Professional Documents
Culture Documents
Etech First Summative
Etech First Summative
Etech First Summative
The following are examples of scenarios that show Rules of Netiquette. Identify what specific rule each scenario
describe:
11. Frank checks first his grammar before posting a status update in his Facebook profile. He observes:
a. Rule No.1: Remember the Human c. Rule No.8: Respect other people’s privacy
b. Rule No.6: Share expert Knowledge d. Rule No.5: Make yourself look good online
12. Your classmate flooded your group chat unnecessary messages not related to your subject. Important
information is now hard to track because of it. What rule was violated?
a. Rule No. 3: Know where you are in cyberspace
b. Rule No. 5: Make yourself look good online
c. Rule No. 4: Respect other people’s time and bandwidth
d. Rule No. 7: Help keep flame wars under control
13. Your brother keeps on peeking on your phone while you are chatting with your friend. What is he violating?
a. Rule No. 8: Respect other people’s privacy c. Rule No.6: Share expert knowledge
b. Rule No. 10: Be forgiving of other people’s mistakes d. Rule No.9: Don’t abuse your power
14. Shane sent a personal message to her friend to take down her post after seeing wrong information in her post.
a. Rule No. 3: Respect other people’s time and bandwidth c. Rule No.1: Remember the human
b. Rule No. 10: Be forgiving of other people’s mistakes d. Rule No 7. Help keep flame wars under
control
15. Sir Carl always posts links of peer-reviewed studies in his Research class group chat.
a. Rule No. 8: Respect other people’s privacy c. Rule No.6: Share expert knowledge
b. Rule No. 10: Be forgiving of other people’s mistakes d. Rule No.9: Don’t abuse your power
ETECH-Q1-Q1 M.R.P.Regalario 10/03/2022
II. TRUE OR FALSE: Write T if the statement is correct, F if it is incorrect.
____16. News sites should present information without bias.
____17. Web 2.0 is classified as a dynamic page. It allows users to interact with the page.
____18. Microblogging focuses on posts or links related to news.
____19. URL is an acronym for Uniform Resource Location.
____20. It is safe to open messages or attachments from someone you do not know.
____21. Grammatical errors and misspelled words should be checked when evaluating websites.
____22. Flame war is a series of hate and rude posts that attacks a specific person in social media.
____23. One way to evaluate authenticity of a website is through AUTHORSHIP. Credentials must be legitimate to
establish the credibility of the author.
____24. It is safe to give out your banking information in the cyberspace without validating the authenticity of the
site.
____25. YouTube is a popular Media Sharing Platform.
III. IDENTIFICATION: Using the word bank below, rearrange the jumbled letters and identify the (A)
online platform and (B) online threat being defined in each item.
A.
___________________26. Also known as “The Cloud”. It uses a network of remote servers on the
internet where a user can store and access data and programs over the internet.
___________________27. It is a computer-mediated tools that allow large group of people to
create, share information, and interact with other users in the cyberspace.
___________________28. A platform that allows creation and sharing of presentations,
infographics and videos with other people.
___________________29. It uses GPS to detect location and used for navigation.
___________________30. This platform can be used as storage of computer files. It also allows
converting and managing files without download in the software tool.
B.
___________________31. Someone who uses internet services for fraud, typically for financial gain
by contacting potential victims via email, social networking sites, dating apps, etc. to get financial
or personal information.
___________________32. This threat disguises as an email from legitimate source which lures
victims to disclose sensitive or confidential information.
___________________33. It is any program or file that is harmful to a computer user. Usually, this
malicious software masks itself in the form of ads and executable files that may cause damage to
the computer.
___________________34. Also known as spiders, crawlers, it is an application that is programmed
to do certain tasks. These are automated and can run according to their instructions without
human intervention.
___________________35. It directs a user to a fake website which may capture the victim’s
confidential information. Online banking and other payment platforms are the usual targets of this
threat.
IV. Name the following icons of some online platforms commonly used on the internet.