You are on page 1of 2

EXAMINATION

Living in the IT Era

I. Modified True or False:


Direction: Write TRUE if the statement is correct but if it’s false, change the underlined word or group of words to
make the whole statement true.
__TRUE __1. Tm Berners-Lee created the World Wide Web.
_Internet _2. World Wide Web is a global network that connects millions of computers around the world.
Dynamic_3. Web 2.0 introduced static web pages that allow users to interact with the web page.
Folksonomy_4. Rich user experience allows users to categorize and locate information.
__TRUE__5. Technological convergence is the synergy of technological advancements to work on similar goal or task.
__TRUE__6. Pinterest is a type of social media that allows user to upload photos, videos and audio that can be
accessed from anywhere in the world.
Microblogging_7. Blogging sites are sites that focus on short updates from the user.
IOS_ 8. Android is a mobile operating system for Apple devices.
__TRUE__ 9. Web 1.0 introduced static web pages that allow users to interact with the web page.
__TRUE__10. Information and Communication Technology (ICT) deals with the use of different communication
technology to locate, save, send and edit information.

II. IDENTIFICATION: Read the questions carefully. Write your answer before the number.

Malicious Software 1. Malware is a short term used for _________.


__Lockscreen_Ransomware __2. It displays an image that prevents you from accessing your computer.
_____Pharming __3. _______ is a common type of online fraud.
Internet Etiquette _4. Netiquette is a short term used for _______.
Spam _____5. The mass distribution of unsolicited messages, advertising or pornography to addresses which can
be easily found on the internet.
Spyware and Adware 6. ______ and ______ are often used by third parties to infiltrate your computer.
Trojan Horses __7. It is an executable file that will install itself and run automatically once it’s downloaded.
Viruses ____8. Malicious computer programs that are often sent as an email attachment or a download with the
intent of infecting your computer.
Spam ____9. It is one of the more common methods of both sending information out and collecting it from
unsuspecting people.
Netiquette _10. It is a set of rules for behaving properly online.
Ransomware __11. A type of malware that restricts access to your computer or your files and displays a message that
demands payment for the restriction to be removed.
Pharming ___ 12. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.
Worms ____13. _______ are common threat to computer and the internet as a whole.
Hacking ____ 14. Action taken by someone to gain unauthorized access to a computer.
Encryption Ransomware 15. It encrypts files on your system’s hard drive and sometimes on shared network, drives, USB
drives, and external hard drives and even some cloud storage drives preventing you from opening them.
Spyware and Adware 16. They often come in the form of a free download and are installed automatically with or without
your consent.
Trojan Horses __ 17. A malicious program that is disguised as or embedded within legitimate software.
Wi-Fi Eavesdropping 18. Virtual listening in on your information that’s shared over an unsecured or not encrypted
network.
Netiquette __ 19. It is the proper way to communicate in an online environment.
Spyware and Adware 20. Software that collects personal information about you without you knowing.
Social Media _ 21. It is a website, application or online channel that enables web users to create, co-create, discuss,
modify and exchange user-generated content.
Information and communication 22. It deals with the use of different communication technologies to send and edit
information.
_Online computer addiction_ 23. It is also known as Internet addiction.
Copyright __ 24. The exclusive legal right given to an originator or an assignee to print, publish, perform, film or
record literary, artistic or musical material and to authorize others to do the same.
-Child Pornography_ 25. It is a form of child sexual exploitation.
Netiquette ___26. The correction or acceptable way of communicating on the internet.
Republic Act No. 10175 27. Unauthorized acquisition use or misuse, transfer, possession, alteration or deletion of
identifying information belonging to another, whether natural or juridical.
Illegal downloading 28. Obtaining files that you do not have the right to use from the internet.
Cybersex ___ 29. Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious
exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
Online identity _30. This is the persona you create about yourself in cyberspace.
Offline computer addiction 31. Generally used when speaking about excessive gaming behavior, which can be practiced
both offline and online.
__Cyberbullying___ 32. The use of electronic communication to bully a person, typically by sending a message of an
intimidating or threatening nature.
__Copyright Infringement__ 33. It is the violation, piracy, or theft of a copyright holder’s exclusive rights through the
unauthorized use of a copyrighted material or work.
__ Cybercrime___ 34. It is a crime in which a computer is the object of the crime.
Cybercriminals__35. _________ may use computer technology to access personal information, business trade secrets
or use the internet for exploitive or malicious purposes.
_ Plagiarism__ 36. It is an act of using or closely imitating the language and thoughts of another author without
authorization.
Cybernetics (Cyber) 37. Relating to or characteristic of the culture of computers, information technology and virtual
reality.
_Cyber Defamation __ 38. It is an unprivileged false statement of fact which tends to harm the reputation of a person or
company.
_ Piracy __ 39. Practice of illegally copying and selling digital music, video, computer software, etc.
__Cybercrime Prevention Act of 2012 – Republic Act No. 10175__ 40. It is the law in the Philippines which aims to address
legal issues concerning online interactions and internet.

V. ENUMERATION

1-6 The Core Rules of Netiquette


1. Know where you are in cyberspace.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Respect other people’s time and bandwidth.
4. Respect other people’s privacy.
5. Don’t abuse your power.
6. Make yourself look good online.

7-15 Cybercrimes under R.A No. 10175


7. Cybersex
8. Child Pornography
9. Libel
10. Computer-related Fraud
11. Data Interference
12. Misuse of Devices
13. Illegal Access
14. Cyber Squatting
15. Computer-related Forgery

Yes, erasures are allowed. All of us commit mistakes.


KEEP GOING!!!

You might also like