Вы находитесь на странице: 1из 2

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region IV-A CALABARZON
City Schools Division of Cabuyao
MAMATID SENIOR HIGH SCHOOL
Mamatid, Cabuyao City, Laguna

FOURTH QUARTERLY ASSESSMENT


Media and Information Literacy
2nd Semester, S.Y 2018 - 2019

Name: _________________________________________Grade & Section: _______________ Date: _____________Score: ________

Choose the correct answer from the choices. Write the letter of your answer on the blank provided. AVOID ERASURES

1. What do you call the directed and purposeful exchange of c. The returned phone calls, e – mails, and text messages
information and messages between people or group of sent back to Engki
people by speaking, writing, gestures, and signs d. Glitches in the internet connections, hums in the
a. Communication b. Messages telephone lines, or too many messages being sent
b. Organization d. Channel 11. Yui is an OTAKU. Her parents don’t like this attitude of
2. Which of the following refers to any form of her. Her only way to express these feelings of her freely
coomunication that can be passed or transmitted using a is thru the cyber world. She can create her own image
channel thru the internet. It means that she has a
a. Communication b. Organization ______________.
b. Messages d. Traditional Media a. Imaginary friend c. Virtual friend
3. What is the commonly used term to refer to b. Imaginary self d. Virtual self
communication system that are configured to create, 12. Which among the following was the person to develop
produce, and disseminate media texts to mass audiences the moving images from static?
a. Communication a. George Eastman c. Louis Pasteur
b. Interpersonal Communication b. Johan Gutenberg d. Nicholson John
c. Mass Communication 13. Arianne is a gamer but she never uses foul words in the
d. Messages cyber world. It only implies that she knows ___________
4. What kind of communication does a person a. Hacking c. Politeness
communicating in a large number of people shows? b. Downloading d. Netiquette
a. Interpersonal communication 14. Which of the following is the legal concept that allows the
b. Mediated Interpersonal Communication reproduction of copyright materials for certain purposes
c. Organizational Communication without obtaining permission / without payment?
d. Public Communication a. Cyber c. Fair Use
5. What do you call the interfernce in the transmission of b. Hacking d. Infringement
messages? 15. Which of the following is the EXCEPTION on the key
a. Decoding c. Feedback questions in media literacy when engaging with images
b. Encoding d. Noise and information messages around us?
6. Which of the following camera grammar is described as a. What is your name?
shot of a hand, eye, mouth, or object in detail? b. Who created the messages?
a. Close – up c. Extreme Close - Up c. What creative techniques were used to attract my
b. Eye – Level Shot d. Low Angle Shot attention?
7. Which of the following is a camera movement shot d. How might different people appreciate and underestimate
wherein a person or an object you are capturing is these messages?
moving horizontally from left to right or right to left? 16. Elaine’s family can avail the latest Iphone models
a. Pan(ning) Shot c. Tracking Shot anytime they want while Elaine’s friend can’t avail even
b. Tilt Shot d. Trecking Shot the basic phones. Their socio economic status affects the
8. What is WSIS? thing we call ____________________
a. World Society on the Information and Summit a. Digital Self c. Elite society
b. World Summit on the Information Society b. Fair Use d. Digital Divide
c. Worldwide Social Information System 17. Which of the following has the ability to experience and
d. Worldwide Summit on the Information System explore the pleasure of media text, and how these are
9. “Walang kinikilingan, walang pinoprotektahan, walang realized through the language of the media?
kasinungalingan, serbisyong totoo lamang” This is the a. Access c. Media literacy
motto of 24 Oras. The field reporters of the said news b. Analysis d. Response
must have the knowledge in seeking the truth about 18. Which is generally established and accepted ways of
certain issues. The field reporters and anchors must be doing something when it comes to internet?
____________. a. Codes c. Genre
a. information literate. b. Conventions d. Semiotics
b. media literate. 19. Which of the following is the system of signs that when
c. technology literacy. put together create a meaning?
d. Media, information and technology literate. a. Codes c. Genre
10. Engki talks to her friends and colleagues in a meeting, b. Conventions d. Semiotics
over coffee, sends e – mails, and text messages 20. What do you call the people that is trained to report news
informing them of the planned mass action at the EDSA to an audience, and expected to be objective,
shrine. What could be the noise interference during the comprehensive, and bias – free?
passing of the message? a. News c. Journalist
a. The members and audiences will tuned in to the show b. Journalism d. Soft News
regarding the mass action in EDSA. 21. Which of the does NOT BELONG to the group?
b. Engki composing the message himself a. Audio and video c. Digital Formats
b. CDs d. Print
22. Which of the following defines the popular publications? 26. The teacher asks you to pass your script for your video
a. contain carefully processed and reviewed information presentation. What format does the teacher need to
though it may not represent the individual views of the retrieve information from you?
academic personnel a. Audio and Video c. Microform
b. highly specialized materials meant for players and b. Digital Format d. Print
specialists on a specific industry 27. Allen McHardy is a kind of students who likes to dominate
c. well researched articles found mostly in academic others. He felt like he is a smart person who knows
journals and published for the specialists of specific field everything. He even use the cyber world to message his
d. most of what rules in the print and non – profit media are classmates and other person threatening them if they not
popular publications with the general public as its target follow his orders. What kind of cybercrime did he commit
23. What is the advantage of watching Anime/Korean in his action?
novelas? a. Cyber Sex c. Cyber Bullying
a. It makes the Filipinos more addictive to other cultures b. Identity Theft d. Child Pornography
b. It helps the Filipinos to acquire new knowledge/language 28. You are a “chicharon’ lover, so you decided to make your
c. It makes the community to leave behind their own nature own recipe of ‘chicharon’ and tried to sell it market. It
as a Filipino boomed in no time and you were able to have branches.
d. It helps the Filipino to become dancer A neighbour copied your type of business and spread
24. “BAYARAN MO NA UTANG MO NA 500!!” <insert image gossips about your chicharon which is not true. One time,
of the person referring to> “SABI MO WALA KANG you unintentionally heard him gossiping again about your
PERA PERO KUNG SAAN SAAN KA NAKAKAGALA!!!” product. What type of defamation can you file against your
Posting that kind of foul words in social media can make neighbour?
dishonour to the person that appears in the picture. What a. Cyber Bullying c. Libel
kind of law did it break? b. Identity Theft d. Slander
a. RA 10175 c. RA 7610 29. During Onyok’s thesis, he searched for the related
b. RA 7877 d. RA 9262 literature and studies in the internet. He copied the
25. Haro is the best journalist ever. He looks for the details informations that were related to the study he is
needed in every angle before writing it in the paper, conducting. He inserted the source of the said
putting it in the computer and everything. He has the information in his research in respect to the
ability to tell the true from the false information base on author/uploader of the information. This only shows that
the interviews and investigation he makes throughout the he knows ____________.
specific area. What does it implies? a. digital access. c. digital commerce.
a. He knows the owner of the company that is why he is b. digital communication. d. digital etiquette.
considered the best journalist. 30. Which of the following is about building moral principles,
b. He is a well – known person in their place that is why and evaluating the implications of the actions to others
they made him the best journalist as a title. and to society at large?
c. He has the power to get the people’s attention and get a. Citizenship c. Ethics
information he needed and becomes the best journalist. b. Digital Citizens d. Netizens
d. He becomes the best journalist because he is literate in
information, in media, and as well in the use of
technology in the said field.

II. IDENTIFICATION: Identify what is being described / asked by the following. CAPITAL LETTERS ONLY. (15 POINTS)

1. This refers to the files that you do not have the right to use from the internet.
2. It is a feedback technology (using computer applications) that takes advantage of the user’s sense of touch by applying force, vibrations
and / or motions to the User.
3. It is the technology in development that enables the control of technology functions using the brain --- totally hands free!
4. It is a 3D computer generated community that takes place in real – time, where a lot of people can work on an endless number of tasks at
once.
5. It is the deliberate use of someone else’s identity to gain financial advantage / benefits in other person’s name.
6. It is the correct / acceptable way of communicating in the internet.
7. What do you call the violation of a copyright?
8. It is an economic inequality between groups in terms of access to, use of, or knowledge of ICT.
9. It is the excessive use of computers to the extent that interferes with daily life.
10. It is the law in the Philippines which aims to address legal issues concerning online interactions and the internet.
11. It is a verbal unprivileged false statement of fact which tends to harm the reputation of a person or a company.
12. It is a form of child sexual exploitation.
13. This refers to the individuals who engaged in the practice of modifying or altering computer software and hardware to accomplish a goal
that is considered to be outside of the creator’s original objective.
14. It is not only used to confirm a person’s identity, it also used to detect a person’s health or emotional state.
15. What do you mean by GPS that is used as an intelligent routing device?

Вам также может понравиться