You are on page 1of 7

Empowerment Technologies

G11 ICT 112 WEEK 1 TO 9


The cloud enables people in different locations to work on the same project. This enables
Better collaboration

Websites that belong to the Web 1.0 generation were mostly


Static

Programs that can only be accessed using a browser are called


Web applications

Which of the following is TRUE about Cloud-based services?


Some cloud-based services can be used for free

Which of the following is NOT a safe practice?


​Submitting your phone number every time you are asked.

Which of the following is not a malware?


Worm 
A Web 3.0 characteristic in which users are always connected to the Internet.
Ubiquitous

Which of the following can contain malware?


All

Which of the following is TRUE?


Mobile apps are all web apps because they can only be accessed using an Internet
browser

Internet-based networks that are used to store, manage, and share resources and
information

Cloud Computing 

are apps and websites used by people to interact with one another by sharing information,
sending messages, and exchanging ideas
Social Media
Which of the following is NOT true about passwords?
Passwords should not be memorized

Which of the following statements is NOT true?


Some apps and websites address you by your username.

is a secret group of characters used to unlock your account


Email address

People who send unwanted and unsolicited emails are called


Spammers

is a generation of the Internet when websites were mostly static


Web 1.0

Tricking people to submit their personal details is called


Phishing

Which of the following information is ok to share with other people?


Email address

HTML means ​HyperText Markup Language 

is a type of malware that is disguised as a harmless or useful program or file.


Trojan

In our lesson, we visited the website of which movie?


Space Jam

You want to know if classes are suspended because of a storm. Which of the following
TLD's is most likely to have the most credible information
.gov

Which of the following does not apply to Netiquette?


Do unto others as you would have them do unto you.

Which of the following is NOT true?


Google's only server is located in California
What do you call the unauthorized copying of the material support, labels, artwork and
packaging? ​Counterfeiting

A task that is done by a computer for another computer is called a


Server

page is about a single topic and can be edited by anyone with the right credentials
Wiki

Netiquette is short for ​Network Etiquette

You had to enter your email address in order to play a free game. A few days later, you
started receiving multiple emails with links to other free games and downloads. You have
been a victim of ​Spam

.net stands for ​network

You can make an online search by entering your keywords in the browser's
Address bar

Which of the following is NOT true?


Some types of malware can spread through offline means such as flash drives and
local area networks

is the most common TLD


.com

The cloud enables people in different locations to work on the same project. This enables
Better collaboration

Which of the following is not a factor that can be used to determine a source's credibility?
The article's length

Netiquette involves a set of rules that are imposed by online groups


Formal

Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by
law but are expected to be followed by everyone.
Informal Netiquette
Servers are housed in centralized locations called ​Data centers

Which of the following mobile apps is not a native application​?​ ​ None of these
You used your smartphone to access Yahoo mail and send an email. In this scenario, your
smartphone is a ​Client

In the Internet, your _____ is as good as your actual name. ​Username

The name Trojan is derived from a fictional wooden ​Horse

You receive an email saying you won an iPhone. When you click the link in the email, you
were asked to enter your credit card number. This is called ​Pharming

You had to enter your email address in order to play a free game. A few days later, you
started receiving multiple emails with links to other free games and downloads. You have
been a victim of ​Spam

REPUBLIC ACT NO. 8293 is also know as ​Intellectual Property Code of the Philippines

Malware is short for ​Malicious hardware

.info stands for ​information

The use of strength or power to intimidate someone into doing something that he does not
want or to make him feel bad ​"BULLYING"  

In which of the following situations is it ok to use your mobile phone? ​None of these

Which of the following is NOT true about worms?


A worm doesn't need human action to spread

is a program that is designed to cause harm to your computer or device ​virus

According to the IP Code, how many types of works are covered by copyright protection?
15

"IP Code" stands for ​Internet Protocol Code of the Philippines

Which of the following is not true?


A web search engine can't be accessed using Internet browsers

Computers can create data and make decisions based on the user's actions through
Machine Learning
A Web 3.0 characteristic in which events and information are made available to users as
they happen.
Real-Time

Clicking on a search result using the _____ will open the link in a new tab.
Mouse wheel

TLD stands for ​ Top-Level Domain. 

In a spreadsheet, the horizontal groupings are called ​Columns

A program used to create, store, and manage data in tables. ​Spreadsheet

In the spreadsheet above, what result will you get if you use the formula =C3-B2
​110

What do you call software that are used to create information like documents, spreadsheet,
presentations, etc? ​Productivity tool

In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)
440

In LibreOffice Writer, what function did we have to open to view the registered databases
Datasources

In the LibreOffice home screen, the database app is called ​LibreOffice Base

What sign is used for multiplication? ​ *

In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)
1200

In the spreadsheet above, what result will you get if you use the formula
=SUM(A1,B1,C1,B3) ​850
Adding information from a database to a document is called ​Mail Merge

A program that is developed by a public community of developers and is made available to


the public for free is described as ​Open-source

In a spreadsheet, the vertical groupings are called ​Columns


Productivity tools are normally made available in software bundles called
Office productivity suite

In the spreadsheet above, what result will you get if you use the formula =A1*C1
30000

In Calc, what sign can be seen in the beginning of the formulas?


C

In the spreadsheet above, what result will you get if you use the formula =SUM(B1,B4)
430

What is the name of word processor that we used in this chapter


LibreOffice Word

What sign is used for division?


/

The long textbox where you can write formulas is called ​Formula Line

Many trusted anti-virus companies give out free versions which are good enough to protect
your computer from malware ​True

Which is true?
Gmail uses a flag icon to mark important emails

All of the following types of malware can "infect" your computer except
Spam

You want to know if classes are suspended because of a storm. Which of the following
TLD's is most likely to have the correct information?
.gov

In LibreOffice, the sets of icons on the top part of the page are called
Toolbars
Which of the following is not an Internet Browser? ​Safari

The unauthorized copying of the material support, labels, artwork and packaging is called
Counterfeiting

It's ok to play loud music in public as long as you only play popular songs.​ False
CC Stands for ​Carbon Copy

is a feature that can be used to make complex web search.


Advanced Search

What is the name of the spreadsheet tool that we made at the end of this chapter?
Savings Tracker

is the act of forcing or intimidating someone into doing something that he/she does not want
to.​ ​ ​Bullying

In Calc, what sign can be seen in the beginning of the formulas?​ C

is the legal right to own an original work ​Copyright

Bcc stands for ​Blind Carbon Copy

apps are used to connect with other people and make interactions such as messaging,
writing comments and sharing pictures and videos.
Social Media

Multiple fake accounts are called ​Trolls

You might also like