You are on page 1of 1

SUMMATIVE TEST 2

Empowerment Technology 11

I. MULTIPLE CHOICE: I. MULTIPLE CHOICE:


Directions: Read and answer the questions below. Directions: Read and answer the questions below.
Encircle the letter of the best answer from among Encircle the letter of the best answer from among
the given choices. the given choices.

1. A web application where a user can 1. _______________a malicious program that


communicate, create and share replicate itself by copying itself to another
content, and participate in online communities? program.
A. Convergence C. Mobile Technologies A. Virus C. Worm
B. Social Media D. Assistive Media B. Adware D. Spyware
2. What is the markup language for designing and 2. _______________malicious program that
developing websites? copy’s itself and spreads to other computers.
A. DNS C. HTTP A. Rootkit C. Trojan Horse
B. URL D. HTML B. Worm D. Virus
3. What version of the world wide web that allows 3. _____________ is a ransom virus that block
interactivity between the the user from accessing the programs or files and
users and the website? demands to pay the ransom through online
A. Web 1.0 C. Web 3.0 method
B. Web 2.0 D. Web 4.0 for the removal of the virus.
4. A website that allows you to broadcast short A. Keylogger C. Ransomware
message. B. Botnet D. Spyware
A. Social News C. Microblogging 4. _________ is a program that runs in the
B. Bookmarking Sites D. Media Sharing background and steals user credentials and
5. A platform that assist person with disability. confidential information and send back to hack by
A. Assistive Media C. Convergence recording
B. Social Media D. Semantic Web every keystroke that a user makes on their
computer or device.
II. TRUE OR FALSE: A. Spyware C. Rootkit
Directions: Write “True” if the statement is true B. Ransomware D. Keylogger
and write “False” if the statement is false. 5. _________ is a malicious program that
disguised as legitimate program that user will
_______6. We are allowed to copy the works of accept and use but take control of your computer.
other people without asking permission. A. Trojan Horse C. Virus
_______7. All Information from the internet are B. Worm D. Botnet
free.
_______8. Search engine is an application used II. TRUE OR FALSE:
for searching the web. Directions: Give the meaning of the following
_______9. All information from the internet are acronyms.
reliable.
6. www - ______________________________
______10. Google is an example of search
7. USB - _______________________________
engine.
8. WiFi - _______________________________
______11. Child pornography is a form of
9. PNG- _______________________________
cybercrime.
10. JPEG - ______________________________
______12. Committing crime on the internet is not
punishable by law III. IDENTIFICATION:
______13. Do not open suspicious email. Directions: Identify the following types of Social
______14. Share your password with anyone. Media.
______15. Think before you click. Ex. Twitter – Social Network

11. Youtube
Prepared by: 12. Reddit
13. Pinterest
14. Flicker
ARIEL A. CANCINO 15. Wordpress
Subject Teacher
Prepared by:

ARIEL A. CANCINO
Subject Teacher

You might also like