You are on page 1of 6

Republic of the Philippines

Department of Education
REGION III – CENTRAL LUZON
SCHOOLS DIVISION OFFICE OF BATAAN
JOSE C. PAYUMO JR. MEMORIAL HIGH SCHOOL
NAPARING, DINALUPIHAN, BATAAN

FIRST QUARTER TEST in EMPOWERMENT TECHNOLOGY


GRADE 11 - STEM/SMAW
Name: ____________________________________ Score: __________________
Grade & Section: ___________________________ Date: ___________________

Multiple Choice. Read and understand each statement carefully. Avoid unnecessary erasures. Use black or blue
pen only. Choose the letter of the best answer and write it on your answer sheet.

1. This media is designed to help people who have visual and reading impairment.
a. Assistive Media c. Bookmark
b. Social Media d. Accessibility
2. Modern technology nowadays work on a similar goal, such as creating word document in personal computer can
also be created using smartphone. What trends in ICT does this innovation belong?
a. Social Media c. Social News
b. Convergence d. Media Sharing
3. What specific type of social media allows you to connect with other people?
a. Microblogging c. Media Sharing
b. Social Networks d. Social News
4. What specific type of social media allows its users to post their original content on websites such as WordPress,
Blogger, and Tumblr?
a. Blogs and Forums c. Media Sharing
b. Social Networks d. Bookmarking Sites
5. It deals with the use of different communications technology to locate, save, send, and edit information.
a. Communication c. Information
b. Technology d. ICT
6. What type of online threat happens when an attacker uses electronic devices to do unwanted surveillance against its
victim?
a. Cyberbullying b. Spamming
c. Phishing d. Cyberstalking
7. What is Netiquette?
a. The proper use of manners and etiquette on the Internet.
b. Using a net to catch fish.
c. Being mean to other people on Facebook.
d. Using proper manners at the dinner table.
8. What is considered shouting over the Internet?
a. Screaming at your computer.
b. Writing in all CAPS.
c. Putting a lot of exclamation marks at the end of a sentence.
d. Not answering a friend request on Facebook.
9. What type of web provides a framework that allows data to be shared and reuse to deliver web content specifically
targeting the user?
a. Web 1.0 c. Web 2.0
b. Web 3.0 d. Website
10. Which of the following is an example of sites under web 2.0?
a. Facebook c. Wikipedia
b. YouTube d. All of the above
11. What type of web page is classified as flat or stationary?
a. Web 1.0 c. Internet
b. Web 2.0 d. Web 3.0
12. It is an internet threat that acquires sensitive personal information like passwords and credit card credentials.
a. Malware c. Phishing
b. Spam d. Virus
13. It refers to a set of rules for an acceptable online behaviour.
a. Ethics b. Good Moral
b. Nethics d. Netiquette
14. This is one form of internet advertising used by advertisers to get the attention of web users but sometimes has
obscene or offensive content.
a. Adverts c. Cards
b. Infographics d. Pop-ads
15. It is a software that can see all the things you are doing in your computer.
a. Attacker c. Hacker
b. Spyware d. Tracker
16. It is a deceitful practice of getting your personal information using email or text messages.
a. Blogging c. Flaming
b. Pharming d. Phishing
17. It is a small program or script that can negatively affect the health of your computer.
a. Malware c. Phisher
b. Spam d. Virus
18. Which of the following social media website is for social network?
a. Facebook c. Reddit
b. Twitter d. Youtube
19. Which of the following social media website is for microblogging?
a. Facebook c. Reddit
b. Twitter d. Youtube
20. Which of the following social media website is for social news.
a. Facebook c. Reddit
b. Twitter d. Youtube
21. Which OS is used for free by several mobile phone companies?
a. Android c. iOS
b. WebOS d. Symbian
22. Which of the following social media website is for blogs and forums?
a. Instagram c. Pinterest
b. Twitter d. Wordpress
23. How does a search engine find websites?
a. Accesses only site hosted by that company c. Looks up only safe verified sites
b. Looks through that companies index of website d. Looks through the entire web
24. In conducting an online research, which of the following should NOT be observed?
a. Give credit to the owner. c. Look for credible sources.
b. Stick to one source only. d. Narrow down the idea.
25. Which search strategy would you use to locate records containing the concept drugs but not the concept
Prescriptions?
a. drugs NOT prescription c. drugs AND prescriptions
b. drugs OR prescription d. I hate drugs
26. Which of the following URL suffixes is intended for commercial websites?
a. edu c. gov
b. com d. org
27. Which of the following is an example of sites under web 2.0?
a. Facebook c. Wikipedia
b. YouTube d. All of the above

28. What type of web page is classified as flat or stationary?


a. Web 1.0 c. Internet
b. Web 2.0 d. Web 3.0
29. Watson is creating a cover video of his favorite song. Which online platform must he publish this?
a. Social News c. Bookmarking Site
b. YouTube d. Blogs
30. Distinguish the upside of Digital media for relationships.
a. People can say Nasty things when they are anonymous.
b. People are connected to a larger community than the people they know offline.
c. Sometimes it is easier to misinterpret what people mean online.
d. Damaging information can spread quickly online.
31. What do you think the problem cause by digital media?
a. Many tasks can be done faster with technology.
b. We produce innovative technologies for medicine and other important fields.
c. Many tasks can be done faster with technology.
d. People can become lazy and depend on technology instead of using their brains.
32. You received a comment from an unknown friend in one of your posts in Social Media saying “YOU IDIOT!”.
What do you call this kind of act?
a. Acting c. Bullying
b. Blogging d. Flaming
33. Your family is going out on a vacation. What should you do?
a. Post pictures when you return home.
b. Post the dates you will be gone online.
c. Post updates of where you are currently checking in hotels or places.
d. Tell no one. Vacations are for getting away.
34. Do you have the same passwords for all your accounts?
a. Yes. That is how I remember all my passwords.
b. I have different passwords for all different accounts.
c. I keep it simple. I don’t have any passwords.
d. I have two similar passwords that I alternately use for all my accounts.
35. Your parents bought you your first cellphone. How will you share your cellphone number?
a. Do not share your cellphone number to anyone.
b. Post your cellphone number in your social media account.
c. Share your cellphone number only in person.
d. Post your cellphone number in your group chat.
36. Your social media friends list should only be composed of .
a. Your favorite brands. c. Anyone who sends you a friend request
b. Family and friends d. Foreigners
37. When online friends say they want to meet you in person, you should___________.
a. Go ahead, make plans and meet them wherever and whenever they want.
b. Inform your parents and make sure that you meet where there are a lot of people around.
c. Never meet anyone in person that you met online, it’s just not safe.
d. Go and meet them without telling to your parents.
38. When you get an email or instant message from people you don't know, you should:__________.
a. Ignore it and put it in your trash folder.
b. Respond with a polite how-do-you-do.
c. Forward the message to your best friends.
d. Reply and get angry.
39. When you receive an email with an attachment that you were NOT expecting from a friend, you
should:___________.
a. Open the attachment without thinking about it.
b. Ask a friend if you think it's okay to open the attachment.
c. Ask your parents if it is okay to open the attachment.
d. Ignore and Don’t open the attachment.

For #’s 40-41, use the choices inside the box.


a. If only the FIRST statement is TRUE. c. If BOTH statements
are TRUE.
b. If only the SECOND statement is TRUE. d. If BOTH statements are
40. Social networks are sites that allow you to connect with other people having the same interests. It allows you to
share your own news and other news from other sources.
41. The Philippines is considered as the “ICT Hub in Asia.” The ICT Industry shares 19.3% of the total employment
population in the Philippines coming from the government agencies.
42. Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the
system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a
victim of ___________.
a. Blogging c. Flaming
b. Pharming d. Phishing
43. How would you distinguish the difference between phishing and pharming?
a. Phishing acquires sensitive personal information like passwords while pharming is a more complicated way
of phishing where it exploits the (Domain Name Service) system
b. Pharming acquires sensitive personal information like passwords while phishing is a more complicated way
of phishing where it exploits the (Domain Name Service) system
c. Phishing is telling the user how the website will handle its data while pharming a program that runs in the
background without you knowing it.
d. Phishing is a malicious program that is disguised as a useful program but once downloaded or installed,
leaves your PC unprotected and allows hacker to get your information while pharming is a malicious program
designed to replicate itself and transfer from one file folder to another and also transfer to other computers
44. What actions would you take to perform if someone uses your work without your consent?
a. I’ll just ignored it. c. I’ll talk to him and ask why he used my work.
b. I’ll file a case of plagiarism against him d. I’ll let him pay my work
45. How would you determine if the virus entered to your computer is a Trojan virus?
a.if disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows
hacker to get your information
b. It is has the ability to monitor what you are currently doing and typing through key logging.
c. if it replicate itself and transfer from one file folder to another and also transfer to other computers.
d. All of the above
46. Kiray is a blind since birth but she can still use an Internet. What is the platform can assist a person with
disability like Kiray?
a. Assistive Media c. Social Media
b. Convergence d. Semantic Web
47. What should you do if you feel you are being cyber-bullied?
a. Call the police c. Tell no one, it's embarrassing
b. Tell a trusted adult like a parent or teacher d. Just delete anything referring to you on the Internet
48. What should you never do if you get an embarrassing picture from someone?
a. Talk to the person again c. Send it on to other friends
b. Tell your parents or a teacher d. Discourage the person from sending pictures like that
49. What should you avoid doing in a chat room?
a. Posting your address c. Posting your phone number
b. Revealing financial information d. All of the above
50. Before posting to a discussion group you should _____________________
a. Read the FAQ
b. Find the Frequently Asked Questions (FAQ) document
c. Read some of the existing posts to get an idea of the tone and character of the group
d. All of the above.

“Don’t Stop don’t stop until you are Proud”

Key to Correction of First Quarter Test in EMPOWERMENT TECHOLOGY

1. C

2. A

3. B

4. A
5. D

6. D

7. A

8. B

9. B

10. C

11. A

12. C

13. D

14. D

15. B

16. D

17. A

18. A

19. B

20. C

21. A

22. D

23. A

24. B

25. A

26. B

27. A

28. A

29. B

30. B

31. D

32. D

33. A/D

34. A

35. C

36. B

37. B/C
38. A/B

39. D

40. A

41. A

42. D

43. D

44. B

45. D

46. A

47. B

48. B

49. D

50. A

PREPARED BY: CHECKED BY:


FLORA DANICA D.FAJILAN JAYCEE B. BARCELONA
Teacher I Master Teacher II

NOTED BY:

ROMA S. DUMANDAN
OIC Assistant School Principal II

You might also like