placeholder image to represent content

Em. Tech-MIDTERM EXAM for First Semester

Quiz by Nathaniel Sebastian

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
50 questions
Show answers
  • Q1

    What does ICT standfor in the context of technology

    Information and Communication Technology 

    International ComputerTechnology 

    Integrated CommunicationTool 

    Internet and Community Technology 

    30s
  • Q2

    Which of the following is NOT considered an internet threat? 

    Malware

    Firewall 

    Pharming 

    Phishing

    30s
  • Q3

    You are assigned as theleader of your group’s online class discussion. While chatting in your group’sFacebook Messenger thread, one member starts posting offensive jokes aboutanother classmate. You remember your ICT teacher’s lesson about proper onlinebehavior. What is the main purpose of netiquette in this situation?

    To limit or control internet use

    To encourage respectful online behavior

    To track and review online activity

    To make internet speed much faster

    30s
  • Q4

    While using the school’scomputer to finish your science project, you accidentally downloaded a freegame from an unverified website. After installing it, the computer started running slowly and some files got corrupted. In this situation, which is an example of malware?

    A program used to detect and remove viruses

    A malicious program disguised as something safe

    Unwanted and repetitive email advertisements

    An online tool for finding and browsing websites

    30s
  • Q5

    Why is it important to use search filters when researching online

    To narrow down andspecify search results 

    To block unwanted websites 

    To slow down the searchresults 

    To increase the number of search results 

    30s
  • Q6

    What is phishing?

    Improving website visibility through search engine techniques

    Using filters to automatically remove unwanted email messages

    Sending bulk emails that are not requested by recipients

    Pretending to be a trusted source to steal private information

    30s
  • Q7

    Which of the following is an ethical consideration when using ICT? 

    Using someone else's password 

    Downloading pirated software

    Citing sourcesproperly   

    Ignoring privacy settings

    30s
  • Q8

    What is the main riskassociated with pharming? 

    It protects againstmalware 

    It sends excessivespam emails 

    It redirects users tofraudulent websites 

    It decreases internetspeed 

    30s
  • Q9

    Which of the following describes plagiarism? 

    Collaborating on aproject 

    Using someone else's work asyour own without giving credit 

    Citing all sources used inresearch 

    Sharing your ownwork 

    30s
  • Q10

    What is the purposeof using the APA citation style? 

    To enhance theappearance of documents 

    To improve computerperformance 

    To encryptdocuments 

    To standardize the format forcitations and references 

    30s
  • Q11

    Your Physics laborary grades are stored in cells C2:C10. You need to find the lowest score in the setto identify who needs extra tutoring. Which function should you apply?

    =MAX(C2:C10)

    =MIN(C2:C10)

    =IF(C2:C10)

    =SUMIF(C2:C10)

    30s
  • Q12

    During an online group chat for your class project, one member starts posting hurtful commentsand spreading false rumors about a classmate. Your teacher reminds everyone about the importance of understanding online behavior. In this situation, whatis cyberbullying?

    Sending polite andfriendly messages online

    Participating invirtual or online learning activities

    Using the internet tomake electronic transactions

    Hurting orintimidating someone using digital media

    30s
  • Q13

    You are applying fora summer job, and the company’s HR officer checks your social media profilesbefore your interview. You want to make a good impression. In this situation, which action helps protect your online reputation?

    Not adjusting orusing any privacy settings

    Uploading contentthat is rude or offensive

    Sharing privatedetails for everyone to see

    Thinking carefullybefore posting information

    30s
  • Q14

    What is the primary goal of online security? 

    To make internet access more difficult 

    To protect users from unauthorized access and threats 

    To increase internet speed 

    To promote online advertisements 

    30s
  • Q15

    How can digital divide be addressed in communities? 

    By providing equal access to technology and internet services 

    By reducing the use of technology in education 

    By promoting traditional communication methods 

    By restricting internetaccess 

    30s

Teachers give this quiz to your class