Uploaded by Noire Oc

1st-quarter-exam-in-empowerment-technologies-sy-2022-2023

advertisement
lOMoARcPSD|30841724
1st Quarter Exam in Empowerment Technologies S.Y.
2022-2023
Religious Education (Sta. Catalina College )
Studocu is not sponsored or endorsed by any college or university
Downloaded by Noire Oc (noire.owsi@gmail.com)
lOMoARcPSD|30841724
CAMALIGAN NATIONAL HIGH SCHOOL
Camaligan, Batan, Aklan
1st Quarter Examination in Empowerment Technologies 11
NAME: _________________________________________ DATE: ___________________
GRADE LEVEL/SECTION: __________________________ SCORE: __________________
Test I. MULTIPLE CHOICE. Direction: Read and analyze the questions carefully. Write the letter of the
correct answer on the space provided before each number.
_____1. This feature of Web 2.0 allows users to categorize information through tagging.
A. Folksonomy
B. Taxonomy
C. Hashtag
D. User Participation
_____2.What type of file does key logger software typically use to store its recording?
A. Virus Files
B. Text Files
C. Log Files
D. Data Files
_____3. The following are tips on how to stay safe online except
A. Buy the software, do not used pirated ones.
C. Share your password with anyone.
B. Add friends you know in real life.
D. Avoid visiting untrusted websites.
_____4. How does spyware infect a computer?
A. Theft of personal information
c. Pop-ups
B. Recording web information
d. All of the above
_____5. Ralph is using a technique that tries to take information from the user. He commonly takes
things like credit cards, usernames, passwords, and home address. What type of threat is depicted in
the scenario?
A. Scam
B. Spam
C. Phishing
D. Fishing
_____6. This is the process of scanning the full text of a query in order to understand what the user
needs.
A. Communication Skills
C. Contextualized online research
B. Research Methodology
D. Data Collection
____7. Any information coming from these domain types are usually reliable except
A. .org
B. .edu
C. .gov
D. .com
_____8. What symbol will you use to search for the exact term or phrase?
a. ( )
B. &
C. " "
D. _____9. This media is designed to help people who have visual and reading impairments.
A. Assistive Media
B. Social media
C. Bookmarking Sites
D. Media Sharing
_____10. Pinterest is a social media website that can be classified as
A. Microblogging
B. Blogs and Forums
C. Bookmarking Sites
D. Media Sharing
Test II: TRUE or FALSE. Instructions: Write True if the statement is correct, otherwise write
False. Write your answer on the space provided.
______ 1. ICT deals with the use of different technologies to work on a similar goal or task.
______ 2. Know the security features of the social networking site you use.
______ 3. Web pages that are the same regardless of the user are referred to static
______ 4. Web pages of Web 1.0 are dynamic and interactive.
______ 5. World Wide Web or www is invented by Sir Tim Bernes-Lee in 1999.
______6. Don't adhere to the same standards of behavior online that you follow in real life
______7. Remember the human and abuse your power.
______ 8. Reply or click links from suspicious emails.
______9. Research skill is the ability to find answer to a question or a solution to a problem.
______10. Don't make your self look good online.
Downloaded by Noire Oc (noire.owsi@gmail.com)
lOMoARcPSD|30841724
Test III. IDENTIFICATION. Instructions: Identify the terms described by the following
statements. Write the answer on the space provided.
______________________1. A law that deals with all the forms of cybercrime.
______________________2. It refers to security of people and practices that should be
observed when using the internet to ensure that their information are safe from crimes.
______________________3. Passwords must contained at least how many characters?
______________________4. A crime in which computer is used as object and tool in
committing a crime such as hacking, phishing, child pornography, etc.
______________________5. A form of pornography that unlawfully exploits children for
sexual stimulation.
Test IV. Matching Type. Direction: Match Column A with Column B. Write the letter of the
correct answer on the space provided.
A
B
______1. Also known as Malicious Software
______2. A malicious program that disguised as legitimate program
that user will accept and use but take control of your computer.
______3. A malicious program that replicate itself by copying itself to
another program.
______4. A malicious program that copy itself and spreads to other
computers.
______5. A malicious program that gathers information from victims
computer and send it back to the hacker.
______6. An unwanted advertisement that will pop-up several times
on victims computer then behave abnormally and tedious to close
them.
______7. A program that runs in the background and steals credentials
and information and send back to hack by recording every keystroke
that a user makes on their computer or device.
_____8. A ransom virus that block the user from accessing the
programs on files and demands to pay a ransom through online
method for the removal of the virus.
_____9. Known as junk email or unwanted email send by advertiser or
bot. It can be used to send malware.
_____10. A cyber attack method using deceptive emails and websites
to acquiring sensitive personal information.
________________________________________
Parents/Guardians Signature over printed name
Date: __________________________________
Downloaded by Noire Oc (noire.owsi@gmail.com)
A.Spyware
B. Keylogger
C. Phishing
D. Spam
E. Ransomware
F. Worm
G. Malware
H. Virus
I. Trojan Horse
J. Adware
lOMoARcPSD|30841724
Downloaded by Noire Oc (noire.owsi@gmail.com)
Download