You are on page 1of 2

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region IV-A CALABARZON
SCHOOLS DIVISION OF CAVITE

CARMONA SENIOR HIGH SCHOOL


EMPOWERMENT TECHNOLOGIES

SCORE__________________________

Name: ____________________________________ Date: _____________________________________


Year/Section: ______________________________ Teacher: __________________________________

I. Identify the following.

___________________1. refers to the transmission of unwanted or unsolicited messages from various origins
using electronic messaging systems such as e-mail and chat messengers.
__________________ 2. a computer software sent by attackers to inflict chaos on a computer’s operation
and processes. Short term for malicious software.
__________________ 3. It deals with the use of different communication technologies such as mobile
phones, telephone, Internet to locate, save, send and edit information.
__________________ 4. defined as “severe or repeated use by one or more students of a written, verbal or
electronic expression, or a physical gesture, or any combination thereof, directed to another student that has
the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage
to his property.”
__________________5. It is a document that is suitable for the World Wide Web.
_____________________6. is network etiquette, the do's and don'ts of online communication.
_____________________7. is a personal insult communicated through the internet.
_____________________8. is where a single device can serve more than one particular function.
_____________________9. Also referred as “Static Web”.
_____________________10. Also referred as “dynamic web”.
_____________________11. Invented by Tim-Berners Lee.
_____________________12. Means unchanged or constant.
____________________ 13. Refers to web pages that are affected by user input or preference
____________________ 14. Allows user to categorize information using freely chosen keywords e.g tagging by
Facebook, twitter, use tags that start with the pound sign #, referred to as hashtag.
____________________ 15. Also called as Semantic Web.
____________________ 16. Is the synergy of technological advancements to work on a similar goal or task
___________________ 17. is a website, application, or online channel that enables web users to create, co-create,
discuss, modify, and exchange user-generated content.
____________________ 18. Dub as the “ICT Hub of Asia” because of huge growth of ICT-related jobs, one of which is
BPO, Business Process Outsourcing, or call centers.
____________________ 19. It is means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers.
___________________ 20. Is a nonprofit service designed to help people who have visual and reading impartments. A
database of audio recordings is used to read to the user.

II. Multiple Choice. Write the letter of the correct answer on the line before each number.
______1. Defined as a software or a program used by an attacker to obtain personal information.
a. Spam b. Phishing c. Threats d. Malware
______2. Unwanted email mostly from bots or advertisers. It can be used to send malware.
a. Malware b. Spam c. Phishing d. Pharming
______3. A more complicated way of phishing where it exploits the DNS (Domain Name Service) system.
a. Malware b. Spam c. Phishing d. Pharming
______4. Is network etiquette, the do's and don'ts of online communication. Refers to the set of guidelines for behaving
properly online.
a. Netiquette b. Internet c. Internet Policy d. Etiquette
______5. Is where a single device can serve more than one particular function.
a. MS Powerpoint b. Smart Phones c. Application d. Media Convergence
______6. A malicious program that transfers from one computer to another by any type of means. Often it uses a
computer network to spread itself.
a. Malware b. Spam c. Phishing d. Pharming
______7. Describe as content is dynamic and is responsive to user’s input
a. Technological Convergence b. Media Convergence c. Rich User Experience d. User Participation
______8. Is a collection of Web pages.
a. Web Site b. Hyperlink c. Computer d. World Wide Web
______9. Is a program that allows you to view and explore information on the Internet.
a. Web Page b. Google c. Web Browser d. Web Site
______10. Slang for browsing – to search for information on the Internet.
a. Surf b. Internet c. Web Browser d. Google

III. Enumeration.
Six Types of Social Media.
1.
2.
3.
4.
5.
6.

Give at least seven TIPS to Stay Safe Online.


7.
8.
9.
10.
11.
12.
13.

Three Types of Internet Threats


14.
15.
16.

Give at least four problems with Web 3.0


17.
18.
19.
20.

IV. Essay.
Choose only one question to answer
1. What is Bullying? What can you do or contribute to help prevent bullying?

2. As student, give your expression on how to empower technologies improve your education?

You might also like