You are on page 1of 1

Empowerment Technologies Quiz No.

2
Name: ___________________________________________________ Score: ________________
Section: __________________________________________________ Date: __________________
Part 1 (Rules of Netiquette)
Write TRUE if you agree with the statement and FALSE if you disagree on the blank before each number.
_____1. My computer has an antivirus so it is okay to open most email attachments like e-cards and video files.
_____2. Your friend told you that his college application was rejected due to the fact that you posted a video of
him doing crazy stuff at a party. You posted the video several years ago but later took it down to protect
your friend’s reputation. Can your friend be right that the college found the video?
_____3. You and your best friend play a lot of video games. One time, she asks you for your password so she
can help you level up and get in-game money. She promises to keep your password a secret. Is it okay
to give away your password?
_____4. You received an email stating that your mother’s bank account is going to be forfeited if you do not
respond to the email. Is it safe to reply?
_____5. You forgot that your essay for English is due tomorrow. While doing your research, you found a
website offering Free essays. Is it okay to use the essays from this free essay website?
_____6. A virus is a malware that multiplies and infects other computers through flash drives.
_____7. Keyloggers are software that show pop-up ads even if you are not using your browser.
_____8. Search engines scan websites for search results even if you have set your post to “private.”
_____9. There is a danger in posting information about a future vacation.
_____10. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But
having it in your profile makes you vulnerable to identity theft.

Part 2 (Internet Threats)


Match column A with column B. Write the letter of the correct answer on the space before each number.
A B.
_____1. Virus a. designed to send you advertisements
_____2. Rogue b. sends official-looking email and is designed to steal sensitive personal
information
_____3. Keylogger c. a provision that allows you to use copyright work without consent with certain
limitations
_____4. Adware d. a browser feature that is synonymous to “private” browsing
_____5. Spam e. replicates and can transfer from one computer to another
_____6. Phishing f. exploits the DNS system
_____7. Fair use g. states that anyone who uses your work without your permission is punishable
by law
_____8. Spyware h. runs in the background and monitors what you are doing
_____9. Private i. unwanted email mostly from bots
_____10. Malware j. disguised as useful program but it is not
_____11. Incognito k. the information superhighway=
_____12. Internet l. tricks the user into posing that it is a security software
_____13. Trojan m. a malicious software
_____14. Copyright n. an option to hide a post so that search engines could not scan it
_____15. Pharming o. used to record the keystrokes done by the user

Part 3 (Contextualized Online Search and Research Skills)


Write TRUE if you agree with the statement and FALSE if you disagree on the blank before each number.
_____1. Online is flexible in every subject or topic.
_____2. Research has the widest coverage about much information that circulates the web world.
_____3. Research skills is the process of interactively searching for and retrieving searching requested
information via computer from databases that are online.
_____4. Research is the easiest way to use when you do your assignment it can make your assignment done
easily.
_____5. Internet is the use of World Wide Web or internet for obtaining information.

You might also like