Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Deals with the use of different communication technologies such as mobile phones,
telephone, Internet, etc. to locate, save, send, and edit information. Example is when we
make a video call, we use social media
5. A generic term used to refer to a group of software or hardware devices by which people
with disabilities can access computers.
A. Collaborative platforms B. ICT C. Assistive Media D. Mobile Media
6. A category of business software that adds broad social networking capabilities to work
processes.
A. Collaborative platforms B. Convergent Technologies C. Assistive Media D. Mobile
Media
9. A media device such as mobile phones and PDA’s were the primary source of portable
media from which we could obtain information and communicate with one another.
A. Collaborative platforms B. ICT C. Convergent Technologies D.
Mobile Media
10. Online versions of information systems, which is “the process of and tools for storing,
managing, using, and gathering of data and communications in an organization.
A. Mobile Media B. Web 1.0 C. Online systems D. Social Media
11. Are computer-mediated tools that allow people or companies to create, share, or
exchange information, career interests, ideas, and pictures/videos in virtual communities and
networks.
A. Mobile Media B. Web 1.0 C. Online systems D. Social Media
12. Describes World Wide Web sites that emphasize user-generated content, usability, and
interoperability. Known as “dynamic web”.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
13. A web version that used semantic web.
A. Web 2.0 B. Web 1.0 C. Web 3.0 D. Social Media
15. This is done by sending you an email that will direct the user to visit a website and be
asked to update his/her username, password, credit card, or personal information.
A. Spam B. Phishing C. Virus D. Malware
16. A malicious program that transfer from one computer to another by any type of means.
Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm (Love
bug Worm)
A. Virus B. Adware C. Trojan D. Worm
17. A malicious program designed to replicate itself and transfer from one computer to
another either through the internet and local networks or data storage like flash drives and
CD’s
A. Worm B. Trojan C. Virus D. Adware
18. A malicious program that is disguised as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.
A. Worm B. Trojan C. Virus D. Adware
19. A program that runs in the background without you knowing it.
A. Spam B. Trojan C. Spyware D. Phishing
21. Unwanted email mostly from bots or advertisers. It can be used to send malware.
A. Spam B. Trojan C. Spyware D. Phishing
25. Social News can allow user to post news item or link from other news sources
A. True B. False C. Maybe D. Not Sure