I. Multiple Choice: I. Multiple Choice

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

I. MULTIPLE CHOICE: I.

MULTIPLE CHOICE:
Directions: Read and answer the questions below. Directions: Read and answer the questions below.
Encircle the letter of the best answer from among Encircle the letter of the best answer from among
the given choices. the given choices.

1. A web application where a user can 1. A web application where a user can
communicate, create and share communicate, create and share
content, and participate in online communities? content, and participate in online communities?
A. Convergence C. Mobile Technologies A. Convergence C. Mobile Technologies
B. Social Media D. Assistive Media B. Social Media D. Assistive Media
2. What is the markup language for designing and 2. What is the markup language for designing and
developing websites? developing websites?
A. DNS C. HTTP A. DNS C. HTTP
B. URL D. HTML B. URL D. HTML
3. What version of the world wide web that allows 3. What version of the world wide web that allows
interactivity between the interactivity between the
users and the website? users and the website?
A. Web 1.0 C. Web 3.0 A. Web 1.0 C. Web 3.0
B. Web 2.0 D. Web 4.0 B. Web 2.0 D. Web 4.0
4. A website that allows you to broadcast short 4. A website that allows you to broadcast short
message. message.
A. Social News C. Microblogging A. Social News C. Microblogging
B. Bookmarking Sites D. Media Sharing B. Bookmarking Sites D. Media Sharing
5. A platform that assist person with disability. 5. A platform that assist person with disability.
A. Assistive Media C. Convergence A. Assistive Media C. Convergence
B. Social Media D. Semantic Web B. Social Media D. Semantic Web

II. TRUE OR FALSE: II. TRUE OR FALSE:


Directions: Write “True” if the statement is true Directions: Write “True” if the statement is true
and write “False” if the statement is false. and write “False” if the statement is false.

_______6. We are allowed to copy the works of _______6. We are allowed to copy the works of
other people without asking permission. other people without asking permission.
_______7. All Information from the internet are _______7. All Information from the internet are
free. free.
_______8. Search engine is an application used _______8. Search engine is an application used
for searching the web. for searching the web.
_______9. All information from the internet are _______9. All information from the internet are
reliable. reliable.
______10. Google is an example of search ______10. Google is an example of search
engine. engine.
______11. Child pornography is a form of ______11. Child pornography is a form of
cybercrime. cybercrime.
______12. Committing crime on the internet is not ______12. Committing crime on the internet is not
punishable by law punishable by law
______13. Do not open suspicious email. ______13. Do not open suspicious email.
______14. Share your password with anyone. ______14. Share your password with anyone.
______15. Think before you click. ______15. Think before you click.

Prepared by: Prepared by:

ARIEL A. CANCINO ARIEL A. CANCINO


Subject Teacher Subject Teacher
SUMMATIVE TEST 2 SUMMATIVE TEST 2
Empowerment Technology 11 Empowerment Technology 11

SUMMATIVE TEST 1
PILOSOPIYA 12

I. MULTIPLE CHOICE: I. MULTIPLE CHOICE:


Directions: Read and answer the questions below. Directions: Read and answer the questions below.
Encircle the letter of the best answer from among Encircle the letter of the best answer from among
the given choices. the given choices.

1. _______________a malicious program that 1. _______________a malicious program that


replicate itself by copying itself to another replicate itself by copying itself to another
program. program.
A. Virus C. Worm A. Virus C. Worm
B. Adware D. Spyware B. Adware D. Spyware
2. _______________malicious program that 2. _______________malicious program that
copy’s itself and spreads to other computers. copy’s itself and spreads to other computers.
A. Rootkit C. Trojan Horse A. Rootkit C. Trojan Horse
B. Worm D. Virus B. Worm D. Virus
3. _____________ is a ransom virus that block 3. _____________ is a ransom virus that block
the user from accessing the programs or files and the user from accessing the programs or files and
demands to pay the ransom through online demands to pay the ransom through online
method method
for the removal of the virus. for the removal of the virus.
A. Keylogger C. Ransomware A. Keylogger C. Ransomware
B. Botnet D. Spyware B. Botnet D. Spyware
4. _________ is a program that runs in the 4. _________ is a program that runs in the
background and steals user credentials and background and steals user credentials and
confidential information and send back to hack by confidential information and send back to hack by
recording recording
every keystroke that a user makes on their every keystroke that a user makes on their
computer or device. computer or device.
A. Spyware C. Rootkit A. Spyware C. Rootkit
B. Ransomware D. Keylogger B. Ransomware D. Keylogger
5. _________ is a malicious program that 5. _________ is a malicious program that
disguised as legitimate program that user will disguised as legitimate program that user will
accept and use but take control of your computer. accept and use but take control of your computer.
A. Trojan Horse C. Virus A. Trojan Horse C. Virus
B. Worm D. Botnet B. Worm D. Botnet

II. TRUE OR FALSE: II. TRUE OR FALSE:


Directions: Give the meaning of the following Directions: Give the meaning of the following
acronyms. acronyms.
6. www - ______________________________ 6. www - ______________________________
7. USB - _______________________________ 7. USB - _______________________________
8. WiFi - _______________________________ 8. WiFi - _______________________________
9. PNG- _______________________________ 9. PNG- _______________________________
10. JPEG - ______________________________ 10. JPEG - ______________________________
III. IDENTIFICATION: III. IDENTIFICATION:
Directions: Identify the following types of Social Directions: Identify the following types of Social
Media. Media.
Ex. Twitter – Social Network Ex. Twitter – Social Network
11. Youtube 11. Youtube
12. Reddit 12. Reddit
13. Pinterest 13. Pinterest
14. Flicker 14. Flicker
15. Wordpress 15. Wordpress

Prepared by: Prepared by:

ARIEL A. CANCINO ARIEL A. CANCINO


Subject Teacher Subject Teacher
SUMMATIVE TEST 1
SUMMATIVE TEST 1
PILOSOPIYA 12
PILOSOPIYA 12
SUMMATIVE TEST 1
PILOSOPIYA 12

I. MULTIPLE CHOICE:
I. MULTIPLE CHOICE: Directions: Read and answer the questions below.
Directions: Read and answer the questions below. Encircle the letter of the best answer from among
Encircle the letter of the best answer from among the given choices.
the given choices.
1. A web application where a user can
1. A web application where a user can communicate, create and share
communicate, create and share content, and participate in online communities?
content, and participate in online communities? A. Convergence C. Mobile Technologies
A. Convergence C. Mobile Technologies B. Social Media D. Assistive Media
B. Social Media D. Assistive Media 2. What is the markup language for designing and
2. What is the markup language for designing and developing websites?
developing websites? A. DNS C. HTTP
A. DNS C. HTTP B. URL D. HTML
B. URL D. HTML 3. What version of the world wide web that allows
3. What version of the world wide web that allows interactivity between the
interactivity between the users and the website?
users and the website? A. Web 1.0 C. Web 3.0
A. Web 1.0 C. Web 3.0 B. Web 2.0 D. Web 4.0
B. Web 2.0 D. Web 4.0 4. A website that allows you to broadcast short
4. A website that allows you to broadcast short message.
message. A. Social News C. Microblogging
A. Social News C. Microblogging B. Bookmarking Sites D. Media Sharing
B. Bookmarking Sites D. Media Sharing 5. A platform that assist person with disability.
5. A platform that assist person with disability. A. Assistive Media C. Convergence
A. Assistive Media C. Convergence B. Social Media D. Semantic Web
B. Social Media D. Semantic Web
II. TRUE OR FALSE:
II. TRUE OR FALSE: Directions: Write “True” if the statement is true
Directions: Write “True” if the statement is true and write “False” if the statement is false.
and write “False” if the statement is false.
_______6. We are allowed to copy the works of
_______6. We are allowed to copy the works of other people without asking permission.
other people without asking permission. _______7. All Information from the internet are
_______7. All Information from the internet are free.
free. _______8. Search engine is an application used
_______8. Search engine is an application used for searching the web.
for searching the web. _______9. All information from the internet are
_______9. All information from the internet are reliable.
reliable. ______10. Google is an example of search
______10. Google is an example of search engine.
engine. ______11. Child pornography is a form of
______11. Child pornography is a form of cybercrime.
cybercrime. ______12. Committing crime on the internet is not
______12. Committing crime on the internet is not punishable by law
punishable by law ______13. Do not open suspicious email.
______13. Do not open suspicious email. ______14. Share your password with anyone.
______14. Share your password with anyone. ______15. Think before you click.
______15. Think before you click.

Prepared by: Prepared by:

ARIEL A. CANCINO ARIEL A. CANCINO


Subject Teacher Subject Teacher

You might also like