Republic of the Philippines
Department of Education
CARAGA Administrative Region
Division of Butuan City
AUPAGAN NATIONAL HIGH SCHOOL
Aupagan, Butuan City
1st Quarter Examination SCORE
EMPOWERMENT TECHNOLOGY
S.Y. 2022 - 2023
Name: _________________________________________ Grade & Section: ______________ Date: ___________
Test I. Multiple choice
Direction: Encircle the letter of the correct answer.
1. It refers to the use of communication technology such as laptops, smartphones, tablets,
telephones, internet and etc. to send, save and edit information.
A. empowerment tech. B. ICT C. computer tech.
2. A technology used in cellular and other devices such as netbooks, laptops, tablets, smartphones
and etc.
A. mobile tech. B. empowerment tech. C. computer tech.
3. This is a website that allows you to share and store multimedia files such as videos, photos, and
music.
A. Media sharing B. media news C. social media
4. This is a platform that assists people with disability. It will guide the individual like a blind person by
using an audio recording.
A. Media tech. B. assistive media C. assistive technology
5. This is a website that allows you to broadcast short messages.
A. Blogs and Forums B. Micro sharing C. Microblogging
Test II. Modified True or False
Direction: Write T if the Statement is True, if the statement is False write F and write the word or statement that made the statement
false. Write your answer on the space provided.
_______ 6. Identity Theft happens when someone intentionally abused, harasses, and mistreated other
person using electronic communication.
_______ 7. Trojan Horse is a malicious program that replicates itself by copying itself to another program.
_______ 8. Adware is an unwanted advertisement that will pop up several times on the victim’s
computer and then behave abnormally and tedious to close them.
_______ 9. The worm is a collection of infected internet-connected devices such as PC and mobile
phones that are controlled by a common type of malware.
_______ 10. Ransomware is a software tool used by hackers to gain control over a computer on a
network without being exposed.
TEST III: IDENTIFICATION
_______________ 11. This is a malicious program that replicates itself by copying itself into another
program.
_______________ 12. It happens when someone intentionally abused, harasses, and mistreated by
another person using electronic communication.
_______________ 13. Also known as Malicious Software.
_______________ 14. A cyberattack method using deceptive emails and websites to acquire sensitive
personal information.
_______________ 15. It is an etiquette applied online that shows proper manner and behavior
_______________ 16. This is a protection given to the owner of the rights in an original work such as books,
musical works, films, paintings, and other works, and computer programs.
_______________ 17. This happens when the copyrighted work is used by other person without permission
of the author or copyright holder.
Aupagan National High School
Purok 5, Aupagan, Butuan City
[email protected] Republic of the Philippines
Department of Education
CARAGA Administrative Region
Division of Butuan City
AUPAGAN NATIONAL HIGH SCHOOL
Aupagan, Butuan City
_______________ 18. This is a program that allows users to search for content on internet.
_______________ 19. This is a research method in collecting and gathering information via internet by
using search engine such as google and Firefox.
_______________ 20. This is the use of copyrighted material for comment, teaching, criticism, news
reporting, research, scholarship, and other similar purpose is not an infringement of
copyright.
TEST IV: Enumeration
DIRECTIONS: Write your answer on the space provided.
TYPES OF MALWARES (21-29) GIVE ATLEAST 6 CORE ROLES OF NETIQUETTE (30-35)
21. _________________________ 30. ___________________________________
22. _________________________ 31. ___________________________________
23. _________________________ 32. ___________________________________
24. _________________________ 33. ___________________________________
25. _________________________ 34. ___________________________________
26. _________________________ 35. ___________________________________
27. _________________________
28. _________________________ GIVE ATLEAST 5 TYPES OF SOCIAL MEDIA (36-40)
29. _________________________ 36. __________________________________
37. __________________________________
38. __________________________________
39. __________________________________
40. __________________________________
TEST V – ESSAY
DIRECTIONS: explain the item below in 4 to 5 sentences each. Write your answer on the space provided.
41-45 – Is learning how to use Microsoft word important? Justify your answer. (5 pts.)
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
46-50 – Is learning how to use a computer important? Justify your answer. (5 pts.)
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________
Aupagan National High School
Purok 5, Aupagan, Butuan City
[email protected]