0% found this document useful (0 votes)
47 views3 pages

Midterm Exam: Caraga Administrative Region

The document contains a midterm exam on empowerment technologies with questions testing knowledge of terms related to information and communication technology. It covers topics like mobile devices, social media, search engines, cryptography, and computer security. The exam contains matching, true/false, and fill-in-the-blank questions.

Uploaded by

JULIETA DIWATA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views3 pages

Midterm Exam: Caraga Administrative Region

The document contains a midterm exam on empowerment technologies with questions testing knowledge of terms related to information and communication technology. It covers topics like mobile devices, social media, search engines, cryptography, and computer security. The exam contains matching, true/false, and fill-in-the-blank questions.

Uploaded by

JULIETA DIWATA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Republic of the Philippines

Department of Education
Caraga Administrative Region
Schools Division of Surigao del Norte
TIMAMANA NATIONAL HIGH SCHOOL
Timamana, Tubod, Surigao del Norte

MIDTERM EXAM
EMPOWERMENT TECHNOLOGIES

Name: ______________________________________ Year/Section: _________________ Score: ______________

Test I. Supply the appropriate terms/words to make the statement complete. Write CLEARLY your answers on the space
provided. (2 points each). Strictly NO ERASURES!

Information and Communication Technology deals with the use of different (1) ______________________ such as mobile
phones, telephone, (2) ____________, to locate, save, (3) __________ and (4) _______________________.

Having a (5) ______________ way to communicate is one of the (6) _________________. In terms of economics, ICT has
saved companies a (7) ___________________ with the kind of communication technology they use nowadays.

Time Magazine’s (8) _____________________________________ of 2013 places two cities from the Philippines in the (9)
______________ and (10) ____________ spots.

Web 2.0 is a term coined by Darcy Nucci on (11) ____________ in her article entitled (12) _________________. Web 2.0
also allows users to use web browsers instead of just using their (13) _________________. Browsers can now be used for
their (14) ______________________, (15) _____________________ and even for (16) ___________________.

The Semantic Web is a (17) __________________ led by (18) ____________________________. Their standard
encourages web developers to include (19) _____________________ in their web pages. The term was coined by the
inventor named (20) ______________________. The Semantic Web provides a common framework that allows data to be
(21) _________________________, (22) ___________________ and (23) ___________________.The aim of (24)
______________ is to have a machines understand the (25) _______________________ to be able to deliver (26)
_________________ specifically targeting the user.

_____________________ is the synergy of (27) __________________ to work on a similar goal or task. Web 3.0 aims to
improve on Web 2.0 by adding (28) ________________ through user preferences. The trends in ICT include (29)
__________________, (30) _________________, (31) ___________________, (32) ___________________, and (33)
____________________. We are responsible of what we (34) __________________. It is our responsibility to protect (35)
_______________________.
Test II. True or False. Write T if the statement is True and False if the statement is False. Write your answers on the space
provided. Strictly NO ERASURES. (3 points each)

_________1. When researching online, remember to break down your topic.


_________2. Use search engine to filter out information you do not need.
_________3. Credible source means checking out the link of the cited text/preferences.
_________4. Giving credit to the source of information for educational purposes is hereby punishable by law.
_________5. A certain law states that the owner have the right to his/her work and anyone who uses it is not punishable by law.
_________6. Spam acquires sensitive personal information details.
_________7. Using OR or I finds web pages that contain either the terms or phrases.
_________8. Incognito mode means the browser/s will not protect you from hackers.
_________9. If you have Wi-Fi at home, make it a private network by adding a reliable password.
_________10. You are not allowed to reply or click links from unsuspicious emails.
_________11. Folksonomy deals with information tagging.
_________12. According to Nielsen, internet users spend more time in social media than in any type of site.
_________13. A static web pages has content that the user can manipulate.
_________14. Blackberry devices uses blackberry OS
_________15. Blogger, WordPress and Tumblr are forms of forums and blogs.
_________16. Software as a service means opposing to purchase the software.
_________17. Dealing with diverse information for universal access purposes is said to be a long tail.
_________18. By keeping your profile public, search engines will not be able to scan your profile.
_________19. A crime committed or assisted through the use of the Internet is known as cybercrime.
_________20. Adware monitor what you are currently doing and typing.

Test IV. Matching Type. Test II. MATCHING TYPE. Select the best answer in column B to match the given questions in column
A. Write the letters only. Strictly NO ERASURES! (3 points each)
Column A Column B
________1. Use to categorize posts in website a. Rogue
________2. Web pages that are the same regardless of the user. b. Internet
________3. Web pages affected by user input or preferences. c. Google Docs
________4. A concept of WWW designed to cater the individual user. d. Fair Use
________5. It means an access highway, abode of information and e. Keyloggers
anyone can grab an information.
________6. A requirement to answer a secret questions whenever you f. Windows Phone OS
lose your password.
________7. Your rights over your work. g. Static
________8. A free web-based application that allows the user to h. Dynamic
create and edit word processing online.
________9. Tricks the user into posing that it is a security software. i. Web 3.0
________10. Allows you to include terms that are usually ignored. j. Social Media
________11. A property that can used without a consent. k. Mother’s Maiden Name
________12. Stealing password or any sensitive information using l. Hastag
a keyboard.
________13. Source and proprietary operating system developed by m. Copyright
Microsoft.
________14. It helps people who have visual/reading deficiency. n. Assistive Media
________15. Users can comment on the post and comments can be ranked. o. + sign

GOD BLESS EVERYONE!

Prepared by:

JULIETA O. DIWATA
SHS Teacher

You might also like