0% found this document useful (0 votes)
58 views4 pages

E-Tech - 1st QE

This document contains a practice test on empowerment technology concepts. It includes multiple choice questions, fill-in-the-blank questions matching social media types and operating systems to their definitions, and a short answer question on internet searching and copying. The test covers topics like assistive technologies, social media platforms, operating systems, cybersecurity threats, citations, and domain types.

Uploaded by

LEMUEL CASTILLO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views4 pages

E-Tech - 1st QE

This document contains a practice test on empowerment technology concepts. It includes multiple choice questions, fill-in-the-blank questions matching social media types and operating systems to their definitions, and a short answer question on internet searching and copying. The test covers topics like assistive technologies, social media platforms, operating systems, cybersecurity threats, citations, and domain types.

Uploaded by

LEMUEL CASTILLO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

FIRST PERIODICAL TEST

IN
EMPOWERMENT TECHNOLOGY

Note: Read the instructions carefully. Alterations and erasures means wrong.
TEST I. Multiple Choice: Read the statement carefully and write the letter of your answer.

1. This media is designed to help people who have visual and reading impairments.
a. Assistive Media
b. Social Media
c. Bookmarking Site
d. Media Sharing

2. Pinterest is a social media website that can be classified as


a. Media Sharing
b. Microblogging
c. Blogs and Forums
d. Bookmarking Sites

3. This operating system is used by apple devices such as iPhone.


a. Symbian
b. Windows OS
c. iOS
d. Blackberry

4. Which of the following is an example of a social networking site?


a. Pinterest
b. Google +
c. Flickr
d. YouTube

5. This feature of Web 2.0 allows users to categorize information through tagging.
a. Hashtag
b. Folksonomy
c. User participation
d. Taxonomy

6. What type of file does key logger software typically use to store its recording?
a. Data Files
b. Virus Files
c. Text Files
d. Log Files

7. Raffy is using a technique that tries to take information from the user. He commonly takes
things like credit cards, usernames, passwords, and home address. What type of threat is
depicted in the scenario?
a. Fishing
b. Scam
c. Spam
d. Phishing
8. How does spyware infect a computer?
a. Popups
b. Theft of personal information
c. Recording web information
d. All of the above

9. People who practice identity theft usually go for


a. Personal information
b. Being able to have another name
c. Send users an email
d. Victim’s Address

10. The following are tips on how to stay safe online except
a. Add friends you know in real life.
b. Avoid visiting untrusted websites.
c. Share your password with anyone.
d. Buy the software, do not use pirated ones.

11. A reliable source is ________________.


a. Biased
b. Trying to sell you something
c. Trusted
d. Google

12. To broaden your search on advertising, you will search the term ___________.
a. advertising OR commercial
b. advertising AND commercial
c. advertising BUT commercial
d. advertising NOT commercial

13. Which of the following do you not need to include in a citation?


a. author, if available
b. title of the article
c. date of publication
d. call number

14. Any information coming from these domain types are usually reliable except
a. .com
b. .org
c. .edu
d. .gov

15. What symbol will you use to search for the exact term or phrase?
a. ( )
b. “ “
c. &
d. –
Test II. Write SO if the social media website is a social network, BS for bookmarking site,
SN for social news, MS for media sharing, MI for microblogging, and BF for blogs and forums.

1. Facebook
2. Blogger
3. Twitter
4. Reddit
5. WordPress
6. Google+
7. Instagram
8. Pinterest
9. YouTube
10. Flickr
11. Tumblr
12. StumbleUpon
13. Dig
14. Plurk
15. Discord

TEST III. Match the description from Column A with the word/s in Column B.
A B
1. An OS used in Apple devices such as the iPhone
and iPad a. Malware

2. Any program or file that is harmful to a computer


user b. Virus

3. Its goal is to acquire sensitive personal


information like passwords and credit card details c. Worm

4. An OS developed by Microsoft for smartphones


and pocket PCs. d. Trojan

5. An open source operating system developed by


Google. Being open source means several mobile
e. Spyware
phone companies use this OS for free.

6. An unwanted email mostly from bots or


advertisers. It can be used to send malware. f. Adware

7. a malicious program designed to replicate itself


and transfer from one computer to another g. Ransomware

8. An OS used in blackberry devices


h. Spam
9. An OS originally used for smartphones; now used
for smartTVs i. Phishing

10. A malicious program that transfers from one


j. iOS
computer to another by any type of means.
11. A type of malicious software from
cryptovirology that threatens to publish the victim's
k. Android
data, unless a ransom is paid.

12. A program designed to send you


advertisements, mostly as pop-ups. l. Blackberry OS

13. The original smartphone OS used by Nokia


devices. m. Windows Phone OS

14. A closed source and proprietary operating


system developed by Microsoft n. Symbian

15. A malicious program that disguises as a useful


program but once downloaded or installed, leaves
o. WebOS
your PC unprotected and allows hackers to get your
information.
p. Windows Mobile

TEST IV. Briefly answer the following question. (5 pts)


1. What are the things you need to consider before and during searching and copying
something from the internet or web?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy