MIDTERM EXAM IN EMPOWERMENT TECHNOLOGIES
Quiz by Melbourne Salonga
Grade 11-12
Empowerment Technologies
Philippines Curriculum: SHS Applied Subjects (MELC)
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measures 8 skills from
Measures 8 skills from
Track each student's skills and progress in your Mastery dashboards
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
50 questions
Show answers
- Q1Which of the following social media website is for microblogging?YoutubeRedditTwitterFacebook30sCS_ICT11/12-ICTPT-Ia-b1
- Q2It refers to the intangible part of the computer system.HardwareSoftwareTupperwarePeopleware30sCS_ICT11/12-ICTPT-Ia-b1
- Q3Which OS is used for free by several mobile phone companies?iOsWebOSAndroidSymbian30sCS_ICT11/12-ICTPT-Ia-b1
- Q4It refers to an electronic device that can accept raw data as input, manipulate or process it to produce output.CellphoneComputerRadioTelephone30sCS_ICT11/12-ICTPT-Ia-b1
- Q5It is a nonprofit service designed to help people who have visual and reading impairments.Assistive MediaMobile MediaDigital MediaSocial Media30sCS_ICT11/12-ICTPT-Ia-b1
- Q6It is an online version of information system.online systeme-learninge-conferencewebinar30sCS_ICT11/12-ICTPT-Ia-b1
- Q7It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other means of approaching the victim unexpectedly using an online technology.CyberstalkingCybercrimeTrackingCyberbullying30sCS_ICT11/12-ICTPT-Ia-b2
- Q8A 12-year-old girl reported to her mother that an old man appeared in her chat room asking and seducing her to chat with him. The old man is doing an act of _____________.cyberstalkingCybercrimeonline predationCyberbullying30sCS_ICT11/12-ICTPT-Ia-b2
- Q9Lydia has learned how to transact online using her credit card as a mode of payment. She is using her laptop and since she is new, she browses the internet and click something out of curiosity. She got a problem when she received her credit card statement because of the big amount she needs to pay. Lydia was attacked by ______.pharmingcyberstalkerphishinghacker30sCS_ICT11/12-ICTPT-Ia-b2
- Q10Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager. The manager called him and said that his flash drive is empty. Dan’s flash drive was infected with ____________.hackerpop-adsspywarevirus30sCS_ICT11/12-ICTPT-Ia-b2
- Q11Precy has received an email from the bank asking her to update her personal information for security purposes. She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.hackerphishingspywarepharming30sCS_ICT11/12-ICTPT-Ia-b2
- Q12Mona is the most beautiful girl and very famous in town. She has a suitor who is always following her. One day, she wants to be free and wants to go to somewhere else alone. Nobody knows where she will go. When she reached the place, she takes photo and post it in social media. A few hours later, her avid suitor is already in her place. So, the avid suitor is _______________ Mona.cyberstalkingpharmingpop-adshacker30sCS_ICT11/12-ICTPT-Ia-b2
- Q13It is a service that allows internet users to search for content via the World Wide Webinternetweb browseronline searchsearch engine30sCS_ICT11/12-ICTPT-Ia-b3
- Q14It is the process of interactively searching for and retrieving requested information via a computer from databases that are online.web browseronline searchsearch engineinternet30sCS_ICT11/12-ICTPT-Ia-b3
- Q15What is the correct keyword to search the question? Activities that happened last December 2019."December2019"#December2019=December2019@December201930sCS_ICT11/12-ICTPT-Ia-b3