Empowerment Reviewer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

EMPOWERMENT TECHNOLOGY

Direction: Read each item carefully and choose the letter of the correct answer.

Write your answers on a separate sheet of paper or in your notebook.

1. What type of web page is classified as flat or stationary?

A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0

2. What web 2.0 feature allows users to subscribe to a data plan that charges for the amount of time spent on the
internet?

A. Folksonomy B. Long Tail C. User Participation D. Application

3. What is the name of the symbol that is used to classify and categorize information?

A. Hashtag B. Question Mark C. Asterisk D. At sign

4. What specific type of social media allows you to connect with other people?

A. Microblogging B. Social Networks C. Media Sharing D. Social News

5. Twitter is an example of what specific type of social media?

A. Microblogging B. Social Networks C. Media Sharing D. Social News

6. YouTube and Instagram are examples of what specific type of social media?

A. Blogs and Forums B. Social Networks C. Media Sharing D. Bookmarking Sites

7. What specific type of social media allows its users to post their original content on websites such as WordPress,
Blogger, and Tumblr?

A. Blogs and Forums B. Social Networks C. Media Sharing D. Bookmarking Sites

8. What type of social media allows you to manage links to various websites?

A. Blogs and Forums B. Social Networks C. Media Sharing D. Bookmarking Sites

9. What do you call the global system of interconnected computer networks that use servers to link billions of devices
worldwide?

A. Websites B. Web browser C. Internet D. World Wide Web

10. What type of web page is classified as a dynamic page?

A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0

11. What type of web provides a framework that allows data to be shared and reuse to deliver web content
specifically targeting the user?

A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Website

12. Which of the following is an example of sites under web 2.0?

A. Facebook B. YouTube C. Wikipedia D. All of the above

13. What type of web page is classified as flat or stationary?

A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0


14. Twitter statuses are only composed of a few characters. What type of social media site does Twitter belong?

A. Micro blogging B. Media Sharing C. Social Networks D. Bookmarking Sites

For #’s 15-16, use the choices inside the box.

A. If only the FIRST statement is TRUE.

B. If only the SECOND statement is TRUE.

C. If BOTH statements are TRUE.

D. If BOTH statements are FALSE.

15. Social networks are sites that allow you to connect with other people having the same interests. It allows you to
share your own news and other news from other sources.

16. The Philippines is considered as the “ICT Hub in Asia.” The ICT Industry shares 19.3% of the total employment
population in the Philippines coming from the government agencies.

17. Marisa wants to publish her collections of original poems online. Which online platform must she do this?

A. Social News B. Bookmarking Site C. YouTube D. Blogs

18. Watson is creating a cover video of his favorite song. Which online platform must he publish this?

A. Social News B. Bookmarking Site C. YouTube D. Blogs

19. Cathy has created a very good slideshow presentation on a certain topic, and she wants to share it to other
teachers around the world. Which online platform must she publish this?

A. Presentation Platforms B. Cloud Computing Platforms

C. File Management Platforms D. Social Media Platforms

20. What is the name of the symbol that is used to classify and categorize information?

A. Hashtag B. Question Mark C. Asterisk D. At sign

21. What is Netiquette?

A. The proper use of manners and etiquette on the Internet.

B. Using a net to catch fish.

C. Being mean to other people on Facebook.

D. Using proper manners at the dinner table.

22. What is considered shouting over the Internet?

A. Screaming at your computer. B. Writing in all CAPS.

C. Putting a lot of exclamation marks at the end of a sentence. D. Not answering a friend request on Facebook.

23. It is OK to forward or post an email message that you received if __________

A. the message is typed in all capitals.

B. the author of the message has given you permission to forward or post it.

C. it does not contain any copyrighted material.


D. the author of the message hasn't marked it as confidential.

24. What is a flame in cyberspace?

A. A person who follows the rules of Netiquette. B. An expert programmer

C. An online chain letter. D. A post or email message that expresses a strong opinion or criticism.
25. Knowledge and understanding of netiquette is useful because ___________

A. it will help you create a positive impression on those you meet in cyberspace.

B. it explains some of the technical limitations of online communications.

C. it explains the conventions already being used by millions of cybernauts.

D. All of the above.

26. What type of online threat happens when an attacker uses electronic devices to do unwanted surveillance against
its victim?

A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking

27. What type of online threat happens when the attacker impersonates another individual or organization to gather
personal or business information?

A. Cyberstalking B. Spoofing C. Scamming D. Pharming

28. What type of information should you avoid giving when using the internet?

A. Phone number B. Profile Picture C. Shirt Size D. Religion

29. What is the golden rule of netiquette?

A. Remember the human. B. Put a smiley in every message C. Use correct grammar.. D. Respect people’s time.

30.You get an email telling you that you won a hundred thousand without joining in a competition. You should
____________.

A. Claim the prize. B. Ignore the email

C. Return the email with response D. Send rude message as revenge

31. What type of malicious program is designed to replicate itself and transfer from one computer to another either
through the internet or local networks or data storage like flash drives and CDs?

A. Adware B. Spyware C. Worms and Virus D. Ransomeware

32. What harmful online programs are designed to send you advertisements, mostly pop-up ads?

A. Adware B. Spyware C. Worms and Virus D. Ransomeware

33. What harmful online program is used to record keystrokes done by users to steal passwords?

A. Adware B. Spyware C. Worms and Virus D. Ransomeware

34. What is ransomware based on?

A. Fear of hackers B. Fear of the Internet C. Fear of spyware D. Fear of losing important files

35. Which of the following is an example of a “phishing” attack?

A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone reliable.
B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login
information.

C. Sending someone a text message looks like a notification that the person has won a contest.

D. Sending someone an email that records their keystroke activities while using their computers.

36. Which of the following must NOT be done if you received an embarrassing picture from your friend?

A. Tell your parents or teachers

B. Send the picture on to other friends

C. Talk to your friend about its negative outcomes.

D. Discourage your friend from sending pictures like that.

37. What is a flame in cyberspace?

A. A person who follows the rules of Netiquette. C. An online chain letter.

B. An expert programmer. D. A post or email message that expresses a strong opinion or criticism.

38. What is considered shouting over the Internet?

A. Screaming at your computer. C. Putting a lot of exclamation marks at the end of a sentence.

B. Writing in all CAPS. D. Not answering a friend request on Facebook.

39. To avoid being cyber-bullied you should always...

A. Give out personal information to anyone who asks.

B. Strike first - post mean things about other people on your Wall on Facebook.

C. Observe proper netiquette rules.

D. Ignore any requests from people to be your friend online.

40.How are you judged in cyberspace?

A. No one can see you, so no one can judge you.

B. You are judged by what you do on the Internet and how it looks - by

your spelling, grammar, and netiquette.

C. You are judged by your intent - if you didn't mean to hurt someone's

feelings, then it's okay.

D. You are judged by how you look - your profile picture is important.

You might also like