You are on page 1of 1

Republic of the Philippines Republic of the Philippines

Department of Education Department of Education


REGION III REGION III
SCHOOLS DIVISION OF TARLAC PROVINCE SCHOOLS DIVISION OF TARLAC PROVINCE
BENIGNO S. AQUINO NATIONAL HIGH SCHOOL BENIGNO S. AQUINO NATIONAL HIGH SCHOOL

Read each item carefully. Read each item carefully.


Remember: ERASURE MEANS WRONG. Remember: ERASURE MEANS WRONG.

I. ENUMERATION I. ENUMERATION

1-4: What are the trends in ICT? 1-4: What are the trends in ICT?
6-10: What are the types of Social Media? 6-10: What are the types of Social Media?
11-14: What are the risk in the Internet? 11-14: What are the risk in the Internet?
15-19: What are threats in the Internet? 15-19: What are threats in the Internet?
20-28: What are the types of Malicious Software? 20-28: What are the types of Malicious Software?
29-30: Give me two an example of Microblogging. 29-30: Give me two an example of Microblogging.

II. IDENTIFICATION II. IDENTIFICATION

1. This is an application and website where user can communicate, create, and share content, and participate in online 1. This is an application and website where user can communicate, create, and share content, and participate in
communities. online communities.
2. This is a platform that assist people with disability. It will guide the individual like a blind person by using an audio 2. This is a platform that assist people with disability. It will guide the individual like a blind person by using an audio
recording. recording.
3. This is a website that allows you to share and store internet bookmarks, articles, posts, blogs, images, and others. 3. This is a website that allows you to share and store internet bookmarks, articles, posts, blogs, images, and others.
4. This is a website that allows you to share and store multimedia files such as video, photos, and music. 4. This is a website that allows you to share and store multimedia files such as video, photos, and music.
5. This is a website that allows you to broadcast short message. 5. This is a website that allows you to broadcast short message.
6. This is the act of sending sexually explicit text messages, images, and videos. 6. This is the act of sending sexually explicit text messages, images, and videos.
7. This is happening when someone intentionally abused, harass, and mistreated by other person using electronic 7. This is happening when someone intentionally abused, harass, and mistreated by other person using electronic
communication. communication.
8. This is a criminal practice where electronic communication is used to stalk or harass individual or group. 8. This is a criminal practice where electronic communication is used to stalk or harass individual or group.
9. This is a cyberattack method using deceptive emails and websites to acquire sensitive personal information. 9. This is a cyberattack method using deceptive emails and websites to acquire sensitive personal information.
10. This is a law that deals with all forms of cybercrime. 10. This is a law that deals with all forms of cybercrime.
11. This is software tools used by hackers to gain control over a computer on a network without being exposed. 11. This is software tools used by hackers to gain control over a computer on a network without being exposed.
12. This is Also known as, junk email or unwanted email send by advertiser or bot. It can be used to send malware. 12. This is Also known as, junk email or unwanted email send by advertiser or bot. It can be used to send malware.
13. This is a malicious program that replicate itself by copying itself to another program. 13. This is a malicious program that replicate itself by copying itself to another program.
14. This is a malicious program that copy’s itself and spreads to other computers. 14. This is a malicious program that copy’s itself and spreads to other computers.
15. This is an unwanted advertisement that will pop-up several times on victim’s computer. 15. This is an unwanted advertisement that will pop-up several times on victim’s computer.

III. TRUE or FALSE III. TRUE or FALSE

1. Do not share your password with anyone. 11. Do not share your password with anyone.
2. Just add friends if you want. 12. Just add friends if you want.
3. Do not visit untrusted websites. 13. Do not visit untrusted websites.
4. Add a password to your WIFI at home to make it public. 14. Add a password to your WIFI at home to make it public.
5. Uninstall and update the antivirus on your computer. 15. Uninstall and update the antivirus on your computer.
6. Do not give your personal information to anyone 16. Do not give your personal information to anyone
7. Think before you click. 17. Think before you click.
8. Never post about your future vacation. 18. Never post about your future vacation.
9. Malware means Malicious Software. 19. Malware means Malicious Software.
10. Talk to the strangers. 20. Talk to the strangers.

IV. ESSAY IV. ESSAY

(5points) Do you understand the lesson? Are you satisfied in the lesson? If YES, elaborate it. If NO elaborate too. (5points) Do you understand the lesson? Are you satisfied in the lesson? If YES, elaborate it. If NO elaborate too.

You might also like