Emptech Midterm Exam

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

General Climaco National High School

School ID 303311
SENIOR HIGH SCHOOL
Name:__________________ Grade&Sec:______________Date:___ Score:_______ Parent’s Signature:

MIDTERM (3RD) IN EMPOWERMENT TECHNOLOGIES12


I Multiple Choice. Read each item carefully. Choose the best answer.
1 It is an unwanted email mostly from bots or advertisers that sends malware.
A Phishing C Trojan
B Spam D Adware
2 Which of the following does not belong in tips in conducting online research?
A Advanced Search C Know the law
B Narrow it down D Give credit
3 It is an online or browser-based computer application that allows to publish, edit and manipulate, organize
and delete web content
A Content Management System C Management Content System
B Joomla D Drupal
4 It is strong drivers of innovation and play an important role in digital society and economy.
A Platforms C Content Development
B Online Platforms D Content Management System
5 This is the most useful when you create a gallery of photos for a website.
A Edit C Editor
B Page D Batch Edit
6 According to this magazine, two Philippine cities are part of the top 10 in their research about “The Selfiest
Cities around the World”.
A People C Reader’s Digest
B Time D Candy
7 It is a nonprofit service designed to help people who have visual and reading impairments.
A Assistive Radio C Assist Media
B Assist Radio D Assistive Media
8 It removes duplicate spaces, and spaces at the start and end of a text string.
A MID C TRIM
B LEFT D FIND
9 This application can be used to automatically compute for several factors that are not easy to notice
especially when faced by a large data.
A MS Excel C MS PowerPoint
B MS Word D MS Access
10 Which of the following does not belong on how to create an effective presentation?
A Minimize C Understanding
B Simplicity D Clarity
11 It is a program designed to send advertisement in the webpage, mostly unknown pop-ups.
A Adware C Spyware
B Malware D Trojan
12 It stands for malicious software.
A Adware C Spyware
B Malware D Trojan
13 DNS stands for ____________________.
A Domain Number System C Domain Number Service
B Domain Name System D Domain Name Service
14 . It is used to create electronic documents that are displayed on the World Wide Web
A Hypertext Markup Language C HighText Markup Language
B Hypertext Mark Language D HighText Mark Language
15 It is a website that contains information from different sources and places in one location in a uniform way.
A Social Media C Web portals
B Blogs D Search Engines
16 It marks the position of the form document where individual data or information will be inserted.
A Data File C Mail Merge
B Merge Field D Mailings
17 It grabs a pixel from your screen to be used in editing.
A Color Picker C Shape Picker
B Pixel Picker D Page
18 What do you call the application that uses image manipulation tool that contains many features to help in
creating images for websites?
A PhotoScape C Pixart
B Photoshop D Pictochart
19 What do you call the sites that focus on short updates from the
user?
A Social News C Microblogging
B Media Sharing D Blogs and Forums
20 Which of the following does not belong to the features of Web
2.0?
A Folksonomy C Rich User
Experience
B Long Tail D Vastness
21. Which of the following terms refers to a program that runs in the background without you
knowing it?
A. Adware B. Spam C. Spyware D. Virus
22. Which program is designed to send advertisements, mostly as pop- ups?
A. Adware B. Keyloggers C. Spam D. Spyware
23. Which is used to record keystrokes done by users to steal passwords?
A. Keyloggers B. Pharming C. Phishing D. Spyware
24. How are unwanted emails, from bots and advertisers called?
A. Spam B. Trojan C. Virus D. Worm
25. How is phishing done?
A. Advertisements are sent to a user
B. Keystrokes done by a user are recorded
C. The domain name service system is exploited
D. An email is sent that directs a user to visit a website and asked to update personal
information.
26. What information is okay to give out on the internet?
A. Name B. Address C. Phone Number D. None of them
27. Is it okay to share personal information with ?
A. Parents only B. Teachers only C. Adults I Trust D. No
one
28. Who you should talk to if you feel uncomfortable about something you see or hear on the
internet?
A. A friend I trust
B. B. An Adult I trust
C. C. My dog
D. D.Someone else online who I don’t know
29. Why do you need to be more cautious with friends you meet online than friends you meet
in school?
A. Most people on the internet are not trustworthy as to the people in the real world.
B. Friendships that begin online are not real
C. Online, it is more difficult to tell if a person is who he/ she says
D. Website have a very strict rules about online friends
30. What is computer security?
A. Creating passwords and keeping your computer private
B. Safely logging off and locking your computer when you are not using it
C. Taking care of hardware, software and data contained
D. Updating software to have anti- virus threat walls
31. How can you pick up viruses in your computer?
A. When passing files through USB sticks
B. Through documents such as Word and Access
C. Through email attachments and websites
D. By visiting unsafe websites
32. What is a virus?
A. A program that looks harmless and tricks you into running it on your computer
B. A program that makes copies of itself and then spreads through a network
damaging systems as it goes along
C. An attempt to get your personal information such as bank account details by
pretending to be for example a charity or claiming you have won a cash prize
D. Accessing a computer system by breaking
33. What is a trojan?
A. A program that looks harmless and tricks you into running it on your computer
B. An attempt to get your personal information such as bank account details by
pretending to be for example a charity or claiming you have won a cash prize
C. Accessing a computer system by breaking through the security system of that
computer
D. A program that makes copies of itself and then spreads through a network
damaging systems as it goes along.
34. What is Phishing?
A. Catching fish in a lake/ pond
B. An attempt to get your personal information such as bank account details
C. Accessing computer system by breaking through the security system of that
computer
D. A program that makes copies of itself and then spreads through a network
damaging systems as it goes along
35. What is a worm?
A. A program that makes copies of itself and then spreads through a network
damaging systems as it goes along
B. Something that can be picked up through emails and attachments
C. A program that looks harmless and tricks you into running it on your computer
D. An attempt to get your personal information such as bank accounts details
36. What can you do to prevent internet threats?
A. Do not visit any dodgy websites
B. Encrypt all emails sent to be safe
C. Install anti-virus software on computer
D. Be wary of emails and only open ones that you know the sender
37. This techniques tries to take information from the user, like credit cards, usernames and
passwords.
a. Phishing B. Spyware C. Scam D. Fishing
38. Which one of the choices below is a sign that spyware is infected on your computer.
A. Random error messeges
B. Your computer is a little slow when playing
C. Your computer works just fine
D. You get many email scams in your spam box
39. How does spyware infect a computer?
A. Pop ups B. Theft of Personal Info C. Recording Web Info D. All the above
40. A web page version that is also described as “Static” web page where the users cannot
manipulate the data within the web page.
a. Web 1.0 c. Web 2.0
b. Web 3.0 d. Web 4.0
41. A trend in ICT that refers to utilization of several technologies to accomplish a task
conveniently.
a. Technological Advancement
b. Technological Divergence
c. Technological Convergence
d. Technological Convenience
42. The Operating System used in Apple devices such as iPhone and iPad.
a. Android OS c. iOS
b. Symbian OS d. Blackberry OS
43. It deals with the use of different communication technologies to locate, edit, and send
information.
a. Information and Communicating Technology
b. Interconnection and Communication Technology
c. Information and Communication Technology
d. All of the Above
44. According to research, several international companies dub the Philippines as
______________________.
a. Technical Center of Asia c. Fast growing hub in Asia
b. ICT Hub of Asia d. ICT Center in Asia
45. It involves the user of technologies to display behavior that HARMS other.
a. Cyber Behavior c. Cyber Misdemeanor
b. Cyber Bullying d. Cyber Cases
46. It is the use of another’s work as your own.
a. Stealing c. Copyright Infringement
b. Plagiarism d. Duplicating
47. It refers to someone who utilizes technology in an appropriate manner.
a. Cyber Citizen c. Cyber Millennial
b. Cyber Human d. Cyber Users
48. Cybercrime Prevention Act of 2012 is also known as ___________.
a. Republic Act 10173 c. Republic Act 10175
b. Republic Act 10174 d. Republic Act 10176

Prepared by:
Mr. Richie Y. Mepieza
SHS Teacher ACAD
04/19/2023-04/19/2023

“ Don’t Stress, Do Your Best…God First”

You might also like