0% found this document useful (0 votes)
22 views

Empowerment Technology Exam

This document contains an assessment on cybersecurity and digital citizenship. It has three sections that assess knowledge on: 1) True/False statements related to password security, privacy, and safe online behavior; 2) Identification of key digital terms; and 3) Enumeration of features of technologies like Web 2.0, types of social media and malware, examples of search engines and website types, and principles of netiquette. The assessment is designed to evaluate understanding of important cybersecurity concepts and best practices for safe, responsible and ethical online behavior.

Uploaded by

Mia Dalit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Empowerment Technology Exam

This document contains an assessment on cybersecurity and digital citizenship. It has three sections that assess knowledge on: 1) True/False statements related to password security, privacy, and safe online behavior; 2) Identification of key digital terms; and 3) Enumeration of features of technologies like Web 2.0, types of social media and malware, examples of search engines and website types, and principles of netiquette. The assessment is designed to evaluate understanding of important cybersecurity concepts and best practices for safe, responsible and ethical online behavior.

Uploaded by

Mia Dalit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

MICRO ASIA COLLEGE OF SCIENCE AND TECHNOLOGY, INC.

Paulien, Zone I, Iba, Zambales

EMPORWENT TECHNOLOGY
Name: Score:
Grade: Date:

STRICTLY NO ERASURE
I. True or False. Write False if the statement is True and Write False if the Statement is True. (1point
each).
1. Do not share your password with anyone.
2. Add friends you know in real life.
3. Do not visit untrusted websites.
4. Remove password to your WIFI at home to make it private.
5. Do not install and update antivirus in your computer.
6. Give your personal information to anyone.
7. Think before you click.
8. Never post about your future vacation.
9. Adhere to the same standards of behavior offline that you follow in real life.
10. Know where you are in school.
11. Respect other people's time and bandwidth.
12. Make yourself look good online.
13. Do not share expert knowledge.
14. Abuse your power.
15. Do not forgive of other people's mistakes.

II. Identification

1.Sharing of diverse information through universal web access.


2. A site that offers services and brings individual and businesses into selling different goods and
commodities such as shopping site like OLX, Lazada, Shopee, Zalora and others.
3. It refers to fusing of technological advancement to work on a similar task.
4. A website where people with the same come together to share information.
5. A website that allows you to share and store multimedia files such as video, photos and music.
6. A discussion website that allows user to ask questions and comments on a journal posted by an
individual or group.
7. A malicious program that replicate itself by copying itself to another program.
8. A collection of infected internet–connected devices such as PC and mobile phone that are controlled
by a common type of malware.
9. A ransom virus that block the user from accessing the programs or files and demands to pay the
ransom through online method for the removal of the virus.
10. A cyberattack method using deceptive emails and websites to acquiring sensitive personal
information.
11. Also known as junk email or unwanted email send by advertiser or bot. It can be used to send
malware.
12. It is a word that came from the two words “net” and “etiquette”.
13. A platform that assist people with disability. It will guide the individual like a blind person by using an
audio recording.
14. A technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc.
15. A new paradigm in web interaction extension of led by World Wide Web Consortium (W3C) where it
provides framework that allows data to be shared and reuse.

III. Enumeration. List down or enumerate being asked on each of the following item. (1point each)

A. Features of Web 2.0 (1-6)


1. 4.
2. 5.
3. 6.
B. Types of Social Media (7-12)
7. 10.
8. 11.
9. 12.
C. Types of Malware (13-20)
13. 17.
14. 18.
15. 19.
16. 20.
D. Examples of Search Engines (21-25)
21. 24.
22. 25.
23.
E. Examples of Static and Dynamic Websites (26-30)
26. 29.
27. 30.
28.
F. The Core rules of Netiquette by Seth T. Rose (31-40)

31.
32.
33.
34.
35.
36.
37.
38.
39.
40.

You might also like