You are on page 1of 2

Republic of the Philippines

DEPARTMENT OF EDUCATION
CARAGA ADMINISTRATIVE REGION
DIVISION OF AGUSAN DEL SUR
D.O. Plaza Gov’t Center, Patin ay, Prosperidad, Agusan del Sur
AGUSAN DEL SUR NATIONAL SCIENCE HIGH SCHOOL

MIDTERM EXAMINATION in EMPOWERMENT TECHNOLOGIES


NAME: __________________________________________ SECTION: ____________________
PART I. Multiple Choice. Select the letter that corresponds to the best answer.

1. What image online format is capable of displaying simple animation?


A. .bmp B. .gif C. .jpg D. .png
2. Among online file formats for images, which one allows you to display images in full colors with NO transparency?
A. .bmp B. .gif C. .jpg D. .png
3. An example of WEB 2.0
A. Blogs, and wikis B. social networking sites C. video sharing D. All of the above
4. It is described as a state of being connected to the cyberspace through a medium of internet or computer network.
A. Offline B. Online C. Website D. Webpage
5. When WWW was invented, most web pages were static. Static (also known as flat page or stationary page) in the
same that the page “as is” and cannot be manipulated by the user. This referred to as Web1.0.
A. HTTP B. html C. www D. all of the above
6. What is meant by UPLOADING?
A. The process of getting files from the Internet. C. the process of acquiring digital files
B. The process of putting digital files into the computer or internet D. Both A and C
7. The following statements are some of the current problems being faced in the ICT except one;
A. Communication happens globally & in real time
B. It has decreased personal privacy
C. The Internet can be an addiction
D. Internet dependence can lessen productivity
8. It allows users to categorize and classify/arrange information using freely chosen keywords (e.g. tagging).
A. Folksonomy B. User participation C. Rich user interface D. None of the above
9. what is ICT means?
A. Information and communication highway technology C. Information and communication technology
B. Information and computer technology D. Information and computer highway technology
10. WAN means ______________.
A. Wide Area Network B. World Area Network C. Weak Area Network D. All of these
11. Designed to send you advertisement.
A. adware B. trojan C. internet D. pharming
12. Replicates and can transfer from one computer to another.
A. Virus B. Spyware C. Spam D. Malware.
13. Exploit the DNS system.
A. Pharming B. Rogue C. Malware D. Spam
14. Runs in the background and monitors what you are doing.
A. Spyware B. Spam C. Trojan D. Keylogger
15. Unwanted emails, mostly from bots.
A. Spam B. Rogue C. Malware D. Net
16. Disguise as a useful program but it’s not.
A. Trojan B. Rogue C. Keylogger D. Worm
17. A malicious software.
A. Malware B. Spyware C. Spam D. Keylogger
18. Used to record the keystrokes done by the user.
A. Keylogger B. Spam C. Trojan D. Worm
19. Malicious program like “LOVE BUG” created by a Filipino programmer.
A. Worm B. Virus C. Malware D. Trojan
20. Tricks the user into posting that is a security software.
A. Phishing B. Virus C. Pharming D. Spam
21. It is defined as information superhighway.
A. Web B. Internet C. Computer D. Social Media
22. Among the text wrap options, which one allows you to treat the image just like how a text is treated?
A. In line with text B. Square C. Through D. Tight
23. Diverse information sharing through universal Web Access is called ______
A. User participation B. Mass Participation C. Variety D. rich user experience
24. Which of the following is NOT a component of a mail merge?
A. Address B. File name C. Form document D. Data file
Directions: Tell whether the statement is related to Online Safety and Security, Protecting Reputation Online, Copyright
Infringement and Online Research. Write “A” for Online Safety and Security, “B” for Protecting Reputation Online, “C”
Copyright Infringement and “D” for Online Research.
25. There is a risk on sharing your Name and other information online
26. Your cellphone number should not be posted over the internet.
27. Having your birthday on your profile makes vulnerable to identity theft.
28. Your post in the internet have tell about your personality.
29. Your reputation is at risk if you are careless in using your social media account.
30. There is a protection on a literary works, paintings, drawings, music etc.
31. It is illegal to use something made from somebody else’s creativity.
32. It is important to acknowledge some body about their woks.
33. To filter information, use advance search.
34. Search engine like Google, Bing and Yahoo is a flat form for gathering information online.
Identification: 2 pts each
1. It is used to navigate your slides during presentation. ________________________
2. The other term for flat page is ___________________
3. Before you put an equation in spreadsheet, what symbol should be typed first? ____________________

Give the 5 problems encountered by the Web 3.0 which makes it unable to realize yet.

1.
2.
3.
4.
5

Prepared by:

BERNARD C. ABULOC
SST-I

You might also like