1. ICT stands for Information and Communication Technology 2. International companies call Philippines as the “ICT Hub of Asia” 3. Convergence is the synergy of technological advancement to work on a similar goal. 4. Social Media is a website that enables users to create, discuss and exchange user generated content. 5. A virus is a malware that multiplies and infects other computer through flash drives. 6. Android is an operating system for mobile phones. 7. Blackberry OS are intended only for Blackberry phones. 8. Symbian is smartphone OS use by Nokia devices. 9. Social News can allow user to post news item or link from other news sources. 10. Microblogging are sites that focus on short updates from the user. WRITE THE LETTER OF THE CORRECT ANSWER.
11. What online platform does the figure represents?
a. Collaboration c. Social Media b. Blogging d. Image e. /Video Hosting 12. What online platform is a website that contains online personal reflections, comments, and often hyperlinks, videos, and photographs provided by the writer? a. Presentation / c. E-learning Visualization d. Blogging b. Web page creation 13. 6. What online platform does Google Drive, Trello, Kanban, Slack, and Skype applications represents? a. Collaboration c. Blogging b. Cloud computing d. Web page creation 14. 10. Which statement is true to describe Social Media Platform? A. Social Media Platform is a collective of online communications channels dedicated to community-based input, interaction, content-sharing and collaboration. B. Social Media Platforms are websites and applications dedicated to forums, micro-blogging, social networking, social bookmarking and social curation a. A and B are both true c. A is false, B is true b. A is true, B is false d. A and B are both false 15. What is cloud computing? a. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data. b. The tools that focus on a model that emphasizes the collaborative nature of the web c. The art of storing data locally. d. The process of saving data to the local network. 16. One of the major benefit of using online platforms is to free-up hardware usage.t a. true c. maybe b. false 17. a provider that transports information electronically and can encompass public and private companies in telecom, internet, cable, satellite and managed system service a. online banking c. payment system b. communication d. cloud computing services 18. an online platform that allows users to create and manage campaigns, generate reports and retrieve information a. online banking c. payment system b. advertisement d. cloud computing platforms 19. online platforms where we can create presentations more creatively a. creative content c. payment system outlets d. cloud computing b. online banking 20. designed to search information on the world wide web a. creative content c. payment system outlets d. web search engines b. online banking LESSON 3 Online Safety, Security, Ethics WRITE TRUE OR FALSE (T OR F) 21. Do not use pirated software. 22. Think before you click 23. Do not just accept terms and conditions; read it. 24. Do not share your password to anyone. 25. Don’t post anything about future vacation. 26. Add friends you know in real life. 27. Avoid visiting untrusted website. 28. Make your Wi-Fi password private. 29. Do not reply to a suspicious e-mail. 30. Do not talk to strangers’ weather online or face to face. LESSON 3 Online Safety, Security, Ethics WRITE THE LETTER OF THE CORRECT ANSWER 31. Designed to send you advertisement. a. adware b. trojan c. internet d. pharming 32. Replicates and can transfer from one computer to another. a. virus b. spyware c. spam d. malware. 33. Exploit the DNS system. a. pharming b. rogue c. malware d. spam 34. Runs in the background and monitors what you are doing. a. spyware b. spam c. trojan d. keylogger 35. Unwanted emails, mostly from bots. a. spam b. rogue c. malware d. net 36. Disguise as a useful program but it’s not. a. trojan b. rogue c. keylogger d. worm 37. A malicious software. a. malware b. spyware c. spam d. keylogger 38. Used to record the keystrokes done by the user. a. keylogger b. spam c. trojan d. worm 39. Malicious program like “LOVE BUG” created by a Filipino programmer. a. worm b. virus c. malware d. trojan 40. Tricks the user into posting that is a security software. a. Phishing b. virus c. Pharming d. spam