Вы находитесь на странице: 1из 2

Republic of the Philippines

Department of Education
Regional Office No. VIII
Division of Samar
CALBIGA NATIONAL HIGH SCHOOL
Calbiga, Samar
Grade 11-12 ID # (344804)
Website: www.calbiganhsweb.wordpress.com
Email: principal.cnhs@gmail.com

1st QUARTER EXAMINATION IN EMPOWERMENT TECHNOLOGIES

DIRECTION: Read each statement carefully. Choose the letter of the best answer.
1. A technology required for information processing anytime, anywhere.
a. ICT b. Assistive Media c. Mobile Media d. Media Tech
2. A violation of an individual or organization's copyright. It describes the unauthorized use of copyrighted material, such as text, photos, videos, music, software, and
other original content.
a. Copyright Infringement b. Online Threat c. Phishing d. Spam
3. The access to the whole or any part of a computer system without right.
a. Illegal Interception b. Illegal Access c. System Interference d. Data Interference
4. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical,
without right.
a. Illegal Access b. Identity Theft c. Libel d. Forgery
5. If a person has committed a cybersex offense, what will be his/ her penalty?
a. Death Sentence
b. Imprisonment of prision mayor
c. A fine of at least P200, 000.00 but not exceeding P 1, 000, 000, 000.00
d. Both B & C
6. A child engaged explicit sexual activity which includes actual or simulated.
a. Child Pornography b. Cybersex c. Lascivious Acts d. Libel
7. If a person has committed offenses under the confidentiality, integrity and availability of computer data and systems against critical infrastructure, what will be his or
her penalty for doing such acts?
a. P 1, 000, 000, 000
b. A penalty of reclusion temporal or a fine of at least P 500,000.00 up to a maximum amount commensurate to the damage incurred or both.
c. Imprisonment of prision mayor or a fine of at least P 200,000.00
d. Imprisonment of prision mayor or a fine of at least P 1,000, 000, 000. 00
8. Refers to the conveying of information between two or more people in different places.
a. Technology b. Media c. Communication d. Information
9. A false published statement that injures an individual's reputation (as in business) or otherwise exposes him or her to public contempt.
a. Libel b. Computer-related Fraud c. Computer-related Forgery d. Identity Theft
10. This law protects an individual from various unwanted online and cyber acts and that may harm or evade one’s privacy and integrity.
a. RA 10627 b. RA 10175 c. RA 9775 d. AO 332
11. These are sites that focuses on short updates from the user.
a. Social network b. Microblogging c. Media Sharing d. Blogs & Forums
12. A malicious program that transfers form one computer to another by any type of means.
a. Virus b. Spyware c. Worm d. Adware
13. Users will subscribe to a software only when needed rather than purchasing them.
a. Software as a Service b. User Participation c. Mass Participation d. Rich-user Interface
14. He invented the World Wide Web.
a. Mark Zuckerberg b. Bill Gates c. Ivan Goldberg d. Tim-Berners Lee
15. Used to remove specific words from Google search results.
a. “ “ b. - c. @ d. AND
16. Freedom from unwanted attention; the state of being free from public attention.
a. Online Risks b. Safety c. Security d. Privacy
17. The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a
computer system, for favor or consideration.
a. Cybersex b. Libel c. Child Pornography d. Cyberspace
18. The read-write-execute Web.
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. World Wide Web
19. A program designed to send you advertisements, mostly as pop-ups.
a. Malware b. Trojan c. Virus d. Adware
20. A special software which imitates human behavior.
a. Web 3.0 b. Semantic Web c. Artificial Intelligence d. Virtual Games
21. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your
information.
a. Trojan b. Adware c. Virus d. Worm
22. These are computer-mediated tools that allow people or companies to create, share, or exchange information, career interests, ideas, and pictures/videos in virtual
communities and network.
a. Social Media b. Mobile Technologies c. Convergent Technologies d. Online Systems
23. The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services
a. Child Pornography b. Unsolicited Commercial Communications c. Identity Theft d. Computer-related Fraud
24. An open-source software developed by Google.
a. Windows Phone OS b. Android c. IOS d. Symbian
25. These are sites that allows you to upload and share media content like images, music and video.
a. Microblogging b. Social Network c. Media Sharing d. Blogs & Forum
26. What does WWW stands for?
a. World Wide Wrestling b. World Wide Web c. World War Won d. Whole Wide World
27. Allows the user to categorize and classify information using freely chosen keywords.
a. Mass Participation b. Folksonomy c. Long Tail d. User Participation
28. Protection against intended incidents; the state of being free from danger or threat.
a. Online Risks b. Safety c. Security d. Privacy
29. Describes World Wide Web sites that emphasize user-generated content, usability, and interoperability.
a. Web 2.0 b. Web 1.0 c. Web 3.0 d. WWW
30. The original smartphone OS; used by NOKIA Devices.
a. Android b. Web OS c. Symbian d. IOS
31. A gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
a. Convergence b. e-Bayanihan c. Digital Divide d. ICT

32. Is when the new technologies are created that take over from past technologies and perform the same task but in a more advance manner.
a. Assistive Media b. Convergent Technologies c. Collaborative Platforms d. Mobile Technologies
33. Used to find relevant social tags mainly from Twitter and other social platforms having usernames starting with @.
a. / b. * c. @ d. “ “
34. Used to get the products with the price in $ mentioned in the search query.
a. @ b. -- c. + d. $
35. Finds webpages that contain either of the terms or phrases.
a. ( ) b. OR or | c. NOT or - d. AND or &
36. It is the writable phrase of the World Wide Web.
a. Web 3.0 b. Web 1.0 c. Web 2.0 d. Semantic Web
37. A category of business software that adds broad social networking capabilities to work processes.
a. Assistive Media b. Convergent Technologies c. Collaborative Platforms d. Mobile Technologies
38. Protection against random accidents; the condition of being protected from or unlikely to cause danger, risk, or injury.
a. Online Risks b. Safety c. Security d. Privacy
39. A software toolkit that is used to produce multiple documents with a given template, editing the basic information that is supplied by a structured dataset.
a. Word Mail b. Mail Merge c. Form Document d. Data Source
40. It contains the fixed information that will be in every letter and the merged codes where the variable text will be.
a. Merged Document b. Variable Set c. Form Document d. Word Mail
41. A document or database that contains the information that will be different for each letter.
a. Form Document b. Data Source c. Merged Document d. Variable Set
42. This law includes protection of individuals from bullying through electronic means.
a. Republic Act 10627 or Anti-Bullying Act of 2013 c. Republic Act 7610
b. Republic Act 10175 or Cybercrime Prevention Act of 2012 d. Republic Act 9262
43. A child engaged explicit sexual activity.
a. Cybersex b. Child Pornography c. Libel d. Child Protection
44. Proper requirements for social behavior online.
a. Etiquette b. Ten Commandments c. Ethics d. Netiquette
45. A software application for retrieving, traversing information resources on the World Wide Web.
a. Web Browser b. Homepage c. Webpage d. Web Design
46. It is a related collection of the World Wide Web (www) files that includes a beginning file called a homepage.
a. Website b. Web Page c. Wikis d. Web Design
47. These are sites that allow you to store and manage links to various websites and resources.
a. Social networks b. Social News c. Social Media d. Bookmarking Sites
48. These are sites that allow you to upload and share media content like images, music and video.
a. Blogs and Forums b. Media Sharing c. ShareIt d. Microblogging
49. Services that are offered on demand rather than on a one-time purchase.
a. Software as a Service b. Folksonomy c. Longtail d. Rich user experience
50. The global system of interconnected networks.
a. Homepage b. Website c. Internet d. WWW

------------GOOD LUCK------------

Consolidated by:

JELLEN B. SUS
Acting Department Head-Grae11

Вам также может понравиться