You are on page 1of 4

11

Empowerment
Technology

SUMMATIVE TEST

Prepared by:

PETER PAUL A. DIAGBEL


Subject Teacher
SUMMATIVE TEST in Empowerment Technology
(Week 1 – Week 2)

Name: Year & Section: Date:

I. Matching Type

Directions: Match column A with the correct answer on column B. Write only the letter of your answer on the space
provided before each number.

Column A Column B
1. The Supreme Student Government of A. Folksonomy
KNCHS organized a successful unity B. Rich User Experience
run for a cost called KapatiRUN. C. User Participation
Everyone especially the official page D. Mass Participation
of KapatiRUN had included E. Software as a Service
#KapatiRUN2020 on their social media F. Technological Convergence
posts. They categorize the information G. Assistive Media
on their page by the use of tags. H. Social Networks
I. Bookmarking sites
2. Celine used her smartphone instead of
J. Media Sharing
using her laptop in doing her research.
K. Microblogging
3. Angelo created a website intended to
L. Blogs and Forums
help people with visual and reading
M. Social News
impairments.
4. Albert is fond of pinning things he finds
on the web using Pinterest.

5. Ana likes to post short updates on her


Twitter account.
6. Lucy uploads her pictures in Instagram
to update her followers of her daily
activities.

7. Alice uses Facebook to connect with her


friends.
8. Most Internet users subscribe to Netflix
for new movies.
9. Justine posted an article on his blog and
his followers commented on his post.

10. Aside from news article websites,


journalists post their news item on
platforms like Reddit.
II. True or False. Write T if the statement is correct, otherwise write F on the space provided before each number.

___________1. Web pages that are the same regardless of the user are referred to static.
___________2. Blogging sites are sites that focus on short updates.
___________3. Android is a mobile operating system for Apple devices.
___________4. Folksonomy deals with information tagging.
___________5. ICT deals with the use of different technologies to work on a similar goal or task.

III. Identification. Write SO if the social media website is a social network, BS for bookmarking site,
SN for social news, MS for media sharing, MI for microblogging, and BF for blogs and forums
on the space provided before each number.

______1. Facebook ______6. Google+


______2. Blogger ______7. Instagram
______3. Twitter ______8. Pinterest
______4. Reddit ______9. YouTube
______5. WordPress ______10. Flickr

IV. Identification: Identify the Internet threat described in each number.


1. Jonathan is having a problem because his files were

corrupted. He discovered that most of his folders were replicated.

2. Ken was asked to pay a certain amount of money for him


to retrieve his files. Ken might be a victim of .

3. Mari found a good application and she installed it on her

computer. But after the installation some of her files were deleted.

4. Jack is receiving several irrelevant messages every day


and his e-mail account has become almost unusable.

5. The network servers of KNCHS stopped to respond and

it was found out that much of the systems' memory was consumed by the malicious
software. What kind of malware is this?

6. Jewel is using a technique that tries to take information


from the user. She commonly takes things like credit cards, usernames, passwords,
and home addresses using a fake website. What type of threat is depicted in the
scenario?

7. This program can record all you enter on your keyboard.

8. Eli received an unwanted email that contains


advertisements. What type of internet threat is depicted in the scenario?

9. A kind of internet threat where the attacker uses a fake


website to get your sensitive information.

10. A program that runs in the background without you

knowing it. It has the ability to monitor what you are currently doing.

You might also like