You are on page 1of 50

Empowerment Technologies

(Quiz 1)
Mr. EJPC Binala
1. ________ digital service that uses the Internet to
facilitate interactions between two or more separate
but interdependent users.

a)Online System
b)Operating System
c)Software Tools
d)Online Platforms
2.It is the process of interactively searching given
words/terms to gather specific information.

a)Online Mission
b)Online Search
c)Online Expedition
d)Online Exploration
3. These are Software Systems designed to search
information of the World Wide Web.

a)Search Bar
b)Search Tool
c)Search Engine
d)Search Application
4. What is Netiquette?

a)Using a net to catch fish.


b)Being mean to other people on Facebook.
c)Presenting proper manners at the dinner table.
d)Showing manners and etiquette on the Internet.
5. Which of the following can be considered as fake,
untrue, and merely opinion-based?

a)Dr. Jose Rizal was the Philippines’ National Hero.


b)Dr. Jose Rizal studied at Ateneo De Manila and
University of the Philippines.
c)Dr. Jose Rizal wrote a third book after Noli Me
Tangere and El Filibusterismo.
d)Dr. Jose Rizal was born on the 30th day of December.
6. What type of social media website is Pinterest?

a)Blogs and Forums


b)Bookmarking site
c)Media Sharing
d)Microblogging
7. What is the online platform where you can store
your files online?

a)Google Drive
b)Photoshop
c)PowerPoint
d)YouTube
8. Which is specially designed for businesses and
professionals?

a)Google drive
b)Instagram
c)LinkedIn
d)Photoshop
9. Which of the following is not a trend in ICT?

a)Convergence
b)Social Media
c)Microblogging
d)None of the above
10. Speech-to-text and text-to-speech are examples of
______.

a)Assistive Media
b)Convergence
c)Media Sharing
d) Augmented Media
11. Android, Windows Mobile, and iOS are all examples
of _______.

a)Software
b)Operating System
c)Media Platform
d)Devices
12. Which among the following is not a kind of social
media?

a)Media sharing
b)Social news
c)Microblogging
d)Social linking
13. While checking on his desktop, Mark noticed that
his recent downloaded application had its exact carbon
copy.

a)Spam
b)Worm
c)Virus
d)Phishing
14. Aljon was confounded when it has come to his
knowledge that all his constructed sample test for
board examination became available online.

a)Spyware
b)Malware
c)Trojan
d)Worm
15. Which of the following information can be
considered as a true one? The 15th president of the
Republic of the Philippines was ___.

a)Fidel Ramos
b)Gloria Arroyo
c)Joseph Estrada
d)Benigno Aquino III
16. Which of the following is not a malware?

a)Infected program designed to send users advertisements.


b)A malicious program that camouflages as authenticated
software.
c) An unwanted message from system generated programs.
d)A device infected by suspicious application that can be
transferred to another device.
17. Spamming is very poor netiquette and means
_______________.

a)Spilling the juice of meat-byproducts into your keyboard.


b)Sending in lines of nonsensical garbage in a chat
conversation.
c) Posting or emailing unsolicited advertising messages to a
wide audience.
d)Posting a message that contains graphic descriptions of
something gross.
18. What do you think is the main reason why we
online navigate?

a)To be more technology-based.


b)To be more comfortable searching.
c)To be more precise on the information.
d)To be more dependent on the internet.
19. What should you do if you receive a text or email
from someone you don't know?

a)Call the police.


b)Delete it without opening it.
c)Open it immediately and reply.
d)Leave it in your inbox until you figure out who it is.
20. What should you do if you feel you are being cyber-
bullied?

a)File a report to authorities.


b)Tell no one, it's embarrassing.
c)Tell a trusted adult like a parent or teacher.
d)Just delete anything referring to you on the Internet.
21. It is acceptable to forward or post an email
message that you received if_____________.

a)The message is typed in all capital letters.


b)It does not contain any copyrighted material.
c)The author of the message has marked it as
confidential.
d)The author of the message hasn’t given you
permission to forward or post it.
22. Which of the following cannot be considered as a guide
in identifying the good source from the satirical source of
information?

a)Check if the site is alleged as satirical.


b)Ask someone knowledgeable and get to know the site.
c)Always be cautious and read the contents of the source.
d)Click any sites that appeared as a source of information.
23. BPO - Business ______ ________

a)Program, Outsource
b)Process, Outsourcing
c)Platform, Outlet
d)Process, Outside
24. HTTPS - Hypertext _____ ______ Secure

a)Transfer, Process
b)Transition, Program
c)Transfer, Protocol
d)Transfer, Process
1. ________ digital service that uses the Internet to
facilitate interactions between two or more separate
but interdependent users.

a)Online System
b)Operating System
c)Software Tools
d)Online Platforms
2.It is the process of interactively searching given
words/terms to gather specific information.

a)Online Mission
b)Online Search
c)Online Expedition
d)Online Exploration
3. These are Software Systems designed to search
information of the World Wide Web.

a)Search Bar
b)Search Tool
c)Search Engine
d)Search Application
4. What is Netiquette?

a)Using a net to catch fish.


b)Being mean to other people on Facebook.
c)Presenting proper manners at the dinner table.
d)Showing manners and etiquette on the Internet.
5. Which of the following can be considered as fake,
untrue, and merely opinion-based?

a)Dr. Jose Rizal was the Philippines’ National Hero.


b)Dr. Jose Rizal studied at Ateneo De Manila and
University of the Philippines.
c)Dr. Jose Rizal wrote a third book after Noli Me
Tangere and El Filibusterismo.
d)Dr. Jose Rizal was born on the 30th day of December.
6. What type of social media website is Pinterest?

a)Blogs and Forums


b)Bookmarking site
c)Media Sharing
d)Microblogging
7. What is the online platform where you can store
your files online?

a)Google Drive
b)Photoshop
c)PowerPoint
d)YouTube
8. Which is specially designed for businesses and
professionals?

a)Google drive
b)Instagram
c)LinkedIn
d)Photoshop
9. Which of the following is not a trend in ICT?

a)Convergence
b)Social Media
c)Microblogging
d)None of the above
10. Speech-to-text and text-to-speech are examples of
______.

a)Assistive Media
b)Convergence
c)Media Sharing
d) Augmented Media
11. Android, Windows Mobile, and iOS are all examples
of _______.

a)Software
b)Operating System
c)Media Platform
d)Devices
12. Which among the following is not a kind of social
media?

a)Media sharing
b)Social news
c)Microblogging
d)Social linking
13. While checking on his desktop, Mark noticed that
his recent downloaded application had its exact carbon
copy.

a)Spam
b)Worm
c)Virus
d)Phishing
14. Aljon was confounded when it has come to his
knowledge that all his constructed sample test for
board examination became available online.

a)Spyware
b)Malware
c)Trojan
d)Worm
15. Which of the following information can be
considered as a true one? The 15th president of the
Republic of the Philippines was ___.

a)Fidel Ramos
b)Gloria Arroyo
c)Joseph Estrada
d)Benigno Aquino III
16. Which of the following is not a malware?

a)Infected program designed to send users advertisements.


b)A malicious program that camouflages as authenticated
software.
c) An unwanted message from system generated programs.
d)A device infected by suspicious application that can be
transferred to another device.
17. Spamming is very poor netiquette and means
_______________.

a)Spilling the juice of meat-byproducts into your keyboard.


b)Sending in lines of nonsensical garbage in a chat
conversation.
c) Posting or emailing unsolicited advertising messages to a
wide audience.
d)Posting a message that contains graphic descriptions of
something gross.
18. What do you think is the main reason why we
online navigate?

a)To be more technology-based.


b)To be more comfortable searching.
c)To be more precise on the information.
d)To be more dependent on the internet.
19. What should you do if you receive a text or email
from someone you don't know?

a)Call the police.


b)Delete it without opening it.
c)Open it immediately and reply.
d)Leave it in your inbox until you figure out who it is.
20. What should you do if you feel you are being cyber-
bullied?

a)File a report to authorities.


b)Tell no one, it's embarrassing.
c)Tell a trusted adult like a parent or teacher.
d)Just delete anything referring to you on the Internet.
21. It is acceptable to forward or post an email
message that you received if_____________.

a)The message is typed in all capital letters.


b)It does not contain any copyrighted material.
c)The author of the message has marked it as
confidential.
d)The author of the message hasn’t given you
permission to forward or post it.
22. Which of the following cannot be considered as a guide
in identifying the good source from the satirical source of
information?

a)Check if the site is alleged as satirical.


b)Ask someone knowledgeable and get to know the site.
c)Always be cautious and read the contents of the source.
d)Click any sites that appeared as a source of information.
23. BPO - Business ______ ________

a)Program, Outsource
b)Process, Outsourcing
c)Platform, Outlet
d)Process, Outside
24. HTTPS - Hypertext _____ ______ Secure

a)Transfer, Process
b)Transition, Program
c)Transfer, Protocol
d)Transfer, Process

You might also like