You are on page 1of 3

St. Mary’s College of Catbalogan (Inc.

)
Formerly Sacred Heart College, (Inc.)
Catbalogan, Samar

PAASCU Accredited
Elementary and High School Department
_________________________________________________________________________________________

SUMMATIVE TEST IN EMPOWERMENT TECHNOLOGIES


BASIC EDUCATION DEPARTMENT
S.Y. 2022 – 2023

TEST I – Multiple Choice 7. Which of the following video hosting platform is the most
Directions: Choose the letter that corresponds to the answer. Write popular nowadays?
the letter of your answer on the space provided. A. Imgur C. YouTube
B. Instagram D. vimeo
1. In principles of design, what is the definition of ‘Emphasis’?
8. What do you call the repetition of elements in your design?
A. The distinction between good and evil.
B. The repetition of one or more elements in a design. A. Contrast C. size
C. The distribution of heavy and light elements in a B. Emphasis D. rhythm
design.
D. The feeling of harmony and unity that is created by all 9. Which of the following type of infographics is designed to
parts of the elements of design. accommodate a huge amount of data?
A. cheat sheet C. numerical
2. Which of the following is the definition of ‘Contrast’ in B. data visualization D. visual article
principles of design?
A. The distinction between good and evil. 10. Which of the following are the basic elements of design?
B. The repetition of one or more elements in a design.
C. The distribution of heavy and light elements in a A. point, line and shape C. shape, color and size
design. B. point, line and space D. space, size and texture
D. The feeling of harmony and unity that is created by all
parts of the elements of design. 11. Which of the following is an example of a geometric
shape?
3. Which of the following is an example of a ‘phishing’ attack? A. Circle C. leaf
B. Glass D. ring
A. Sending someone an email that records their
keystroke activities while using their computer 12. Every design has a life, and there are some fools in our
B. Sending someone a text message looks that like a eyes because it gives a feeling of its content richness.
notification that the person has won a contest Which element of design does the statement refer to?
C. Sending someone an email that contains a malicious
link that disguised to look like an email from someone A. Emphasis C. texture
reliable B. Shape D. unity
D. Creating a fake website that looks nearly identical to a
real website in order to trick users into entering their 13. Lexter checks the spelling and grammar of the website’s
login information content. What checklist of evaluating websites does Lexter
perform?
4. What does the Timeline Infographic contain?
A. Accuracy C. objectivity
A. Series of activities B. Coverage D. purpose
B. The records of the past
C. Chronological order of the event 14. “Does the information try to sway the audience?” is a
D. The records of our entire life’s journey question that is fitted to what checklist in evaluating
websites?
5. If Cheat Sheet infographics is for quick reference, flowchart
infographic is for what? A. Accuracy C. objectivity
A. for answering queries B. Coverage D. purpose
B. for comparing two things
C. for outlining events in an order 15. How to check if the website is up to date or outdated?
D. for the information to spread in social media
A. Coverage C. Objectivity
6. EJ wanted to shout over the internet because of some B. Currency D. Accuracy
reasons, how will he express it?
A. Unfriend all his friends list 16. Gracethea created a vlog of his favorite place with his
B. Scream at his computer monitor friend. Which online platform must she publish the output
C. Write his message in all uppercase on?
D. Put many exclamation points after every sentence
A. blogs C. social News
B. bookmarking site D. YouTube A. Cyberstalking C. scamming
B. Spoofing D. pharming
17. Why does Web 1.0 is considered a crawl web page?
Because it is,
A. dynamic C. semantic
B. numeric D. stationary
22. Alyssa records the keystroke of Axel and steals her
18. Alliah wrote a series of poems about her life’s journey accounts password. What harmful online program does
online. Which online platforms must she publish on her Alyssa committed?
work? A. Adware C. worms and virus
B. Spyware D. ransomware
A. Blogs C. social News
B. bookmarking sites D. YouTube 23. If harvesting is pharming, fooling is scamming, the pop-up
is what?
19. If Facebook is to socialize, YouTube is a video hosting, the A. Adware C. worms and virus
GPS is to what? B. Spyware D. ransomware
A. cloud Computing C. mapping
B. file Management D. social media 24. What type of malicious program is designed to replicate
itself and transfer from one computer to another either
20. What type of online threat happens when an attacker uses through the internet or local networks or data storage like
electronic devices to do unwanted surveillance against its flash drives and CDs?
victim?
A. Adware C. worms and virus
A. Cyberbullying C. spamming B. Spyware D. ransomware
B. Phishing D. cyberstalking
25. In evaluating the websites, which of these are persons or
21. Janica impersonates East-West bank to gather customers’ organizations that creates the page?
personal or business information. What type of online A. Authority C. currency
threat does Janica commit? B. Coverage D. purpose

TEST II – Matching type


Directions: Match Column A with Column B. Write the letter of the correct answer in Column C

Column A Column B Column C

26. A malicious software A. Virus

27. The information superhighways B. Adware

28. Design to send you advertisement C. Cyberbullying

29. Unwanted email mostly from bots D. Cyberstalking

30. Disguised as a useful program but is not E. Internet

31. Runs in the background and monitors what you are doing F. Internet Scam

32. Replicates and can transfer from one computer to another G. Malware
33. Directs an internet user to a fake website instead of a legitimate one. H. Netiquette
34. It refers to the act of tormenting, harassing, or embarrassing another person using
I. Online Safety
the internet.
35. It refers to the use of the internet or other electronic device to harass or stalk
J. Online Security
individuals or organizations.
36. It refers to someone using internet services or software to defraud or take
K. Online Treat
advantage of victims, typically for financial gain.
37. an email is sent from an internet criminal disguised as an email from a legitimate,
L. Pharming
trustworthy source.
38. It is a form of malware that locks you out of your device and/or encrypts your files,
M. Phishing
then forces you to pay a ransom to get them back.
39. deemed any malicious act that attempts to gain access to a computer network
N. Ransomware
without authorization or permission from the owners.
40. Someone or something pretends to be something else to gain our confidence, get
O. Spam
access to our systems, steal data, steal money, or spread malware.

P. Spoofing
Q. Spyware

R. Trojan

You might also like