0% found this document useful (0 votes)
652 views4 pages

Empowerment Technologies - Lesson 2: Online Safety-security-ethics-And-etiquette - Quiz # 2 With Answer Key

EmpTech Quiz # 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
652 views4 pages

Empowerment Technologies - Lesson 2: Online Safety-security-ethics-And-etiquette - Quiz # 2 With Answer Key

EmpTech Quiz # 2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL

PUTLOD, JAEN, NUEVA ECIJA

Name:______________________________________ Section:________________ Score:__________


Subject: EMPOWERMENT TECHNOLOGIES – Lesson 2 – QUIZ # 2

MULTIPLE CHOICES: Select the best answer from the choices and write the letter that corresponds to your answer on
the space provided.

1. ___________It is an act of engaging an underage minor into inappropriate sexual relationships through the internet.
A. Cyberbullying B. Cyberstalking C. Flaming D. Online Predation

2. ___________ It focuses on the acceptable use of online resources in an online social environment.
A. Good Moral B. Nethics C. Netiquette D. Online Ethics

3. ___________Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager. The
manager called him and said that his flash drive is empty. Dan’s flash drive was infected with __________.
A. Computer Virus B. Malware C. Phisher D. Spam

4. ___________Precy has received an email from the bank asking her to update her personal information for security purposes.
She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.
A. Blogging B. Flaming C. Pharming D. Phishing

5. ___________ You received a comment from an unknown friend in one of your posts in Social Media saying “YOU IDIOT!”. What
do you call this kind of act?
A. Acting B. Bullying C. Blogging D. Flaming

6. ___________It is an internet threat that acquires sensitive personal information like passwords and credit card credentials.
A. Malware B. Phishing C. Spam D. Virus

7. It refers to a set of rules for an acceptable online behaviour.


A. Ethics B. Good Moral C. Nethics D. Netiquette

8. ___________ This is one form of an internet advertising used by advertisers to get the attention of web users but sometimes
has an obscene or an offensive content
A. Adverts B. Cards C. Infographics D. Pop-ads

9. ___________It is a software that can see all the things you are doing in your computer.
A. Attacker B. Hacker C. Spyware D. Tracker

10. ___________It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other means of
approaching the victim unexpectedly using an online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking

11. ___________Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of Lori who is
a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a victim of ___________________.
A. Cyberbullying B. Cyberstalking C. Flaming D.Online Predation

12. ___________Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the
system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a victim of
___________.
A. Blogging B. Flaming C. Pharming D. Phishing

13. ___________It is a deceitful practice of getting your personal information using email or text messages.
A. Blogging B. Flaming C. Pharming D. Phishing

14. ___________It is a small program or script that can negatively affect the health of your computer.
A. Malware B. Phisher C. Spam D. Virus

15. ___________He is a clever or expert programmer who can gain unauthorized access to other computers.
A. Attacker B. Hacker C. Spyware D. Tracker

Prepared by:

GRAZELEEN M. MERCADO
Subject Teacher II
PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL
PUTLOD, JAEN, NUEVA ECIJA

ANSWER KEY – LESSON 2 – Quiz # 2


PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL
PUTLOD, JAEN, NUEVA ECIJA

Name:______________________________________ Section:________________ Score:__________


Subject: EMPOWERMENT TECHNOLOGIES – Lesson 2 – QUIZ # 2

MULTIPLE CHOICES: Select the best answer from the choices and write the letter that corresponds to your answer on
the space provided.

1. ___________ This is one form of an internet advertising used by advertisers to get the attention of web users but sometimes
has an obscene or an offensive content
A. Adverts B. Cards C. Infographics D. Pop-ads

2. ___________It is a software that can see all the things you are doing in your computer.
A. Attacker B. Hacker C. Spyware D. Tracker

3. ___________It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other means of
approaching the victim unexpectedly using an online technology.
A. Cyberbullying B. Cyber-crime C. Cyberstalking D. Tracking

4. ___________Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of Lori who is
a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a victim of ___________________.
A. Cyberbullying B. Cyberstalking C. Flaming D.Online Predation

5. ___________Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the
system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a victim of
___________.
A. Blogging B. Flaming C. Pharming D. Phishing

6. ___________It is a deceitful practice of getting your personal information using email or text messages.
A. Blogging B. Flaming C. Pharming D. Phishing

7. ___________It is a small program or script that can negatively affect the health of your computer.
A. Malware B. Phisher C. Spam D. Virus

8. ___________He is a clever or expert programmer who can gain unauthorized access to other computers.
A. Attacker B. Hacker C. Spyware D. Tracker

9. ___________It is an act of engaging an underage minor into inappropriate sexual relationships through the internet.
A. Cyberbullying B. Cyberstalking C. Flaming D. Online Predation

10. ___________ It focuses on the acceptable use of online resources in an online social environment.
A. Good Moral B. Nethics C. Netiquette D. Online Ethics

11. ___________Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager. The
manager called him and said that his flash drive is empty. Dan’s flash drive was infected with __________.
A. Computer Virus B. Malware C. Phisher D. Spam

12. ___________Precy has received an email from the bank asking her to update her personal information for security purposes.
She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.
A. Blogging B. Flaming C. Pharming D. Phishing

13. ___________ You received a comment from an unknown friend in one of your posts in Social Media saying “YOU IDIOT!”. What
do you call this kind of act?
A. Acting B. Bullying C. Blogging D. Flaming

14. ___________It is an internet threat that acquires sensitive personal information like passwords and credit card credentials.
A. Malware B. Phishing C. Spam D. Virus

15. It refers to a set of rules for an acceptable online behaviour.


A. Ethics B. Good Moral C. Nethics D. Netiquette

Prepared by:

GRAZELEEN M. MERCADO
Subject Teacher II
PUTLOD – SAN JOSE NATIONAL HIGH SCHOOL
PUTLOD, JAEN, NUEVA ECIJA

ANSWER KEY – LESSON 2 – Quiz # 2


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

You might also like