0% found this document useful (0 votes)
37 views6 pages

Empowerment Technology Activity Sheet

This document contains a 35 question pre-test about empowerment technology topics like web 1.0, web 2.0, social media, malware types, and more. Students are to select the best answer for each multiple choice question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views6 pages

Empowerment Technology Activity Sheet

This document contains a 35 question pre-test about empowerment technology topics like web 1.0, web 2.0, social media, malware types, and more. Students are to select the best answer for each multiple choice question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Republic of the Philippines

Department of Education
Regional Office VIII
Division of Eastern Samar
BALANGKAYAN SENIOR HIGH SCHOOL
Balangkayan, Eastern Samar

Pre-Test in Empowerment Technology

NAME: _______________________________________ Grade and Sec.: ________________ Date: ______________

Direction: Read the question carefully. Select the best answer and ENCIRCLE the letter of your best answer.

1. What Web 2.0 Feature allows users to subscribe to a software when they need it instead of purchasing
them?
A. Folksonomy B. Long Tail C. User Participation D. Software as a Service

2. What type of web page is classified as flat or stationary?


A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0

3. This user can have high interaction with the content of the page and can achieve level of expertise.
A. Long Tail B. Rich User Experience C. Software as a service D. Mass Participation

4. YouTube and Instagram are examples of what specific type of social media?
A. Blogs and Forums B. Social Networks C. Media Sharing D. Bookmarking Sites

5. What type of social media that allows user to ask questions and comments on a journal posted by individual
or group?
A. Blogs and Forum B. Social Networks C. Media Sharing D. Bookmarking Sites

6. What harmful online programs are designed to send you advertisement mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomware

7. What malicious program that gathers information from victim’s computer and send it back to the hacker?
A. Adware B. Spyware C. Worms and Virus D. Ransomware

8. What is ransomware based on?


A. Fear of hackers
B. Fear of the Internet
C. Fear of spyware
D. Fear of losing important files

9. What is considered shouting over the Internet?


A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
10. What type of malicious program is designed to replicate itself and transfer one computer to another either
through the internet or local networks or storage like flash drives and CDs?
A. Adware B. Spyware C. Worms and Virus D. Ransomware

11. It refers to the use of communication technology such as laptop, tablet, telephone, internet and etc. to
send, save, and edit information.
A. Information and Communication Technology (ICT) C. WEB 2.0
B. WEB 1.0 D. WEB 3.0

12. It is an English computer scientist best known as the inventor of the World Wide Web.
A. Albert Einstein C. Tim Berners Lee
B. Isaac Newton D. Galileo Galilei

13. It is a dynamic web page where user can interact with page like creating a user account, posting
comments, uploading files and images, and others.
A. Information and Communication Technology (ICT) C. WEB 2.0
B. WEB 1.0 D. WEB 3.0

14. The first development of World Wide Web where web pages are static. It also known as flat or stationary
page and it cannot be manipulated by users.
A. Information and Communication Technology (ICT) C. WEB 2.0
B. WEB 1.0 D. WEB 3.0

15. A program that runs in the background and steals user credentials and confidential information and send
back to hack by recording every keystroke that a user makes on their computer or device.
A. Adware C. Worm
B. Trojan Horse D. Keylogger

16. What types of malware with a malicious program that disguised as legitimate program that user will
accept and use but take control of your computer.
A. Adware C. Worm
B. Trojan Horse D. Keylogger

17. A malicious program that copy’s itself and spreads to other computers.
A. Adware C. Worm
B. Trojan Horse D. Keylogger

18. A website where people with the same come together to share information.
A. Social Network C. Bookmarking Sites
B. Microblogging D. Media Sharing

19. A website where user can post stories and are ranked based on the popularity through voting.
A. Social Network C. Bookmarking Sites
B. Social News D. Media Sharing

20. A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and
others.
A. Social Network C. Bookmarking Sites
B. Social News D. Media Sharing

21. A website that allows you to broadcast short message


A. Microblogging C. Assistive Media
B. Mobile Technologies D. Media Sharing
22. A technology used in cellular and other devices such netbook, laptop, tablet, smart phones and etc.
A. Microblogging C. Assistive Media
B. Mobile Technologies D. Media Sharing

23. What does the (HTML) stands for?


A. Hyper Tech Mark Language C. Hyper Text Mark Language
B. Hyper Tank Mark Language D. Hyper Toner Mark Language

24. What does the word (ICT) stands for?


A. In Complete Technology C. Inappropriate Communication Technology
B. Information Communication Technology D. Informative Communication Technology

25. A features of web 2.0 which users can classify and arrange information by adding tag label.
A. Folksonomy C. Long Tail
B. User Participation D. Software as a service

26. Consists of different pages that are formatted in markup language called HTML and linked to each other
that contain text, graphics, multimedia files, hyperlinks and etc.
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. World Wide Web (WWW)

27. A user can put content on their own in web page like comment, evaluation, and etc.
A. Folksonomy C. Long Tail
B. Software as a service D. User Participation

28. A site that offers services and brings individual and business into selling different goods and commodities
such as shopping site like OLX, Lazada, Shopee, Zalora, and others.
A. Folksonomy C. Long Tail
B. Software as a service D. User Participation

29. It is a sharing of diverse information through universal web access.


A. Mass Participation C. Long Tail
B. Software as a service D. User Participation

30.It is a new paradigm in web interaction extension of led by World Wide Web consortium (W3C) where it
provides framework that allows data to be shared and reuse.
A. Web 3.0 The Semantic Web C. Web 2.0
B. Web 1.0 D. World Wide Web (WWW)

31. Appears when the formula refers to range name that doesn’t exist in the worksheet.
A. #### C. #N/A
B. #NAME D. #DIV/0!

32. This appears when the column is not wide enough to display the content and/or dates and times are
negative numbers.
A. #### C. #N/A
B. #NAME D. #DIV/0!

. 33. It refers to fusing of technology advancement to work on similar task.


A. Social Media C. Convergence
B. Mass Participation D. Folksonomy
34. An application and website where user can communicate, create and share content, and participate in
online communities.
A. Social Media C. Convergence
B. Mass Participation D. Folksonomy

35. A platform that assist people with disability. It will guide the individual like a blind person by using an
audio recording.
A. Mass Participation C. Assistive Media
B. Social Media D. Mobile Technologies

36. It is a collection of infected internets – connected devices such as PC and mobile phone that are
controlled by a common type of malware.
A. Rootkit C. Ransomware
B. Botnet D. Spam

37. It is a software tools used by hackers to gain control over computer on a network without being exposed.
A. Rootkit C. Ransomware
B. Botnet D. Spam

38. It is a virus that block the user from accessing the programs or files and demands to pay the ransom
through online method for the removal of the virus.
A. Rootkit C. Ransomware
B. Botnet D. Spam

39. Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.
A. Cybercrime C. Spam
B. Phishing D. Cybercrime Law

40. This a cyberattack method using deceptive emails and websites to acquiring sensitive personal
information.
A. Cybercrime C. Spam
B. Phishing D. Cybercrime Law

41. A crime in which computer is used as object and tool in committing a crime such as hacking, phishing,
spamming, child pornography, libel, hate crimes, identity thief and others.
A. Cybercrime C. Spam
B. Phishing D. Cybercrime Law

42. It is a law that deals with all forms of cybercrime.


A. Cybercrime C. Spam
B. Phishing D. Cybercrime Law

43. What is Netiquette?


A. The proper use of manners and etiquette on the internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook
D. Using proper manners at the dinner table

44. It is OK to forward or post an email message that you received if_________________


A. the message is typed in all capitals.
B. The author of the message has given you permission to forward or post it.
C. It does not contain any copyrighted material.
D. The author of the message hasn’t marked it as confidential.
45. Your family is going out on a vacation. What should you do?
A. Post a picture when you return home.
B. Post dates you will be gone online
C. Post updates of where you are currently checking on hotels or places.
D. Tell no one. Vacations are for getting away.

46. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my accounts.

47. Your parents bought you your first cellphone. How will you share your cellphone number?
A. Do not share your cellphone number to anyone
B. Post your cellphone number in your social media account.
C. Share cellphone number only in person
D. Post your cellphone number in your group chat.

48. Your social media friends list should only be composed of?
A. Your favorite brands.
B. Family and friends
C. Anyone who sends you a friend request
D. Foreigners

49. To avoid being cyber-bullied you should always…


A. Give out personal information to anyone who asks.
B. Strike first- post mean things about other people on your wall on Facebook.
C. Observe proper netiquette rules
D. Ignore any request from people to be your friend online.

50. How are you judged in cyberspace?


A. No one can see you, so no one can judge you.
B. You are judged by what you do on the internet and how it looks – by your spelling, grammar, and
netiquette.
C. You are judged by your intent- if you didn’t mean to hurt someone’s feelings, then it’s okay.
D. You

Prepared By: APRIL FATIMA T. GAMALO


JASIEL SHOMER B. OFILANDA
DONALD G. ESCOTO
LOUEJIE APELADO

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy