Professional Documents
Culture Documents
Midterms Emptech
Midterms Emptech
DEPARTMENT OF EDUCATION
Region IV-A CALABARZON
PROVINCE OF BATANGAS
St. Blaise Community Academy, Inc.
San Luis, Batangas/ chs_sbca53@yahoo.com
043 – 740-960609997646638 / 09178076741
_________ 1. In this version of the web, web pages are static and not interactive.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 2. In this Web, the user is able to see a website differently than others.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 3. This Web refers to web technologies to understand and interpret human-generated content.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 4. In this version of the web, you can’t post comments or create an account.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 5. It allows users to interact with the page, instead of just reading the page
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 6. The aim of this version is to have machines understand the user’s preferences to be able to deliver web content
specifically targeting the user.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 7. Here, the Internet can predict the best possible answers to your question by “learning from your previous choices”.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 8. In this version of the web, the user may be able to comment or create a user account.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 9. It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging)
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 10. Users will subscribe to software only when needed rather than purchasing them.
a. Web 1.0 b. Web 2.0 c. Web 3.0
_________ 11. Online Safety is also called cyber safety or digital safety which refers to practices and precautions one should observe
when using the internet.
_________ 12. Internet Security is a security in relation to transactions made over the internet and overall authentication and
protection data sent via Internet protocol.
_________ 13. Ethics refers to a set of moral principles that govern an individual or group on what considered as acceptable behavior
while using the internet.
_________ 14. Netiquette refers to acceptable rules for online behavior
_________ 15. Malware are malicious software that is intended to damage or disable computer systems that have codes to collect
information without one’s knowledge.
_________ 16. Viruses are typically attached to an executable file or a word document.
_________ 17. A brute-force attack is a type of password attack where hackers make numerous hit-or-miss attempts to gain access.
_________ 18. A keylogger is spyware that records a user’s activity by logging keyboard strokes.
_________ 19. Cybercriminals use keyloggers for stealing a variety of sensitive data, from passwords to credit card numbers.
_________ 20. SMS phishing, or smishing, leverages text messages rather than email to carry out a phishing attack.
TEST III. ENUMERATION.
Direction: Enumerate the following items being asked.
TEST V. ANALYZING
Direction: Inspect the following pictures and determine what Principles of Graphics and Layout is present. Write your answer on
the space provided before each number.
_________ 41.
_________ 42.
_________ 44.
_________ 45.
_________ 46.
_________ 47.
3|SBCA MIDTERM EXAM IN EMPTECH ©BY SIR JOSH
_________ 48.
_________ 49.
_________ 50.
PREPARED BY: