1. I. TRUE OR FALSE
__1. Code is a system of signs, put together to
create meaning.
__2. Conventions are habits or long accepted
ways of doing things.
__3. Read is to analyze for meaning.
__4. .Representation is based upon what the
product does and who it is for.
__5. Fad is the money earned by brand name.
__6. Jingle is the verse or song that repeats
sounds or has a catchy rhythm.
__7. Cyber relationship addiction is the
compulsive use of internet photography and adult
fantasy role play sites impacting negatively on
real life intimate relationship.
__8. Cyber addiction to social networking and
messaging to the point where virtual becomes
more important than real life relationship.
__9. Cyber bullying is the use of information
technology to harm or to harass other people in
deliberate, repeated and hostile manner.
__10. Digital divide is an economic and social
inequality according to categories of persons in
a given population in their access.
__11. Massive open online course is an online
course aimed at unlimited participation and open
access via web.
__12. Crowdsourcing simply means telling people
that you might reach for opinions.
__13. Augmented reality is a technique which
enables three dimensional images to be made.
__14. Augmented reality is a live direct or
indirect view of a physical, real world
environment whose elements are presented by
computer generated sensors.
__15. Media literacy means understanding and
using the media of mass communication in a
proactive, non-passive, and assertive ways.
__16. Information literacy refers to a set of
characteristics that transform an ordinary
student into wise information owner, and
lifelong learner.
__17. People media is a good source of current
news and events which broadens social
consciousness.
__18. Print media is the primary tool of
transferring knowledge and information.
__19. Radio media is a powerful mass medium used
in education.
__20. TV media is the medium that uses the
television set to present information.
__21.Print Media consists of television, radio
and films.
__22. We can consider promotional flyers as part
of print media.
__23. Advertisements on TV are part of broadcast
media.
__24. Resume is considered print media.
__25. Due to advent of technology, online news
is very rampant and the demand for newspapers is
becoming low.
__26. Newspapers are example of broadcast media.
__27. Anything that has something to do with
internet is part of new media.
__28. Online journals are part of new media.
__29. If you want to be updated to be updated on
the latest news, go to the library.
__30. Thesis can be found in the library.
__31. Print Media involves newspapers,
textbooks, magazine and journals.
__32. Broadcast media involves TV, radio and
films.
__33. New media consists of all online
platforms.
__34. Samsung S9 Plus is an example of new media
__35. TV advertisements are under broadcasts
media
__36. If you want to search for your related
literatures, look for textbooks, journals and
newspapers.
__37. Reader's digest is an example of Print
Media.
__38. Manila Bulletin is an example of Broadcast
media.
__39. E-books are example of new media
__40. If the e-book was published and is now at
the market, it is still considered as new media.
II. IDENTIFICATION
_________________1. It is the cybercrime
prevention act of 2012 which is a law in the
Philippines approved on September 12, 2012 which
aims to address legal issues concerning online
interactions and the internet.
_________________2. It is relating to or
involving computer networks such as the
internet.
_________________3. It refers to the virtual
computer world, and more specifically, is an
electronic medium used to form a global computer
networks to facilitate online communication.
_________________4. It refers to the criminal
activities carried out by means of computers or
the internet.
_________________5. It is the use of electronic
communications to bully a person, typically by
sending messages of an intimidating or
threatening nature.
_________________6. It refers to the practice of
modifying or altering computer software and
hardware to accomplish a goal that is considered
to be outside of the creator’s original
objective.
_________________7. It is the attempt to obtain
sensitive information such as usernames,
passwords, and credit card details, and
indirectly money, often for malicious reasons,
by distinguishing as a trustworthy entity in an
electronic communication.
_________________8. It refers to obtaining files
that you do not have the right to use from the
internet.
_________________9. It is the deliberate use of
someone else’s identity, usually as a method to
gain a financial advantage or obtain credit and
other benefits in the other person’s name, and
perhaps to the other person’s disadvantage or
loss.
_________________10. It is unprivileged false
statement of fact which tends to harm the
reputation of a person or a company.
_________________11. It is a form of child
sexual exploitation.
_________________12. It is a legal device that
gives the creator of a literary, artistic,
musical, or other creative work that solely
right to publish and sell that work.
_________________13. Violation of a copyright is
called?
_________________14. It is an act of instance of
using or closely imitating the language and
thoughts of another author without
authorization; the representation of that
author’s work as one’s own , as by not crediting
the original author.
_________________15. It is the persona you
create about yourself virtually.
_________________16. It is the correct or
acceptable way of communicating on the internet.
_________________17. It is the science of
applying touch (tactile) sensation and control
to interaction with computer applications.
_________________18. It is a feedback
technology, using computer applications, that
takes advantage of the user’s sense of touch by
applying force, vibrations and/or motions to the
user.
_________________19. It is by combining hard
sensor information such as where you are and the
conditions around you, combined with soft
sensors such as your calendar, your social
network and past preferences, and future devices
2. will constantly learn about who you are and how
you live, work and play.
_________________20. It is the future technology
will be useful to, for example, local councils.
While on the move, staff will be able to provide
the precise description and location of a
street-based issue using smartphones.
_________________21. Antibullying Act of 2013
_________________22. Anti-child Pornography Act
of 2009
_________________23. Cybercrime Prevention Act
of 2012
_________________24. Intellectual Property Coed
of the Philippines
_________________25. Anti-Camcording Act of 2010
_________________26. Anti-Photo and Video
Voyeurism Act of 2009
_________________27. Department of Information
and Communication Technology Act of 2015
_________________28. Types of bullying that use
vulgar language
_________________29. Types of bullying that
revealing sensitive information
_________________30. It is a sending or posting
gossip or rumors about a person.
_________________31. Techniques in hacking that
record every keystroke
_________________32. It is self –replicating
programs that spread by inserting copies of
them.
_________________33. The process of recovering
password from data stored.
_________________34. Classification of hacker
who identifies and exploits weaknesses.
_________________35. It is also called ethical
hacker.
_________________36. Also known as a malicious
hacker
_________________37. A non-skilled person who
gains access to computer system
_________________38. Sites that allow users to
submit short written entries.
_________________39. Sites that allow users to
store picture and videos.
_________________40. Sites that allow users to
post news and links.
_________________41. Data Privacy Act of
III. MULTIPLE CHOICES
Choose the letter of the correct answer.
___1. These are common interpretations of people
on things around them.
A. Conventions B. Codes
C. Both A and B D. None of these
___2. The following are the categories of codes
except:
A. Oral B. Symbolic
C. Written D. Technical
___3. A payment made to an author or composer
for each copy of a work sold or to an inventor
for each article sold under patent.
A. Copyright B. Fair use
C. Intellectual property D. Royalty
___4. The use of information technology to harm
or to harass other people in deliberate,
repeated, and hostile manner.
A. Bashing B. Cyber bullying
C. Internet addiction D. Gossip
___5. Different companies send representatives
to accept job application usually held in a big
mall or a university.
A. Job fair B. Job ads
C. Job site D. Job opportunity
___6. This government office records the
population of the Philippines, which include
birthdate, marriage, and death date.
A. Government Service Insurance System
B. National Bureau of Investigation
C. National Statistics Office
D. Social Security System
___7. ___________is a brand new trend where
people are given the convenience of literally
wearing their gadgets for multiple purposes.
A. Gadget care B. Wearable
C. Interconnectivity D. High tech clothing
___8. Diana Obinger, President and CEO of
EDUCAUSE, says MOOCs go beyond information
giving and seeking, thus, it elevates to
______________.
A. Interaction B. Connectedness
C. Opportunities D. None
___9. An individual who knows how to use the
different computer applications is
called____________.
A. Computer literate B. Educated
C. Intelligent D. Skilled
___10. A computer literate individual
appreciates the convenience of ___________ in
preparing letters, reports, and researcher
A. Encoding B. Decoding
C. Typing D. Word processing
IV. ENUMERATION
TYPES OF PLAGIARSIM (Sources Not Cited)
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
6. _________________
TYPES OF CYBER SEX
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
TYPES OF CYBERCRIME
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
6. _________________
7. _________________
8. _________________
9. _________________
CLASSIFICATION OF HACKER
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
6. _________________
DIFFERENT TYPES OF BULLYING
1.___________________
2. ___________________
3. ___________________
4. ___________________
5. ___________________
6. ___________________
7. ___________________
CHARACTERISTICS OF UBIQUITOUS LEARNING
1.________________________
2. _______________________
3. _______________________
4. _______________________
5. _______________________
6. _______________________
3 MAJOR TRENDS IN UBIQUITOUS COMPUTING
1. _______________________
2. _______________________
3. _______________________
COMPONENTS OF E-LEARNING
1. _______________________
2. _______________________
3. _______________________
4. _______________________
5. _______________________
6. _______________________
7. _______________________