You are on page 1of 1

IN EMPOWERMENT TECHNOLOGY Grade 11

Unit Test

Name:_____________________________________ Grade & Section:___________ Score:__________

I. Identification: Choose your Answer inside the box below

____________________________1. This is done by sending you an email that will direct the user to visit a website and be
asked to update his/her username, password, credit card, or personal information.
____________________________2. A malicious program that transfer from one computer to another by any type of
means. Often, it uses a computer network to spread itself. For example, the
ILOVEYOU worm (Love bug Worm)
____________________________3. A malicious program designed to replicate itself and transfer from one computer to
another either through the internet and local networks or data storage like flash drives
and CD’s.
____________________________4. A malicious program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.
____________________________5. A program that runs in the background without you knowing it.
____________________________6. A program designed to send you advertisements, mostly as pop-ups
____________________________7. It is a worldwide system of computer network in which users at any one computer can
get information from any other computer.
____________________________8. A type of social media which sites allow you to upload and share media content like
image, music and video.
____________________________9. These are sites that’s focus on short updates from user.
____________________________10. Online versions of information systems, which is “the process of and tools for storing,
managing, using, and gathering of data and communications in an organization.
____________________________11. These are computer-mediated tools that allow people or companies to create, share, or
exchange information, career interests, ideas, and pictures/videos in virtual
communities and networks.
____________________________12. A web version that used semantic web.
____________________________13. A web design version that based on “static web”.
____________________________14. . it is unauthorized accessing of data from a computer network. Mostly, hackers attack
commercial and government sites to cause an alarm or to threat someone.
____________________________15. it is an illegal act of gambling on any sports event that happened over the Internet.
____________________________16. an anonymous criminal who harass, abuse, threat, or annoy other people. One example
of this is cyberbullying or the repeated harassment that usually happens among the
youth, and from the past years, becomes the main cause of suicide cases.
____________________________17. These are printable objects or materials that can be integrated in the document to
enhance the appearance or to allow anyone to have some tools to use for composing
and representing ideas of messages.
____________________________18. What image compression/file type is capable of displaying simple animation?
____________________________19. A “coming together of two or more disparate disciplines or technologies”.
____________________________20. An umbrella term that includes any communication device or application
____________________________21. A media devices such as mobile phones and PDA’s were the primary source of
portable media from which we could obtain information and communicate with one
another.
____________________________22. TikTok is a social media application that can be classified as:
____________________________23. It is an illegal act engage in any sexual activities.
____________________________24. it is an unauthorized use or stealing of intellectual property, such as movies and
music, for profitable benefit. Sometimes, students violate it through plagiarism.
____________________________25. Based on Republic Act no 9775 or known as Anti- Child Pornography Act of
2009, it is an act of real or simulated explicit sexual activities that involves any
child aged 18 and below and it is penalized depending on the offender.

Hacking Social Media Web 3.0 Micro blogging Web 1.0


Electronic Harassment Folksonomy Blogs and Forums Media Sharing
Non-Delivery of merchandise Internet Adware Phishing Internet
Sport Betting Spyware Trojan Worm Virus ICT

Online System Shapes jpg Convergent Technologies

Mobile Media Prostitution Copyright Infringement Child Pornography

You might also like