You are on page 1of 2

EDUC 204 – Group 2 Quiz c.

E-safety
d. Personal Mobile phones and devices
Members: Abat, Ron O’neal
Lagmay, Mary Christine 8. What is the main purpose of the Department
Pangan, Princess Apple of Information Communication Technology
(DICT) roadmap?
1. The following are some risks in the use of a. To regulate internet usage
ICT and e-networking, EXCEPT: b. To guide agencies in utilizing,
a. Downloading materials not relevant regulating, and enhancing ICT
to their studies c. To develop new ICT technologies
b. Exposure to inappropriate content d. To promote digital entertainment
including online pornography
c. Cyberbullying 9. Which of the following is NOT one of the
d. Prolonged exposure to online seven vital programs covered by the DICT
technologies roadmap?
a. ICT in Education Masterplan
2. The following are some risks in the use of b. Content and Application
ICT and e-networking, EXCEPT: Development
a. Leaving a mobile phone turned on c. PheDNET
during class period d. OSY
b. Addiction to gambling and gaming
c. Theft and fraud such as phishing 10. Which of the following is NOT a key focus
d. Privacy issues area mentioned under "Issues on ICT and
Internet Policy Regulations"?
3. Copying information into assignment and a. Freedom of expression
failing to acknowledge the source, and b. Privacy and security
downloading materials not relevant to their c. Environmental impact
studies are some minor misuse of ICT. d. Digital marketing strategies
a. First statement is true; second
statement is false 11. What is one of the concerns addressed
b. First statement is false; second under "Issues on ICT and Internet Policy
statement is true Regulations"?
c. Both statements are true a. Food safety regulations
d. Both statements are false b. E-Pollutants from E-Waste
c. Urban planning initiatives
4. Leaving a mobile phone turned it on during d. Fashion trends
class period, and unauthorized taking of
pictures with mobile phone or camera are 12. What is one of the challenges related to
some minor misuse of ICT. privacy and security in ICT?
a. First statement is true; second a. Cybernetic warfare
statement is false b. Online shopping discounts
b. First statement is false; second c. Social media influencers
statement is true d. Data breaches
c. Both statement is true
d. Both statement is false 13. What environmental concern is highlighted
in the provided information?
5. E- safety helps safeguard children in digital a. Airplane emissions
world. It do not emphasizes learning to b. Deforestation
understand new technologies in a positive c. E-Pollutants from E-Waste
way. d. Water pollution
a. First statement is true; second
statement is false 14. It refers to everything that makes it possible
b. First statement is fals; second for electronic and non-electronic devices to
statement is true communicate.
c. Both statements are true a. Information Technology
d. Both statements are false b. Telecommunication Technology
c. Networking technology
6. E-safety does not support young learners d. None of the above
and adults to develop safer online behavior.
It does not provide safety education about 15. It refers to the course of action undertaken
the risks and benefits of ICT. by government, stakeholders, organizations,
a. First statement is true; second and/or entities involving ICT to help guide
statement is false decisions and achieve outcomes.
b. First statement is false; second a. ICT Policy
statement is true b. Policy
c. Both statements are true c. Rules
d. Both statements are false d. Rules and regulations

7. Users are not permitted to disclose their 16. It is the program of the World Bank that
password unless they get permission from attempts to document national educational
the owner or from the management. technology policies around the world.
a. Cameras a. Systems Assessment for Better
b. Password policy Education Results (SABER)
b. Systems Assessment for Better
Education Rules (SABER)
c. Systemic Assessment for Better
Education Results (SABER)
d. Systemic Assessment for Better
Education Rules (SABER)

17. The following are eight ICT policy themes


found in education around the world,
EXCEPT:
a. Vision and Mission
b. Teachers
c. Education Management Information
System (EMIS)
d. Learning resources

18. Setting up an educational technology room


requires the observance of several safety
rules. Schools must ensure that computers
have anti-glare screen protectors.
a. First statement is true; second
statement is false
b. First statement is false; second
statement is true
c. Both statements are true
d. Both statements are false

19. Computer rooms must have at least one fire


extinguisher. It is okay to overload the
electrical sockets and bring food and drinks.
a. First statement is true; second
statement is false
b. First statement is false; second
statement is true
c. Both statements are true
d. Both statements are false

20. What is the implication of ICT Policies to


teachers and teaching?
a. Teachers should be aware that the
use of technology may jeopardize
their privacy and security.
b. Technology should never replace
any human teacher.
c. Teachers should be mindful of the e-
waste that are being thrown away to
the land and to the atmosphere.
d. All of the above

You might also like