails

All of the following types of malware can "infect" your computer except

Spam

You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the correct information?

.gov

In LibreOffice, the sets of icons on the top part of the page are called

Toolbars

Which of the following is not an Internet Browser? Safari

The unauthorized copying of the material support, labels, artwork and packaging is called

Counterfeiting

It's ok to play loud music in public as long as you only play popular songs. False
CC Stands for Carbon Copy

is a feature that can be used to make complex web search.

Advanced Search

What is the name of the spreadsheet tool that we made at the end of this chapter?

Savings Tracker

is the act of forcing or intimidating someone into doing something that he/she does not want to.
Bullying

In Calc, what sign can be seen in the beginning of the formulas? C

is the legal right to own an original work Copyright

Bcc stands for Blind Carbon Copy

apps are used to connect with other people and make interactions such as messaging, writing comments
and sharing pictures and videos.

Social Media

Multiple fake accounts are called Trolls

Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program Adware.

Which of the following statements is true? No one can steal your personal information without asking
for permission.
At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi, which you connect to using your phone. In this scenario, your phone is a Server

Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a Trojan

Which of the following is not true?

All TLD's contain credible information

Which of the following is NOT a reason why you should give credit to your sources

To make the author notice you

The URL and design of a website's homepage changes depending on the preferences of the current
Dynamic

Which of the following TLD's is most likely to be owned by a university? ORG

Real-time, ubiquitous, and machine learning are the defining elements of Web 3.0

Which of the following does not need human action to spread? Worm

You can make online searches in Mozilla Firefox by typing your keywords I Search bar

Anyone can use the following TLD's except

b. .gov

Which of the following can be used in identity theft? d. Full name

Which of the following is not a search engine? Advanced Search


Tricking people to submit their personal details is calle Phishing

Your mom is calling you during class. In this situation, which of the following is the ethical thing to do?
Ask for your teacher's permission to go outside so you can answer the call.

The following are benefits of cloud computing except

What is the official website of the Intellectual Property Code of the Philippines? ipophil.gov.ph

is a single program or a system of programs designed to look for information in the Internet. Web
search engines

Several members of a forum are a having a heated debate. Eventually, they started posting insults and
threats against other members. The debate has escalated into a

Sock puppet

Which of the following should not be shared with anyone?

You can check an article's _____ to know if the information that it contains is updated.

Publication date

are programs that are directly installed in a computer or device Native applications

A mathematical equation that can be applied to one or multiple cells is called a

Collumn

In this chapter, the data that we linked to the document was created using what application?

Excel
What sign is used for multiplication? c. *

A program used to create, edit, and print documents is called a Word processor

In a spreadsheet, each box in a table is called a

Cell

Which of the following can "infect" your computer spam

are official rules in an online community. Formal

A _____ is a computer that does a task for other computers. Server

Google.com is an example of a dynamic website True

While typing a keyword, several _____ may appear bellow it.

Suggestions

A heated argument that escalates into threats and personal insults is called a

Flame war

Which of the following is NOT a search engine? Firefox

You bought an artist's album then you made and sold copies of it. What you did is called

Counterfeiting

What is the sign that separates the two parts of the email address?

At sign
Read-only websites and web pages that were single files and saved in HTML format belong to what
generation? Web 1.0

What word best describes Web 1.0 websites and web pages?

Static

The Golden Rule states "Do unto others before they do unto you."

True

The following personal information should not be shared with other people except

Bullying

Pretending to own someone else's work or product is called

Plagiarism

What is the most common TLD

.com

Emails can be sent to the _____ instead of permanently deleting them

Inbox

Dummy accounts used by one person are called

Sock puppets

In "aaaaa@bbbbb.com" what is bbbbb.com?

Domain part

Clicking a link with the mouse wheel will cause it to open in

. A different website
Non-profit groups prefer to use which TLD?

.org

Unwanted and suspicious emails are kept in the Spam folder

What do you call an app used for sending, receiving, and organizing emails.

Email client

In this chapter, what email service did we use? Gmail

Some websites refer to you by your _____ instead of your actual name.

Username

s a type of malware that automatically spreads in a computer or a system even without human
interaction.

Worm

The only way to do a web search in Mozilla Firefox is to type the keywords in the search bar. True

Which is NOT true?

By default, Gmail will delete a message in the Trash after 30 days

The name given to traditional postal mail

Snail mail

Netiquette is considered _____ if it is strictly upheld in an online community.

Formal

Several _____ may appear below the search bar or address bar while you are typing a keyword.
In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1

25500

Which of the following TLD's cannot be used by the public?

.gov

A website that contains articles written by users and can be edited by other users is called a

Web 2.0

contains emails that have been composed but were not sent.

Drafts

is a web browser owned by Apple Safari

Which of the following does not infect your computer? Spam

It's ok to tell other people the following personal information except

Password

Illegally copying and distributing copyrighted materials is called

Piracy

Use _____ to make complex web searches.

Advanced Search

is an incident where members of an online community get into arguments and start posting insults and
personal attacks.

Flame war
Which of the following personal information should not be shared with other people

Password

Spam can spread when the infected computer makes contact with another computer

TRUE

allows you to use multiple keywords and entire phrases and narrow down your search by selecting
language, region, date, etc.

Advanced Search

It's bad to receive a lot of _____ because they are annoying take up memory space

Spam

Based on the spreadsheet above, give the answer to the following formula:

=SUM(C1:C5)

The default name of a ____ is a letter and a number Cell

Yahoo, Google, and Bing are examples of a _____.

Web search engine

In Calc, what is the symbol used for subtraction?

A group of programs used to create, edit, view, and print computer graphics is called a
relies on users to contribute web contents.

Social Media

It is ok to post your passwords in your social media accounts so you won't forget them.

False

Ad-blockers are browser add-ons that prevent advertisements from being displayed in your browser.
True

People who send unwanted and unsolicited emails are called

Scammers

Wiki is derived from the Hawiian work wikiwiki, which means

Quick

While typing a keyword in a search bar, _____ may appear below it.

Suggestions

=B2/C2+B4

The World Anti-Piracy Observatory is operated by

UNESCO

may appear in web search engines, address bars, and search bars while you are typing a keyword

Suggestions

A combination of characters that can unlock your account is called a

Password
Web 1.0 websites are defined as static or Web based

Trolls use _____, which are fake accounts so that they can post as different users.

Sock puppets

is the generation of the Internet that is characterized by the increased focus on user participation and
the prevalence of dynamic websites.

Web 2.0

The names of _____ are letters Cells

The _____ lists 15 types of works that are covered by copyright protection.

Intellectual Property Code of the Philippines

is an Internet-based application that can be accessed using browsers.

web application

What is the name of word processor that we used in Chapter 5?

LibreOffice Word

is a type of malware that causes unwanted advertisements to appear in your screen.

Adware

By default, Gmail will delete a message in the Trash after 50 days.

False

A computer that receives a service in a network is called a


Server

What is the name of the open-source productivity suite that we used in Chapter 5?

Libre Office word processor

websites can change their appearance and behavior based on the users' actions.

Dynamic

A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.

Productivity tool

A website that allows users to edit its contents and structure is called a

Wiki

Recording live performances or broadcasts without permission from the owner is called

Streaming

People who try to cause trouble by posting inappropriate or banned contents and off-topic messages
are called

Trolls

is a type of malware that disguises itself as a harmless program or file.

Trojan

When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called

Streaming

is a type of malware that is named after a fictional horse.


Trojan

LibreOffice is an open-source

Office productivity suite

Bcc Stands for

Blind Carbon Copy

Chrome, Firefox, and Internet explorer are examples of

Web Browsers

What is the name given to software used to create, store and collections of information?

In Calc, what is the default name of the cell that belongs to the second row and the third column?

C:2

Most web search engines have an _____ feature which can be used to make complex web searches

Advanced Search

Reproducing and distributing materials without the owner's consent is called

Piracy

Which of the following details is NOT essential in citing a source

name of the researcher

Websites that belong to _____ generation encourages a give-and-take relationship between the
websites and the users by allowing them to leave comments, upload files and to publish their own
contents.
Web kg

is the legal right to own an original work

Copyright

Web 1.0 websites is best described by which of the following?

Static

In LibreOffice, the sets of icons on the top part of the page are called

Formula bar

Email stands for Electronic mail

Other that your username or email address, what else is almost always required to access your online
accounts? Password

are people who send unwanted and unsolicited messages.

Scammers

aresections of an email client that are used to store different kinds of email.

Folders

Chrome's default search engine is Google Search.

True

Which is NOT true?

You might also like