0% found this document useful (0 votes)
33 views1 page

QUIZ 2 Empowerment Technology

This document contains a quiz about online safety, netiquette, and research skills. It has three parts. Part 1 contains statements about opening email attachments, posting personal information online, and sharing passwords. Part 2 matches terms like virus, phishing, and malware to their definitions. Part 3 contains statements about researching topics online and developing research skills. The quiz assesses knowledge across these important digital literacy topics in fewer than 15 multiple choice and true/false questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views1 page

QUIZ 2 Empowerment Technology

This document contains a quiz about online safety, netiquette, and research skills. It has three parts. Part 1 contains statements about opening email attachments, posting personal information online, and sharing passwords. Part 2 matches terms like virus, phishing, and malware to their definitions. Part 3 contains statements about researching topics online and developing research skills. The quiz assesses knowledge across these important digital literacy topics in fewer than 15 multiple choice and true/false questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Empowerment Technologies Quiz No.

2
Name: ___________________________________________________ Score: ________________
Section: __________________________________________________ Date: __________________
Part 1 (Rules of Netiquette)
Write TRUE if you agree with the statement and FALSE if you disagree on the blank before each number.
_____1. My computer has an antivirus so it is okay to open most email attachments like e-cards and video files.
_____2. Your friend told you that his college application was rejected due to the fact that you posted a video of
him doing crazy stuff at a party. You posted the video several years ago but later took it down to protect
your friend’s reputation. Can your friend be right that the college found the video?
_____3. You and your best friend play a lot of video games. One time, she asks you for your password so she
can help you level up and get in-game money. She promises to keep your password a secret. Is it okay
to give away your password?
_____4. You received an email stating that your mother’s bank account is going to be forfeited if you do not
respond to the email. Is it safe to reply?
_____5. You forgot that your essay for English is due tomorrow. While doing your research, you found a
website offering Free essays. Is it okay to use the essays from this free essay website?
_____6. A virus is a malware that multiplies and infects other computers through flash drives.
_____7. Keyloggers are software that show pop-up ads even if you are not using your browser.
_____8. Search engines scan websites for search results even if you have set your post to “private.”
_____9. There is a danger in posting information about a future vacation.
_____10. Letting people know your birthday is probably a must if you want to get as many gifts as possible. But
having it in your profile makes you vulnerable to identity theft.

Part 2 (Internet Threats)


Match column A with column B. Write the letter of the correct answer on the space before each number.
A B.
_____1. Virus a. designed to send you advertisements
_____2. Rogue b. sends official-looking email and is designed to steal sensitive personal
information
_____3. Keylogger c. a provision that allows you to use copyright work without consent with certain
limitations
_____4. Adware d. a browser feature that is synonymous to “private” browsing
_____5. Spam e. replicates and can transfer from one computer to another
_____6. Phishing f. exploits the DNS system
_____7. Fair use g. states that anyone who uses your work without your permission is punishable
by law
_____8. Spyware h. runs in the background and monitors what you are doing
_____9. Private i. unwanted email mostly from bots
_____10. Malware j. disguised as useful program but it is not
_____11. Incognito k. the information superhighway=
_____12. Internet l. tricks the user into posing that it is a security software
_____13. Trojan m. a malicious software
_____14. Copyright n. an option to hide a post so that search engines could not scan it
_____15. Pharming o. used to record the keystrokes done by the user

Part 3 (Contextualized Online Search and Research Skills)


Write TRUE if you agree with the statement and FALSE if you disagree on the blank before each number.
_____1. Online is flexible in every subject or topic.
_____2. Research has the widest coverage about much information that circulates the web world.
_____3. Research skills is the process of interactively searching for and retrieving searching requested
information via computer from databases that are online.
_____4. Research is the easiest way to use when you do your assignment it can make your assignment done
easily.
_____5. Internet is the use of World Wide Web or internet for obtaining information.

You might also like