Em. Tech-MIDTERM EXAM for First Semester
Quiz by Nathaniel Sebastian
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
What does ICT standfor in the context of technology
Information and Communication Technology
International ComputerTechnology
Integrated CommunicationTool
Internet and Community Technology
30s - Q2
Which of the following is NOT considered an internet threat?
Malware
Firewall
Pharming
Phishing
30s - Q3
You are assigned as theleader of your group’s online class discussion. While chatting in your group’sFacebook Messenger thread, one member starts posting offensive jokes aboutanother classmate. You remember your ICT teacher’s lesson about proper onlinebehavior. What is the main purpose of netiquette in this situation?
To limit or control internet use
To encourage respectful online behavior
To track and review online activity
To make internet speed much faster
30s - Q4
While using the school’scomputer to finish your science project, you accidentally downloaded a freegame from an unverified website. After installing it, the computer started running slowly and some files got corrupted. In this situation, which is an example of malware?
A program used to detect and remove viruses
A malicious program disguised as something safe
Unwanted and repetitive email advertisements
An online tool for finding and browsing websites
30s - Q5
Why is it important to use search filters when researching online
To narrow down andspecify search results
To block unwanted websites
To slow down the searchresults
To increase the number of search results
30s - Q6
What is phishing?
Improving website visibility through search engine techniques
Using filters to automatically remove unwanted email messages
Sending bulk emails that are not requested by recipients
Pretending to be a trusted source to steal private information
30s - Q7
Which of the following is an ethical consideration when using ICT?
Using someone else's password
Downloading pirated software
Citing sourcesproperly
Ignoring privacy settings
30s - Q8
What is the main riskassociated with pharming?
It protects againstmalware
It sends excessivespam emails
It redirects users tofraudulent websites
It decreases internetspeed
30s - Q9
Which of the following describes plagiarism?
Collaborating on aproject
Using someone else's work asyour own without giving credit
Citing all sources used inresearch
Sharing your ownwork
30s - Q10
What is the purposeof using the APA citation style?
To enhance theappearance of documents
To improve computerperformance
To encryptdocuments
To standardize the format forcitations and references
30s - Q11
Your Physics laborary grades are stored in cells C2:C10. You need to find the lowest score in the setto identify who needs extra tutoring. Which function should you apply?
=MAX(C2:C10)
=MIN(C2:C10)
=IF(C2:C10)
=SUMIF(C2:C10)
30s - Q12
During an online group chat for your class project, one member starts posting hurtful commentsand spreading false rumors about a classmate. Your teacher reminds everyone about the importance of understanding online behavior. In this situation, whatis cyberbullying?
Sending polite andfriendly messages online
Participating invirtual or online learning activities
Using the internet tomake electronic transactions
Hurting orintimidating someone using digital media
30s - Q13
You are applying fora summer job, and the company’s HR officer checks your social media profilesbefore your interview. You want to make a good impression. In this situation, which action helps protect your online reputation?
Not adjusting orusing any privacy settings
Uploading contentthat is rude or offensive
Sharing privatedetails for everyone to see
Thinking carefullybefore posting information
30s - Q14
What is the primary goal of online security?
To make internet access more difficult
To protect users from unauthorized access and threats
To increase internet speed
To promote online advertisements
30s - Q15
How can digital divide be addressed in communities?
By providing equal access to technology and internet services
By reducing the use of technology in education
By promoting traditional communication methods
By restricting internetaccess
30s