0% found this document useful (0 votes)
67 views4 pages

Emp Tech 1ST Periodical Exam

EXAM

Uploaded by

Chris Carabuena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views4 pages

Emp Tech 1ST Periodical Exam

EXAM

Uploaded by

Chris Carabuena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Republic of the Philippines

Department of Education
REGION VI – WESTERN VISAYAS
DIVISION OF SAGAY CITY
EUSEBIO LOPEZ MEMORIAL INTEGRATED SCHOOL
1st PERIODICAL EXAMINATION IN EMPOWERMENT TECHNOLOGY | GRADE 11
S.Y. 2024-2025
SEPTEMBER 23-24, 2024

I. MULTIPLE CHOICE
Directions: Read and answer each question. Choose the letter of the correct answer. Write your answer in
a ½ lengthwise yellow pad.

1. What is a part of the internet that is not visible to the search engines and requires the use of anonymizing
browser called Tor (The Onion Router) to be accessed?
A. Dark Web B. Deep Web C. Surface Web D. World Wide Web

2. Internet changes the way we live, work and enjoy our life. What part of the internet, If John would like to
access Academic Databases, Medical Records, Financial Records, Legal Documents and some Government
reports?
A. Dark Web B. Deep Web C. Surface Web D. World Wide Web

3. What is the process of interactively searching for and retrieving requested information via a computer from
database that are online?
A. Online Search B. Library Search C. Digital Search D. Search Engine

4. What is a type of social engineering assault that lure users into a trap that steals their personal information or
inflicts their systems with malware?
A. Baiting B. Pretexting C. Phishing D. Scareware

5. Joseph a blogger wants to enhance his skills in Social Media platform. Which of the following is an example of
a Social Media?
A. Dropbox B. Tumblr C. Weebly D. Wikimapia

6. What is a software system that is designed to search for information on the World Wide Web?
A. Search Engine B. Web Address C. Web Browsers D. URL

7. What form of digital social engineering assault wherein users prods them into revealing sensitive information,
clicking on links to malicious websites, or opening attachments that contain malware?
A. Baiting B. Pretexting C. Phishing D. Scareware

8. What type of hackers who usually download tools or use available hacking codes written by other developers
and hackers?
A. Black Hat B. Gray Hat C. White Hat D. Script Kiddie

9. Paul is an IT Professional in a well-known company, he helped the company to remove a virus or PenTest
different types of application and software. He is also, What type of hacker is Paul?
A. Black Hat B. Blue Hat C. White Hat D. Red Hat

10. What Cloud Computing software wherein you can keep your file safe, synced, and easy to share?
A. Dropbox B. Google Drive C. Flash Drive D. Hard Drive

11. What is a global system of interconnected computer networks that use the internet protocol suite (TCIP/IP) to
link billions of devices worldwide?
A. Computer B. Internet C. Telephone D. Web

12. What is a process of attempting to gain Unauthorized access to restricted systems using common passwords
or algorithms that guess passwords?
A. Hacking B. Spear Phishing C. Password Cracking D. Social Engineering
13. World Wide Web is an information space where documents and other web resources are identified by URLs.
Which of the following is NOT an online platform of World Wide Web?

I. Web 1.0 III. Web 10


II. Web 2.0 IV. Web 20

A. I and II B. I only C. I, II, and III D. III and IV

14. What refers to the online security or safety of people and their information when using internet?
A. Internet Protection B. Internet Safety C. Internet Protocol D. Internet Hazard

15. What malicious program designed to replicate itself and transfer from one file folder to another and also
transfer to other computers?
A. Adware B. Virus C. Trojan D. Worms

16. Who was the founder of the World Wide Web?


A. Jeff Bezos B. Bill Gates C. Mark Zuckerberg D. Tim-Berners Lee

17. What is known as the flat page or stationary age in the sense that the page is “as is” and cannot be
manipulated by the user?
A. Internet B. Dynamic Web Pages C. Static Web Pages D. World Wide Web

18. What feature of Web 2.0 wherein users categorize and classify information using freely chosen keywords e.g.
tagging by Facebook, Twitter, use tags that start with the sign #, referred to as hashtag?
A. Folksonomy B. Long Tail C. User Participation D. Mass Participation

19. Karen received her parcel from Lazada, after that she rate the product and put some comments because the
product has a slight damage. What feature of Web 2.0 takes place in this situation?
A. Folksonomy B. Long Tail C. User Participation D. Mass Participation

20. Niko is a vlogger and uploaded a new video content in a Media Sharing Site. The following are examples of
Media Sharing Sites EXCEPT.
A. Instagram B. Tumblr C. Flickr D. YouTube

21. What program that runs in the background without you knowing it, and has the ability to monitor what you are
currently doing and typing through keylogging?
A. Adware B. Virus C. Spyware D. Worms

22. In an ICT class, Mica is helping his classmates with the task and activities and not taking advantage just
because he has more knowledge and power. What rules of netiquette takes place in this situation?
A. Remember the human
B. Don’t’ abuse your power
C. Be forgiving of another people’s mistake
D. Respect other people’s time and bandwidth

23. Ana is regularly reading the yahoo mail of her friend without the proper permission. What rules of netiquette
does Ana didn’t not follow?
A. Don’t’ abuse your power
B. Respect other people’s privacy
C. Be forgiving of another people’s mistake
D. Respect other people’s time and bandwidth

24. What is a crime committed or assisted through the use of the internet?
A. Cybercrime B. Virtual Crime C. Internet crime D. Personal Crime

25. What is the synergy of technological advancements to work on a similar goal or task?
A. Convergence B. Virtual Literacy C. Adaptation D. Social Involvement

26. What is a process of encoding a message or information in such a way that only authorized parties can
access it in a two-way method?
A. Encryption B. Decrypting C. Hashing D. Spidering

27. Undertakes efficient detection and investigation of crimes (cybercrimes) and other offenses against the laws of
the Philippines.
A. PNP (Philippine National Police)
B. PDEA (Philippine Drug Enforcement Agency)
C. NBI (National Bureau of Investigation)
D. FBI (Federal Bureau of Investigation)
28. A type of password cracking technique which use algorithms that combine alpha-numeric characters and
symbols to come up with passwords of the attack?
A. Guess
B. Dictionary Attack
C. Brute Force Attack
D. Rainbow table Attack

29. It deals with the use of different communication technologies such as mobile phones, telephone, Internet to
locate, save, send and edit information
A. Information and Communications Technology
B. Information and Telecommunications Technology
C. Information System
D. Empowerment Technologies

30. It is a diverse information sharing through universal web access. Web 2.0’s content is based on people from
various cultures.
A. Folksonomy B. Long Tail C. User Participation D. Mass Participation

II. IDENTIFICATION:

Directions: Identity what is being asked on the following question. Wrong spelling is wrong.

__________1. This is the knowledge of maximizing the user’s personal safety and security risks to private information
and property associated with using the internet, and the self-protection of computer crime in general.

__________2. It is a tree branch of computer security related to the Internet, often involving browser security but also
network security on a more general level as it applies to another applications or operating system as a whole.

__________ 3. It is an online communication that makes everyone comfortable.

__________4. Refers to the patterns of behavior used when on the internet, guided both by law of personal philosophy.

__________5. It is the term used for a broad range of malicious activities accomplished through human interactions.

__________6. An unwanted acquisition of sensitive personal information like passwords and credit card credentials.

__________7. Sites that allow you to store and manage links to various website and resources. Most of the sites allow
you to create a tag to others.

__________8. It is a non- profit service designed to help people who have visual and reading impairments. A
database of audio recordings is used to read to the user.

__________9. Often servers are in geographically different places, but server acts as if they are working next to each
other.

__________10. focus on short updates from the user. Those that subscribed to the user will be able to receive these
updates. Ex. Twitter and Plurk.

III. ENUMERATION.

Direction: Enumerate the following

1-7 | TYPES OF HACKERS

8-10 | GIVE 3 PASSWORD CRACKING TECHNIQUES

Prepared by: Checked: Noted:

JU KENNETH D. DORIMAN ALLEN JAY E. JOMALESA RENE M. ENCABO


Subject Teacher Master Teacher I Principal II
ALS LEARNERS: FACE TO FACE

TVL A
RENCE CENTINA
REYNIEL DALAORAO
MJ JUMAWAN
JISON PERANIO
JAYSON MONTEBANO

TVL-B
RODNIE GUSTILLO
NICKO GARCIA

TVL-D
ROGELIO VILLAFLOR

You might also like