SlideShare a Scribd company logo
1 of 2
Page 1
ICCT Colleges Foundation, Inc.
V.V. Soliven Avenue II, Cainta, Rizal
Senior High School
A.Y. 2017 – 2018
MIDTERM EXAMINATION
MEDIA AND INFORMATION TECHNOLOGY
General Directions:
 Read and understand each statement carefully.
 Indicate your answer on the TEST BOOKLET
 Avoid erasures.
 Use black or blue pen only.
I. Write H if the first statement is true and second is false. Write M if the first statement is false and the
statement is true. Write I if the twostatements are both true. Write L if the both statements are false.
1. A. Code is a system of signs, put together to create meaning.
B. Conventions are habits or long accepted ways of doing things.
2. A. Read is to analyze for meaning.
B. Representation is based upon what the product does and who it is for.
3. A. Fad is the money earned by brand name.
B. Jingle is the verse or song that repeats sounds or has a catchy rhythm.
4. A. Cyber relationship addiction is the compulsive use of internet photography and adult fantasy role play
sites impacting negatively on real life intimate relationship.
B. Cyber addiction to social networking and messaging to the point where virtual becomes more
important than real life relationship.
5. A. Cyber bullying is the use of information technology to harm or to harass other people in deliberate,
repeated and hostile manner.
B. Digital divide is an economic and social inequality according to categories of persons in a given
population in their access.
6. A. Massive open online course is an online course aimed at unlimited participation and open access via
web.
B. Crowdsourcing simply means telling people that you might reach for opinions.
7. A. Augmented reality is a technique which enables three dimensional images to be made.
B. Augmented reality is a live direct or indirect view of a physical, real world environment whose
elements are presented by computer generated sensors.
8. A. Media literacy means understanding and using the media of mass communication in a proactive,
non-passive, and assertive ways.
B. Information literacy refers to a set of characteristics that transform an ordinary student into wise
information owner, and lifelong learner.
9. A. People media is a good source of current news and events which broadens social consciousness.
B. Print media is the primary tool of transferring knowledge and information.
10. A. Radio media is a powerful mass medium used in education.
B. TV media is the medium that uses the television set to present information.
II. Identification. Choose your answer inside the box.
1. It is the cybercrime prevention act of 2012 which is a law in the Philippines approved on September 12, 2012
which aims to address legal issues concerning online interactions and the internet.
2. It is relating to or involving computer networks such as the internet.
3. It refers to the virtual computer world, and more specifically, is an electronic medium used to form a global
computer networks to facilitate online communication.
4. It refers to the criminal activities carried out by means of computers or the internet.
5. It is the use of electronic communications to bully a person, typically by sending messages of an intimidating
or threatening nature.
6. It refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is
considered to be outside of the creator’s original objective.
REPUBLICACTNO.10175 REPUBLICACTNO.11275 INTELLIGENT ROUTING DEVICESCYBER
CONTEXTUAL AWARENESS CYBER SPACE HAPTICS TECHNOLOGY CYBER CRIME
HAPTICS CYBER BULLYING NETIQUETTEHACKING VIRTUAL SELFPHISHING
PLAGIARISM ILLEGAL DOWNLOADING INFRINGEMENT IDENTITY THEFT COPYRIGHT
CYBER DEFAMATION CHILDPORNOGRAPHY
Page 2
7. It is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, and
indirectly money, often for malicious reasons, by distinguishing as a trustworthy entity in an electronic
communication.
8. It refers to obtaining files that you do not have the right to use from the internet.
9. It is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain
credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss.
10. It is unprivileged false statement of fact which tends to harm the reputation of a person or a company.
11. It is a form of child sexual exploitation.
12. It is a legal device that gives the creator of a literary, artistic, musical, or other creative work that solely right
to publish and sell that work.
13. Violation of a copyright is called?
14. It is an act of instance of using or closely imitating the language and thoughts of another author without
authorization; the representation of that author’s work as one’s own , as by not crediting the original author.
15. It is the persona you create about yourself virtually.
16. It is the correct or acceptable way of communicating on the internet.
17. It is the science of applying touch (tactile) sensation and control to interaction with computer applications.
18. It is a feedback technology, using computer applications, that takes advantage of the user’s sense of touch by
applying force, vibrations and/or motions to the user.
19. It is by combining hard sensor information such as where you are and the conditions around you, combined
with soft sensors such as your calendar, your social network and past preferences, and future devices will
constantly learn about who you are and how you live, work and play.
20. It is the future technology will be useful to, for example, local councils. While on the move, staff will be able
to provide the precise description and location of a street-based issue using smartphones.
III. Choose the letter of the correct answer.
1. These are common interpretations of people on things around them.
A. Conventions B. Codes C. Both A and B D. None of these
2. The following are the categories of codes except:
A. Oral B. Symbolic C. Written D. Technical
3. A payment made to an author or composer for each copy of a work sold or to an inventor for each article sold
under patent.
A. Copyright
B. Fair use
C. Intellectual property
D. Royalty
4. The use of information technology to harm or to harass other people in deliberate, repeated, and hostile
manner.
A. Bashing
B. Cyber bullying
C. Internet addiction
D. Gossip
5. Different companies send representatives to accept job application usually held in a big mall or a university.
A. Job fair
B. Job ads
C. Job site
D. Job opportunity
6. This government office records the population of the Philippines, which include birthdate, marriage, and
death date.
A. Government Service Insurance System
B. National Bureau of Investigation
C. National Statistics Office
D. Social Security System
7. is a brand new trend where people are given the convenience of literally wearing their gadgets
for multiple purposes.
A. Gadget care
B. Wearable
C. Interconnectivity
D. High tech clothing
8. Diana Obinger, President and CEO of EDUCAUSE, says MOOCs go beyond information giving and seeking, thus,
it elevates to ______________.
A. Interaction
B. Connectedness
C. Opportunities
D. None
9. An individual who knows how to use the different computer applications is called____________.
A. Computer literate
B. Educated
C. Intelligent
D. Skilled
10. A computer literate individual appreciates the convenience of ___________ in preparing letters, reports, and
researches.
A. Encoding
B. Decoding
C. Typing
D. Word processing
III. Enumeration.
1-5. Types of cybersex addicted user.
6-10. Techniques on hacking.

More Related Content

What's hot

Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ictACLC Antipolo
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basicsAnne Collier
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1HamadRabban
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SJuvywen
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"Yokimura Dimaunahan
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDebra Hargrove
 
Digital citizenship lesson 1
Digital citizenship lesson 1Digital citizenship lesson 1
Digital citizenship lesson 1jpanotes
 
Introduction to-internet-n-emails
Introduction to-internet-n-emailsIntroduction to-internet-n-emails
Introduction to-internet-n-emailsAnuja Khaire
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internetGeorge_Hleb_5
 
How the internet aids communication
How the internet aids communicationHow the internet aids communication
How the internet aids communicationManish Kumar
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenshipmonazarrinkelk
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipdarlinga
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 

What's hot (20)

Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ict
 
Digital citizenship basics
Digital citizenship basicsDigital citizenship basics
Digital citizenship basics
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
 
LESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1SLESSON 1, 2 & 3-ETECH 1S
LESSON 1, 2 & 3-ETECH 1S
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
 
Digital citizenship lesson 1
Digital citizenship lesson 1Digital citizenship lesson 1
Digital citizenship lesson 1
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Introduction to-internet-n-emails
Introduction to-internet-n-emailsIntroduction to-internet-n-emails
Introduction to-internet-n-emails
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internet
 
advantages and disadvantages of internet
advantages and disadvantages of internet advantages and disadvantages of internet
advantages and disadvantages of internet
 
How the internet aids communication
How the internet aids communicationHow the internet aids communication
How the internet aids communication
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Nine elements of digital citizenship
Nine elements of digital citizenshipNine elements of digital citizenship
Nine elements of digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 

Similar to Hm122 midterm-exam-media

The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxMarieChileMutia
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)sanju prasad
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...LorieLynDeGuzmanSalv
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxTedsTV
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfkenneth218994
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
digital citizenship
digital citizenshipdigital citizenship
digital citizenshiptooraw
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Chapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxChapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxnorwinadriatico
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipryanpark86
 

Similar to Hm122 midterm-exam-media (20)

quiz 100 items
quiz 100 itemsquiz 100 items
quiz 100 items
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptx
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
digital citizenship
digital citizenshipdigital citizenship
digital citizenship
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
MIL_WEEK-3.pptx
MIL_WEEK-3.pptxMIL_WEEK-3.pptx
MIL_WEEK-3.pptx
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
Chapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptxChapter 5_IT, Culture and Society.pptx
Chapter 5_IT, Culture and Society.pptx
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
1st presentation
1st presentation 1st presentation
1st presentation
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

More from ICCT foundation inc (20)

Hm122 prelim exam-media
Hm122 prelim exam-mediaHm122 prelim exam-media
Hm122 prelim exam-media
 
Chapter 2-types of media
Chapter 2-types of mediaChapter 2-types of media
Chapter 2-types of media
 
Chapter 6 media codes and convention
Chapter 6 media  codes and conventionChapter 6 media  codes and convention
Chapter 6 media codes and convention
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Chapter 9 current trends
Chapter 9 current trendsChapter 9 current trends
Chapter 9 current trends
 
Chapter 11 people media
Chapter 11 people mediaChapter 11 people media
Chapter 11 people media
 
Chapter 10 meida
Chapter 10 meida Chapter 10 meida
Chapter 10 meida
 
Question aire hackcing.bullly,
Question aire hackcing.bullly, Question aire hackcing.bullly,
Question aire hackcing.bullly,
 
Comic sample
Comic sampleComic sample
Comic sample
 
Shooting star
Shooting starShooting star
Shooting star
 
Ppt animation-trigger
Ppt animation-triggerPpt animation-trigger
Ppt animation-trigger
 
Pairs2
Pairs2Pairs2
Pairs2
 
A long quiz
A long quizA long quiz
A long quiz
 
Q1= anwer key
Q1= anwer keyQ1= anwer key
Q1= anwer key
 
Activities
ActivitiesActivities
Activities
 
Hand out of lesson
Hand out of lessonHand out of lesson
Hand out of lesson
 
A long quiz
A long quizA long quiz
A long quiz
 
Custom animation
Custom animationCustom animation
Custom animation
 
Cross word puzzle.
Cross word puzzle.Cross word puzzle.
Cross word puzzle.
 
Ppt 2007 lesson mhs
Ppt 2007 lesson mhsPpt 2007 lesson mhs
Ppt 2007 lesson mhs
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Hm122 midterm-exam-media

  • 1. Page 1 ICCT Colleges Foundation, Inc. V.V. Soliven Avenue II, Cainta, Rizal Senior High School A.Y. 2017 – 2018 MIDTERM EXAMINATION MEDIA AND INFORMATION TECHNOLOGY General Directions:  Read and understand each statement carefully.  Indicate your answer on the TEST BOOKLET  Avoid erasures.  Use black or blue pen only. I. Write H if the first statement is true and second is false. Write M if the first statement is false and the statement is true. Write I if the twostatements are both true. Write L if the both statements are false. 1. A. Code is a system of signs, put together to create meaning. B. Conventions are habits or long accepted ways of doing things. 2. A. Read is to analyze for meaning. B. Representation is based upon what the product does and who it is for. 3. A. Fad is the money earned by brand name. B. Jingle is the verse or song that repeats sounds or has a catchy rhythm. 4. A. Cyber relationship addiction is the compulsive use of internet photography and adult fantasy role play sites impacting negatively on real life intimate relationship. B. Cyber addiction to social networking and messaging to the point where virtual becomes more important than real life relationship. 5. A. Cyber bullying is the use of information technology to harm or to harass other people in deliberate, repeated and hostile manner. B. Digital divide is an economic and social inequality according to categories of persons in a given population in their access. 6. A. Massive open online course is an online course aimed at unlimited participation and open access via web. B. Crowdsourcing simply means telling people that you might reach for opinions. 7. A. Augmented reality is a technique which enables three dimensional images to be made. B. Augmented reality is a live direct or indirect view of a physical, real world environment whose elements are presented by computer generated sensors. 8. A. Media literacy means understanding and using the media of mass communication in a proactive, non-passive, and assertive ways. B. Information literacy refers to a set of characteristics that transform an ordinary student into wise information owner, and lifelong learner. 9. A. People media is a good source of current news and events which broadens social consciousness. B. Print media is the primary tool of transferring knowledge and information. 10. A. Radio media is a powerful mass medium used in education. B. TV media is the medium that uses the television set to present information. II. Identification. Choose your answer inside the box. 1. It is the cybercrime prevention act of 2012 which is a law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and the internet. 2. It is relating to or involving computer networks such as the internet. 3. It refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer networks to facilitate online communication. 4. It refers to the criminal activities carried out by means of computers or the internet. 5. It is the use of electronic communications to bully a person, typically by sending messages of an intimidating or threatening nature. 6. It refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. REPUBLICACTNO.10175 REPUBLICACTNO.11275 INTELLIGENT ROUTING DEVICESCYBER CONTEXTUAL AWARENESS CYBER SPACE HAPTICS TECHNOLOGY CYBER CRIME HAPTICS CYBER BULLYING NETIQUETTEHACKING VIRTUAL SELFPHISHING PLAGIARISM ILLEGAL DOWNLOADING INFRINGEMENT IDENTITY THEFT COPYRIGHT CYBER DEFAMATION CHILDPORNOGRAPHY
  • 2. Page 2 7. It is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, and indirectly money, often for malicious reasons, by distinguishing as a trustworthy entity in an electronic communication. 8. It refers to obtaining files that you do not have the right to use from the internet. 9. It is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss. 10. It is unprivileged false statement of fact which tends to harm the reputation of a person or a company. 11. It is a form of child sexual exploitation. 12. It is a legal device that gives the creator of a literary, artistic, musical, or other creative work that solely right to publish and sell that work. 13. Violation of a copyright is called? 14. It is an act of instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author’s work as one’s own , as by not crediting the original author. 15. It is the persona you create about yourself virtually. 16. It is the correct or acceptable way of communicating on the internet. 17. It is the science of applying touch (tactile) sensation and control to interaction with computer applications. 18. It is a feedback technology, using computer applications, that takes advantage of the user’s sense of touch by applying force, vibrations and/or motions to the user. 19. It is by combining hard sensor information such as where you are and the conditions around you, combined with soft sensors such as your calendar, your social network and past preferences, and future devices will constantly learn about who you are and how you live, work and play. 20. It is the future technology will be useful to, for example, local councils. While on the move, staff will be able to provide the precise description and location of a street-based issue using smartphones. III. Choose the letter of the correct answer. 1. These are common interpretations of people on things around them. A. Conventions B. Codes C. Both A and B D. None of these 2. The following are the categories of codes except: A. Oral B. Symbolic C. Written D. Technical 3. A payment made to an author or composer for each copy of a work sold or to an inventor for each article sold under patent. A. Copyright B. Fair use C. Intellectual property D. Royalty 4. The use of information technology to harm or to harass other people in deliberate, repeated, and hostile manner. A. Bashing B. Cyber bullying C. Internet addiction D. Gossip 5. Different companies send representatives to accept job application usually held in a big mall or a university. A. Job fair B. Job ads C. Job site D. Job opportunity 6. This government office records the population of the Philippines, which include birthdate, marriage, and death date. A. Government Service Insurance System B. National Bureau of Investigation C. National Statistics Office D. Social Security System 7. is a brand new trend where people are given the convenience of literally wearing their gadgets for multiple purposes. A. Gadget care B. Wearable C. Interconnectivity D. High tech clothing 8. Diana Obinger, President and CEO of EDUCAUSE, says MOOCs go beyond information giving and seeking, thus, it elevates to ______________. A. Interaction B. Connectedness C. Opportunities D. None 9. An individual who knows how to use the different computer applications is called____________. A. Computer literate B. Educated C. Intelligent D. Skilled 10. A computer literate individual appreciates the convenience of ___________ in preparing letters, reports, and researches. A. Encoding B. Decoding C. Typing D. Word processing III. Enumeration. 1-5. Types of cybersex addicted user. 6-10. Techniques on hacking.