0% found this document useful (0 votes)
209 views4 pages

Mastery 1 (Etech)

This document contains a mastery examination in empowerment technology consisting of multiple choice questions about various technology and social media terms and concepts. It also includes a section matching different internet threats to netiquette behaviors that could help avoid them. Some key topics covered include types of social media, computer components, operating systems, and threats like computer viruses, phishing, cyberbullying, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
209 views4 pages

Mastery 1 (Etech)

This document contains a mastery examination in empowerment technology consisting of multiple choice questions about various technology and social media terms and concepts. It also includes a section matching different internet threats to netiquette behaviors that could help avoid them. Some key topics covered include types of social media, computer components, operating systems, and threats like computer viruses, phishing, cyberbullying, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Center for Healthcare Professions Cebu, Inc.

FCB Building.cor P.Burgos Street and A.C Cortes Street ,Alang-Alang, Mandaue City
Tel No. (+6332) 420 1880 / (+6332) 420 1881
Email Ad: [email protected] / www.chpcebu.com

1st MASTERY EXAMINATION IN EMPOWERMENT TECHNOLOGY

Name:_______________________________________Date:_____________Score:_______
Grade:_____ Section:_____________

I. MULTIPLE CHOICE: Select the best answer from the choices and write the letter that corresponds to
your answer on the answer sheet.
1. Which of the following social media website is for social news.
A. Facebook B. Reddit C. Twitter D. Youtube
2. It deals with the use of different communications technology to locate, save, send, and edit information.
A. Communication B. Information C. Technology D. ICT
3. It refers to the tangible part of the computer system.
A. Hardware B. Peopleware C. Software D. Tupperware
4. It is a mobile operating system for Apple devices.
A. Android B. iOS C. Symbian D. WebOS
5. Which of the following social media website is for social network?
A. Facebook B. Reddit C. Twitter D. Youtube
6. It refers to an electronic device that can accept raw data as input, manipulate or process it to produce
output.
A. Cellphone B. Computer C. Radio D. Telephone
7. Which of the following contents is the main feature of Youtube?
A. Comments B. Likes C. Photos D. Videos
8. Which of the following social media website is for microblogging?
A. Facebook B. Reddit C. Twitter D. Youtube
9. It refers to the intangible part of the computer system.
A. Hardware B. Peopleware C. Software D. Tupperware
10. Which of the following is not a media sharing site?
A. Flickr B. Instagram C. Twitter D. Youtube

1
11. It is a nonprofit service designed to help people who have visual and reading impairments.
A. Assistive media B. Digital Media C. Mobile media D. Social media

12. Which type of social media is Wix?


A. Blogs B. Microblogging C. Social News D. Youtube
13. It is an online version of information system.
A. e-learning B. Online system C. e-conference D. Webinar
14. Which of the following social media website is for blogs and forums?
A. Instagram B. Pinterest C. Twitter D. Wordpress
15. Which OS is used for free by several mobile phone companies?
A. Android B. iOS C. WebOS D. Symbian
16. It is an act of engaging an underage minor into inappropriate sexual relationships through the internet.
A. Cyberbullying B. Cyberstalking C. Flaming D. Online Predation
17. It focuses on the acceptable use of online resources in an online social environment.
A. Good Moral B. Nethics C. Netiquette D. Online Ethics
18. Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager.
The manager called him and said that his flash drive is empty. Dan’s flash drive was infected with
____________.
A. Computer Virus B. Malware C. Phisher D. Spam
19. Precy has received an email from the bank asking her to update her personal information for security
purposes. She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.
A. Blogging B. Flaming C. Pharming D. Phishing
20. You received a comment from an unknown friend in one of your posts in Social Media saying “YOU
IDIOT!”. What do you call this kind of act?
A. Acting B. Bullying C. Blogging D. Flaming
21. It is an internet threat that acquires sensitive personal information like passwords and credit card
credentials.
A. Malware B. Phishing C. Spam D. Virus
22. It refers to a set of rules for an acceptable online behaviour.
A. Ethics B. Good Moral C. Nethics D. Netiquette
23. This is one form of an internet advertising used by advertisers to get the attention of web users but
sometimes has an obscene or an offensive content
A. Adverts B. Cards C. Infographics D. Pop-ads
24. It is a software that can see all the things you are doing in your computer.
2
A. Attacker B. Hacker C. Spyware D. Tracker
25. It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other
means of approaching the victim unexpectedly using an online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking
26. Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of
Lori who is a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a
victim of ___________________.
A. Cyberbullying B. Cyberstalking C. Flaming D.Online Predation
27. Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log
in to the system. Unknowingly upon signing in, Lily’s username and password has already been
compromised and is now a victim of ___________.20
A. Blogging B. Flaming C. Pharming D. Phishing
28. It is a deceitful practice of getting your personal information using email or text messages.
A. Blogging B. Flaming C. Pharming D. Phishing
29. It is a small program or script that can negatively affect the health of your computer.
A. Malware B. Phisher C. Spam D. Virus
30. He is a clever or expert programmer who can gain unauthorized access to other computers.
A. Attacker B. Hacker C. Spyware D. Tracker

II. In the table below, mark with a check (  ) the internet threats that can be avoided in doing each
netiquette. Internet threats are represented by letter in the table under Internet Threats column.
a. Computer Virus f. Online Predation
b. Cyberbullying g. Pharming
c. Cyberstalking h. Phishing
d. Flaming i. Spam
e. Hacker j. Spyware

Internet Threats
Netiquette
a b c d e f g h i j
1. Make real people a priority
2. Use respectful language
3. Share with discretion
4. Don’t exclude others

3
5. Choose friends wisely
6. Respect people’s privacy
7. Fact check before reposting
8. Respond to emails promptly
9. Update online information
10. Think before you click

Examine the message below and answer the questions that follows. Write your answers in your notebook.
“Hello, STUPID! If you weren’t such an IDIOT, you’d understand why you’re wrong about
everything. But apparently you’re so RETARDED that you CAN’T EVEN SPELL RIGHT. And also
you’re FAT.” (Burnside 2019)
1. What kind of an internet threat do you think is this?
2. Why is this a threat to you?
3. What can you do to avoid this?
4. How will you reconstruct the messagee so it will not be hurtful?

You might also like