Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Republic of the Philippines

Department of Education
Region V - Bicol
PIODURAN NATIONAL HIGH SCHOOL
Binodegahan, Pioduran, Albay

Summative Exam
EMPOWERMENT TECHNOLOGY

Name: ___________________________________ Section:__________________ Score:_________


I. Multiple Choice: Choose the letter of your answer and write it on the space provided. All
answer should be CAPITALIZED.
1. It is defined as the information superhighway. This means that anyone has access to
this highway, can place information, and can grab that information.
a. Google c. Internet
b. Media d. Online Platforms
2. An umbrella term that includes any communication device or application.
a. Collaborative Platforms c. Social Media
b. ICT d. Convergent Technologies
3. Describes World Wide Web sites that emphasize user-generated content, usability, and
interoperability. Known as “dynamic web”
a. Social Media c. Web 2.0
b. Web 1.0 d. Web 3.0
4. Which of the following is an example of Web 3.0?
a. TikTok c. Crypto Currency
b. Wikipedia d. Google
5. A web version that used semantic web.
a. Social Media c. Web 2.0
b. Web 1.0 d. Web 3.0
6. These are the web pages that cannot be edited or manipulated by the users.
a. Static web c. Semantic Web
b. Dynamic Web d. Food Web
7. One of the features of dynamic web, the user can react and put their own information.
a. Folksonomy c. Rice user Experience
b. Mass Participation d. User Participation
8. This is done by sending you an email that will direct the user to visit a website and be
asked to update his/her username, password, credit card, or personal information.
a. Spam c. Malware
b. Phishing d. Trojan
9. These are the websites, application, or online channel that allows the netizens to
create, co-create, discuss, modify, and exchange user-generated content such as
images, documents etc. with other netizens.
a. Social Media c. Mobile Technologies
b. Convergent Technologies d. Assistive Media
10. This trend refers to a group of software and hardware devices to help people with
disabilities.
a. Social Media c. Mobile Technologies
b. Convergent Technologies d. Assistive Media
11. A closed source and proprietary operating system developed by Microsoft.
a. Android c. iOS
b. Windows OS d. Symbian
12. A malicious program disguised as a useful program, the devices were unprotected and
became vulnerable to other malwares once you accessed or downloaded it.
a. Virus c. Trojan
b. Worm d. Adware
13. A creator's exclusive right on his invention. With that the owner can decide how the
invention will be used by others.
a. Copyright c. Trademark
b. Patent d. Geographical Indication
14. It is the permission to use works that are protected by copyright, such as books, music
and lyrics, etc. for the following purposes: teaching, news reporting, criticizing or
commenting, and comedy or parody.
a. Intellectual Property c. Netiquette
b. Fair Use d. Fake News
15. A Republic Act no 9775 that explicit sexual activities that involves any child aged 18
and below and it is penalized depending on the offender.
a. Prostitution c. Cyberbullying
b. Child Pornography d. Hacking
II. Identification
Direction: Select the word from the box being describe on the following statement. Write
the word of the correct answer on the blank provided before each item.

Critical Thinking Trademark Search Engine


Fake News Hacking Hashtag
Spyware Semantic Web Copyright
ILOVEYOU Letter Domain Type Analytical Skills

1. Common example for folksonomy that categorize and classify or arrange


information.
2. It is the other term for Web 3.0.
3. A malware that runs in the background without you knowing it.
4. It is unauthorized accessing of data from a computer network.
5. These are fabricated stories, or information that was made to deceive people.
6. It is a sign used to distinguish good or service within a company and it used
this ™ logo.
7. An example of worm that infected 45 million machines all over the world.
8. It's our capacity to absorb, reflect and conclude from the searched
knowledge.
9. It is the ability to gather, organize, visualize, and adapt information that is
tailored to the subject’s context.
10. Are programs that look for documents based on specific keywords and
return these documents where the keywords were found.

III. Enumeration
1. The six features of Dynamic Web
2. Four Internet Trends
3. Three Internet Threats
4. Five Types of Malwares

IV. Essay
1. What are the safety tips that you can give in using the internet?
2. As a netizen, what would you think of the world after 20 years? Briefly discuss some
advancements in technology and communication.

You might also like