You are on page 1of 23

Assessment

Lesson 1 chapter 1

DISCUSSION QUESTIONS. Read the questions carefully and discussed your answer
concisely.

1. Described technology in one word and discuss its positive and negative impact out of
your one-word description.
Example: Advanced. In my perspective as an individual I considered technology as an
advanced invention because it provides our desired output in just one click away such
as asking google, online shopping, writing and editing documents and also sending it
electronically to our colleagues and it solves complex problem which signals the people
what course of action to take such as weather forecasting that prepares people if there
is a strongest typhoon coming. However, it greatly affects specifically our nature
because of transportation inventions which causes air pollution which would result to
bad health conditions. Furthermore, due to high rise building established and road widening
projects causes our nature to suffer wherein, we neglected to replace the damaged
instead we celebrated and suffered afterwards the drawbacks to the world because of
climate change.

NOW, IT’S YOUR TURN


1. Described technology in one word and discuss its positive and negative impact out of
your one-word description.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________

2. Technology can be seen anywhere and we most often used technology to accomplish
our day to day task. Can you list down atleast two (2) technologies you have been using
and discuss its uses then compare your accomplishment using that particular
technology than doing a task without using that device/gadget.

____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
__________________________________________________________________________

LEARNING OUTCOMES
1. Define what is a computer.
2. Identify the parts and function of a computer.
3. Differentiate each computer generations.
Assessment

Lesson 2

I. IDENTIFICATION. Read the questions carefully and write the correct answer on the
space provided.

Indicate the principal function of the following listed below by writing the appropriate
letter — I (input device), O (output device), S (storage device) P (processing device), C
(Communication device), AS (Application software), S (System Software) or I/O (for both Input
and Output acting devices)

II. DISCUSSION QUESTIONS. Read the questions carefully and express your answer briefly.

1. On your own words define what is a computer?


______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
________________________________________

2. What have noticed from each generations of computer? Differentiate and discuss
each computer generations.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
Assessment

I. ENUMERATION. List down the six basic types of computers and provide at least one
example of each type of computing device.
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________

DISCUSSION QUESTIONS.

1. There is usually a positive side and a negative side to each new technological
improvement. Write down a technology you use every day and consider its benefits and
risks. What benefits does the technology provide?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Are there any risks involved and, if so, how can they be minimized?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

If you chose not to use this technology because of the possible risks associated with it,
how would your life be affected?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Who should determine if the benefits of a new technology outweigh the potential risks?
Consumers or the government?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

CHAPTER REVIEW

I. IDENTIFICATION. Read the questions carefully and write the correct answer on the
space provided.

1. It refers to the use of computer to input, process, store, secure, retrieve and transmit all
forms of electronic data or information.
_______________________________
2. The earliest recorded computing device.
_______________________________
3. This computer generation was considered as the slowest and complicated type of
computer in its time.
_______________________________
4. Programmed to allow users to perform a specific task such as, creating documents,
presentations, computing budgets, entertainment, editing, listening to music and
exchanging emails.
_______________________________
5. The tangible part of a computer is called?
_______________________________

II. MULTIPLE CHOICE. Encircle the correct letter of the correct answer.

6. Which of the following does not belong to the group?


A. Google Chrome B. Windows 10 C. Skype D. Instagram

7. The following are examples of a computer hardware EXCEPT one.


A. Android B. Keyboard C. Mouse D. Monitor

8. Storage devices are used to save data or information for future use such as;
A. Flash Drive or thumb drive C. Floppy drive
B. CD drive D. Memory card reader

9. Which of the example is an example of input device?


A. Fax machine C. Touch Screen
B. Digital Camera D. Keyboard
10. Which of the following is an example of an application software?
A. Facebook C. Linux E. None of the
Above.
B. Messenger D. Both A & B

III. FILL IN THE BLANK.

11. Early computers were done by humans whose job title was ________________

12. One of the positive impact of the technology to me as a student


______________________________________________________________________.

13. One of the negative impact of the technology to me as a student


______________________________________________________________________.

14. One of the negative impact of the technology to the society


______________________________________________________________________

15. It is essential to learn about of computers and technology because


______________________________________________________________________

IV. ENUMERATION

List down atleast two types of computer and provide each example and their uses.

16. _____________________

17. _____________________
_____________________________
_____________________________
_____________________________
_____________________________
_____________________________
________________________________

1. What is an Internet?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

2. What are the main objectives of creation of the internet?


______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

DISCUSSION QUESTIONS.

1. What is a URL?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

2. Try to search on the internet about a topic that you like then, copy the whole URL and
label the scheme, domain name, file path, parameters, and/or anchor.
. IDENTIFICATION. Read the questions carefully and write the correct answer on the
space provided.

1. Performing financial transactions over the Internet is called.


__________________________________
2. A learning environment in which the student is physically located away from the
instructor and other students; commonly, instruction and communications take place via
the Web.
__________________________________
3. A software program used by a search site to retrieve matching Web pages from a search
database.
__________________________________
4. A single page on the Internet that contains information.
__________________________________
5. The largest and most well-known computer network, linking billions of devices all over
the world.
__________________________________
II. ENUMERATION.

1. List down atleast three (3) examples of social networking sites

1.1 ____________________``1.2 ____________________ 1.3


__________________

2. Provide two (2) examples of online entertainment


2.1 ______________________________ 2.2 ______________________________

3. List down five worthwhile activities that you can accomplish over the web.
3.1 ___________________________________________________________________
3.2 ___________________________________________________________________
3.3 ___________________________________________________________________
3.4 ___________________________________________________________________
3.5 ___________________________________________________________________
4. Enumerate atleast five (5) examples of E-commerce.
4.1 ___________________________
4.2 ___________________________
4.3 ___________________________
4.4 ___________________________
4.5 ___________________________
DISCUSSION QUESTIONS. Read the questions carefully and write your answer on
the space provided.

1. List one advantage and one disadvantage of the use of Web site cookies.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

2. What is a censorship and privacy issues and how they are related to internet use?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

CHAPTER REVIEW

I. IDENTIFICATION. Read the questions carefully and write the correct answer on the space
provided.
_____________1. The popular mode of delivering seminars via web due to the cause
and restrictions of pandemic to travel back and fro.

_____________2. The easiest and fastest way to accomplish monetary transactions online.

_____________3. The suppression of all or part of a play, movie, letter, or publication


considered offensive or a threat to security.

_____________4. A small piece of information stored on the computer when someone visits
a Web site on the Internet.

_____________5. It contains few information stored in the computer yet essential that
you mostly used upon log in over the network.

II. ENUMERATION.
1. The Internet has clearly changed the way people interact and live their lives. What are
some examples of devices which uses the Internet today?
1.1 _______________________________
1.2 _______________________________
1.3 _______________________________
1.4 _______________________________
1.5 _______________________________

2. Cite several ways to communicate over the Internet.


2.1 _______________________________
2.2 _______________________________
2.3 _______________________________
2.4 _______________________________
2.5 _______________________________

III. DISCUSSION QUESTIONS. Read the questions carefully and write your answer concisely.

1. What is the difference between the Internet and the World Wide Web?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

IV. MULTIPLE CHOICE. Read the questions carefully and encircle the letter of the correct
answer.
1. The largest and most well-known computer network, linking millions of computers all
over the world.
A. ARPANET B. Internet C. World Wide Web D. ISP

2. The predecessor of the internet, created in 1969 by the U.S. Department of Defense
which sponsored its development.
A. ARPANET B. Internet C. World Wide Web D. ISP

3. Very common today to order products over the internet.


A. Online Banking C. Online Education
B. Online Shopping D. Instant Messaging

4. Free or low-cost software that is supported by onscreen advertising.


A. Cookies B. Users C. E-Commerce D. Adware

5. A single page on the Internet that contains information.


A. Web Page B. Hyperlinks C. HTML D. Web
6. Performing banking activities over the internet such as, reviewing account, and checking
up credit card balances.
A. Online Banking C. Online Education
B. Online Shopping D. Instant Messaging

7. An educational class or program, such as through Web-based training and distance


learning.
A. Online Banking C. Online Education
B. Online Shopping D. Instant Messaging

8. A form of private chat set up to allow users to easily and quickly exchange real-time
typed messages with the individuals they specify.
A. Online Banking C. Online Education
B. Online Shopping D. Instant Messaging

9. Refers to the role people play in technology and the development of hardware
or software.
A. Cookies B. Users C. E-Commerce D. Adware

10. It refers to the address of a particular Web site or other resource on the Internet.
A. Uniform Resource Locator C. Hyperlinks
B. World Wide Web D. HTML

11. A site that creates a community individual that were made available to meet different
needs.
A. Search Engine B. Online News C. Online entertainment D. Social Media

12. Refers to the use of computers, video cameras, microphones, and other
communications technologies to conduct face-to-face meetings among people in
different locations over the internet.
A. Webinars C. Online Education B. Videoconferencing D. Online Music

13. A program that gathers information about Web sites and documents on the Internet that
are relevant to a particular search term or phrase.
A. Search Engine B. Online News C. Online entertainment D. Social Media

14. It hinders the spread of information from political opposition groups, to filter out subject
deemed offensive or to block sites that could endanger national security.
A. Web browsing privacy B. Spyware C. Censorship D. Adware

15. It encompasses the information available of particular individuals how it is used and by
whom.
A. Web browsing privacy B. Spyware C. Censorship D. Adware
I. ENUMERATION.
1. Provide two (2) examples each of protecting against of the following;
1.1 hardware loss
_______________________________
_______________________________
1.2 hardware damage
________________________________
________________________________
1.3 System failure
________________________________
________________________________

II. DISCUSSION QUESTIONS. Read the questions carefully and write your answer on the
space provided.

1. Identify and assess the relationship between security and privacy.


____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

I. ENUMERATION.
1. Provide atleast three (3) other examples of unauthorized access and use.

1.1 ___________________________________
1.2 ___________________________________
1.3 ___________________________________

2. List three (3) precautions you can take to protect against someone hacking your social
media accounts.

2.1 ___________________________________
2.2 ___________________________________
2.3 ___________________________________

II. DISCUSSION QUESTIONS.

1. Is It Ever Ethical to Wi-Fi Piggyback? Wi-Fi piggybacking refers to using an unsecured


Wi-Fi network to access the Internet without authorization. Some people piggyback on a
stranger’s Wi-Fi network for a quick Google search or e-mail check; others use a
neighbor’s Wi-Fi connection on a regular basis.

When a Wi-Fi network is left unsecured, does that mean that outside use is invited?
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

How would you feel if someone piggybacked on your Wi-Fi network?


________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

ENUMERATION.

1. Provide three (3) examples of computer sabotage and explain how individuals and

businesses can protect against it.

1.1 ______________________________
______________________________________________________________________

______________________________________________________________________

______________________________________________________________________

1.2 ______________________________

______________________________________________________________________

______________________________________________________________________

______________________________________________________________________

1.3 ______________________________

______________________________________________________________________

______________________________________________________________________

______________________________________________________________________

I. ENUMERATION
1. What are the several ways to protect yourself against identity theft, online fraud or
threat.

1.1 ___________________________________
1.2 ___________________________________
1.3 ___________________________________
1.4 ___________________________________
1.5 ___________________________________

II. DISCUSSION.

1. Is Mobile Banking More Secure than Online Banking? Some consider traditional online
banking safer because it has been tested longer. Others view mobile banking as safer
because individuals tend to have their smartphones with them at all times and so can be
notified more quickly of security breaches, GPS information can be used to identify
transactions that occur in a different physical location from the registered location of the
phone and therefore might be fraudulent, and mobile banking accounts are often
associated with a single smartphone. Mobile banking can be performed via a Web app,
mobile Web site, or text messaging.

Is one method safer than the other?


________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

Would you feel safer using one or the other?


________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

MULTIPLE CHOICE. Read the questions carefully and encircle the letter of the correct answer.
1. Which of the following is a form of cyberbullying?
A.  Flaming (sending hurtful or mean messages) C. Email
B. Trick or treat D. All of the above
2. Your behavior while you are on the internet can affect others.
A. True B.  False
3. Pretending to be someone else while sending mean or false messages is a form of
cyberbullying.
A. True B.  False
4. Someone you just met online could be considered a trusted adult.
A. True B. False
5. If a website makes you feel uncomfortable you should
A. Leave the site C. Tell an adult
B. Click on another part, maybe it will be better D. Both a and b
6. Once you have created passwords and usernames on your personal accounts, you
should tell it to
A.  Only your best friends C. Only the friends you trust
B. Everyone D. Only your parents or guardians
7. Your passwords should be
A. Something that is easy for you to remember, but hard for others to guess
B. Your birthday
C. Something only you and your best friend know
D. Your pet's name
8. Giving your password to a friend could result in the following incidents:
A. Your email or other personal sites could be tampered with
B. Someone could steal your identity online
C. Your banking or shopping sites could be tampered with by someone you don't
know
D. All of the above
9. When you get a rude or hurtful message on the computer you should
A. Respond to the message and tell the person what you think
B. Save and show the messages to a parent, guardian or trusted adult
C. Just ignore the messages
D. Delete and ignore the messages
10. If someone creates a social-networking page such as Facebook in your name you
should
A. Ignore it C. Create one of your own
B. Show it to your friends D. Tell your parents and contact the site
administrator.

CHAPTER REVIEW

MULTIPLE CHOICE. Read the questions carefully and mark the correct answer on the
answer sheet provided.

1. The process of taking physical and software preventive measures to protect the
underlying networking infrastructure.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
2. Accessing an unsecured Wi-Fi network from your current location without authorization.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
3. A collection of hardware and/or software intended to protect a computer or computer
network from unauthorized access.
A. Cybercrime B. Hacking C. Cyberbullying D. Firewalls
4. Using someone else’s identity to purchase goods or services, obtain new credit cards or
bank loans, or illegally masquerade as that individual.
A. Phishing C. Identity Theft
B. Pharming D. Social Media Hack
5. A malicious program designed to spread rapidly to a large number of computers by
sending copies of itself to other computers.
A. Computer Worm C. Trojan Horse
B. Malware D. Viruses
6. Acts of malicious destruction to a computer or computer resource is another common
type of computer crime today.
A. Security Software C. Dot cons
B. Computer Sabotage D. Encryption
7. Method of scrambling contents of e-mail or files to make them unreadable if intercepted.
A. Security Software C. Dot cons
B. Computer Sabotage D. Encryption
8. The act of accessing someone else’s social media account to make changes to the
content or to perform an activity as that individual.
A. Phishing B. Identity Theft C. Pharming D. Social Media Hacks
9. A malicious program that masquerades as something else.
A. Computer Worm C. Trojan Horse
B. Malware D. Viruses
10. Use of spoofed e-mail messages to gain credit card numbers and other personal data.
A. Phishing B. Identity Theft C. Pharming D. Social Media Hacks
11. The use of spoofed domain names to obtain personal information.
A. Phishing C. Identity Theft
B. Pharming D. Online Theft
12. The use of electronic communication to bully a person, typically by sending messages of
an intimidating or threatening nature.
A. Cybercrime B. Hacking C. Cyberbullying D. Firewalls
13. Generic term that refers to any type of malicious software.
A. Computer Worm C. Trojan Horse
B. Malware D. Viruses
14. Using a computer resource for unapproved activities.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
15. Gaining access to a computer, network, file or other resource without permission.
A. Network security C. Unauthorized access
B. Wi-Fi piggybacking D. Unauthorized use
16. Typically, a suite of programs used to protect your computer against a variety of threats.
A. Security Software B. Botnets C. Privacy D. Encryption
17. A PC that is controlled by a hacker or other computer criminal is referred to as a bot or
zombie PC.
A. Security Software B. Botnets C. Privacy D. Encryption
18. Which of the following does not belong?
A. Always use the default password. B. Enable encryption.
C. Install security software. D. All of the above.
19. Ideally, what characters should you use in a password to make it strong?
A. Letters and Numbers only. C. Mixed Case (upper and lower) Characters
B. Special characters D. All of the above.
20. Which of the following is the most commonly used password?
A. iloveyou B. 123456 C. virus D. ugly

ASSESSMENT #4
I. ESSAY: Read the statement/s carefully. Answer the given statement/s concisely.

1. Discuss how digital technology change society in the area of:


a. Business
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
b. Job
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
c. Health
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
d. Lifestyle
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
e. Entertainment
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
f. Education
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
2. Differentiate Technological Determinism and Social Constructivism. Elaborate
and give concrete examples.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

3. Describe the process of technological change. How technological evolution


takes place?
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________

ASSESSMENT #5

1. Enumerate 5 IoT devices and discuss what smart abilities do they have.

______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
________________________________________________________________

2. Differentiate virtual reality technology and augmented technology from one another.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________

3. What are the positive and negative implications of these emerging trends to our
culture and society.
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
REFERENCES
__________1. Printer
__________2. CD Drive
__________3. Keyboard
__________4. Mouse
__________5. Touchscreen
__________6. CPU
__________7. Memory Card Reader
__________8. Speaker
__________9. Modem
__________10. Microphones
__________11. Instagram
__________12. Camera
__________13. Fax Machine
__________14. Facebook
__________15. Windows 10
__________16. Linux
__________17. Samsung Notes
__________18. iOS
__________19. Android
__________20. Google Chrome

You might also like