0% found this document useful (0 votes)
85 views2 pages

Emtech. M1week1 277

This document appears to be a summative test covering topics related to empowerment technologies, including web technologies, types of social media, cybersecurity threats, and proper online etiquette. The test contains 20 multiple choice questions testing knowledge of topics such as different generations of the web, specific social media platforms, examples of malware, and guidelines for safe and respectful online behavior. Correct answers are not provided, and the test is meant to assess knowledge gained over the first two weeks of a semester-long course on empowerment technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views2 pages

Emtech. M1week1 277

This document appears to be a summative test covering topics related to empowerment technologies, including web technologies, types of social media, cybersecurity threats, and proper online etiquette. The test contains 20 multiple choice questions testing knowledge of topics such as different generations of the web, specific social media platforms, examples of malware, and guidelines for safe and respectful online behavior. Correct answers are not provided, and the test is meant to assess knowledge gained over the first two weeks of a semester-long course on empowerment technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

SUMMATIVE TEST IN EMPOWERMENT TECHNOLOGIES

SECOND SEMESTER: FIRST QUARTER


MODULE 1 (Week 1-2)

Name: ______ Year& Strand: Date: Score:


I. MULTIPLE CHOICE. Read and analyze each statement carefully then write the letter of the correct answer before the
number.

________1. What type of web page is classified as flat or stationary?


A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0
________2. What web 2.0 feature allows users to subscribe to a data plan that charges for the amount of
time spent on the internet?
A. Application B. Folksonomy C. Long Tail D. User Participation
________3. What is the name of the symbol that is used to classify and categorize information?
A. At sign B. Asterisk C. Hashtag D. Question Mark
________4. What specific type of social media allows you to connect with other people?
A. Microblogging B. Media Sharing C. Social Networks D. Social News
________5. Twitter is an example of what specific type of social media?
A. Microblogging B. Media Sharing C. Social Networks D. Social News
________6. YouTube and Instagram are examples of what specific type of social media?
A. Blogs and Forums B. Bookmarking Sites C. Media Sharing D. Social Networks
________7. What specific type of social media allows its users to post their original content on websites such as
WordPress, Blogger, and Tumblr?
A. Blogs and Forums B. Bookmarking Sites C. Media Sharing D. Social Networks
________8. What type of social media allows you to manage links to various websites?
A. Blogs and Forums B. Bookmarking Sites C. Media Sharing D. Social Networks
________9. What do you call the global system of interconnected computer networks that use servers to link billions
of devices worldwide?
A. Internet B. Web browser C. Websites D. World Wide Web
________10. What type of web page is classified as a dynamic page?
A. Internet B. Web 1.0 C. Web 2.0 D. Web 3.0
________11. What type of malicious program is designed to replicate itself and transfer from one computer to
another either through the internet or local networks or data storage like flash drives and CDs?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
________12. What harmful online programs are designed to send you advertisements, mostly pop-up ads?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
________13. What harmful online program is used to record keystrokes done by users to steal passwords?
A. Adware B. Spyware C. Worms and Virus D. Ransomeware
________14. What is ransomware based on?
A. Fear of hackers B. Fear of the Internet C. Fear of spyware D. Fear of losing important files

________15. Which of the following is an example of a “phishing” attack?


A. Creating a fake website that looks nearly identical to a real website in order to trick users into
entering their login information.
B. Sending someone an email that contains a malicious link that is disguised to look like an email
from someone reliable.
C. Sending someone a text message looks like a notification that the person has won a contest.
D. Sending someone an email that records their keystroke activities while using their computers.
________16. Which of the following must NOT be done if you received an embarrassing picture from your friend?
A. Discourage your friend from sending pictures like that.
B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes.
D. Tell your parents or teachers
________17. What is a flame in cyberspace?
A. A person who follows the rules of Netiquette.
B. A post or email message that expresses a strong opinion or criticism.
C. An expert programmer.
D. An online chain letter.
________18. What is considered shouting over the Internet?
A. Not answering a friend request on Facebook.
B. Putting a lot of exclamation marks at the end of a sentence.
C. Screaming at your computer.
D. Writing in all CAPS.
________19. To avoid being cyber-bullied you should always...
A. Ignore any requests from people to be your friend online.
B. Give out personal information to anyone who asks.
C. Observe proper netiquette rules.
D. Strike first - post mean things about other people on your Wall on Facebook.
________20. How are you judged in cyberspace?
A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and
netiquette.
C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.
D. You

You might also like