Empowerment Technology Long Quiz

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Empowerment technology

Long quiz (August 22, 2024)


Name: _______________________________ Score:_________

Test I: Multiple choice (Write the letter of the correct answer on the space provided before each number.)
____1. Twitter statuses are only composed of a few characters. What type of social media

site does Twitter belong?


A. Micro blogging C. Social Networks
B. Media Sharing D. Bookmarking Sites
____2. Watson is creating a cover video of his favorite song. Which online platform must he
publish this?
A. Social News C. YouTube
B. Bookmarking Site D. Blogs
____3. Cathy has created a very good slideshow presentation on a certain topic, and she
wants to share it to other teachers around the world. Which online platform must
she publish this?
A. Presentation Platforms C. File Management Platforms
B. Cloud Computing Platforms D. Social Media Platforms
____4. What is Netiquette?
A. The proper use of manners and etiquette on the Internet.
B. Using a net to catch fish.
C. Being mean to other people on Facebook.
D. Using proper manners at the dinner table.
____5. What is considered shouting over the Internet?
A. Screaming at your computer.
B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook.
___6. It is OK to forward or post an email message that you received if __________
A. the message is typed in all capitals.
B. the author of the message has given you permission to forward or post it.
C. it does not contain any copyrighted material.
D. the author of the message hasn't marked it as confidential.
___7.. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. An expert programmer.
C. An online chain letter.
D. A post or email message that expresses a strong opinion or criticism.
____8. Knowledge and understanding of netiquette is useful because ___________
A. it will help you create a positive impression on those you meet in
cyberspace.
B. it explains some of the technical limitations of online communications.
C. it explains the conventions already being used by millions of cybernauts.
D. All of the above.
___9. What type of online threat happens when an attacker uses electronic devices
to do unwanted surveillance against its victim?
A. Cyberbullying C. Spamming
B. Phishing D. Cyberstalking
___10. What type of online threat happens when the attacker impersonates another
individual or organization to gather personal or business information?
A. Cyberstalking C. Scamming
B. Spoofing D. Pharming
____11. What type of information should you avoid giving when using the internet?17
A. Phone number B. Profile Picture C. Shirt Size D. Religion
____12. What is the golden rule of netiquette?
A. Remember the human. C. Use correct grammar.
B. Put a smiley in every message. D. Respect people’s time.
____13.You get an email telling you that you won a hundred thousand without joining
in a competition. You should ____________.
A. Claim the prize.
C. Return the email with response.
B. Ignore the email.
D. Send rude message as revenge
____14. Your family is going out on a vacation. What should you do?
A. Post pictures when you return home.
B. Post the dates you will be gone online.
C. Post updates of where you are currently checking in hotels or places.
D. Tell no one. Vacations are for getting away.
_____15. Do you have the same passwords for all your accounts?
A. Yes. That is how I remember all my passwords.
B. I have different passwords for all different accounts.
C. I keep it simple. I don’t have any passwords.
D. I have two similar passwords that I alternately use for all my accounts.
Test II – True or False ( 2 points each correct answer)
_____________1. Never give any personal information out about yourself over the internet.
_____________2. Do not give any banking or sensitive information unless you are sure that it is a reputable
business having a secure service.
_____________3. Never open messages or attachments from someone you do not know.
_____________4. Regularly review your privacy settings in your online accounts to make sure you are not sharing
important personal information.
_____________5. When using a public computer terminal, be sure to save your browsing data before leaving.
_____________6. Keep your software updated to avoid security holes.
_____________7. Download or install software or anything on your computer or cell phone that is unknown to you.
_____________8. Netiquette is a combination of the words netizen and etiquette.
_____________9. There is no risk in sharing information about your siblings especially younger siblings because
they cannot use the internet yet.
_____________10. Your social media friends list should only be composed of anyone who sends you friend request.

Test III – Core rules of netiquette


1. Remember the ______________.
2. Adhere to the same standards of behavior online that you follow in _____________.
3. Know where you are in __________________.
4. Respect other people's __________ and bandwidth.
5. Make _____________ look good online.
6. Share expert _________________.
7. Help keep _______________ under control.
8. Respect other people's _______________.
9. Don't _______________ your power.
10. Be _________________ of other people's mistakes.

You might also like