SlideShare a Scribd company logo
National Capital Region
Schools Division Office
HORACIO DELA COSTA HIGH SCHOOL
Caloocan City
Globalizing Filipino Skills and Competencies
EMPOWERMENT TECHNOLOGIES
S.Y. 2017- 2018
Name: _____________________________________________________________ Date: _____________________
Strand: ________________________Grade & Section: ______________________ Score:____________________
Test I: MULTIPLE CHOICE
Directions: The following statement are tips to stay safe online. Choose the letter of the correct answer.
A B C D
1. Do not use pirated software.
a. Safe b. Not Safe c. Not Sure d. Maybe
1.
2. Think before you click.
a. Safe b. Not Safe c. Not Sure d. Maybe
2.
3. Do not just accept terms and conditions; read it.
a. Safe b. Not Safe c. Not Sure d. Maybe
3.
4. Do not share your password to anyone.
a. Safe b. Not Safe c. Not Sure d. Maybe
4.
5. Don’t post anything about future vacation.
a. Safe b. Not Safe c. Not Sure d. Maybe
5.
6. Add friends you know in real life.
a. Safe b. Not Safe c. Not Sure d. Maybe
6.
7. Avoid visiting untrusted website.
a. Safe b. Not Safe c. Not Sure d. Maybe
7.
8. Make your Wi-Fi password private.
a. Safe b. Not Safe c. Not Sure d. Maybe
8.
9. Do not reply to a suspicious e-mail.
a. Safe b. Not Safe c. Not Sure d. Maybe
9.
10. Do not talk to strangers weather online or face to face.
a. Safe b. Not Safe c. Not Sure d. Maybe
10.
Test II: MULTIPLE CHOICE
Directions: From the bubble sheet, choose “A” if the statement is TRUE, “B” Maybe, “C” almost true, and “D” if NOT true.
11. ICT stands for Information and Communication Technology 11.
12. International companies call Philippines as the “ICT Hub of Asia” 12.
13. Convergence is the synergy of technological advancement to work on a similar goal. 13.
14. Social Media is a website that enables users to create, discuss and exchange user generated
content.
14.
15. A virus is a malware that multiplies and infects other computer through flash drives. 15.
16. Android is an operating system for mobile phones. 16.
17. Blackberry OS are intended only for Blackberry phones. 17.
18. Symbian is smartphone OS use by Nokia devices. 18.
19. Social News can allow user to post news item or link from other news sources. 19.
20. Microblogging are sites that focus on short updates from the user. 20.
Test II: MULTIPLE CHOICE
Directions: Classify the following examples of social media according to their types. Choose the letter of the correct answer .
A - Bookmarking site B - Social News C - Microblogging D - Blogs and Forums
21. StumbleUpon 21.
22. Reddit 22.
23. Blogger 23.
24. Tumblr 24.
25. Yahoo 25.
26. Youtube 26.
27. CNN news portal 27.
28. Twitter 28.
29. Pinterest 29.
30. Plurk 30.
Test II: MULTIPLE CHOICE
Directions: Choose the letter of the correct answer.
31. Designed to send you advertisement.
a. adware b. trojan c. internet d. pharming
31.
32. Replicates and can transfer from one computer to another.
a. virus b. spyware c. spam d. malware.
32.
33. Exploit the DNS system.
a. pharming b. rogue c. malware d. spam
33.
34. Runs in the background and monitors what you are doing.
a. spyware b. spam c. trojan d. keylogger
34.
35. Unwanted emails, mostly from bots.
a. spam b. rogue c. malware d. net
35.
36. Disguise as a useful program but it’s not.
a. trojan b. rogue c. keylogger d. worm
36.
37. A malicious software.
a. malware b. spyware c. spam d. keylogger
37.
38. Used to record the keystrokes done by the user.
a. keylogger b. spam c. trojan d. worm
38.
39. Malicious program like “LOVE BUG” created by a Filipino programmer.
a. worm b. virus c. malware d. trojan
39.
40. Tricks the user into posting that is a security software.
a. Phishing b. virus c. Pharming d. spam
40.
Test IV: MULTIPLE CHOICE
Directions: Tell whether the statement is related to Online Safety and Security, Protecting Reputation Online, Copyright
Infringement and Online Research. Write “A” for Online Safety and Security, “B” for Protecting Reputation Online,
“C” Copyright Infringement and “D” for Online Research.
41. There is a risk on sharing your Name and other information online. 41.
42. Your cellphone number should not be posted over the internet 42.
43. Having your birthday on your profile makes vulnerable to identity theft. 43.
44. Your post in the internet have tell about your personality. 44.
45. Your reputation is at risk if you are careless in using your social media account. 45.
46. There is a protection on a literary works, paintings, drawings, music etc. 46.
47. It is illegal to use something made from somebody else’s creativity 47.
48. It is important to acknowledge some body about their woks. 48.
49. To filter information, use advance search 49.
50. Search engine like Google, Bing and Yahoo is a flat form for gathering information online. 50.

More Related Content

What's hot

Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
Jesus Rances
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS)
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
Angelito Quiambao
 
Online Platform Tools for ICT Content Development
Online Platform Tools for ICT Content Development Online Platform Tools for ICT Content Development
Online Platform Tools for ICT Content Development
Christine Joy Benedicto
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
Jesus Rances
 
EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5
PATRONAGE OF MARY DEVELOPMENT SCHOOL (PMDS)
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
Reygie Fabro
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
Pearl Maxine Jimena
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
LiezlLumapac
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
alicelagajino
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
Michelle Faina
 
Imaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment TechnologiesImaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment Technologies
Mark Jhon Oxillo
 
Final exam in empowerment technologies
Final exam in empowerment technologiesFinal exam in empowerment technologies
Final exam in empowerment technologies
RudulaAmper2
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
THE CURRENT STATE OF ICT - LESSON 1.pdf
THE CURRENT STATE OF ICT - LESSON 1.pdfTHE CURRENT STATE OF ICT - LESSON 1.pdf
THE CURRENT STATE OF ICT - LESSON 1.pdf
Jamaica Ojos
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
Aubrey Mae Antonio
 
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content DevelopmentEmpowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Lany Lyn Magdaraog
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
Mark Jhon Oxillo
 

What's hot (20)

Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Empowerment Technologies - Module 6
Empowerment Technologies - Module 6Empowerment Technologies - Module 6
Empowerment Technologies - Module 6
 
EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4EMPOWERMENT TECHNOLOGIES - LESSON 4
EMPOWERMENT TECHNOLOGIES - LESSON 4
 
Contextualized Online Search and Research Skills
Contextualized Online Search and Research SkillsContextualized Online Search and Research Skills
Contextualized Online Search and Research Skills
 
Online Platform Tools for ICT Content Development
Online Platform Tools for ICT Content Development Online Platform Tools for ICT Content Development
Online Platform Tools for ICT Content Development
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5EMPOWERMENT TECHNOLOGIES - LESSON 5
EMPOWERMENT TECHNOLOGIES - LESSON 5
 
Empowerment Technology
Empowerment TechnologyEmpowerment Technology
Empowerment Technology
 
Module 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGYModule 4 EMPOWERMENT TECHNOLOGY
Module 4 EMPOWERMENT TECHNOLOGY
 
ETECH MELCS
ETECH MELCSETECH MELCS
ETECH MELCS
 
Empowerment Technology Lesson 3
Empowerment Technology Lesson 3Empowerment Technology Lesson 3
Empowerment Technology Lesson 3
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Imaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment TechnologiesImaging and Design for the Online Environment - Empowerment Technologies
Imaging and Design for the Online Environment - Empowerment Technologies
 
Final exam in empowerment technologies
Final exam in empowerment technologiesFinal exam in empowerment technologies
Final exam in empowerment technologies
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
THE CURRENT STATE OF ICT - LESSON 1.pdf
THE CURRENT STATE OF ICT - LESSON 1.pdfTHE CURRENT STATE OF ICT - LESSON 1.pdf
THE CURRENT STATE OF ICT - LESSON 1.pdf
 
Managing and sustaining ict projects
Managing and sustaining ict projectsManaging and sustaining ict projects
Managing and sustaining ict projects
 
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content DevelopmentEmpowerment Technologies - Online Platforms as Tools for ICT Content Development
Empowerment Technologies - Online Platforms as Tools for ICT Content Development
 
Interactive Multimedia - Empowerment Technologies
 Interactive Multimedia - Empowerment Technologies Interactive Multimedia - Empowerment Technologies
Interactive Multimedia - Empowerment Technologies
 

Similar to Midterm exam-empowerment

PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
MarkCesarVillanueva
 
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxxEMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
MakiBalisi
 
etech2022.docx
etech2022.docxetech2022.docx
etech2022.docx
jonadhe mondeja
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comVirendra Kumar Dubey
 
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docxBAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
lascellesjaimie
 
2nd Q test-empowerment tech.docx
2nd Q test-empowerment tech.docx2nd Q test-empowerment tech.docx
2nd Q test-empowerment tech.docx
RealTalkMusic20
 
EMPOWERMENT TECHNOLOGY PRETEST.doc
EMPOWERMENT TECHNOLOGY PRETEST.docEMPOWERMENT TECHNOLOGY PRETEST.doc
EMPOWERMENT TECHNOLOGY PRETEST.doc
Crystal Gayle Afos
 
Enter your answers to each of the questions here. Just enter t.docx
Enter your answers to each of the questions here. Just enter t.docxEnter your answers to each of the questions here. Just enter t.docx
Enter your answers to each of the questions here. Just enter t.docx
mealsdeidre
 
1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf
1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf
1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf
kennithdase
 
Final Examination925 North S
Final Examination925 North SFinal Examination925 North S
Final Examination925 North S
ChereCheek752
 
UNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptUNIT_1_1626771386169.ppt
UNIT_1_1626771386169.ppt
HannaAnvar1
 
Which of the following statements is true about a discussion.docx
Which of the following statements is true about a discussion.docxWhich of the following statements is true about a discussion.docx
Which of the following statements is true about a discussion.docx
bkbk37
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
stacio
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
MarieChileMutia
 
Mobile ui
Mobile uiMobile ui
Mobile ui
Jerry Gannod
 
ETECH-Current State of ICT Technologies.pptx
ETECH-Current State of ICT Technologies.pptxETECH-Current State of ICT Technologies.pptx
ETECH-Current State of ICT Technologies.pptx
AuraLeeCarisma
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
DWP Information Architects Inc.
 

Similar to Midterm exam-empowerment (20)

PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
 
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxxEMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
EMP.TECH-1ST.docxxxxxxxxxxxxxxxxxxxxxxxx
 
etech2022.docx
etech2022.docxetech2022.docx
etech2022.docx
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docxBAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
 
2nd Q test-empowerment tech.docx
2nd Q test-empowerment tech.docx2nd Q test-empowerment tech.docx
2nd Q test-empowerment tech.docx
 
EMPOWERMENT TECHNOLOGY PRETEST.doc
EMPOWERMENT TECHNOLOGY PRETEST.docEMPOWERMENT TECHNOLOGY PRETEST.doc
EMPOWERMENT TECHNOLOGY PRETEST.doc
 
Enter your answers to each of the questions here. Just enter t.docx
Enter your answers to each of the questions here. Just enter t.docxEnter your answers to each of the questions here. Just enter t.docx
Enter your answers to each of the questions here. Just enter t.docx
 
1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf
1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf
1. TRUE OR FALSE Some modern malware can directly attack and disabl.pdf
 
Final Examination925 North S
Final Examination925 North SFinal Examination925 North S
Final Examination925 North S
 
UNIT_1_1626771386169.ppt
UNIT_1_1626771386169.pptUNIT_1_1626771386169.ppt
UNIT_1_1626771386169.ppt
 
Which of the following statements is true about a discussion.docx
Which of the following statements is true about a discussion.docxWhich of the following statements is true about a discussion.docx
Which of the following statements is true about a discussion.docx
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
The-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptxThe-Current-State-of-ICT-Empowerment Technology.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
 
Com Ed 8 Finals
Com Ed 8 FinalsCom Ed 8 Finals
Com Ed 8 Finals
 
Mobile ui
Mobile uiMobile ui
Mobile ui
 
ETECH-Current State of ICT Technologies.pptx
ETECH-Current State of ICT Technologies.pptxETECH-Current State of ICT Technologies.pptx
ETECH-Current State of ICT Technologies.pptx
 
Year of the AppSec Breach_Forrester
Year of the AppSec Breach_ForresterYear of the AppSec Breach_Forrester
Year of the AppSec Breach_Forrester
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 

More from Adrian Buban

Computer System Servicing Prelim Examination 2018
Computer System Servicing Prelim Examination 2018Computer System Servicing Prelim Examination 2018
Computer System Servicing Prelim Examination 2018
Adrian Buban
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
Adrian Buban
 
Illustrator
IllustratorIllustrator
Illustrator
Adrian Buban
 
Css1
Css1Css1
Lm computer hardware
Lm computer hardwareLm computer hardware
Lm computer hardware
Adrian Buban
 
Three dangerous sins
Three dangerous sinsThree dangerous sins
Three dangerous sins
Adrian Buban
 
Three dangerous sins part 2
Three dangerous sins   part 2Three dangerous sins   part 2
Three dangerous sins part 2
Adrian Buban
 
The stubborn heart
The stubborn heartThe stubborn heart
The stubborn heart
Adrian Buban
 
The measure of a strong church
The measure of a strong churchThe measure of a strong church
The measure of a strong church
Adrian Buban
 
The grace of god
The grace of godThe grace of god
The grace of god
Adrian Buban
 
The benefits of a small church
The benefits of a small churchThe benefits of a small church
The benefits of a small church
Adrian Buban
 
the grace of God
the grace of Godthe grace of God
the grace of God
Adrian Buban
 
Maging ganap
Maging ganapMaging ganap
Maging ganap
Adrian Buban
 
L ove passionately
L ove passionatelyL ove passionately
L ove passionately
Adrian Buban
 
Lamp on a stand
Lamp on a standLamp on a stand
Lamp on a stand
Adrian Buban
 
Kept by the power of god
Kept by the power of godKept by the power of god
Kept by the power of god
Adrian Buban
 
choose the best choice
choose the best choicechoose the best choice
choose the best choice
Adrian Buban
 
How to abide in christ
How to abide in christHow to abide in christ
How to abide in christ
Adrian Buban
 
He was abandon
He was abandonHe was abandon
He was abandon
Adrian Buban
 
Don’t ever compromise
Don’t ever compromiseDon’t ever compromise
Don’t ever compromise
Adrian Buban
 

More from Adrian Buban (20)

Computer System Servicing Prelim Examination 2018
Computer System Servicing Prelim Examination 2018Computer System Servicing Prelim Examination 2018
Computer System Servicing Prelim Examination 2018
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
 
Illustrator
IllustratorIllustrator
Illustrator
 
Css1
Css1Css1
Css1
 
Lm computer hardware
Lm computer hardwareLm computer hardware
Lm computer hardware
 
Three dangerous sins
Three dangerous sinsThree dangerous sins
Three dangerous sins
 
Three dangerous sins part 2
Three dangerous sins   part 2Three dangerous sins   part 2
Three dangerous sins part 2
 
The stubborn heart
The stubborn heartThe stubborn heart
The stubborn heart
 
The measure of a strong church
The measure of a strong churchThe measure of a strong church
The measure of a strong church
 
The grace of god
The grace of godThe grace of god
The grace of god
 
The benefits of a small church
The benefits of a small churchThe benefits of a small church
The benefits of a small church
 
the grace of God
the grace of Godthe grace of God
the grace of God
 
Maging ganap
Maging ganapMaging ganap
Maging ganap
 
L ove passionately
L ove passionatelyL ove passionately
L ove passionately
 
Lamp on a stand
Lamp on a standLamp on a stand
Lamp on a stand
 
Kept by the power of god
Kept by the power of godKept by the power of god
Kept by the power of god
 
choose the best choice
choose the best choicechoose the best choice
choose the best choice
 
How to abide in christ
How to abide in christHow to abide in christ
How to abide in christ
 
He was abandon
He was abandonHe was abandon
He was abandon
 
Don’t ever compromise
Don’t ever compromiseDon’t ever compromise
Don’t ever compromise
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Midterm exam-empowerment

  • 1. National Capital Region Schools Division Office HORACIO DELA COSTA HIGH SCHOOL Caloocan City Globalizing Filipino Skills and Competencies EMPOWERMENT TECHNOLOGIES S.Y. 2017- 2018 Name: _____________________________________________________________ Date: _____________________ Strand: ________________________Grade & Section: ______________________ Score:____________________ Test I: MULTIPLE CHOICE Directions: The following statement are tips to stay safe online. Choose the letter of the correct answer. A B C D 1. Do not use pirated software. a. Safe b. Not Safe c. Not Sure d. Maybe 1. 2. Think before you click. a. Safe b. Not Safe c. Not Sure d. Maybe 2. 3. Do not just accept terms and conditions; read it. a. Safe b. Not Safe c. Not Sure d. Maybe 3. 4. Do not share your password to anyone. a. Safe b. Not Safe c. Not Sure d. Maybe 4. 5. Don’t post anything about future vacation. a. Safe b. Not Safe c. Not Sure d. Maybe 5. 6. Add friends you know in real life. a. Safe b. Not Safe c. Not Sure d. Maybe 6. 7. Avoid visiting untrusted website. a. Safe b. Not Safe c. Not Sure d. Maybe 7. 8. Make your Wi-Fi password private. a. Safe b. Not Safe c. Not Sure d. Maybe 8. 9. Do not reply to a suspicious e-mail. a. Safe b. Not Safe c. Not Sure d. Maybe 9. 10. Do not talk to strangers weather online or face to face. a. Safe b. Not Safe c. Not Sure d. Maybe 10. Test II: MULTIPLE CHOICE Directions: From the bubble sheet, choose “A” if the statement is TRUE, “B” Maybe, “C” almost true, and “D” if NOT true. 11. ICT stands for Information and Communication Technology 11. 12. International companies call Philippines as the “ICT Hub of Asia” 12. 13. Convergence is the synergy of technological advancement to work on a similar goal. 13. 14. Social Media is a website that enables users to create, discuss and exchange user generated content. 14. 15. A virus is a malware that multiplies and infects other computer through flash drives. 15. 16. Android is an operating system for mobile phones. 16. 17. Blackberry OS are intended only for Blackberry phones. 17. 18. Symbian is smartphone OS use by Nokia devices. 18. 19. Social News can allow user to post news item or link from other news sources. 19. 20. Microblogging are sites that focus on short updates from the user. 20. Test II: MULTIPLE CHOICE Directions: Classify the following examples of social media according to their types. Choose the letter of the correct answer . A - Bookmarking site B - Social News C - Microblogging D - Blogs and Forums 21. StumbleUpon 21. 22. Reddit 22. 23. Blogger 23. 24. Tumblr 24. 25. Yahoo 25. 26. Youtube 26. 27. CNN news portal 27. 28. Twitter 28. 29. Pinterest 29. 30. Plurk 30.
  • 2. Test II: MULTIPLE CHOICE Directions: Choose the letter of the correct answer. 31. Designed to send you advertisement. a. adware b. trojan c. internet d. pharming 31. 32. Replicates and can transfer from one computer to another. a. virus b. spyware c. spam d. malware. 32. 33. Exploit the DNS system. a. pharming b. rogue c. malware d. spam 33. 34. Runs in the background and monitors what you are doing. a. spyware b. spam c. trojan d. keylogger 34. 35. Unwanted emails, mostly from bots. a. spam b. rogue c. malware d. net 35. 36. Disguise as a useful program but it’s not. a. trojan b. rogue c. keylogger d. worm 36. 37. A malicious software. a. malware b. spyware c. spam d. keylogger 37. 38. Used to record the keystrokes done by the user. a. keylogger b. spam c. trojan d. worm 38. 39. Malicious program like “LOVE BUG” created by a Filipino programmer. a. worm b. virus c. malware d. trojan 39. 40. Tricks the user into posting that is a security software. a. Phishing b. virus c. Pharming d. spam 40. Test IV: MULTIPLE CHOICE Directions: Tell whether the statement is related to Online Safety and Security, Protecting Reputation Online, Copyright Infringement and Online Research. Write “A” for Online Safety and Security, “B” for Protecting Reputation Online, “C” Copyright Infringement and “D” for Online Research. 41. There is a risk on sharing your Name and other information online. 41. 42. Your cellphone number should not be posted over the internet 42. 43. Having your birthday on your profile makes vulnerable to identity theft. 43. 44. Your post in the internet have tell about your personality. 44. 45. Your reputation is at risk if you are careless in using your social media account. 45. 46. There is a protection on a literary works, paintings, drawings, music etc. 46. 47. It is illegal to use something made from somebody else’s creativity 47. 48. It is important to acknowledge some body about their woks. 48. 49. To filter information, use advance search 49. 50. Search engine like Google, Bing and Yahoo is a flat form for gathering information online. 50.