1. Page 1
ICCT Colleges Foundation, Inc.
V.V. Soliven Avenue II, Cainta, Rizal
Senior High School
A.Y. 2017 – 2018
MIDTERM EXAMINATION
MEDIA AND INFORMATION TECHNOLOGY
General Directions:
Read and understand each statement carefully.
Indicate your answer on the TEST BOOKLET
Avoid erasures.
Use black or blue pen only.
I. Write H if the first statement is true and second is false. Write M if the first statement is false and the
statement is true. Write I if the twostatements are both true. Write L if the both statements are false.
1. A. Code is a system of signs, put together to create meaning.
B. Conventions are habits or long accepted ways of doing things.
2. A. Read is to analyze for meaning.
B. Representation is based upon what the product does and who it is for.
3. A. Fad is the money earned by brand name.
B. Jingle is the verse or song that repeats sounds or has a catchy rhythm.
4. A. Cyber relationship addiction is the compulsive use of internet photography and adult fantasy role play
sites impacting negatively on real life intimate relationship.
B. Cyber addiction to social networking and messaging to the point where virtual becomes more
important than real life relationship.
5. A. Cyber bullying is the use of information technology to harm or to harass other people in deliberate,
repeated and hostile manner.
B. Digital divide is an economic and social inequality according to categories of persons in a given
population in their access.
6. A. Massive open online course is an online course aimed at unlimited participation and open access via
web.
B. Crowdsourcing simply means telling people that you might reach for opinions.
7. A. Augmented reality is a technique which enables three dimensional images to be made.
B. Augmented reality is a live direct or indirect view of a physical, real world environment whose
elements are presented by computer generated sensors.
8. A. Media literacy means understanding and using the media of mass communication in a proactive,
non-passive, and assertive ways.
B. Information literacy refers to a set of characteristics that transform an ordinary student into wise
information owner, and lifelong learner.
9. A. People media is a good source of current news and events which broadens social consciousness.
B. Print media is the primary tool of transferring knowledge and information.
10. A. Radio media is a powerful mass medium used in education.
B. TV media is the medium that uses the television set to present information.
II. Identification. Choose your answer inside the box.
1. It is the cybercrime prevention act of 2012 which is a law in the Philippines approved on September 12, 2012
which aims to address legal issues concerning online interactions and the internet.
2. It is relating to or involving computer networks such as the internet.
3. It refers to the virtual computer world, and more specifically, is an electronic medium used to form a global
computer networks to facilitate online communication.
4. It refers to the criminal activities carried out by means of computers or the internet.
5. It is the use of electronic communications to bully a person, typically by sending messages of an intimidating
or threatening nature.
6. It refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is
considered to be outside of the creator’s original objective.
REPUBLICACTNO.10175 REPUBLICACTNO.11275 INTELLIGENT ROUTING DEVICESCYBER
CONTEXTUAL AWARENESS CYBER SPACE HAPTICS TECHNOLOGY CYBER CRIME
HAPTICS CYBER BULLYING NETIQUETTEHACKING VIRTUAL SELFPHISHING
PLAGIARISM ILLEGAL DOWNLOADING INFRINGEMENT IDENTITY THEFT COPYRIGHT
CYBER DEFAMATION CHILDPORNOGRAPHY
2. Page 2
7. It is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, and
indirectly money, often for malicious reasons, by distinguishing as a trustworthy entity in an electronic
communication.
8. It refers to obtaining files that you do not have the right to use from the internet.
9. It is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain
credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss.
10. It is unprivileged false statement of fact which tends to harm the reputation of a person or a company.
11. It is a form of child sexual exploitation.
12. It is a legal device that gives the creator of a literary, artistic, musical, or other creative work that solely right
to publish and sell that work.
13. Violation of a copyright is called?
14. It is an act of instance of using or closely imitating the language and thoughts of another author without
authorization; the representation of that author’s work as one’s own , as by not crediting the original author.
15. It is the persona you create about yourself virtually.
16. It is the correct or acceptable way of communicating on the internet.
17. It is the science of applying touch (tactile) sensation and control to interaction with computer applications.
18. It is a feedback technology, using computer applications, that takes advantage of the user’s sense of touch by
applying force, vibrations and/or motions to the user.
19. It is by combining hard sensor information such as where you are and the conditions around you, combined
with soft sensors such as your calendar, your social network and past preferences, and future devices will
constantly learn about who you are and how you live, work and play.
20. It is the future technology will be useful to, for example, local councils. While on the move, staff will be able
to provide the precise description and location of a street-based issue using smartphones.
III. Choose the letter of the correct answer.
1. These are common interpretations of people on things around them.
A. Conventions B. Codes C. Both A and B D. None of these
2. The following are the categories of codes except:
A. Oral B. Symbolic C. Written D. Technical
3. A payment made to an author or composer for each copy of a work sold or to an inventor for each article sold
under patent.
A. Copyright
B. Fair use
C. Intellectual property
D. Royalty
4. The use of information technology to harm or to harass other people in deliberate, repeated, and hostile
manner.
A. Bashing
B. Cyber bullying
C. Internet addiction
D. Gossip
5. Different companies send representatives to accept job application usually held in a big mall or a university.
A. Job fair
B. Job ads
C. Job site
D. Job opportunity
6. This government office records the population of the Philippines, which include birthdate, marriage, and
death date.
A. Government Service Insurance System
B. National Bureau of Investigation
C. National Statistics Office
D. Social Security System
7. is a brand new trend where people are given the convenience of literally wearing their gadgets
for multiple purposes.
A. Gadget care
B. Wearable
C. Interconnectivity
D. High tech clothing
8. Diana Obinger, President and CEO of EDUCAUSE, says MOOCs go beyond information giving and seeking, thus,
it elevates to ______________.
A. Interaction
B. Connectedness
C. Opportunities
D. None
9. An individual who knows how to use the different computer applications is called____________.
A. Computer literate
B. Educated
C. Intelligent
D. Skilled
10. A computer literate individual appreciates the convenience of ___________ in preparing letters, reports, and
researches.
A. Encoding
B. Decoding
C. Typing
D. Word processing
III. Enumeration.
1-5. Types of cybersex addicted user.
6-10. Techniques on hacking.