Professional Documents
Culture Documents
Lesson 1 chapter 1
DISCUSSION QUESTIONS. Read the questions carefully and discussed your answer
concisely.
1. Described technology in one word and discuss its positive and negative impact out of
your one-word description.
Example: Advanced. In my perspective as an individual I considered technology as an
advanced invention because it provides our desired output in just one click away such
as asking google, online shopping, writing and editing documents and also sending it
electronically to our colleagues and it solves complex problem which signals the people
what course of action to take such as weather forecasting that prepares people if there
is a strongest typhoon coming. However, it greatly affects specifically our nature
because of transportation inventions which causes air pollution which would result to
bad health conditions. Furthermore, due to high rise building established and road widening
projects causes our nature to suffer wherein, we neglected to replace the damaged
instead we celebrated and suffered afterwards the drawbacks to the world because of
climate change.
2. Technology can be seen anywhere and we most often used technology to accomplish
our day to day task. Can you list down atleast two (2) technologies you have been using
and discuss its uses then compare your accomplishment using that particular
technology than doing a task without using that device/gadget.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________
LEARNING OUTCOMES
1. Define what is a computer.
2. Identify the parts and function of a computer.
3. Differentiate each computer generations.
Assessment
Lesson 2
I. IDENTIFICATION. Read the questions carefully and write the correct answer on the
space provided.
Indicate the principal function of the following listed below by writing the appropriate
letter — I (input device), O (output device), S (storage device) P (processing device), C
(Communication device), AS (Application software), S (System Software) or I/O (for both Input
and Output acting devices)
II. DISCUSSION QUESTIONS. Read the questions carefully and express your answer briefly.
2. What have noticed from each generations of computer? Differentiate and discuss
each computer generations.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
Assessment
I. ENUMERATION. List down the six basic types of computers and provide at least one
example of each type of computing device.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________
DISCUSSION QUESTIONS.
1. There is usually a positive side and a negative side to each new technological
improvement. Write down a technology you use every day and consider its benefits and
risks. What benefits does the technology provide?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Are there any risks involved and, if so, how can they be minimized?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
If you chose not to use this technology because of the possible risks associated with it,
how would your life be affected?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Who should determine if the benefits of a new technology outweigh the potential risks?
Consumers or the government?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
CHAPTER REVIEW
I. IDENTIFICATION. Read the questions carefully and write the correct answer on the
space provided.
1. It refers to the use of computer to input, process, store, secure, retrieve and transmit all
forms of electronic data or information.
_______________________________
2. The earliest recorded computing device.
_______________________________
3. This computer generation was considered as the slowest and complicated type of
computer in its time.
_______________________________
4. Programmed to allow users to perform a specific task such as, creating documents,
presentations, computing budgets, entertainment, editing, listening to music and
exchanging emails.
_______________________________
5. The tangible part of a computer is called?
_______________________________
II. MULTIPLE CHOICE. Encircle the correct letter of the correct answer.
8. Storage devices are used to save data or information for future use such as;
A. Flash Drive or thumb drive C. Floppy drive
B. CD drive D. Memory card reader
11. Early computers were done by humans whose job title was ________________
IV. ENUMERATION
List down atleast two types of computer and provide each example and their uses.
16. _____________________
17. _____________________
_____________________________
_____________________________
_____________________________
_____________________________
_____________________________
________________________________
1. What is an Internet?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
DISCUSSION QUESTIONS.
1. What is a URL?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
2. Try to search on the internet about a topic that you like then, copy the whole URL and
label the scheme, domain name, file path, parameters, and/or anchor.
. IDENTIFICATION. Read the questions carefully and write the correct answer on the
space provided.
3. List down five worthwhile activities that you can accomplish over the web.
3.1 ___________________________________________________________________
3.2 ___________________________________________________________________
3.3 ___________________________________________________________________
3.4 ___________________________________________________________________
3.5 ___________________________________________________________________
4. Enumerate atleast five (5) examples of E-commerce.
4.1 ___________________________
4.2 ___________________________
4.3 ___________________________
4.4 ___________________________
4.5 ___________________________
DISCUSSION QUESTIONS. Read the questions carefully and write your answer on
the space provided.
1. List one advantage and one disadvantage of the use of Web site cookies.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
2. What is a censorship and privacy issues and how they are related to internet use?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
CHAPTER REVIEW
I. IDENTIFICATION. Read the questions carefully and write the correct answer on the space
provided.
_____________1. The popular mode of delivering seminars via web due to the cause
and restrictions of pandemic to travel back and fro.
_____________2. The easiest and fastest way to accomplish monetary transactions online.
_____________4. A small piece of information stored on the computer when someone visits
a Web site on the Internet.
_____________5. It contains few information stored in the computer yet essential that
you mostly used upon log in over the network.
II. ENUMERATION.
1. The Internet has clearly changed the way people interact and live their lives. What are
some examples of devices which uses the Internet today?
1.1 _______________________________
1.2 _______________________________
1.3 _______________________________
1.4 _______________________________
1.5 _______________________________
III. DISCUSSION QUESTIONS. Read the questions carefully and write your answer concisely.
1. What is the difference between the Internet and the World Wide Web?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
IV. MULTIPLE CHOICE. Read the questions carefully and encircle the letter of the correct
answer.
1. The largest and most well-known computer network, linking millions of computers all
over the world.
A. ARPANET B. Internet C. World Wide Web D. ISP
2. The predecessor of the internet, created in 1969 by the U.S. Department of Defense
which sponsored its development.
A. ARPANET B. Internet C. World Wide Web D. ISP
8. A form of private chat set up to allow users to easily and quickly exchange real-time
typed messages with the individuals they specify.
A. Online Banking C. Online Education
B. Online Shopping D. Instant Messaging
9. Refers to the role people play in technology and the development of hardware
or software.
A. Cookies B. Users C. E-Commerce D. Adware
10. It refers to the address of a particular Web site or other resource on the Internet.
A. Uniform Resource Locator C. Hyperlinks
B. World Wide Web D. HTML
11. A site that creates a community individual that were made available to meet different
needs.
A. Search Engine B. Online News C. Online entertainment D. Social Media
12. Refers to the use of computers, video cameras, microphones, and other
communications technologies to conduct face-to-face meetings among people in
different locations over the internet.
A. Webinars C. Online Education B. Videoconferencing D. Online Music
13. A program that gathers information about Web sites and documents on the Internet that
are relevant to a particular search term or phrase.
A. Search Engine B. Online News C. Online entertainment D. Social Media
14. It hinders the spread of information from political opposition groups, to filter out subject
deemed offensive or to block sites that could endanger national security.
A. Web browsing privacy B. Spyware C. Censorship D. Adware
15. It encompasses the information available of particular individuals how it is used and by
whom.
A. Web browsing privacy B. Spyware C. Censorship D. Adware
I. ENUMERATION.
1. Provide two (2) examples each of protecting against of the following;
1.1 hardware loss
_______________________________
_______________________________
1.2 hardware damage
________________________________
________________________________
1.3 System failure
________________________________
________________________________
II. DISCUSSION QUESTIONS. Read the questions carefully and write your answer on the
space provided.
I. ENUMERATION.
1. Provide atleast three (3) other examples of unauthorized access and use.
1.1 ___________________________________
1.2 ___________________________________
1.3 ___________________________________
2. List three (3) precautions you can take to protect against someone hacking your social
media accounts.
2.1 ___________________________________
2.2 ___________________________________
2.3 ___________________________________
When a Wi-Fi network is left unsecured, does that mean that outside use is invited?
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
ENUMERATION.
1. Provide three (3) examples of computer sabotage and explain how individuals and
1.1 ______________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
1.2 ______________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
1.3 ______________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
I. ENUMERATION
1. What are the several ways to protect yourself against identity theft, online fraud or
threat.
1.1 ___________________________________
1.2 ___________________________________
1.3 ___________________________________
1.4 ___________________________________
1.5 ___________________________________
II. DISCUSSION.
1. Is Mobile Banking More Secure than Online Banking? Some consider traditional online
banking safer because it has been tested longer. Others view mobile banking as safer
because individuals tend to have their smartphones with them at all times and so can be
notified more quickly of security breaches, GPS information can be used to identify
transactions that occur in a different physical location from the registered location of the
phone and therefore might be fraudulent, and mobile banking accounts are often
associated with a single smartphone. Mobile banking can be performed via a Web app,
mobile Web site, or text messaging.
MULTIPLE CHOICE. Read the questions carefully and encircle the letter of the correct answer.
1. Which of the following is a form of cyberbullying?
A. Flaming (sending hurtful or mean messages) C. Email
B. Trick or treat D. All of the above
2. Your behavior while you are on the internet can affect others.
A. True B. False
3. Pretending to be someone else while sending mean or false messages is a form of
cyberbullying.
A. True B. False
4. Someone you just met online could be considered a trusted adult.
A. True B. False
5. If a website makes you feel uncomfortable you should
A. Leave the site C. Tell an adult
B. Click on another part, maybe it will be better D. Both a and b
6. Once you have created passwords and usernames on your personal accounts, you
should tell it to
A. Only your best friends C. Only the friends you trust
B. Everyone D. Only your parents or guardians
7. Your passwords should be
A. Something that is easy for you to remember, but hard for others to guess
B. Your birthday
C. Something only you and your best friend know
D. Your pet's name
8. Giving your password to a friend could result in the following incidents:
A. Your email or other personal sites could be tampered with
B. Someone could steal your identity online
C. Your banking or shopping sites could be tampered with by someone you don't
know
D. All of the above
9. When you get a rude or hurtful message on the computer you should
A. Respond to the message and tell the person what you think
B. Save and show the messages to a parent, guardian or trusted adult
C. Just ignore the messages
D. Delete and ignore the messages
10. If someone creates a social-networking page such as Facebook in your name you
should
A. Ignore it C. Create one of your own
B. Show it to your friends D. Tell your parents and contact the site
administrator.
CHAPTER REVIEW
MULTIPLE CHOICE. Read the questions carefully and mark the correct answer on the
answer sheet provided.
1. The process of taking physical and software preventive measures to protect the
underlying networking infrastructure.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
2. Accessing an unsecured Wi-Fi network from your current location without authorization.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
3. A collection of hardware and/or software intended to protect a computer or computer
network from unauthorized access.
A. Cybercrime B. Hacking C. Cyberbullying D. Firewalls
4. Using someone else’s identity to purchase goods or services, obtain new credit cards or
bank loans, or illegally masquerade as that individual.
A. Phishing C. Identity Theft
B. Pharming D. Social Media Hack
5. A malicious program designed to spread rapidly to a large number of computers by
sending copies of itself to other computers.
A. Computer Worm C. Trojan Horse
B. Malware D. Viruses
6. Acts of malicious destruction to a computer or computer resource is another common
type of computer crime today.
A. Security Software C. Dot cons
B. Computer Sabotage D. Encryption
7. Method of scrambling contents of e-mail or files to make them unreadable if intercepted.
A. Security Software C. Dot cons
B. Computer Sabotage D. Encryption
8. The act of accessing someone else’s social media account to make changes to the
content or to perform an activity as that individual.
A. Phishing B. Identity Theft C. Pharming D. Social Media Hacks
9. A malicious program that masquerades as something else.
A. Computer Worm C. Trojan Horse
B. Malware D. Viruses
10. Use of spoofed e-mail messages to gain credit card numbers and other personal data.
A. Phishing B. Identity Theft C. Pharming D. Social Media Hacks
11. The use of spoofed domain names to obtain personal information.
A. Phishing C. Identity Theft
B. Pharming D. Online Theft
12. The use of electronic communication to bully a person, typically by sending messages of
an intimidating or threatening nature.
A. Cybercrime B. Hacking C. Cyberbullying D. Firewalls
13. Generic term that refers to any type of malicious software.
A. Computer Worm C. Trojan Horse
B. Malware D. Viruses
14. Using a computer resource for unapproved activities.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
15. Gaining access to a computer, network, file or other resource without permission.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
16. Typically, a suite of programs used to protect your computer against a variety of threats.
A. Security Software B. Botnets C. Privacy D. Encryption
17. A PC that is controlled by a hacker or other computer criminal is referred to as a bot or
zombie PC.
A. Security Software B. Botnets C. Privacy D. Encryption
18. Which of the following does not belong?
A. Always use the default password. B. Enable encryption.
C. Install security software. D. All of the above.
19. Ideally, what characters should you use in a password to make it strong?
A. Letters and Numbers only. C. Mixed Case (upper and lower) Characters
B. Special characters D. All of the above.
20. Which of the following is the most commonly used password?
A. iloveyou B. 123456 C. virus D. ugly
ASSESSMENT #4
I. ESSAY: Read the statement/s carefully. Answer the given statement/s concisely.
ASSESSMENT #5
1. Enumerate 5 IoT devices and discuss what smart abilities do they have.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
________________________________________________________________
2. Differentiate virtual reality technology and augmented technology from one another.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
3. What are the positive and negative implications of these emerging trends to our
culture and society.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
REFERENCES
__________1. Printer
__________2. CD Drive
__________3. Keyboard
__________4. Mouse
__________5. Touchscreen
__________6. CPU
__________7. Memory Card Reader
__________8. Speaker
__________9. Modem
__________10. Microphones
__________11. Instagram
__________12. Camera
__________13. Fax Machine
__________14. Facebook
__________15. Windows 10
__________16. Linux
__________17. Samsung Notes
__________18. iOS
__________19. Android
__________20. Google Chrome