You are on page 1of 4

Republic of the Philippines

Department of Education
Region X
Division of Valencia City
CONCEPCION NATIONAL HIGH SCHOOL
Concepcion, Valencia City

THIRD PERIODICAL EXAMINATION


EMPOWERMENT TECHNOLOGY – ICT & GAS
January 09-10, 2020

Name: ____________________________________Grade Section: ______________________Score: __________

Teacher: EDD BENEDICT B. DENSING

I. MULTIPLE CHOICE – Part 1


Directions: Encircle the letter of the correct answer.

1. Refers to practice and precautions one observe when using the Internet.
A. Digital Safety C. Ethics
B. Cyber Safety D. Netiquette

2. Refers to set of MORAL PRINCIPLES that govern an individual or group on what is considered as
ACCEPTABLE BEHAVIOR while using a computer.
A. Digital Safety C. Ethics
B. Cyber Safety D. Netiquette

3. Mean ACCEPTABLE RULES for online behavior.


A. Digital Safety C. Ethics
B. Cyber Safety D. Netiquette

4. It deals with the use of different communication technologies such as mobile phones, telephone, Internet
etc. to locate, save, send, and edit information.
A. Internet C. Google
B. Computer Networks D. ICT

5. Known as flat page or stationary page, in the same that the page “as is” and cannot be manipulated by the
user.
A. World Wide Web C. Dynamic Page
B. Static Page D. Hypertext Transfer Protocol

6. Refers to the web pages that are affected by user input or preference.
A. World Wide Web C. Dynamic Page
B. Static Page D. Hypertext Transfer Protocol

7. An evolution of technological developments that merge into a new system bringing together different
types of applications and media.
A. Social Media C. Internet
B. Facebook D. Technology Convergence

8. Its stresses the role of unified communications and the integration of telecommunications, computers as
well as necessary enterprise software, middleware, storage, and audio-visual system, which enable users
to access, store, transmit, and manipulate information.
A. Technology C. Internet
B. ICT D. Technology Convergence

9. A key feature of Web 2.0 in which the owner of website is not the only one who is able to put content.
A. User Participation C. Rich User Interface
B. Long Tail D. Folksonomy

10. It is a movement led by the World Wide Web Consortium (W3C).


A. Website C. Semantic Web
B. Word Wide Web D. HTML
11. It is a program that duplicates itself and then infects the computer.
A. Trojan Horse C. Computer Virus
B. Hacker D. Spyware

12. A computer program that is installed covertly on a personal computer to collect information or even take
control over the computer without the knowledge of the user.
A. Trojan Horse C. Computer Virus
B. Hacker D. Spyware

13. Usually unsolicited commercial email sent from an unknown source with identical message sent to
multiple recipients.
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam

14. It is a deceitful email practice in which the sender address is changed, so that it would appear to have
come from a different source which is usually someone you know.
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam

15. It is a deceitful practice of trying to get confidential information such as passwords and usernames, and
credit card details by making it appear as if it comes from a trustworthy source
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam

16. This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious
website.
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam

17. This is a person who is able to enter and control other people’s computer without authorization.
A. Trojan Horse C. Computer Virus
B. Hacker D. Spyware

18. A malware fronting to perform a good task, but covertly performs undesirable function with the intention
of entering the computer without the user’s consent.
A. Trojan Horse C. Computer Virus
B. Hacker D. Spyware

19. It is a collection of internet-base communication tools and computer assisted channels dedicated to allow
users to interact, communication and share information.
A. Facebook C. Instagram
B. Twitter D. Social Media

20. It is a popular free social networking site with more than a billion users around the globe that allows users
to create profiles, upload photos and etc.
A. Facebook C. Instagram
B. Twitter D. Social Media

21. A type of Mobile OS, use in apple devices such as iPhone and iPad.
A. Android C. Blackberry
B. Windows Phone D. iOS

22. An open source Mobile OS, developed by Google.


A. Android C. Blackberry
B. Windows Phone D. iOS

23. This social networking site allows users to microblog or broadcast short messages called “TWEETS”.
A. Facebook C. Instagram
B. Twitter D. Social Media

24. Refers to a website where in most of the uploading is only a photo.


A. Facebook C. Instagram
B. Twitter D. Social Media

25. A range of handheld devices from mobile phones, tablets, and e-readers to game consoles, primarily used
as personal, interactive, internet-enabled and user controlled portable platforms.
A. Assistive Media C. Facebook
B. Mobile Media D. Twitter

26. An internet-based reading advises for persons with visual and reading impairment.
A. Assistive Media C. Facebook
B. Mobile Media D. Twitter

27. It is set of rules for behaving properly online


A. Etiquette C. Cyber Crime
B. Netiquette D. Hacking

MULTIPLE CHOICE – Part 2


Directions: The following statement are tips to stay safe online. Chose the letter of the correct answer.

28. Do not use pirated software.


A. Safe C. Not Sure
B. Not Safe D. Maybe

29. Think before you click.


A. Safe C. Not Sure
B. Not Safe D. Maybe

30. Do not just accept terms and conditions; read it.


A. Safe C. Not Sure
B. Not Safe D. Maybe

31. Don’t post anything about future vacation.


A. Safe C. Not Sure
B. Not Safe D. Maybe

32. Add friends you know in real life.


A. Safe C. Not Sure
B. Not Safe D. Maybe

33. Avoid visiting untrusted website.


A. Safe C. Not Sure
B. Not Safe D. Maybe

34. Make your WI-FI password private.


A. Safe C. Not Sure
B. Not Safe D. Maybe

35. Do not reply to a suspicious-email.


A. Safe C. Not Sure
B. Not Safe D. Maybe

36. Do not talk to stranger’s weather online or face to face.


A. Safe C. Not Sure
B. Not Safe D. Maybe

II. TRUE OR FALSE


Directions: Write TRUE if the statement is correct, and if false write the correct answer. Write your answer in
the space provided.

1. ____________ Web 2.0 is classified as dynamic webpage.


2. ____________ PISHING is a malicious individual or group who scam users.
3. ____________ Web 2.0 introduced static web pages that allow users to interact with the webpage.
4. ____________ CYBER STALKING uses electronic communication to harass or frighten someone.
5. ____________ BALANCE deals with the visual weight of objects, textures, colors and space.
6. ____________ EMPHASIS is the area designed to attract the viewers’ attention.
7. ____________ PROPORTION includes visual elements that create a sense of unity where they
relate well with one another.
8. ____________ HACKING is the gaining of unauthorized access to your system profit, protest,
information gathering or to evaluate system weakness.
9. ____________ SALAMI ATTACT involves direct or search unauthorized access to system by
introducing malicious programs know as viruses, worms ect.
10. ____________ VIRUS DISSEMINATION making small attacks, unnoticed but does large damage.
11. ____________ ICT stands for Information and Communication Technology.
12. ____________ CYBER CRIME any illegal or unethical activity through internet or using computer
as a tool.
13. ____________ TECHNOLOGY is the application of scientific knowledge for practical purposes,
especially in industry.
14. ____________ WEB 2.0 it is described by Time Berners-Lee (father of the WWW) as the read-write
executive web.
15. ____________ WEB 3.0 referred to as the semantic web or data driven web content and response.

III. ENUMERATION
Provide the answers of the following statements.
Give at least 3 Dangers on the Internet
1. _________________
2. _________________
3. _________________

The 8 Type of Attacks


4. _________________
5. _________________
6. _________________
7. _________________
8. _________________
9. _________________
10. _________________
11. _________________

Give at least 3 Basic Principles of Graphics and Layout 


12. __________________
13.  __________________
14. __________________

Give at least 7 Rules of Netiquette


15.  __________________
16. __________________
17.  __________________
18. __________________
19.  __________________
20. __________________
21.  __________________

Give at least 2 types of Social Media


22. __________________
23.  ________________

“The person who strays from common sense will end up in the company of the dead.”
- Proverbs 22:16

GOOD LUCK!

You might also like