0% found this document useful (0 votes)
482 views14 pages

EMPOWERMENT TECHNOLOGY Quiz

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 14

EMPOWERMENT

TECHNOLOGY
LONG QUIZ
Identification
1. It is unwanted email mostly from bots and
advertisers. It can be used to send malware.

2. Stands for “ Malicious Software” .

3. An Operating System developed by Microsoft


for Smartphones and pocket PCs.
4. An Open Source OS developed by Google.

5. It is a non-profit service designed to help


people who have visual and reading
impairments.

6. It is the synergy of technological


advancements to work on a similar goal or task.
7. An Operating System used in Apple devices.

8. The Original Smartphone OS; used by NOKIA.

9. It plays an integral part in the development of the


Philippine economy.

10. A more complicated way of phishing where it


exploits the Domain Name Service (DNS) system.
MULTIPLE CHOICES
• 11. If someone sends you an email and this
email direct you to visit a website and be
asked to update your username / password
and other personal details. What do you think
does the sender is doing.
a.Pharming b. Phishing
c. Keylogging d. Infringement
12. It has the ability to monitor what you are
currently doing and typing through
keylogging.
 
a. Adware b. Spyware
c. Trojan d. Worm
13. It is the crime committed or assisted through
the use of internet.

a.Copyright infringement
b. Cyber Bullying
c. Cybercrime
d. Keylogging
14. While browsing internet, someone sends
you an advertisement or bots and you open it.
Your computer got infected. What do you
think is the internet threat that you received.
a. Spyware b. Adware
c. Spam d. Trojan
15. It means that an intellectual property may
be used w/o consent as long as it is used in
commentaries, criticisms , search engines,
parodies, news reports, research, library
archiving, teaching, and education.
a. Cybercrime c. infringement
b. Fair use d. Phishing
16. Which of the following practice is not safe
while using internet?
a. Be mindful of what you share online.
b. Do not talk to stranger fact to face.
c. Reply or Click links from suspicious email.
d. Make your wifi private by adding password.
17. Among the following, which is NOT
considered malware?
a. worm b. Trojan
c. adware d. spam
18. . It is defined as information superhighway.

a. Computer c. website
b. Internet d. Blogs
19. To avoid Copyright infringement, what ability
did you possess when you can express
something using your own words, but you
should give credit to the source?
a. Being Responsible
b. Being creative
c. Understanding
d. Know the law
20. Which of the following is not considerable when
posting something over the internet?

a. Before posting on the web, Ask question to


yourself?
b. .Avoid using names.
c. Set your post in “public”.
d. Talk to your friends about Think before you click
responsibility.

You might also like