Empowerment Technology Activity Sheet
Empowerment Technology Activity Sheet
Department of Education
Regional Office VIII
Division of Eastern Samar
BALANGKAYAN SENIOR HIGH SCHOOL
Balangkayan, Eastern Samar
Direction: Read the question carefully. Select the best answer and ENCIRCLE the letter of your best answer.
1. What Web 2.0 Feature allows users to subscribe to a software when they need it instead of purchasing
them?
A. Folksonomy B. Long Tail C. User Participation D. Software as a Service
3. This user can have high interaction with the content of the page and can achieve level of expertise.
A. Long Tail B. Rich User Experience C. Software as a service D. Mass Participation
4. YouTube and Instagram are examples of what specific type of social media?
A. Blogs and Forums B. Social Networks C. Media Sharing D. Bookmarking Sites
5. What type of social media that allows user to ask questions and comments on a journal posted by individual
or group?
A. Blogs and Forum B. Social Networks C. Media Sharing D. Bookmarking Sites
6. What harmful online programs are designed to send you advertisement mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
7. What malicious program that gathers information from victim’s computer and send it back to the hacker?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
11. It refers to the use of communication technology such as laptop, tablet, telephone, internet and etc. to
send, save, and edit information.
A. Information and Communication Technology (ICT) C. WEB 2.0
B. WEB 1.0 D. WEB 3.0
12. It is an English computer scientist best known as the inventor of the World Wide Web.
A. Albert Einstein C. Tim Berners Lee
B. Isaac Newton D. Galileo Galilei
13. It is a dynamic web page where user can interact with page like creating a user account, posting
comments, uploading files and images, and others.
A. Information and Communication Technology (ICT) C. WEB 2.0
B. WEB 1.0 D. WEB 3.0
14. The first development of World Wide Web where web pages are static. It also known as flat or stationary
page and it cannot be manipulated by users.
A. Information and Communication Technology (ICT) C. WEB 2.0
B. WEB 1.0 D. WEB 3.0
15. A program that runs in the background and steals user credentials and confidential information and send
back to hack by recording every keystroke that a user makes on their computer or device.
A. Adware C. Worm
B. Trojan Horse D. Keylogger
16. What types of malware with a malicious program that disguised as legitimate program that user will
accept and use but take control of your computer.
A. Adware C. Worm
B. Trojan Horse D. Keylogger
17. A malicious program that copy’s itself and spreads to other computers.
A. Adware C. Worm
B. Trojan Horse D. Keylogger
18. A website where people with the same come together to share information.
A. Social Network C. Bookmarking Sites
B. Microblogging D. Media Sharing
19. A website where user can post stories and are ranked based on the popularity through voting.
A. Social Network C. Bookmarking Sites
B. Social News D. Media Sharing
20. A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and
others.
A. Social Network C. Bookmarking Sites
B. Social News D. Media Sharing
25. A features of web 2.0 which users can classify and arrange information by adding tag label.
A. Folksonomy C. Long Tail
B. User Participation D. Software as a service
26. Consists of different pages that are formatted in markup language called HTML and linked to each other
that contain text, graphics, multimedia files, hyperlinks and etc.
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. World Wide Web (WWW)
27. A user can put content on their own in web page like comment, evaluation, and etc.
A. Folksonomy C. Long Tail
B. Software as a service D. User Participation
28. A site that offers services and brings individual and business into selling different goods and commodities
such as shopping site like OLX, Lazada, Shopee, Zalora, and others.
A. Folksonomy C. Long Tail
B. Software as a service D. User Participation
30.It is a new paradigm in web interaction extension of led by World Wide Web consortium (W3C) where it
provides framework that allows data to be shared and reuse.
A. Web 3.0 The Semantic Web C. Web 2.0
B. Web 1.0 D. World Wide Web (WWW)
31. Appears when the formula refers to range name that doesn’t exist in the worksheet.
A. #### C. #N/A
B. #NAME D. #DIV/0!
32. This appears when the column is not wide enough to display the content and/or dates and times are
negative numbers.
A. #### C. #N/A
B. #NAME D. #DIV/0!
35. A platform that assist people with disability. It will guide the individual like a blind person by using an
audio recording.
A. Mass Participation C. Assistive Media
B. Social Media D. Mobile Technologies
36. It is a collection of infected internets – connected devices such as PC and mobile phone that are
controlled by a common type of malware.
A. Rootkit C. Ransomware
B. Botnet D. Spam
37. It is a software tools used by hackers to gain control over computer on a network without being exposed.
A. Rootkit C. Ransomware
B. Botnet D. Spam
38. It is a virus that block the user from accessing the programs or files and demands to pay the ransom
through online method for the removal of the virus.
A. Rootkit C. Ransomware
B. Botnet D. Spam
39. Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.
A. Cybercrime C. Spam
B. Phishing D. Cybercrime Law
40. This a cyberattack method using deceptive emails and websites to acquiring sensitive personal
information.
A. Cybercrime C. Spam
B. Phishing D. Cybercrime Law
41. A crime in which computer is used as object and tool in committing a crime such as hacking, phishing,
spamming, child pornography, libel, hate crimes, identity thief and others.
A. Cybercrime C. Spam
B. Phishing D. Cybercrime Law
46. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my accounts.
47. Your parents bought you your first cellphone. How will you share your cellphone number?
A. Do not share your cellphone number to anyone
B. Post your cellphone number in your social media account.
C. Share cellphone number only in person
D. Post your cellphone number in your group chat.
48. Your social media friends list should only be composed of?
A. Your favorite brands.
B. Family and friends
C. Anyone who sends you a friend request
D. Foreigners