ET Midterms

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

MIDTERM EXAMS

SCORE:

NAME: ______________________________
GRADE AND SECTION: _________________
DATE: _______________

Prepared by: Checked by:

Julianne Rebecca M. Pitlongay Windilina B. Lorenzana


Subject Teacher Master Teacher I

Approved by:

Romeo S. Venancio
School Principal II

MULTIPLE CHOICE.
EMPOWERMENT TECHNOLOGY
Read and analyze the questions and choose the correct answer. Write your answers _____ 43. The act of tormenting, threatening, harassing or embarrassing another
on the space provided before each number. WRITE THE LETTER IN person using the internet or other technologies.
CAPITAL LETTERS. A. Cyber Crime B. Cyber Stalking C. Bullying D. Cyber
Bullying
_____ 1. What type of web page is classified as flat or stationary? _____ 44. Describes a criminal who impersonates another individual or
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0 organization, with the intent to gather personal or business information.
_____ 2. What web 2.0 feature allows users to subscribe to a data plan that charges A. Scamming B. Spamming C. Spoofing D. Stalking
for the amount of time spent on the internet? _____ 45. All of the following are rules of netiquette EXCEPT:
A. Folksonomy B. Long Tail C. User Participation D. Application A. You can post, share, and comment whatever you want on social media.
_____ 3. What specific type of social media allows you to connect with other B. Adhere to the same standard of behavior online that you would follow in
people? real life.
A. Microblogging B. Social Networks C. Media Sharing D. Social C. Respect other people’s time and bandwidth.
News D. Be forgiving of other people’s mistakes.
_____ 4. Twitter is an example of what specific type of social media? _____ 46. It refers to the practices and precautions that should be observed when
A. Microblogging B. Social Networks C. Media Sharing D. Social using the internet to ensure that the users as well as their computers and personal
News information are safe from crimes associated with using the internet.
_____5. YouTube and Instagram are examples of what specific type of social A. Online Safety B. Online Rules C. Netiquette D. Core Rules
media? _____ 47. In MS Word, which tab will you click if you want to create a mail
A. Blogs and Forums C. Media Sharing merge letter?
B. Social Networks D. Bookmarking Sites A. Layout B. Home C. Insert D. Mailings
_____ 6. What specific type of social media allows its users to post their original _____ 48. It allows you to present and share presentations, infographics and videos
content on websites such as WordPress, Blogger, and Tumblr? with other people. It is used to communicate information clearly and efficiently.
A. Blogs and Forums C. Media Sharing A. Presentation or Visualization Platform C. Social Media
B. Social Networks D. Bookmarking Sites B. Cloud Computing Platform D. File Management Platform
_____ 7. What type of social media allows you to manage links to various _____ 49. It is a set of rules and norms for acceptable conduct or behavior online.
websites? A. Etiquette B. Netiquette C. Values D. Laws
A. Blogs and Forums C. Media Sharing _____ 50. It allows users to collectively classify and find information using freely
B. Social Networks D. Bookmarking Sites chosen keywords.
_____ 8. What do you call the global system of interconnected computer networks A. Folksonomy C. Long Tail
that use servers to link billions of devices worldwide? B. User Participation D. Rich User Experience
A. Websites B. Web browser C. Internet D. World Wide Web
_____ 9. What type of web page is classified as a dynamic page?
A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0
_____ 10. Which of the following is an example of sites under web 2.0?
A. Facebook B. YouTube C. Wikipedia D. all of the above
_____ 11. Social Networks are sites that allow you to connect with other people
having the same interests. It allows you to share your own news and other news
from other sources. _____ 33. If you want to insert illustrations in your document, which tab will you
A. Only the FIRST statement is TRUE. click?
A. File B. Home C. Insert D. Design _____ 12. Marisa wants to publish her collections of original poems online. Which
_____ 34. It is a word processing feature that allows you to easily create multiple online platform must she do this?
letters, labels, envelopes, and others. A. Social News B. Bookmarking Sites C. YouTube D. Blogs
A. Label Generation B. Mail Merge C. Insert D. MS Word _____ 13. Watson is creating a cover video of his favorite song. Which online
_____ 35. It is also called data file which comprises the information to be merged platform must he publish this?
into a document such as the list of names and addresses to be used in a mail merge. A. Social News B. Bookmarking Site C. YouTube D. Blogs
A. Main Document B. Data Source C. Merge Document D. Form Letter _____ 14. Cathy has created a very good slideshow presentation on a certain topic,
_____ 36. Also known as love bug or love letter. It is a computer worm attached and she wants to share it to other teachers around the world. Which online platform
on email that have infected 10 million of windows personal computer that cause must she publish this?
computer shutdown and deletion of files on the year 2000. A. Presentation Platforms C. File Management Platforms
A. Trojan Horse B. Virus C. Iloveyou Virus D. Ihateyou Virus B. Cloud Computing Platforms D. Social Media Platforms
_____ 37. Which of the following is an example of a spyware? _____ 15. What is netiquette?
A. Banner Ads B. Malware C. Pop-up Ads D. Keylogger A. The proper use of manners and etiquette on the internet.
_____ 38. All of the following are online safety measures EXCEPT: B. Using a net to catch fish.
A. Never give any personal information out about yourself over the internet. C. Being mean to other people on Facebook.
B. Never open messages or attachments from someone you do not know. D. Using proper manners at the dinner table.
C. When using a public computer terminal, be sure to delete your browsing _____ 16. What is considered shouting over the internet?
data before leaving. A. Screaming at your computer.
D. You can download and install software or anything on your computer or B. Writing in all CAPS.
cell phone that is unknown to you. C. Putting a lot of exclamation marks at the end of a sentence.
_____ 39. An act performed by a knowledgeable computer user sometimes D. Not answering a friend request on Facebook.
referred to as hacker that illegally browses or steal someone’s information. _____ 17. It is OK to forward or post an email message that you received if
A. Online Hackers B. Online Threats C. Online Crimes D. Cybercrime ______.
_____ 40. A network of zombie computers that have been taken over by a robot or A. the message is typed in all capitals
bot that performs large scale malicious acts for the creator of the botnet. B. the author of the message has given you permission to forward or post it
A. Internet Scam B. Virus C. Internet Bots D. C. it does not contain any copyrighted material
Internet Bugs D. the author of the message hasn’t marked it as confidential
_____ 41. It is a malicious software disguised as real software often secretly _____ 18. What is a flame in cyberspace?
installed, intended to transfer and gather private information, like passwords, A. A person who follows the rules of netiquette.
without the user’s permission. B. An expert programmer.
A. Malware B. Adware C. Spyware D. Virus C. An online chain letters.
_____ 42. YanYan’s stalker uses the internet and other electronic device to harass D. A post or email message that expresses a strong opinion or criticism.
or stalk her. What type of threat is used by the stalker? _____ 19. Knowledge and understanding of netiquette is useful because ________.
A. CyberCrime B. Phishing C. CyberStalking D. Pharming A. It will help you create a positive impression on those you meet in
cyberspace.
B. It explains some of the technical limitations of online communications.
B. Only the SECOND statement is TRUE. C. It explains the conventions already being used by millions of cybernauts.
C. BOTH statements are TRUE. D. All of the above.
D. BOTH statements are FALSE.
_____ 20. What type of information should you avoid giving when using the A. Adware B. Spyware C. Worms and Virus D. Ransomware
internet? _____ 27. Which of the following is an example of a “phishing” attack?
A. Phone number B. Profile Picture C. Shirt Size D. Religion A. Sending someone an email that contains a malicious link that is disguised
_____ 21. What is the golden rule of netiquette? to look like an email from someone reliable.
A. Remember the human. C. Use correct grammar. B. Creating a fake website that looks nearly identical to a real website in
B. Put a smiley in every message. D. Respect people’s time. order to trick users into entering their login information.
_____ 22. You get an email telling you that you won a hundred thousand without C. Sending someone a text message looks like a notification that the person
joining in a competition. You should ___________. has won a contest.
A. Claim the prize. C. Return the email with response. D. Sending someone an email that records their keystroke activities while
B. Ignore the email. D. Send rude message as revenge. using their computers.
_____ 23. Choose which image below describes how you feel about sharing _____ 28. Which of the following must NOT be done if you received an
password with your boyfriend/girlfriend? embarrassing picture from your friend?
A. Tell your parents or teachers.
B. Send the picture on to other friends.
C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that.
_____ 29. To avoid being cyber-bullied you should always ________.
A. Give out personal information to anyone who asks.
B. Strike first – post mean things about other people on your wall on
A. C. Facebook.
C. Observe proper netiquette.
D. Ignore any requests from people to be your friend online.
_____ 30. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the internet and how it looks – by your
spelling, grammar, and netiquette.
C. You are judged by your intent – if you didn’t mean to hurt someone’s
B. D. feelings, then it’s okay.
D. You are judged by how you look – your profile picture is important.
_____ 24. Your social media friends list should only be composed of _____ 31. Which of the following objects can be inserted in your document?
___________. A. PicturesB. Sound C. Chart D. Shapes
A. Your favorite brands C. Anyone who sends you a friend _____ 32. In MS Word, this is a visualization or drawing that is in the form of
request. pictures, clip art, shapes, SmartArt, charts, or screen clippings.
B. Family and friends D. foreigners A. Icons B. Illustrations C. Shapes D. Charts
_____ 25. What harmful online programs are designed to send you advertisements,
mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomware
_____ 26. What harmful online program is used to record keystrokes done by users
to steal passwords?

You might also like