You are on page 1of 1

SUMMATIVE EXAM IN EMPOWERMENT TECHNOLOGIES 15.

It is distributed computing on internet or delivery of computing


service over the internet.
I. Multiple Choice. a. Cloud Computing c. WWW
b. Assistive Media d. WebSite
1. It deals with the use of different communication technologies
16. A type of scam where the scammers disguise as a trustworthy
such as mobile phones, telephone, Internet, etc. to locate, save,
source in attempt to obtain private information.
send and edit information.
a. Hacking b. Phishing c. Internet Scams d. Malware
a. Information Communication Technology
b. Information Technology
17. These are schemes that deceive the user in various ways in
c. Communication Technology
attempt to take advantage of them.
d. Technology
a. Hacking b. Phishing c. Internet Scams d. Malware
2. Is a website, application, or online channels that enable web
18. It can infect an entire network of devices through network
users to create.
interfaces.
a. Social Media b. Social Network c. Social d. Social News
a. Virus b. Worm c. Trojan Horse d. Malware
3. It stands for malicious software.
19. It attaches itself to your files and slowly but surely spreads to
a. Spam b. Phishing c. Copyright Infringement d. Malware
other files.
a. Virus b. Worm c. Trojan Horse d. Malware
4. It is the global system of interconnected computer networks.
a. WWW b. Internet c. LAN d. Server
20.It is a malicious software that disguises itself as an average file
or program in order to trick users into downloading it.
5. This is a type of scam where the scammers disguise as a
a. Virus b. Worm c. Trojan Horse d. Malware
trustworthy source in attempt to obtain private information.
a. Internet Scams b. Hacker c. Phishing d. Malware

6. These are schemes that deceive the user in various ways in


II. Identification
attempt to take advantage of them.
a. Internet Scams b. Hacker c. Phishing d. Malware
21. Philippines is dub as the “_____________________”?
7. This is the intent to abuse, intimidate, or overpower an individual 22. It is an electronic device for storing and processing data,
or group online.
a. Cyberstalking b. Cyberbullying c. Hacking d. Online Predation typically in binary form, according to instructions given to it in a
variable program.
8. It is a two- or three-dimensional icon that represents a
computer user or a gamer. 23. WWW stands for?
a. Avatar b. Hacker c. Phishing d. Malware 24. .com is a short word for?
9. A collection of related network web resources, such as web 25. A type of website that displays different content each time it's
pages, multimedia content. viewed.
a. Webpage b. WWW c. Internet d. Website 26. A type of website that is most basic and coded in plain HTML.
27. What is the Operating System (OS) of Iphone?
10. A document that is suitable to act as a web
resource on the World Wide Web. 28. It is the use of the Internet or other electronic means
a. Webpage b. WWW c. Internet d. Website
to stalk or harass an individual, group, or organization.
11. This platform is all about semantic web. 29. It is the use of electronic means with the intent to abuse,
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0
intimidate, or overpower an individual or group.
12. These are sites that allows you to connect with other people 30. P2P stands for?
with the same interests or background.
a. Bookmarking Site c. Social News
b. Social Networks d. Media Sharing

13. A Sites that allow you to upload and share media content like
images, music and video.
a. Social Network c. Social News
b. Bookmarking Site d. Media Sharing

14. It is a non- profit service designed to help people who have


visual and reading impairments.
a. Mobile Technologies c. Media Sharing
b. Assistive Media d. Blogging

You might also like