SUMMATIVE TEST IN
EMPOWERMENT 11
Direction: Read the questions carefully and write the letter of the
correct answer.
1.What do you call the media that is designed to help
people who have visual and hearing impairments?
A. Assistive media C. Facebook
B. B. Long tail D. Blogger
2. What type of social media that allow users to post their
own news items or links to other news sources?
A. Social networks C. Blogs
B. Social news D. Forums
• 3 This type of social media allows user to download
videos from a website.
• A . Blogs and forums C. Social News
• B. Bookmarking sites D. Media sharing
• 4. This is a read-only webpage.
• A. Web 1.0 C. Web 3.0
• B. Web 2.0 D. Web 4.0
• 5. Twitter is a social media site that can be classified as
• A. Media sharing C. Blog
• B. Microblogging D. Social news
• 6. A feature of Web 2.0 in which a user can give feedback
to a certain product.
• A. User participation C. Mass participation
• B. Rich user experience D. Folksonomy
•
• 7. What type of operating system used in iPhones?
• A. Android C. Blackberry OS
• B. Symbian D. iOS
• 8. This refers to the feature where users are able to
categorize and locate information through tagging.
• A. Hashtags C. Taxonomy
• B. Folksonomy D. Rich user experience
• 9. What is Netiquette?
• A. Using a net to catch fish
• B. Being mean to other people on facebook.
• C. Presenting proper manners at the
dinner table.
• D. Showing manners and etiquette on the
internet.
10. Which of the following should you never
give up on the internet?
A. Your Age B. Your name
C. Your address D. All of
the above
11.What should you do to avoid being cyber-
bullied?
A. Observe proper netiquette rules.
B. Give out personal information
C. Ignore any requests from people to be your
friend online
D. Strike first-post mean things about other
people on your Facebook wall.
12. With your secret codes and passwords, you
should:
A. Give them only to your best friends.
B. Give them to strangers.
C. Never give your passwords, except to
your parents.
D. Never give except your boyfriend.
13.What should you if you feel you are being
cyber-bullied?
A. Call the police
B. Tell no one, it’s embarrassing
C. Tell a trusted adult like a parent or
teacher.
D. Just delete anything referring to you on
the internet.
14.Knowledge and understanding of netiquette is
useful because __________.
A. It will help you create a positive
impression on those you meet in cyberspace.
B. It explains the conventions already being
used by millions of cyber units .
C. It explains some of the technical
limitations of online communications.
D. All of the above.
15.This threats can monitor your keystrokes,
read and delete your files, reformat your hard
drive, and access your applications.
A. Spyware
B. Phishing
C. Pharming
D. Keylogging
16. These are official-looking emails that are sent
impersonating a well-known provider, such as
bank.
A. Phishing
B. Spam
C. Trojan
D. Pharming
17. With your secret codes and passwords, you
should:
A. Give them only to your best friends.
B. Give them to strangers.
C. Never give your passwords, except to your
parents.
D. Never give except your boyfriend.
18.Precy has received an email from the bank asking
her update her personal information for security
purposes. She clicked the link and sign in.
Unknowingly, Precy is already a victim
of__________.
A. Virus
B. Phishing
C. Pharmers
D. Spam
19.Dan has finished all written reports. He saved it
in a flash drive and he submitted it to his manager
. The manager called him and said that his flash
drive is empty. Dan’s flash drive was infected
with__________.
A. Spyware
B. Virus
C. Trojan
D. Spam
20. They create web pages mimicking that of a
trustworthy business, such as an online banking
log-in page.
A. Spam
B. Trojan
C. Pharmers
D. Phishing