Sei sulla pagina 1di 2

QUIZ 1: EMPOWERMENT TECHNOLOGIES

WRITE TRUE OR FALSE (T OR F)


1. ICT stands for Information and Communication Technology
2. International companies call Philippines as the “ICT Hub of Asia”
3. Convergence is the synergy of technological advancement to work on a
similar goal.
4. Social Media is a website that enables users to create, discuss and exchange
user generated content.
5. A virus is a malware that multiplies and infects other computer through flash
drives.
6. Android is an operating system for mobile phones.
7. Blackberry OS are intended only for Blackberry phones.
8. Symbian is smartphone OS use by Nokia devices.
9. Social News can allow user to post news item or link from other news sources.
10. Microblogging are sites that focus on short updates from the user.
WRITE THE LETTER OF THE CORRECT ANSWER.

11. What online platform does the figure represents?


a. Collaboration c. Social Media
b. Blogging d. Image
e. /Video Hosting
12. What online platform is a website that contains online personal reflections,
comments, and often hyperlinks, videos, and photographs provided by the
writer?
a. Presentation / c. E-learning
Visualization d. Blogging
b. Web page creation
13. 6. What online platform does Google Drive, Trello, Kanban, Slack, and
Skype applications represents?
a. Collaboration c. Blogging
b. Cloud computing d. Web page creation
14. 10. Which statement is true to describe Social Media Platform?
A. Social Media Platform is a collective of online communications channels
dedicated to community-based input, interaction, content-sharing and
collaboration.
B. Social Media Platforms are websites and applications dedicated to forums,
micro-blogging, social networking, social bookmarking and social curation
a. A and B are both true c. A is false, B is true
b. A is true, B is false d. A and B are both false
15. What is cloud computing?
a. The practice of using a network of remote servers hosted on the
Internet to store, manage, and process data.
b. The tools that focus on a model that emphasizes the collaborative
nature of the web
c. The art of storing data locally.
d. The process of saving data to the local network.
16. One of the major benefit of using online platforms is to free-up hardware
usage.t
a. true c. maybe
b. false
17. a provider that transports information electronically and can encompass
public and private companies in telecom, internet, cable, satellite and
managed system service
a. online banking c. payment system
b. communication d. cloud computing
services
18. an online platform that allows users to create and manage campaigns,
generate reports and retrieve information
a. online banking c. payment system
b. advertisement d. cloud computing
platforms
19. online platforms where we can create presentations more creatively
a. creative content c. payment system
outlets d. cloud computing
b. online banking
20. designed to search information on the world wide web
a. creative content c. payment system
outlets d. web search engines
b. online banking
LESSON 3 Online Safety, Security, Ethics
WRITE TRUE OR FALSE (T OR F)
21. Do not use pirated software.
22. Think before you click
23. Do not just accept terms and conditions; read it.
24. Do not share your password to anyone.
25. Don’t post anything about future vacation.
26. Add friends you know in real life.
27. Avoid visiting untrusted website.
28. Make your Wi-Fi password private.
29. Do not reply to a suspicious e-mail.
30. Do not talk to strangers’ weather online or face to face.
LESSON 3 Online Safety, Security, Ethics
WRITE THE LETTER OF THE CORRECT ANSWER
31. Designed to send you advertisement.
a. adware b. trojan c. internet d. pharming
32. Replicates and can transfer from one computer to another.
a. virus b. spyware c. spam d. malware.
33. Exploit the DNS system.
a. pharming b. rogue c. malware d. spam
34. Runs in the background and monitors what you are doing. a. spyware b. spam
c. trojan d. keylogger
35. Unwanted emails, mostly from bots.
a. spam b. rogue c. malware d. net
36. Disguise as a useful program but it’s not.
a. trojan b. rogue c. keylogger d. worm
37. A malicious software. a. malware b. spyware c. spam d. keylogger
38. Used to record the keystrokes done by the user. a. keylogger b. spam c. trojan
d. worm
39. Malicious program like “LOVE BUG” created by a Filipino programmer. a. worm
b. virus c. malware d. trojan
40. Tricks the user into posting that is a security software. a. Phishing b. virus c.
Pharming d. spam

Potrebbero piacerti anche