SlideShare a Scribd company logo
1 of 3
I. TRUE OR FALSE
__1. Code is a system of signs, put together to
create meaning.
__2. Conventions are habits or long accepted
ways of doing things.
__3. Read is to analyze for meaning.
__4. .Representation is based upon what the
product does and who it is for.
__5. Fad is the money earned by brand name.
__6. Jingle is the verse or song that repeats
sounds or has a catchy rhythm.
__7. Cyber relationship addiction is the
compulsive use of internet photography and adult
fantasy role play sites impacting negatively on
real life intimate relationship.
__8. Cyber addiction to social networking and
messaging to the point where virtual becomes
more important than real life relationship.
__9. Cyber bullying is the use of information
technology to harm or to harass other people in
deliberate, repeated and hostile manner.
__10. Digital divide is an economic and social
inequality according to categories of persons in
a given population in their access.
__11. Massive open online course is an online
course aimed at unlimited participation and open
access via web.
__12. Crowdsourcing simply means telling people
that you might reach for opinions.
__13. Augmented reality is a technique which
enables three dimensional images to be made.
__14. Augmented reality is a live direct or
indirect view of a physical, real world
environment whose elements are presented by
computer generated sensors.
__15. Media literacy means understanding and
using the media of mass communication in a
proactive, non-passive, and assertive ways.
__16. Information literacy refers to a set of
characteristics that transform an ordinary
student into wise information owner, and
lifelong learner.
__17. People media is a good source of current
news and events which broadens social
consciousness.
__18. Print media is the primary tool of
transferring knowledge and information.
__19. Radio media is a powerful mass medium used
in education.
__20. TV media is the medium that uses the
television set to present information.
__21.Print Media consists of television, radio
and films.
__22. We can consider promotional flyers as part
of print media.
__23. Advertisements on TV are part of broadcast
media.
__24. Resume is considered print media.
__25. Due to advent of technology, online news
is very rampant and the demand for newspapers is
becoming low.
__26. Newspapers are example of broadcast media.
__27. Anything that has something to do with
internet is part of new media.
__28. Online journals are part of new media.
__29. If you want to be updated to be updated on
the latest news, go to the library.
__30. Thesis can be found in the library.
__31. Print Media involves newspapers,
textbooks, magazine and journals.
__32. Broadcast media involves TV, radio and
films.
__33. New media consists of all online
platforms.
__34. Samsung S9 Plus is an example of new media
__35. TV advertisements are under broadcasts
media
__36. If you want to search for your related
literatures, look for textbooks, journals and
newspapers.
__37. Reader's digest is an example of Print
Media.
__38. Manila Bulletin is an example of Broadcast
media.
__39. E-books are example of new media
__40. If the e-book was published and is now at
the market, it is still considered as new media.
II. IDENTIFICATION
_________________1. It is the cybercrime
prevention act of 2012 which is a law in the
Philippines approved on September 12, 2012 which
aims to address legal issues concerning online
interactions and the internet.
_________________2. It is relating to or
involving computer networks such as the
internet.
_________________3. It refers to the virtual
computer world, and more specifically, is an
electronic medium used to form a global computer
networks to facilitate online communication.
_________________4. It refers to the criminal
activities carried out by means of computers or
the internet.
_________________5. It is the use of electronic
communications to bully a person, typically by
sending messages of an intimidating or
threatening nature.
_________________6. It refers to the practice of
modifying or altering computer software and
hardware to accomplish a goal that is considered
to be outside of the creator’s original
objective.
_________________7. It is the attempt to obtain
sensitive information such as usernames,
passwords, and credit card details, and
indirectly money, often for malicious reasons,
by distinguishing as a trustworthy entity in an
electronic communication.
_________________8. It refers to obtaining files
that you do not have the right to use from the
internet.
_________________9. It is the deliberate use of
someone else’s identity, usually as a method to
gain a financial advantage or obtain credit and
other benefits in the other person’s name, and
perhaps to the other person’s disadvantage or
loss.
_________________10. It is unprivileged false
statement of fact which tends to harm the
reputation of a person or a company.
_________________11. It is a form of child
sexual exploitation.
_________________12. It is a legal device that
gives the creator of a literary, artistic,
musical, or other creative work that solely
right to publish and sell that work.
_________________13. Violation of a copyright is
called?
_________________14. It is an act of instance of
using or closely imitating the language and
thoughts of another author without
authorization; the representation of that
author’s work as one’s own , as by not crediting
the original author.
_________________15. It is the persona you
create about yourself virtually.
_________________16. It is the correct or
acceptable way of communicating on the internet.
_________________17. It is the science of
applying touch (tactile) sensation and control
to interaction with computer applications.
_________________18. It is a feedback
technology, using computer applications, that
takes advantage of the user’s sense of touch by
applying force, vibrations and/or motions to the
user.
_________________19. It is by combining hard
sensor information such as where you are and the
conditions around you, combined with soft
sensors such as your calendar, your social
network and past preferences, and future devices
will constantly learn about who you are and how
you live, work and play.
_________________20. It is the future technology
will be useful to, for example, local councils.
While on the move, staff will be able to provide
the precise description and location of a
street-based issue using smartphones.
_________________21. Antibullying Act of 2013
_________________22. Anti-child Pornography Act
of 2009
_________________23. Cybercrime Prevention Act
of 2012
_________________24. Intellectual Property Coed
of the Philippines
_________________25. Anti-Camcording Act of 2010
_________________26. Anti-Photo and Video
Voyeurism Act of 2009
_________________27. Department of Information
and Communication Technology Act of 2015
_________________28. Types of bullying that use
vulgar language
_________________29. Types of bullying that
revealing sensitive information
_________________30. It is a sending or posting
gossip or rumors about a person.
_________________31. Techniques in hacking that
record every keystroke
_________________32. It is self –replicating
programs that spread by inserting copies of
them.
_________________33. The process of recovering
password from data stored.
_________________34. Classification of hacker
who identifies and exploits weaknesses.
_________________35. It is also called ethical
hacker.
_________________36. Also known as a malicious
hacker
_________________37. A non-skilled person who
gains access to computer system
_________________38. Sites that allow users to
submit short written entries.
_________________39. Sites that allow users to
store picture and videos.
_________________40. Sites that allow users to
post news and links.
_________________41. Data Privacy Act of
III. MULTIPLE CHOICES
Choose the letter of the correct answer.
___1. These are common interpretations of people
on things around them.
A. Conventions B. Codes
C. Both A and B D. None of these
___2. The following are the categories of codes
except:
A. Oral B. Symbolic
C. Written D. Technical
___3. A payment made to an author or composer
for each copy of a work sold or to an inventor
for each article sold under patent.
A. Copyright B. Fair use
C. Intellectual property D. Royalty
___4. The use of information technology to harm
or to harass other people in deliberate,
repeated, and hostile manner.
A. Bashing B. Cyber bullying
C. Internet addiction D. Gossip
___5. Different companies send representatives
to accept job application usually held in a big
mall or a university.
A. Job fair B. Job ads
C. Job site D. Job opportunity
___6. This government office records the
population of the Philippines, which include
birthdate, marriage, and death date.
A. Government Service Insurance System
B. National Bureau of Investigation
C. National Statistics Office
D. Social Security System
___7. ___________is a brand new trend where
people are given the convenience of literally
wearing their gadgets for multiple purposes.
A. Gadget care B. Wearable
C. Interconnectivity D. High tech clothing
___8. Diana Obinger, President and CEO of
EDUCAUSE, says MOOCs go beyond information
giving and seeking, thus, it elevates to
______________.
A. Interaction B. Connectedness
C. Opportunities D. None
___9. An individual who knows how to use the
different computer applications is
called____________.
A. Computer literate B. Educated
C. Intelligent D. Skilled
___10. A computer literate individual
appreciates the convenience of ___________ in
preparing letters, reports, and researcher
A. Encoding B. Decoding
C. Typing D. Word processing
IV. ENUMERATION
TYPES OF PLAGIARSIM (Sources Not Cited)
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
6. _________________
TYPES OF CYBER SEX
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
TYPES OF CYBERCRIME
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
6. _________________
7. _________________
8. _________________
9. _________________
CLASSIFICATION OF HACKER
1. _________________
2. _________________
3. _________________
4. _________________
5. _________________
6. _________________
DIFFERENT TYPES OF BULLYING
1.___________________
2. ___________________
3. ___________________
4. ___________________
5. ___________________
6. ___________________
7. ___________________
CHARACTERISTICS OF UBIQUITOUS LEARNING
1.________________________
2. _______________________
3. _______________________
4. _______________________
5. _______________________
6. _______________________
3 MAJOR TRENDS IN UBIQUITOUS COMPUTING
1. _______________________
2. _______________________
3. _______________________
COMPONENTS OF E-LEARNING
1. _______________________
2. _______________________
3. _______________________
4. _______________________
5. _______________________
6. _______________________
7. _______________________
quiz 100 items

More Related Content

What's hot

computer literacy course for CHUSS students, makerere
computer literacy course for CHUSS students, makererecomputer literacy course for CHUSS students, makerere
computer literacy course for CHUSS students, makererekabuye jafalih
 
Blissfield Presentation
Blissfield PresentationBlissfield Presentation
Blissfield Presentationelizkeren
 
481 Assignment Articles
481 Assignment Articles481 Assignment Articles
481 Assignment Articlesafaca671
 
New technologies in writing instruction
New technologies in writing instructionNew technologies in writing instruction
New technologies in writing instructionTshen Tashi
 
IRJET- Back to School
IRJET- Back to SchoolIRJET- Back to School
IRJET- Back to SchoolIRJET Journal
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computerFatin Izzaty
 

What's hot (6)

computer literacy course for CHUSS students, makerere
computer literacy course for CHUSS students, makererecomputer literacy course for CHUSS students, makerere
computer literacy course for CHUSS students, makerere
 
Blissfield Presentation
Blissfield PresentationBlissfield Presentation
Blissfield Presentation
 
481 Assignment Articles
481 Assignment Articles481 Assignment Articles
481 Assignment Articles
 
New technologies in writing instruction
New technologies in writing instructionNew technologies in writing instruction
New technologies in writing instruction
 
IRJET- Back to School
IRJET- Back to SchoolIRJET- Back to School
IRJET- Back to School
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 

Similar to quiz 100 items

MIL_Final Exam001.docx
MIL_Final Exam001.docxMIL_Final Exam001.docx
MIL_Final Exam001.docxJOELALANO5
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxTedsTV
 
HISTORY OF COMPUTERS.pdf
HISTORY OF COMPUTERS.pdfHISTORY OF COMPUTERS.pdf
HISTORY OF COMPUTERS.pdfssuser4dd301
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13Justino Lourenço
 
What Will the Communication Technology Landscape Look Like in 2024 A.D.?
What Will the Communication Technology Landscape  Look Like in 2024 A.D.?What Will the Communication Technology Landscape  Look Like in 2024 A.D.?
What Will the Communication Technology Landscape Look Like in 2024 A.D.?ancohr01
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our worldJustino Lourenço
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Mediaplusaziz
 
Com303 presentation
Com303 presentationCom303 presentation
Com303 presentationaedarn01
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
The Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxThe Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxMorganEvans44
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salikguest8541ec
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...guest8541ec
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatemaguest8541ec
 
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docxRunning Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docxcharisellington63520
 
Information communication technology and cyber law
Information communication technology and cyber lawInformation communication technology and cyber law
Information communication technology and cyber lawEr Hari Prasad Ghimire
 

Similar to quiz 100 items (20)

Hm122 midterm-exam-media
Hm122 midterm-exam-mediaHm122 midterm-exam-media
Hm122 midterm-exam-media
 
MIL_Final Exam001.docx
MIL_Final Exam001.docxMIL_Final Exam001.docx
MIL_Final Exam001.docx
 
EMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptxEMPOWERMENT TECHNOLOGIES.pptx
EMPOWERMENT TECHNOLOGIES.pptx
 
Dissrtation. New media platforms
Dissrtation. New media platformsDissrtation. New media platforms
Dissrtation. New media platforms
 
HISTORY OF COMPUTERS.pdf
HISTORY OF COMPUTERS.pdfHISTORY OF COMPUTERS.pdf
HISTORY OF COMPUTERS.pdf
 
Digital footprint@wse march13
Digital footprint@wse march13Digital footprint@wse march13
Digital footprint@wse march13
 
What Will the Communication Technology Landscape Look Like in 2024 A.D.?
What Will the Communication Technology Landscape  Look Like in 2024 A.D.?What Will the Communication Technology Landscape  Look Like in 2024 A.D.?
What Will the Communication Technology Landscape Look Like in 2024 A.D.?
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
Digital Footprint in our world
Digital Footprint in our worldDigital Footprint in our world
Digital Footprint in our world
 
4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media4 Trends Shaping the Future of Social Media
4 Trends Shaping the Future of Social Media
 
Com303 presentation
Com303 presentationCom303 presentation
Com303 presentation
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
The Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptxThe Evolution & Impact of Technology .pptx
The Evolution & Impact of Technology .pptx
 
Digital Citizenship by Fatema Salik
Digital Citizenship by Fatema SalikDigital Citizenship by Fatema Salik
Digital Citizenship by Fatema Salik
 
Digital Citizenship...
Digital Citizenship...Digital Citizenship...
Digital Citizenship...
 
Digital Citizenship by Fatema
Digital Citizenship by FatemaDigital Citizenship by Fatema
Digital Citizenship by Fatema
 
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docxRunning Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS  .docx
Running Head INTERNET TECHNOLOGY AND ITS UESES IN VARIOUS AREAS .docx
 
Information communication technology and cyber law
Information communication technology and cyber lawInformation communication technology and cyber law
Information communication technology and cyber law
 
1st presentation
1st presentation 1st presentation
1st presentation
 

More from ICCT foundation inc (20)

Hm122 prelim exam-media
Hm122 prelim exam-mediaHm122 prelim exam-media
Hm122 prelim exam-media
 
Chapter 2-types of media
Chapter 2-types of mediaChapter 2-types of media
Chapter 2-types of media
 
Chapter 6 media codes and convention
Chapter 6 media  codes and conventionChapter 6 media  codes and convention
Chapter 6 media codes and convention
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Chapter 9 current trends
Chapter 9 current trendsChapter 9 current trends
Chapter 9 current trends
 
Chapter 11 people media
Chapter 11 people mediaChapter 11 people media
Chapter 11 people media
 
Chapter 10 meida
Chapter 10 meida Chapter 10 meida
Chapter 10 meida
 
Question aire hackcing.bullly,
Question aire hackcing.bullly, Question aire hackcing.bullly,
Question aire hackcing.bullly,
 
Comic sample
Comic sampleComic sample
Comic sample
 
Shooting star
Shooting starShooting star
Shooting star
 
Ppt animation-trigger
Ppt animation-triggerPpt animation-trigger
Ppt animation-trigger
 
Pairs2
Pairs2Pairs2
Pairs2
 
A long quiz
A long quizA long quiz
A long quiz
 
Q1= anwer key
Q1= anwer keyQ1= anwer key
Q1= anwer key
 
Activities
ActivitiesActivities
Activities
 
Hand out of lesson
Hand out of lessonHand out of lesson
Hand out of lesson
 
A long quiz
A long quizA long quiz
A long quiz
 
Custom animation
Custom animationCustom animation
Custom animation
 
Cross word puzzle.
Cross word puzzle.Cross word puzzle.
Cross word puzzle.
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

quiz 100 items

  • 1. I. TRUE OR FALSE __1. Code is a system of signs, put together to create meaning. __2. Conventions are habits or long accepted ways of doing things. __3. Read is to analyze for meaning. __4. .Representation is based upon what the product does and who it is for. __5. Fad is the money earned by brand name. __6. Jingle is the verse or song that repeats sounds or has a catchy rhythm. __7. Cyber relationship addiction is the compulsive use of internet photography and adult fantasy role play sites impacting negatively on real life intimate relationship. __8. Cyber addiction to social networking and messaging to the point where virtual becomes more important than real life relationship. __9. Cyber bullying is the use of information technology to harm or to harass other people in deliberate, repeated and hostile manner. __10. Digital divide is an economic and social inequality according to categories of persons in a given population in their access. __11. Massive open online course is an online course aimed at unlimited participation and open access via web. __12. Crowdsourcing simply means telling people that you might reach for opinions. __13. Augmented reality is a technique which enables three dimensional images to be made. __14. Augmented reality is a live direct or indirect view of a physical, real world environment whose elements are presented by computer generated sensors. __15. Media literacy means understanding and using the media of mass communication in a proactive, non-passive, and assertive ways. __16. Information literacy refers to a set of characteristics that transform an ordinary student into wise information owner, and lifelong learner. __17. People media is a good source of current news and events which broadens social consciousness. __18. Print media is the primary tool of transferring knowledge and information. __19. Radio media is a powerful mass medium used in education. __20. TV media is the medium that uses the television set to present information. __21.Print Media consists of television, radio and films. __22. We can consider promotional flyers as part of print media. __23. Advertisements on TV are part of broadcast media. __24. Resume is considered print media. __25. Due to advent of technology, online news is very rampant and the demand for newspapers is becoming low. __26. Newspapers are example of broadcast media. __27. Anything that has something to do with internet is part of new media. __28. Online journals are part of new media. __29. If you want to be updated to be updated on the latest news, go to the library. __30. Thesis can be found in the library. __31. Print Media involves newspapers, textbooks, magazine and journals. __32. Broadcast media involves TV, radio and films. __33. New media consists of all online platforms. __34. Samsung S9 Plus is an example of new media __35. TV advertisements are under broadcasts media __36. If you want to search for your related literatures, look for textbooks, journals and newspapers. __37. Reader's digest is an example of Print Media. __38. Manila Bulletin is an example of Broadcast media. __39. E-books are example of new media __40. If the e-book was published and is now at the market, it is still considered as new media. II. IDENTIFICATION _________________1. It is the cybercrime prevention act of 2012 which is a law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and the internet. _________________2. It is relating to or involving computer networks such as the internet. _________________3. It refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer networks to facilitate online communication. _________________4. It refers to the criminal activities carried out by means of computers or the internet. _________________5. It is the use of electronic communications to bully a person, typically by sending messages of an intimidating or threatening nature. _________________6. It refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. _________________7. It is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, and indirectly money, often for malicious reasons, by distinguishing as a trustworthy entity in an electronic communication. _________________8. It refers to obtaining files that you do not have the right to use from the internet. _________________9. It is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss. _________________10. It is unprivileged false statement of fact which tends to harm the reputation of a person or a company. _________________11. It is a form of child sexual exploitation. _________________12. It is a legal device that gives the creator of a literary, artistic, musical, or other creative work that solely right to publish and sell that work. _________________13. Violation of a copyright is called? _________________14. It is an act of instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author’s work as one’s own , as by not crediting the original author. _________________15. It is the persona you create about yourself virtually. _________________16. It is the correct or acceptable way of communicating on the internet. _________________17. It is the science of applying touch (tactile) sensation and control to interaction with computer applications. _________________18. It is a feedback technology, using computer applications, that takes advantage of the user’s sense of touch by applying force, vibrations and/or motions to the user. _________________19. It is by combining hard sensor information such as where you are and the conditions around you, combined with soft sensors such as your calendar, your social network and past preferences, and future devices
  • 2. will constantly learn about who you are and how you live, work and play. _________________20. It is the future technology will be useful to, for example, local councils. While on the move, staff will be able to provide the precise description and location of a street-based issue using smartphones. _________________21. Antibullying Act of 2013 _________________22. Anti-child Pornography Act of 2009 _________________23. Cybercrime Prevention Act of 2012 _________________24. Intellectual Property Coed of the Philippines _________________25. Anti-Camcording Act of 2010 _________________26. Anti-Photo and Video Voyeurism Act of 2009 _________________27. Department of Information and Communication Technology Act of 2015 _________________28. Types of bullying that use vulgar language _________________29. Types of bullying that revealing sensitive information _________________30. It is a sending or posting gossip or rumors about a person. _________________31. Techniques in hacking that record every keystroke _________________32. It is self –replicating programs that spread by inserting copies of them. _________________33. The process of recovering password from data stored. _________________34. Classification of hacker who identifies and exploits weaknesses. _________________35. It is also called ethical hacker. _________________36. Also known as a malicious hacker _________________37. A non-skilled person who gains access to computer system _________________38. Sites that allow users to submit short written entries. _________________39. Sites that allow users to store picture and videos. _________________40. Sites that allow users to post news and links. _________________41. Data Privacy Act of III. MULTIPLE CHOICES Choose the letter of the correct answer. ___1. These are common interpretations of people on things around them. A. Conventions B. Codes C. Both A and B D. None of these ___2. The following are the categories of codes except: A. Oral B. Symbolic C. Written D. Technical ___3. A payment made to an author or composer for each copy of a work sold or to an inventor for each article sold under patent. A. Copyright B. Fair use C. Intellectual property D. Royalty ___4. The use of information technology to harm or to harass other people in deliberate, repeated, and hostile manner. A. Bashing B. Cyber bullying C. Internet addiction D. Gossip ___5. Different companies send representatives to accept job application usually held in a big mall or a university. A. Job fair B. Job ads C. Job site D. Job opportunity ___6. This government office records the population of the Philippines, which include birthdate, marriage, and death date. A. Government Service Insurance System B. National Bureau of Investigation C. National Statistics Office D. Social Security System ___7. ___________is a brand new trend where people are given the convenience of literally wearing their gadgets for multiple purposes. A. Gadget care B. Wearable C. Interconnectivity D. High tech clothing ___8. Diana Obinger, President and CEO of EDUCAUSE, says MOOCs go beyond information giving and seeking, thus, it elevates to ______________. A. Interaction B. Connectedness C. Opportunities D. None ___9. An individual who knows how to use the different computer applications is called____________. A. Computer literate B. Educated C. Intelligent D. Skilled ___10. A computer literate individual appreciates the convenience of ___________ in preparing letters, reports, and researcher A. Encoding B. Decoding C. Typing D. Word processing IV. ENUMERATION TYPES OF PLAGIARSIM (Sources Not Cited) 1. _________________ 2. _________________ 3. _________________ 4. _________________ 5. _________________ 6. _________________ TYPES OF CYBER SEX 1. _________________ 2. _________________ 3. _________________ 4. _________________ 5. _________________ TYPES OF CYBERCRIME 1. _________________ 2. _________________ 3. _________________ 4. _________________ 5. _________________ 6. _________________ 7. _________________ 8. _________________ 9. _________________ CLASSIFICATION OF HACKER 1. _________________ 2. _________________ 3. _________________ 4. _________________ 5. _________________ 6. _________________ DIFFERENT TYPES OF BULLYING 1.___________________ 2. ___________________ 3. ___________________ 4. ___________________ 5. ___________________ 6. ___________________ 7. ___________________ CHARACTERISTICS OF UBIQUITOUS LEARNING 1.________________________ 2. _______________________ 3. _______________________ 4. _______________________ 5. _______________________ 6. _______________________ 3 MAJOR TRENDS IN UBIQUITOUS COMPUTING 1. _______________________ 2. _______________________ 3. _______________________ COMPONENTS OF E-LEARNING 1. _______________________ 2. _______________________ 3. _______________________ 4. _______________________ 5. _______________________ 6. _______________________ 7. _______________________