0% found this document useful (0 votes)
67 views1 page

I. Multiple Choice: I. Multiple Choice:: A Malicious Program That Replicate Itself by Copying Itself To Another Program

This document contains a summative test on empowerment technology. The test has three sections: 1. Multiple choice - Questions test knowledge of topics like social media, web technologies, cybersecurity threats like viruses, worms, and ransomware. 2. True/False - Statements cover issues like copyright, reliability of online information, functions of search engines, and cybercrimes. 3. Identification - Students must identify different social media platforms like YouTube, Reddit, Pinterest, and Flickr. The test evaluates students' understanding of key concepts in empowerment technology.

Uploaded by

Ariel Cancino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views1 page

I. Multiple Choice: I. Multiple Choice:: A Malicious Program That Replicate Itself by Copying Itself To Another Program

This document contains a summative test on empowerment technology. The test has three sections: 1. Multiple choice - Questions test knowledge of topics like social media, web technologies, cybersecurity threats like viruses, worms, and ransomware. 2. True/False - Statements cover issues like copyright, reliability of online information, functions of search engines, and cybercrimes. 3. Identification - Students must identify different social media platforms like YouTube, Reddit, Pinterest, and Flickr. The test evaluates students' understanding of key concepts in empowerment technology.

Uploaded by

Ariel Cancino
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

SUMMATIVE TEST 2

Empowerment Technology 11

I. MULTIPLE CHOICE: I. MULTIPLE CHOICE:


Directions: Read and answer the questions below. Directions: Read and answer the questions below.
Encircle the letter of the best answer from among Encircle the letter of the best answer from among
the given choices. the given choices.

1. A web application where a user can 1. _______________a malicious program that


communicate, create and share replicate itself by copying itself to another
content, and participate in online communities? program.
A. Convergence C. Mobile Technologies A. Virus C. Worm
B. Social Media D. Assistive Media B. Adware D. Spyware
2. What is the markup language for designing and 2. _______________malicious program that
developing websites? copy’s itself and spreads to other computers.
A. DNS C. HTTP A. Rootkit C. Trojan Horse
B. URL D. HTML B. Worm D. Virus
3. What version of the world wide web that allows 3. _____________ is a ransom virus that block
interactivity between the the user from accessing the programs or files and
users and the website? demands to pay the ransom through online
A. Web 1.0 C. Web 3.0 method
B. Web 2.0 D. Web 4.0 for the removal of the virus.
4. A website that allows you to broadcast short A. Keylogger C. Ransomware
message. B. Botnet D. Spyware
A. Social News C. Microblogging 4. _________ is a program that runs in the
B. Bookmarking Sites D. Media Sharing background and steals user credentials and
5. A platform that assist person with disability. confidential information and send back to hack by
A. Assistive Media C. Convergence recording
B. Social Media D. Semantic Web every keystroke that a user makes on their
computer or device.
II. TRUE OR FALSE: A. Spyware C. Rootkit
Directions: Write “True” if the statement is true B. Ransomware D. Keylogger
and write “False” if the statement is false. 5. _________ is a malicious program that
disguised as legitimate program that user will
_______6. We are allowed to copy the works of accept and use but take control of your computer.
other people without asking permission. A. Trojan Horse C. Virus
_______7. All Information from the internet are B. Worm D. Botnet
free.
_______8. Search engine is an application used II. TRUE OR FALSE:
for searching the web. Directions: Give the meaning of the following
_______9. All information from the internet are acronyms.
reliable.
6. www - ______________________________
______10. Google is an example of search
7. USB - _______________________________
engine.
8. WiFi - _______________________________
______11. Child pornography is a form of
9. PNG- _______________________________
cybercrime.
10. JPEG - ______________________________
______12. Committing crime on the internet is not
punishable by law III. IDENTIFICATION:
______13. Do not open suspicious email. Directions: Identify the following types of Social
______14. Share your password with anyone. Media.
______15. Think before you click. Ex. Twitter – Social Network

11. Youtube
Prepared by: 12. Reddit
13. Pinterest
14. Flicker
ARIEL A. CANCINO 15. Wordpress
Subject Teacher
Prepared by:

ARIEL A. CANCINO
Subject Teacher

You might also like