ICT involves the use of digital technologies and the internet to manage information and communication. It enables people to discover, connect, and share information through collaborative platforms and social media. Convergent technologies combine multiple technologies to improve overall functionality, with smartphones being a prime example. In a networked world, possibilities are opened for people to discover, connect, and co-create through tools like social media and the internet.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
280 views1 page
Summative Test Emtech Lesson 1&2
ICT involves the use of digital technologies and the internet to manage information and communication. It enables people to discover, connect, and share information through collaborative platforms and social media. Convergent technologies combine multiple technologies to improve overall functionality, with smartphones being a prime example. In a networked world, possibilities are opened for people to discover, connect, and co-create through tools like social media and the internet.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Summative Test 27.
It encompasses all the digital technology used to
Lesson 1 and 2 manage information and communication. 28. An app that translate text into sign language. Empowerment Technology 29. It is a combination of many technology that come True or False: together to improve over-all functionalities. __1. ICT is a tool used in many workplaces today. 30. Hand-held technology. __2. In a Networked World people can discover, disclose, ______________________________________________ connect, and co-create. a. Online systems b. Social Media c. Web 2.0 __3. Assistive technology gives people with no disability access to computers. d. Web 3.0 e. Aggregator website __4. Collaborative platforms adds broad social networking 31. Using the internet to file NBI clearance. capabilities to work processes. 32. Current internet generation from 2006. __5. Convergent technology is a single invention that tackles a 33. Internet from 1999 to 2005. single problem. 34. Facebook, Twitter and Instagram. __6. ICT involves only the internet. 35. Pinterest shows similar pins. __7. Desktops and smartphones are mobile devices. ______________________________________________ __8. Social Media are computer-mediated tools that allow people a. Avatar b. Flaming c. MMOG d. P2P e. Blog or companies to create, share, or exchange private and public 36. An archer in a game. information. 37. Sharing movies __9. Web 2.0 emphasize user-generated content, usability and 38. Hate speech interoperability. __10. Web 2.0 is called the “intelligent Web”. 39. Writing in the web __11. Google News is an example of aggregator website. 40. Fortnite and PUBG __12. A cartoonish graphic, a photograph, a screen name that ______________________________________________ represents a computer user or a gamer. Multiple Choice: __13. Blog came from the term “have log”. 41. What activity can be considered safe? __14. Flaming is a courteous and ethical way of interacting in the a. posting name and birthday in profile web. b. always sharing routine activities and interest __15. Mash-up is a single take video. c. using password which is an 8-letter word __16. MMOG usually involves a single player completing a set d. All of the above mission. 42. Where should you share your ideas for a specific __17. P2P is used to share movies and software that is why it is person. a favorite application for pirating. __18. Phishing is an act of sending authentic looking forms or a. comment section b. private message link for websites that are actually malicious. c. Facebook wall d. public forum __19. Podcast is a video and audio file popularized in iPod. 43. In a networked world, what possibilities are opened? __20. You can only send SMS when you are online. a. discover b. isolate c. connect d. co-create _______________________________________________ 44. What is a perfect example of convergent technology? Matching Type: a. Multifunction printer b. Smartphone a. Phishing b. Malware c. Spyware d. Keylogger e. Hacking c. Home assistant d. All of the above __21. It records the keystrokes of a user and gives access to the 45. What can you do in Web 3.0 that you cannot do in Web attacker. 2.0? __22. Software that can activate webcams and location of the a. Posting and blogging b. Data-mining user and send information to an attacker. c. Machine learning c. Artificial intelligence __23. Viruses and ransomwares are example of this disruptive _______________________________________________ and destructive software. 46. Do not use pirated software. __24. It is the process of gaining information from a new user a. Safe b. Not Safe c. Not Sure that can be used for accessing social media or other accounts. 47. Think before you click. __25. A website or link that poses as legitimate when it fact it a. Safe b. Not Safe c. Not Sure was created to gather data from a user. 48. Do not just accept terms and conditions; read it. _______________________________________________ a. Safe b. Not Safe c. Not Sure a. Assistive Media b. Collaborative Platforms 49. Do not share your password in FB to anyone. c. Convergent Technologies d. ICT e. Mobile Media a. Safe b. Not Safe c. Not Sure __26. Google sheet allows numerous users to help each 50. Don’t post anything about future vacation. other in preparing a spreadsheet. a. Safe b. Not Safe c. Not Sure