0% found this document useful (0 votes)
9 views3 pages

Emtech-Midterm Examination-Cvafpi

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3

st

1 QUARTER EXAMINATION IN EMPOWERMENT TECHNOLOGY

Name: _______________________________________________ Grade and Section: __________________


Teacher: Ms. Anjhella A. Vinuya Score: ____________________________
GENERAL INSTRUCTION:
Write your answer in capital letter. Use black pen only and erasures or any form of tampering will mean wrong.
Test I. MULTIPLE CHOICE.
Direction: Read each item carefully. Write the letter of the correct answer on the space provided.

____1. What is the acronym ICT stands for?


A. Information and Communications Technology C. Informal Communications Technology
B. Informed Communications Technology D. Informations Communications Technology
____2. It refers to the software that people use to create and produce documents, presentations,
databases, charts, and graphs.
A. Productivity Tools C. Productivity Stool
B. Product Key D. Product Tools
____3. What is the acronym WWW stands for?
A. Word Wide Web C. Worth Wide Web
B. World Web Wide D. World Wide Web
____4. A program that allows users to search for content on internet.
A. Search Engine C. Google
B. Internet D. Worth Wide Web
____5. It is a flat or stationary page since it cannot be manipulated by the user.
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
____6. Users can classify and arrange information by adding tag or label.
A. Folksony C. Folksominy
B. Folksonomy D. Folksonomity
____7. This Act shall be known as the “Cybercrime Prevention Act of 2012”.
A. Republic Act No. 10174 C. Republic Act No. 10176
B. Republic Act No. 10175 D. Republic Act No. 10177
____8. It is also known as Malicious Software.
A. Adware C. Malware
B. Spyware D. Aware
____9. A crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.
A. Identity Theft C. Identity personal
B. Identity Stealing D. Identity left
____10. What do you call when someone intentionally abused, harass, and mistreated by other person using electronic communication?
A. Cyber abuse C. Cyberbullying
B. Cyber harass D. Cyber mistreated
____11. The semantic web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user.
A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0
____12. It refers to the practices and precautions that should be observed when using the internet.
A. Online practices C. Online observation
B. Online precautions D. Online safety
____13. It is an etiquette applied online that shows proper manner and behavior.
A. Etiquette C. Good manners
B. Netiquette D. Netizens
____14. The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada,
Amazon.
A. User Participation C. Long tail
B. Folksonomy D. Software as a service
____15. The feature of web 2.0, which services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the
amount of time you spent in the internet.
A. User Participation C. Long tail
B. Folksonomy D. Software as a service
____16. The feature of Web 2.0, which users will subscribe to a software only when needed rather than purchasing them e.g. Google docs used to create and edit word processing and spread
sheet.
A. User Participation C. Long tail
B. Folksonomy D. Software as a service
____17. This is a website, application, or online channel that enables web users to create, co-create, discuss modify, and exchange user generated content.
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
____18. The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do the tasks that were originally found in PCs.
A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media
____19. The following are the example of bloggers and forums, except.
A. Blogger C. Word press
B. Twitter D. Tumblr
____20. This is mobile operating system used in apple devices such as Ipad and Iphone.
A. Android C. SYMBIAN
B. IOS D. WEBOS
____21. The act of sending sexually explicit text messages, images, and videos.
A. Sexting C. Harassing
B. Bullying D. Texting
____22. Who invented WWW?
A. Seth T. Ross C. Netizens
B. Rappler blog site D. Tim-Berners Lee
____23. It is a protection given to the owner of the rights in an original work such as books, musical
works, films, paintings, and other works, and computer programs.
A. Copypaste C. Copywright
B. Copywrong D. Copyright
____24. Any person who is infringing the right protected work would be liable under the law.
A. Copyright Infringement C. Copyright
B. Copyright Law D. Fair use
____25. According to him, there are 119 million mobile phone subscriptions from a total population of 101 million and 47 million active Facebook accounts.
A. Seth T. Ross C. Netizens
B. Rappler blog site D. Tim-Berners Lee
____26. He invented the ten (10) core rules of netiquette.
A. Seth T. Ross C. Netizens
B. Rappler blog site D. Tim-Berners Lee
____27. It is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
A. Copyright Infringement C. Copyright
B. Copyright Law D. Fair use
____28. It refers to the software that people use to create and produce documents, presentations, databases charts, and graphs.
A. Production Tools C. Productivity Tools
B. Editing Tools D. Computer Tools
____29. Why should you learn productivity tools?
A. It is essential
B. It is efficient
C. While there are a wide range of benefits of using productivity tools.
D. All of the above
____30. The following are some of the example of productivity tools, except:
A. MS Word C. MS Powerpoint
B. MS Excel D. MS Suite

Test II. TRUE OR FALSE


Direction: Read each statement below carefully that tells something about the tips to be safe online and netiquette. Draw 😊on the space provided if the statement is TRUE and draw ☹ if

the statement is FALSE.


____31. Add password to your WIFI at home to make it private.
____32. Visit untrusted websites.
____33. Post about your future vacation.
____34. Adhere to the same standards of behavior online that you follow in real life.
____35. Abuse your power.

TEST III. ENUMERATION


Direction: List down or enumerate what is being asked on each of the following item.
(35-37) Types of Malwares
35.
36.
37.
(38-39) Examples of Search Engine
38.
39.
(40-42) Common Error Values That You Can Encounter from Faulty Formulas
40.
41.
42
(43-46) Elements of Design
43.
44.
45.
46.
(47-50) Principles of Design
47.
48.
49.
50.

“The fear of the Lord is the beginning of wisdom, and knowledge of the Holy One is understanding.”
-Proverbs 9:10

Prepared by:

MS. ANJHELLA A. VINUYA


Subject Teacher

Checked by: Noted by:


CHRISTIAN JOHN J. DUANA, LPT, CRS AIDA M. CASTRO, Ed. D.
CIDT Member Principal
CIDT Chairman

You might also like