0% found this document useful (0 votes)
104 views2 pages

Lamao Senior High School Empowerment Technologies First Quarter Summative Test #1

This document contains a summative test for LAMAO Senior High School students covering key concepts in empowerment technologies and the first quarter. The test has three sections - the first asks students to identify definitions, the second has students identify true/false statements, and the third asks students to write an essay explaining why it is important to "Think before you Click".

Uploaded by

carolus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views2 pages

Lamao Senior High School Empowerment Technologies First Quarter Summative Test #1

This document contains a summative test for LAMAO Senior High School students covering key concepts in empowerment technologies and the first quarter. The test has three sections - the first asks students to identify definitions, the second has students identify true/false statements, and the third asks students to write an essay explaining why it is important to "Think before you Click".

Uploaded by

carolus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

LAMAO SENIOR HIGH SCHOOL

EMPOWERMENT TECHNOLOGIES
FIRST QUARTER
SUMMATIVE TEST #1

NAME:_______________________________________________________ SECTION:___________________

I. Directions: Identify each of the following definitions/descriptions. Write the letter of your answer on a clean
sheet of paper (yellow paper, bondpaper, intermediate paper).

1. Which of the following social media website is for social network?


A. Facebook B. Reddit C. Twitter D. Youtube
2. It is an online version of information system.
A. e-learning B. Online system C. e-conference D. Webinar
3. It is a nonprofit service designed to help people who have visual and reading impairments.
A. Assistive media B. Digital Media C. Mobile media D. Social media
4. It deals with the use of different communications technology to locate, save, send, and edit information.
A. Communication B. Information C. Technology D. ICT
5. It refers to the tangible part of the computer system.
A. Hardware B. Peopleware C. Software D. Tupperware
6. It refers to a set of rules for an acceptable online behaviour.
A. Ethics B. Good Moral C. Nethics D. Netiquette

7. It is a type of window that appears on top of (over) the browser window of a Web site that a user has visited
A. Email Spoofing B. Pharming C. Phising D. Pop-ads
8. It refers to the creation of emails with a forged sender address.
A. Email Spoofing B. Pharming C. Phising D. Pop-ads

9. It is a deceitful practice of getting your personal information using email or text messages.
A. Email Spoofing B. Pharming C. Phising D. Pop-ads

10. It is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting
users to fraudulent Web sites without their knowledge or consent.
A. Email Spoofing B. Pharming C. Phising D. Pop-ads
II. Read each of the following definitions/descriptions. Write TRUE if the statement is correct anf FALSE if it is not
correct. Write your answer on your answer sheet.

___1. Software refers to the intangible part of the computer system.

___2. Mobile Media refers to “media devices such as mobile phones and PDA’s were the primary source of portable
media from which we could obtain information and communicate with one another.
___3. Social Media are computer-mediated tools that allow people or companies to create, share, or exchange
information, career interests, ideas, and pictures/videos in virtual communities and networks.
___4. Online ethics focuses on the unacceptable use of online resources in an online social environment.
___5. Spotware is software that "spies" on your computer where it captures information like web browsing habits,
e-mail messages, usernames and passwords, and credit card information.

___6. Pop-ads can be used by hackers to steal your personal information.

___7. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone
else like sharing personal or private information causing embarrassment or humiliation.

___8. Flaming is the act of saying mean things online, usually in ALL CAPS, and often in a public forum with the
intention to humiliate.

___9. ICT is the only online platforms in the market.


___10. Phising happened when the code sent in an e-mail modifies local host files on a personal computer.

III. Essay. Why is it important to “Think before you Click”? (5pts)

Rubrics:
5 – answer is clear and correct
3 – answer correct but not clearly stated
1 – answer is far from what is asked

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy