You are on page 1of 3

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region V-Bicol
Schools Division Office of Tabaco City
SAN ANTONIO NATIONAL HIGH SCHOOL

MIDTERM EXAMINATION
EMPOWERMENT TECHNOLOGIES
FIRST SEM. S.Y. 2023-2024

Name:_______________________________________________ Date:_____________ Score:__________

Grade and Section:______________________________

I. Multiple Choice: Write the letters that correspond to your answer. All answers should be CAPITALIZE.

_____1. A generic term used to refer to a group of software or hardware devices by which people with
disabilities can access computers.
A. Collaborative platforms B. ICT C. Assistive Media D. Mobile Media
_____2. A category of business software that adds broad social networking capabilities to work processes.
A. Collaborative platforms B. Convergent Technologies C. Assistive Media D. Mobile Media
_____3. A “coming together of two or more disparate disciplines or technologies”.
A. Collaborative platforms B. ICT C. Convergent Technologies D. Mobile Media
_____4. An umbrella term that includes any communication device or application
A. Collaborative platforms B. ICT C. Convergent Technologies D. Mobile Media
_____5. A media devices such as mobile phones and PDA’s were the primary source of portable media from
which we could obtain information and communicate with one another.
A. Collaborative platforms B. ICT C. Convergent Technologies D. Mobile Media
_____6. Online versions of information systems, which is “the process of and tools for storing, managing,
using, and gathering of data and communications in an organization.
A. Mobile Media B. Web 1.0 C. Online systems D. Social Media
_____7. Are computer-mediated tools that allow people or companies to create, share, or exchange
information, career interests, ideas, and pictures/videos in virtual communities and networks.
A. Mobile Media B. Web 1.0 C. Online systems D. Social Media
_____8. Describes World Wide Web sites that emphasize user-generated content, usability, and
interoperability. Known as “dynamic web”.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
_____9. A web version that used semantic web.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
_____10. A web design version that based on “static web”.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
_____11. This is done by sending you an email that will direct the user to visit a website and be asked to
update his/her username, password, credit card, or personal information.
A. Spam B. Phishing C. Virus D. Malware
_____12. A malicious program that transfer from one computer to another by any type of means. Often, it uses
a computer network to spread itself. For example, the ILOVEYOU worm (Love bug Worm)
A. Virus B. Adware C. Trojan D. Worm
_____13. A malicious program designed to replicate itself and transfer from one computer to another either
through the internet and local networks or data storage like flash drives and CD’s.
A. Worm B. Trojan C. Virus D. Adware
_____14. A malicious program that is disguised as a useful program but once downloaded or installed, leaves
your PC unprotected and allows hackers to get your information.
A. Worm B. Trojan C. Virus D. Adware
_____15. A program that runs in the background without you knowing it.
A. Spam B. Trojan C. Spyware D. Phishing
_____16. A program designed to send you advertisements, mostly as pop-ups
A. Virus B. Adware C. Trojan D. Worm
_____17. Unwanted email mostly from bots or advertisers. It can be used to send malware.
A. Spam B. Trojan C. Spyware D. Phishing
_____18. Stands for malicious software.
A. Spam B. Phishing C. Virus D. Malware
_____19. An example of social media platform.
A. Pay maya B. Gcash C. twitter D. SMS
_____20. How many online platforms do we have in Empowerment Technologies?
A. 9 B. 10 C. 5 D. 2
_____21. This is an advertisement platform
A. Google Ads B. SMS C. facebook D. instagram
_____22. This is a business software platform ideal for business-oriented persons.
A. Assistive Media B. Collaborative Platform C. ICT D. Social Media
_____23. ______ is an example of convergent technologies.
A. Scanning technologies B. E-mail C. Blog D.Lazada
_____24. These are online versions of information system for sharing, managing, gathering of data and
communications.
A. Online Systems B. Mobile Media C. ICT D. Convergent Technologies
_____25. These are digital form of communication device or application to help people gather information and
easily communicate using different types of technologies
A. Online Systems B. Mobile Media C. ICT D. Convergent Technologies
_____26. An act performed by a knowledgeable computer user, sometimes referred to as hacker that illegally
browses or steal someone's information.
A. Online Threats B. Online Netiquette C. Online Safety D. Online Ethics
_____27. A malicious website that resembles a legitimate website, use to gather usernames and passwords.
A. Pharming B. Phishing C. Internet Scam D. Internet Bots
_____28. This functions by spying on user activity without their knowledge.
A. Adware B. Spyware C. Internet Scam D. Internet Bots
_____29. It is a type of malware that automatically delivers advertisements.
A. Adware B. Spyware C. Internet Scam D. Internet Bots
_____30. A malicious website that resembles a legitimate website, use to gather usernames and passwords.
A. Pharming B. Phishing C. Internet Scam D. Internet Bots
_____31. The purpose of this is to cheat the target of their personal property directly rather than private
information through fabricated promises, confidence tricks and many more.
A. Pharming B. Phishing C. Internet Scam D. Internet Bots
_____32. A network of zombie computers that have been taken over by a robot or bot that performs large-
scale malicious acts for the creator of the botnet.
A. Pharming B. Phishing C. Internet Scam D. Internet Bots
_____33. __________ is used to avoid internet scam threat of security threat.
A. Captcha Technology B. File name C. Form document D. Data File
_____34. It is a malicious software disguised as real software often secretly installed, intended to transfer and
gather private information, like passwords, without the user's permission.
A. Malware B. Phishing C. Internet Scam D. Internet Bots
_____35. It is a program designed to replicate by attaching itself into other computer programs, data files, or
the boot sector of the hard drive.
A. Virus B. Phishing C. Internet Scam D. Internet Bots
_____36. This can be injected into a network by any types of means, like USB stick or an email attachment.
A. Virus B. Worm C. Internet Scam D. Internet Bots
_____37. It is a type of malware that disguises itself as a normal file or program to trick users into downloading
and installing malware.
A. Virus B. Trojan Horse C. Internet Scam D. Internet Bots
_____38. This is created by a Filipino student: Onel De Guzman & Reonel Ramones.
A. Love bug B. Trojan Horse C. Internet Scam D. Internet Bots
_____39. A malfunction on a computer system through its runtime.
A. Love bug B. Trojan Horse C. Computer Bug D. Internet Bots
_____40. Originally used harass and stalk individual, group or organizations thru electronic devices.
A. Cyber Stalking B. Trojan Horse C. Cyber Bullying D. Internet Bots

“Tell me and I forget.


Teach me and I remember.
Involve me and I learn.”
~Benjamin Franklin

Prepared by:

ERICA L. CANON

Teacher /Adviser
ANSWER KEY:
1. C
2. A
3. C
4. B
5. D
6. C
7. D
8. A
9. C
10. B
11. B
12. D
13. C
14. B
15. C
16. B
17. A
18. D
19. B
20. D
21. A
22. C
23. D
24. C
25. B
26. A
27. B
28. B
29. D
30. A
31. C
32. B
33. A
34. B
35. A
36. D
37. A
38. C
39. D
40. B

You might also like