Etech First Summative

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Department of Education

SAN RAFAEL NATIONAL HIGH SCHOOL – SENIOR HIGH SCHOOL


EMPOWERMENT TECHNOLOGIES
FIRST QUARTER
FIRST SUMMATIVE ASSESSMENT

NAME: ___________________________________________ SCORE: __________


GRADE & SECTION: ________________________
DATE:____________
Parent’s Signature over Printed Name
I. MULTIPLE CHOICE. Encircle the letter of the correct answer.
1. It is the proper use of manners and etiquette on the internet.
a. GMRC b. Responsible Internet Use c. Netiquette d. Socmed Etiquette
2. A kind of web page that is static or flat and cannot be manipulated by the user.
a. Web 2.0 b. Web 1.0 c. Web 3.0 d. world wide web
3. It is the global system of interconnected computer networks that uses TCP/IP to communicate between networks
and devices.
a. World Wide Web b. Internet c. URL d. Social Media
4. What is considered SHOUTING over the internet?
a. Posting negative comments on social media.
b. Screaming at your computer.
c. Writing in all CAPS.
d. Placing angry emojis in every statement.
5. It refers to the act of tormenting, harassing, or embarrassing another person using the internet.
a. Spoofing b. Pharming c. Trolling d. Cyberbullying
6. It is subtype of social media that allows user to connect with other people.
a. Social Networking b. Media Sharing c. Blogs d. Bookmarking Tiles
7. A kind of online threat where the attacker uses electronic devices to do unwanted surveillance to its victim.
a. Phishing b. Cyberbullying c. Cyberstalking d. Spamming
8. The following are safety measure to avoid online crimes, except:
a. Never give any personal information out about yourself over the internet.
b. Delete your browsing data when using computers in a public computer shop.
c. Disclosing sensitive information to suspicious websites.
d. Keep your software updated to avoid security holes.
9. Sir Carl wants to publish his video lessons about chemical reactions. What is the BEST online platform to use for
his videos?
a. Twitter b. Instagram c. Tumblr d. YouTube
10. Tina needs to save and back up her documents online. What platform must she use?
a. File Management Platforms c. Social Media Platforms
b. Presentation Platforms d. Cloud Computing Platforms

The following are examples of scenarios that show Rules of Netiquette. Identify what specific rule each scenario
describe:
11. Frank checks first his grammar before posting a status update in his Facebook profile. He observes:
a. Rule No.1: Remember the Human c. Rule No.8: Respect other people’s privacy
b. Rule No.6: Share expert Knowledge d. Rule No.5: Make yourself look good online
12. Your classmate flooded your group chat unnecessary messages not related to your subject. Important
information is now hard to track because of it. What rule was violated?
a. Rule No. 3: Know where you are in cyberspace
b. Rule No. 5: Make yourself look good online
c. Rule No. 4: Respect other people’s time and bandwidth
d. Rule No. 7: Help keep flame wars under control
13. Your brother keeps on peeking on your phone while you are chatting with your friend. What is he violating?
a. Rule No. 8: Respect other people’s privacy c. Rule No.6: Share expert knowledge
b. Rule No. 10: Be forgiving of other people’s mistakes d. Rule No.9: Don’t abuse your power
14. Shane sent a personal message to her friend to take down her post after seeing wrong information in her post.
a. Rule No. 3: Respect other people’s time and bandwidth c. Rule No.1: Remember the human
b. Rule No. 10: Be forgiving of other people’s mistakes d. Rule No 7. Help keep flame wars under
control
15. Sir Carl always posts links of peer-reviewed studies in his Research class group chat.
a. Rule No. 8: Respect other people’s privacy c. Rule No.6: Share expert knowledge
b. Rule No. 10: Be forgiving of other people’s mistakes d. Rule No.9: Don’t abuse your power
ETECH-Q1-Q1 M.R.P.Regalario 10/03/2022
II. TRUE OR FALSE: Write T if the statement is correct, F if it is incorrect.
____16. News sites should present information without bias.
____17. Web 2.0 is classified as a dynamic page. It allows users to interact with the page.
____18. Microblogging focuses on posts or links related to news.
____19. URL is an acronym for Uniform Resource Location.
____20. It is safe to open messages or attachments from someone you do not know.
____21. Grammatical errors and misspelled words should be checked when evaluating websites.
____22. Flame war is a series of hate and rude posts that attacks a specific person in social media.
____23. One way to evaluate authenticity of a website is through AUTHORSHIP. Credentials must be legitimate to
establish the credibility of the author.
____24. It is safe to give out your banking information in the cyberspace without validating the authenticity of the
site.
____25. YouTube is a popular Media Sharing Platform.

III. IDENTIFICATION: Using the word bank below, rearrange the jumbled letters and identify the (A)
online platform and (B) online threat being defined in each item.

LCDUO MCPUITNGO ISLAUIVZATNOI LEFI GEMTANANME IPAPMNG


CIOSLA AMDEI MGIHPARN NTENIRET MACS

WLAREMA NTENITER OBTRO NGHPIISH

A.
___________________26. Also known as “The Cloud”. It uses a network of remote servers on the
internet where a user can store and access data and programs over the internet.
___________________27. It is a computer-mediated tools that allow large group of people to
create, share information, and interact with other users in the cyberspace.
___________________28. A platform that allows creation and sharing of presentations,
infographics and videos with other people.
___________________29. It uses GPS to detect location and used for navigation.
___________________30. This platform can be used as storage of computer files. It also allows
converting and managing files without download in the software tool.
B.
___________________31. Someone who uses internet services for fraud, typically for financial gain
by contacting potential victims via email, social networking sites, dating apps, etc. to get financial
or personal information.
___________________32. This threat disguises as an email from legitimate source which lures
victims to disclose sensitive or confidential information.
___________________33. It is any program or file that is harmful to a computer user. Usually, this
malicious software masks itself in the form of ads and executable files that may cause damage to
the computer.
___________________34. Also known as spiders, crawlers, it is an application that is programmed
to do certain tasks. These are automated and can run according to their instructions without
human intervention.
___________________35. It directs a user to a fake website which may capture the victim’s
confidential information. Online banking and other payment platforms are the usual targets of this
threat.

IV. Name the following icons of some online platforms commonly used on the internet.

36. ___________ 39. ____________ 42. __________

37. ___________ 40. ____________ 43. _________

38. __________ 41. ___________ 44. _________ 45. _________

ETECH-Q1-Q1 M.R.P.Regalario 10/03/2022

You might also like