Professional Documents
Culture Documents
Department of Education
Region X
Division of Valencia City
CONCEPCION NATIONAL HIGH SCHOOL
Concepcion, Valencia City
1. Refers to practice and precautions one observe when using the Internet.
A. Digital Safety C. Ethics
B. Cyber Safety D. Netiquette
2. Refers to set of MORAL PRINCIPLES that govern an individual or group on what is considered as
ACCEPTABLE BEHAVIOR while using a computer.
A. Digital Safety C. Ethics
B. Cyber Safety D. Netiquette
4. It deals with the use of different communication technologies such as mobile phones, telephone, Internet
etc. to locate, save, send, and edit information.
A. Internet C. Google
B. Computer Networks D. ICT
5. Known as flat page or stationary page, in the same that the page “as is” and cannot be manipulated by the
user.
A. World Wide Web C. Dynamic Page
B. Static Page D. Hypertext Transfer Protocol
6. Refers to the web pages that are affected by user input or preference.
A. World Wide Web C. Dynamic Page
B. Static Page D. Hypertext Transfer Protocol
7. An evolution of technological developments that merge into a new system bringing together different
types of applications and media.
A. Social Media C. Internet
B. Facebook D. Technology Convergence
8. Its stresses the role of unified communications and the integration of telecommunications, computers as
well as necessary enterprise software, middleware, storage, and audio-visual system, which enable users
to access, store, transmit, and manipulate information.
A. Technology C. Internet
B. ICT D. Technology Convergence
9. A key feature of Web 2.0 in which the owner of website is not the only one who is able to put content.
A. User Participation C. Rich User Interface
B. Long Tail D. Folksonomy
12. A computer program that is installed covertly on a personal computer to collect information or even take
control over the computer without the knowledge of the user.
A. Trojan Horse C. Computer Virus
B. Hacker D. Spyware
13. Usually unsolicited commercial email sent from an unknown source with identical message sent to
multiple recipients.
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam
14. It is a deceitful email practice in which the sender address is changed, so that it would appear to have
come from a different source which is usually someone you know.
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam
15. It is a deceitful practice of trying to get confidential information such as passwords and usernames, and
credit card details by making it appear as if it comes from a trustworthy source
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam
16. This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious
website.
A. Pharming C. Phishing
B. Email Spoofing D. Email Spam
17. This is a person who is able to enter and control other people’s computer without authorization.
A. Trojan Horse C. Computer Virus
B. Hacker D. Spyware
18. A malware fronting to perform a good task, but covertly performs undesirable function with the intention
of entering the computer without the user’s consent.
A. Trojan Horse C. Computer Virus
B. Hacker D. Spyware
19. It is a collection of internet-base communication tools and computer assisted channels dedicated to allow
users to interact, communication and share information.
A. Facebook C. Instagram
B. Twitter D. Social Media
20. It is a popular free social networking site with more than a billion users around the globe that allows users
to create profiles, upload photos and etc.
A. Facebook C. Instagram
B. Twitter D. Social Media
21. A type of Mobile OS, use in apple devices such as iPhone and iPad.
A. Android C. Blackberry
B. Windows Phone D. iOS
23. This social networking site allows users to microblog or broadcast short messages called “TWEETS”.
A. Facebook C. Instagram
B. Twitter D. Social Media
25. A range of handheld devices from mobile phones, tablets, and e-readers to game consoles, primarily used
as personal, interactive, internet-enabled and user controlled portable platforms.
A. Assistive Media C. Facebook
B. Mobile Media D. Twitter
26. An internet-based reading advises for persons with visual and reading impairment.
A. Assistive Media C. Facebook
B. Mobile Media D. Twitter
III. ENUMERATION
Provide the answers of the following statements.
Give at least 3 Dangers on the Internet
1. _________________
2. _________________
3. _________________
“The person who strays from common sense will end up in the company of the dead.”
- Proverbs 22:16
GOOD LUCK!