Professional Documents
Culture Documents
DIRECTION: Select the correct answer from the box provided below.
1. Information is said to be reliable if it can be verified and evaluated. Others refer to the trustworthiness of
the source in evaluating the reliability of information.
2. Reliability, accuracy, and value of information may vary based on the time it was produced or acquired.
While a piece of information may have been found accurate, reliable, and valuable during the time it was
produced, it may become irrelevant and inaccurate with the passing of time (thus making it less valuable).
Other information may be timeless, proven to be the same in reliability, accuracy, and value throughout
history.
3. In the media context, refers to a standard or norm that acts as a rule governing behaviour.
4. The information sent from a source to a receiver.
5. A place in which literary, musical, artistic, or reference materials (such as books, manuscripts, recordings,
or films) are kept for use but not for sale
6. Type of media that is native; local; originating or produced naturally in a particular region/locality
7. A global computer network providing a variety of information and communication facilities, consisting of
interconnected networks using standardized communication protocols
8. People engaged in the process of creating and putting together media content to make a finished media
product.
9. Accuracy refers to the closeness of the report to the actual data. Measurement of accuracy varies,
depending on the type of information being evaluated. Forecasts are said to be accurate if the report is
similar to the actual data. Financial information is considered accurate if the values are correct, properly
classified, and presented.
10. Information is said to be of value if it aids the user in making or improving decisions.
RELIABILITY OF INFORMATION
ACCURACY OF INFORMATION
VALUE OF INFORMATION
AUTHORITY OF THE SOURCE
TIMELINESS
INTERNET
INDIGENOUS MEDIA
CONVENTION
MESSAGES
LIBRARY
PRODUCERS
MULTIPLE CHOICE
Information Technology (IT) is the application of Thanks to the continuous development of computers, the
computers and internet to store, retrieve, transmit, and original computing systems became minicomputers and
manipulate information, often in the context of a businesslater personal computers took the lead. Nowadays, mobile
or other enterprise. IT is considered a subset of phones are dethroning the personal computer and
information and communications technology (ICT) and computing is evolving faster to become disembodied
has evolved according to the needs. more like a cloud, becoming accessible more easily
whenever needed. Information technology has
It is worthwhile noting that the term IT is commonly used transformed people and companies and has allowed
as a synonym for computers and computer networks, but digital technology to influence society and economy alike.
it also encompasses other information distribution It has, in this sense, shaped societies and adapted itself
technologies such as television and telephones. Several to people's needs.
industries are associated with information technology,
including computer hardware, software, electronics, History
If you want a brief history of Information Technology, here When creating a research project, you can
is one. Humans were the first "computers". Then, use as many pictures and information from
machines were invented to carry out the computational the internet without worries.
tasks. Now these machines have given way to new form Your posts are public, do not post anything
of information technology. Information has become
that your grandmother would not want to see.
disembodied accessible from anywhere through cloud
Do not Spam.
technology. Recent advances in IT is the consequence of
the development in computing systems. Stay on-topic, do not start talking about
something else.
Humans have been storing, retrieving, manipulating, and The FAQ section of a website will help you to
communicating information since the Sumerians in find the answers to any queries about
Mesopotamia developed writing in about 3000 BC, but the protocol.
term information technology in its modern sense first
appeared in a 1958 article published in the Harvard 32-35. Which websites are legal? Check all that
Business Review; authors Harold J. Leavitt and Thomas apply.
L. Whisler commented that "the new technology does not
yet have a single established name. We shall call it YTS.AM
information technology (IT)." Their definition consists of Piratebay.org
three categories: techniques for processing, the Amazon.com
application of statistical and mathematical methods to
Itunes.com
decision-making, and the simulation of higher-order
Deepweb
thinking through computer programs.
Natgeo.org
23. Information technology is changing principally Lazada.com
because of: Torrent.org
a. the changing needs 36. Is a law in the Philippines approved on
b. new technological advances September 12, 2012 which aims to address legal
24. According to the author the first computers were: issues concerning online interactions and the
Internet.
a. humans
a. RA 10175
b. calculators b. RA 10176
25. Development of information technology is the c. RA 10177
result of: d. Anti-Cyberspace Law
a. advances in computing systems 37. Means relating to, or involving computers or
b. development of machinery in general computer networks (such as the Internet).
a. Cyber
26. Computing systems are taking the form of clouds
b. Space
means: c. Saber
a. computing power are becoming d. Internet
disembodied. 38. Refers to the virtual computer world, and more
b. computers have become smaller specifically, is an electronic medium used to form
27. What is the meaning of the word "netiquette"? a global computer network to facilitate online
a. Showing others your pictures thorugh the communication.
a. Outerspace
internet and allowing them to post their
b. Cyberspace
pictures. c. Space
b. Respecting other users' views and displaying d. Universe
common courtesy when posting your views 39. Is the attempt to obtain sensitive information
to online discussion groups. such as usernames, passwords, and credit card
c. It is a etiquette network that allows you to details (and, indirectly, money), often for
post your opinions, it is called malicious reasons, by disguising as a trustworthy
entity in an electronic communication.
www.netiquetteforall.com
a. Fishing
d. It is a behavior that we only need to follow b. Hacking
when we write emails. c. Phishing
28-31. Basic Rules of Netiquette. Select all that d. None of the above
apply. Write check inside the box. 40. Refers to obtaining files that you do not have the
Do not threaten anybody with personal right to use from the Internet.
a. Downloading
abuse.
b. Legal downloading
Send as many chain messages as possible. c. Illegal Downloading
d. Illegal
41. Is the deliberate use of someone else's identity, b. Cyberpunk
usually as a method to gain a financial c. Cybercrime
advantage or obtain credit and other benefits in d. None of the above
the other person's name, and perhaps to the 44. The use of electronic communication to bully a
other person's disadvantage or loss. person, typically by sending messages of an
a. Poster intimidating or threatening.
b. Identity theft a. Bullying
c. Hacking b. Cyberbully
d. Phishing c. Cyberpunk
42. Is an unprivileged false statement of fact which d. None of the above
tends to harm the reputation of a person or 45. Refers to the practice of modifying or altering
company. computer software and hardware to accomplish
a. Cyber defamation a goal that is considered to be outside of the
b. Libel creator's original objective.
c. Tort a. Hacking
d. Abuse b. Phishing
43. Refers to the criminal activities carried out by c. Fishing
means of computers or the Internet. d. None of the above
a. Cyberspace
TRUE OR FALSE. Directions: Write true if the statement is TRUE, write false if the
statement is FALSE. Write your answer after the each item.
46. Popular media cannot reach some rural areas. While print, broadcast, and new media have
a wide reach, there are still areas that these forms of media have not reached.
47. Indigenous media and information are highly credible because they are near the source and
are seldom circulated for profit.
48. Indigenous media are channels for change, education, and development because of its
direct access to local channels.
49. Ignoring indigenous media and information can result in development and education
programs that are irrelevant and ineffective.
50. One form of indigenous media and their local example is folk or traditional media.
Types of Code:
51.
52.
53.
Legal download sites.
54.
55.
56.
2 types of defamation:
57.
58.
Crimes involving the use of internet.
59.
60.
- Anonymous