Media and Information Literacy

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Multiple Choice. Choose the appropriate answer. Encircle the letter of your choice.

1.What is the major characteristics of the communication process?


A. Reactive
B. Interactive
C. Proactive
D. None of the above
2. Which of the following is not a common characteristic of generation Y individuals?
A. They consider their friends as family.
B. They are generally idealistic.
C. They are good multitaskers.
D. None of the above.
3. What do new media include?
A. Newspaper
B. Radio
C. Television
D. Computers
4. What element of the communication process refers to communication context in which
communication takes please?
A. Message
B. Medium
C. Feedback
D. Communication environment
5. What are the three major function of communication media in the Philippines?
A. To inform, to influence, to entertain
B. To entertain, to educate, to inform
C. To educate, to entertain to create
D. All of the above
6. Which era of human communication was the mobile phone invented?
A. Writing
B. Printing
C. Telecommunications
D. Interactive communication
7. What are the different types of media according to codes?
A. Sound
B. Video
C. Text
D. All of the above
8. What does mediamorphosis mean?
A. Old and new media are part of an interdependent system.
B. New media emerge from the old media.
C. Old media continue to evolve and adapt.
D. All of the above
9. What are the different types of media according to format?
A. Print
B. Electronic
C. Digital
D. All of the above
10. What do you need to consider in producing a media product?
A. Audience
B. Purpose
C. Medium
D. All of the above
11. Which of the following is the best source of information on health issues?
A. Internet
B. Experience
C. Library
D. Hispital
12. Which of the following is not an applicable way of organizing information?
A. By time-line
B. By category
C. By color
D. By location
13. What type of information is considered the original source of information?
A. Primary information
B. Secondary information
C. Tertiary information
D. All of the above
14. What are some of the opportunities of media and information?
A. Entertainment
B. Information
C. Education
D. All of the above
15. How are information and media content present and packaged?
A. By the nuances of the medium
B. By the type of audience to whom it is intended
C. By the purpose of the content
D. All of the above
16. Where do we get our tendency to use stereotypes or labels on certain groups when we produce
messages?
A. Media
B. Personal experience
C. Internet
D. All of the above
17. What are some of the aspects that we need to check in analyzing representations?
A. Music
B. Images
C. Language
D. All of the above
18. Who is considered a message marker?
A. Creator
B. Content
C. Consumer
D. All of the above
19. Which of the following is considered the grammar of media?
A. Media language
B. Codes and conventions
C. Representations
D. None of the above
20. What aspect of media representation refers to how current text is understood in relation to other
texts in the past?
A. Image
B. Sound
C. Intertextuality
D. Language
21. Which of the following is considered as a form of cyber threat wherein ones password gets stolen
to gain access to personal accounts?
A. Narcissism
B. Sexting
C. Cyber stalking
D. None of the above
22. Who should enjoy freedom of expression?
A. Advertisers
B. Media consumers
C. Journalists
D. All of the above
23. Which of the following enables strangers to identify internet users through their online behavior?
A. Sexting
B. Phishing
C. Digital footprint
D. All of the above
24. Which of the following is a form of user-generated content?
A. Facebook posts
B. Citizen journalism
C. Blogs
D. All of the above
25. Which of the following is a myth in the use of the internet?
A. Deleting erases anything permanently from the internet.
B. Setting online profile to “private” allows control over who can see it.
C. Downloading for personal web page is legal.
D. All of the above
26. Which of the following is not an element of radio drama?
A. Lights
B. Music
C. Dialogue
D. Sound effects
27. What is a characteristic of television, films, and videos?
A. Audio
B. Visual
C. Audiovisual
D. None of the above
28. Which of the following are considered frame media?
A. Television
B. Films
C. Videos
D. All of the above
29. What do we need to check before providing personal information online?
A. Web browser
B. Strong password
C. Mediated surveillance
D. All of the above
30. Which of the following is a type of music?
A. Rock
B. Pop
C. Ballad
D. All of the above
31. What is communication? How would you differentiate it from communications?
32. How do teenagers access information from the media and internet? Describe and explain some
observations and experiences.
33. Why should media and information literacy be treated as a composite concept?
34. What are some of the advantages and disadvantages of the mass media? Give examples.
35. What do you think is the reason why MIL has been integrated in the senior high school program?
Explain your answer
36. Why do we have to know information needs? Explain your answer.
37. Why do we need information? Cite some possible uses.
38. What are media languages? Explain.
39. Why do we need to study media representations? Explain your answer.
40. How will you describe the process of evaluating information?
41. ​Online identity theft - s​ tealing another person's identity and pretending to be the account owner.
42. ​Cyber trespassing or cyber stalking - ​stealing another person's password to gain access to his or
her personal accounts.
43. ​Cyber bullying - h ​ arassing someone online, sometimes through cruel messages, discriminatory
comments, or hate campaigns.
44. ​Narcissism - u ​ ncontrolled and excessive posting of “selfies.”
45. ​Online “groomers” - o ​ pen adult sexual predators pretending to be peers.
46.​ Sexting - s​ ending sexually oriented messages, including lewd humor, through text messaging.
47. ​Facebook depression - e ​ xcessive and unguided use of Facebook.
48. ​Facebook envy - ​comparing one's self with the unrealistic public image of friends, which leads to
low self-esteem.
49. ​Illusion of privacy - ​anything can be said to account owners by anyone, including those unknown
to them.
50.​ Phishing -​ an attempt to make the user send his or​ ​ log-in information and password to a fake
online account.

You might also like