lOMoARcPSD|30841724 1st Quarter Exam in Empowerment Technologies S.Y. 2022-2023 Religious Education (Sta. Catalina College ) Studocu is not sponsored or endorsed by any college or university Downloaded by Noire Oc (noire.owsi@gmail.com) lOMoARcPSD|30841724 CAMALIGAN NATIONAL HIGH SCHOOL Camaligan, Batan, Aklan 1st Quarter Examination in Empowerment Technologies 11 NAME: _________________________________________ DATE: ___________________ GRADE LEVEL/SECTION: __________________________ SCORE: __________________ Test I. MULTIPLE CHOICE. Direction: Read and analyze the questions carefully. Write the letter of the correct answer on the space provided before each number. _____1. This feature of Web 2.0 allows users to categorize information through tagging. A. Folksonomy B. Taxonomy C. Hashtag D. User Participation _____2.What type of file does key logger software typically use to store its recording? A. Virus Files B. Text Files C. Log Files D. Data Files _____3. The following are tips on how to stay safe online except A. Buy the software, do not used pirated ones. C. Share your password with anyone. B. Add friends you know in real life. D. Avoid visiting untrusted websites. _____4. How does spyware infect a computer? A. Theft of personal information c. Pop-ups B. Recording web information d. All of the above _____5. Ralph is using a technique that tries to take information from the user. He commonly takes things like credit cards, usernames, passwords, and home address. What type of threat is depicted in the scenario? A. Scam B. Spam C. Phishing D. Fishing _____6. This is the process of scanning the full text of a query in order to understand what the user needs. A. Communication Skills C. Contextualized online research B. Research Methodology D. Data Collection ____7. Any information coming from these domain types are usually reliable except A. .org B. .edu C. .gov D. .com _____8. What symbol will you use to search for the exact term or phrase? a. ( ) B. & C. " " D. _____9. This media is designed to help people who have visual and reading impairments. A. Assistive Media B. Social media C. Bookmarking Sites D. Media Sharing _____10. Pinterest is a social media website that can be classified as A. Microblogging B. Blogs and Forums C. Bookmarking Sites D. Media Sharing Test II: TRUE or FALSE. Instructions: Write True if the statement is correct, otherwise write False. Write your answer on the space provided. ______ 1. ICT deals with the use of different technologies to work on a similar goal or task. ______ 2. Know the security features of the social networking site you use. ______ 3. Web pages that are the same regardless of the user are referred to static ______ 4. Web pages of Web 1.0 are dynamic and interactive. ______ 5. World Wide Web or www is invented by Sir Tim Bernes-Lee in 1999. ______6. Don't adhere to the same standards of behavior online that you follow in real life ______7. Remember the human and abuse your power. ______ 8. Reply or click links from suspicious emails. ______9. Research skill is the ability to find answer to a question or a solution to a problem. ______10. Don't make your self look good online. Downloaded by Noire Oc (noire.owsi@gmail.com) lOMoARcPSD|30841724 Test III. IDENTIFICATION. Instructions: Identify the terms described by the following statements. Write the answer on the space provided. ______________________1. A law that deals with all the forms of cybercrime. ______________________2. It refers to security of people and practices that should be observed when using the internet to ensure that their information are safe from crimes. ______________________3. Passwords must contained at least how many characters? ______________________4. A crime in which computer is used as object and tool in committing a crime such as hacking, phishing, child pornography, etc. ______________________5. A form of pornography that unlawfully exploits children for sexual stimulation. Test IV. Matching Type. Direction: Match Column A with Column B. Write the letter of the correct answer on the space provided. A B ______1. Also known as Malicious Software ______2. A malicious program that disguised as legitimate program that user will accept and use but take control of your computer. ______3. A malicious program that replicate itself by copying itself to another program. ______4. A malicious program that copy itself and spreads to other computers. ______5. A malicious program that gathers information from victims computer and send it back to the hacker. ______6. An unwanted advertisement that will pop-up several times on victims computer then behave abnormally and tedious to close them. ______7. A program that runs in the background and steals credentials and information and send back to hack by recording every keystroke that a user makes on their computer or device. _____8. A ransom virus that block the user from accessing the programs on files and demands to pay a ransom through online method for the removal of the virus. _____9. Known as junk email or unwanted email send by advertiser or bot. It can be used to send malware. _____10. A cyber attack method using deceptive emails and websites to acquiring sensitive personal information. ________________________________________ Parents/Guardians Signature over printed name Date: __________________________________ Downloaded by Noire Oc (noire.owsi@gmail.com) A.Spyware B. Keylogger C. Phishing D. Spam E. Ransomware F. Worm G. Malware H. Virus I. Trojan Horse J. Adware lOMoARcPSD|30841724 Downloaded by Noire Oc (noire.owsi@gmail.com)