0% found this document useful (0 votes)
280 views1 page

Summative Test Emtech Lesson 1&2

ICT involves the use of digital technologies and the internet to manage information and communication. It enables people to discover, connect, and share information through collaborative platforms and social media. Convergent technologies combine multiple technologies to improve overall functionality, with smartphones being a prime example. In a networked world, possibilities are opened for people to discover, connect, and co-create through tools like social media and the internet.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
280 views1 page

Summative Test Emtech Lesson 1&2

ICT involves the use of digital technologies and the internet to manage information and communication. It enables people to discover, connect, and share information through collaborative platforms and social media. Convergent technologies combine multiple technologies to improve overall functionality, with smartphones being a prime example. In a networked world, possibilities are opened for people to discover, connect, and co-create through tools like social media and the internet.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Summative Test 27.

It encompasses all the digital technology used to


Lesson 1 and 2 manage information and communication.
28. An app that translate text into sign language.
Empowerment Technology 29. It is a combination of many technology that come
True or False: together to improve over-all functionalities.
__1. ICT is a tool used in many workplaces today. 30. Hand-held technology.
__2. In a Networked World people can discover, disclose, ______________________________________________
connect, and co-create.
a. Online systems b. Social Media c. Web 2.0
__3. Assistive technology gives people with no disability access
to computers. d. Web 3.0 e. Aggregator website
__4. Collaborative platforms adds broad social networking 31. Using the internet to file NBI clearance.
capabilities to work processes. 32. Current internet generation from 2006.
__5. Convergent technology is a single invention that tackles a 33. Internet from 1999 to 2005.
single problem. 34. Facebook, Twitter and Instagram.
__6. ICT involves only the internet. 35. Pinterest shows similar pins.
__7. Desktops and smartphones are mobile devices. ______________________________________________
__8. Social Media are computer-mediated tools that allow people a. Avatar b. Flaming c. MMOG d. P2P e. Blog
or companies to create, share, or exchange private and public 36. An archer in a game.
information. 37. Sharing movies
__9. Web 2.0 emphasize user-generated content, usability and
38. Hate speech
interoperability.
__10. Web 2.0 is called the “intelligent Web”. 39. Writing in the web
__11. Google News is an example of aggregator website. 40. Fortnite and PUBG
__12. A cartoonish graphic, a photograph, a screen name that ______________________________________________
represents a computer user or a gamer. Multiple Choice:
__13. Blog came from the term “have log”. 41. What activity can be considered safe?
__14. Flaming is a courteous and ethical way of interacting in the a. posting name and birthday in profile
web. b. always sharing routine activities and interest
__15. Mash-up is a single take video. c. using password which is an 8-letter word
__16. MMOG usually involves a single player completing a set d. All of the above
mission. 42. Where should you share your ideas for a specific
__17. P2P is used to share movies and software that is why it is
person.
a favorite application for pirating.
__18. Phishing is an act of sending authentic looking forms or a. comment section b. private message
link for websites that are actually malicious. c. Facebook wall d. public forum
__19. Podcast is a video and audio file popularized in iPod. 43. In a networked world, what possibilities are opened?
__20. You can only send SMS when you are online. a. discover b. isolate c. connect d. co-create
_______________________________________________ 44. What is a perfect example of convergent technology?
Matching Type: a. Multifunction printer b. Smartphone
a. Phishing b. Malware c. Spyware d. Keylogger e. Hacking c. Home assistant d. All of the above
__21. It records the keystrokes of a user and gives access to the 45. What can you do in Web 3.0 that you cannot do in Web
attacker. 2.0?
__22. Software that can activate webcams and location of the a. Posting and blogging b. Data-mining
user and send information to an attacker. c. Machine learning c. Artificial intelligence
__23. Viruses and ransomwares are example of this disruptive _______________________________________________
and destructive software. 46. Do not use pirated software.
__24. It is the process of gaining information from a new user a. Safe b. Not Safe c. Not Sure
that can be used for accessing social media or other accounts. 47. Think before you click.
__25. A website or link that poses as legitimate when it fact it a. Safe b. Not Safe c. Not Sure
was created to gather data from a user. 48. Do not just accept terms and conditions; read it.
_______________________________________________ a. Safe b. Not Safe c. Not Sure
a. Assistive Media b. Collaborative Platforms 49. Do not share your password in FB to anyone.
c. Convergent Technologies d. ICT e. Mobile Media a. Safe b. Not Safe c. Not Sure
__26. Google sheet allows numerous users to help each 50. Don’t post anything about future vacation.
other in preparing a spreadsheet. a. Safe b. Not Safe c. Not Sure

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy