PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL
PUTLOD, JAEN, NUEVA ECIJA
Name:______________________________________ Section:________________ Score:__________
Subject: EMPOWERMENT TECHNOLOGIES – Lesson 2 – QUIZ # 2
MULTIPLE CHOICES: Select the best answer from the choices and write the letter that corresponds to your answer on
the space provided.
1. ___________It is an act of engaging an underage minor into inappropriate sexual relationships through the internet.
A. Cyberbullying B. Cyberstalking C. Flaming D. Online Predation
2. ___________ It focuses on the acceptable use of online resources in an online social environment.
A. Good Moral B. Nethics C. Netiquette D. Online Ethics
3. ___________Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager. The
manager called him and said that his flash drive is empty. Dan’s flash drive was infected with __________.
A. Computer Virus B. Malware C. Phisher D. Spam
4. ___________Precy has received an email from the bank asking her to update her personal information for security purposes.
She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.
A. Blogging B. Flaming C. Pharming D. Phishing
5. ___________ You received a comment from an unknown friend in one of your posts in Social Media saying “YOU IDIOT!”. What
do you call this kind of act?
A. Acting B. Bullying C. Blogging D. Flaming
6. ___________It is an internet threat that acquires sensitive personal information like passwords and credit card credentials.
A. Malware B. Phishing C. Spam D. Virus
7. It refers to a set of rules for an acceptable online behaviour.
A. Ethics B. Good Moral C. Nethics D. Netiquette
8. ___________ This is one form of an internet advertising used by advertisers to get the attention of web users but sometimes
has an obscene or an offensive content
A. Adverts B. Cards C. Infographics D. Pop-ads
9. ___________It is a software that can see all the things you are doing in your computer.
A. Attacker B. Hacker C. Spyware D. Tracker
10. ___________It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other means of
approaching the victim unexpectedly using an online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking
11. ___________Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of Lori who is
a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a victim of ___________________.
A. Cyberbullying B. Cyberstalking C. Flaming D.Online Predation
12. ___________Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the
system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a victim of
___________.
A. Blogging B. Flaming C. Pharming D. Phishing
13. ___________It is a deceitful practice of getting your personal information using email or text messages.
A. Blogging B. Flaming C. Pharming D. Phishing
14. ___________It is a small program or script that can negatively affect the health of your computer.
A. Malware B. Phisher C. Spam D. Virus
15. ___________He is a clever or expert programmer who can gain unauthorized access to other computers.
A. Attacker B. Hacker C. Spyware D. Tracker
Prepared by:
GRAZELEEN M. MERCADO
Subject Teacher II
PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL
PUTLOD, JAEN, NUEVA ECIJA
ANSWER KEY – LESSON 2 – Quiz # 2
PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL
PUTLOD, JAEN, NUEVA ECIJA
Name:______________________________________ Section:________________ Score:__________
Subject: EMPOWERMENT TECHNOLOGIES – Lesson 2 – QUIZ # 2
MULTIPLE CHOICES: Select the best answer from the choices and write the letter that corresponds to your answer on
the space provided.
1. ___________ This is one form of an internet advertising used by advertisers to get the attention of web users but sometimes
has an obscene or an offensive content
A. Adverts B. Cards C. Infographics D. Pop-ads
2. ___________It is a software that can see all the things you are doing in your computer.
A. Attacker B. Hacker C. Spyware D. Tracker
3. ___________It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other means of
approaching the victim unexpectedly using an online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking
4. ___________Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of Lori who is
a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a victim of ___________________.
A. Cyberbullying B. Cyberstalking C. Flaming D.Online Predation
5. ___________Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the
system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a victim of
___________.
A. Blogging B. Flaming C. Pharming D. Phishing
6. ___________It is a deceitful practice of getting your personal information using email or text messages.
A. Blogging B. Flaming C. Pharming D. Phishing
7. ___________It is a small program or script that can negatively affect the health of your computer.
A. Malware B. Phisher C. Spam D. Virus
8. ___________He is a clever or expert programmer who can gain unauthorized access to other computers.
A. Attacker B. Hacker C. Spyware D. Tracker
9. ___________It is an act of engaging an underage minor into inappropriate sexual relationships through the internet.
A. Cyberbullying B. Cyberstalking C. Flaming D. Online Predation
10. ___________ It focuses on the acceptable use of online resources in an online social environment.
A. Good Moral B. Nethics C. Netiquette D. Online Ethics
11. ___________Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager. The
manager called him and said that his flash drive is empty. Dan’s flash drive was infected with __________.
A. Computer Virus B. Malware C. Phisher D. Spam
12. ___________Precy has received an email from the bank asking her to update her personal information for security purposes.
She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.
A. Blogging B. Flaming C. Pharming D. Phishing
13. ___________ You received a comment from an unknown friend in one of your posts in Social Media saying “YOU IDIOT!”. What
do you call this kind of act?
A. Acting B. Bullying C. Blogging D. Flaming
14. ___________It is an internet threat that acquires sensitive personal information like passwords and credit card credentials.
A. Malware B. Phishing C. Spam D. Virus
15. It refers to a set of rules for an acceptable online behaviour.
A. Ethics B. Good Moral C. Nethics D. Netiquette
Prepared by:
GRAZELEEN M. MERCADO
Subject Teacher II
PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL
PUTLOD, JAEN, NUEVA ECIJA
ANSWER KEY – LESSON 2 – Quiz # 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15