You are on page 1of 3

Tinuyop National High School

Empowerment Technologies
Final Examination
Grade 11

Name: _____________________________________________ Date: ______________


Section: _________________________ Score: _____________

I. Multiple Choice: Encircle the letter of the correct answer.

1. It is an online petition platform that allows the online community to create or sign petitions.
a. Weebly c. Change.org
b. Pinterest d. Better.net
2. In what year did EDSA Dos take place?
a. 2001 c. 2003
b. 2002 d. 2004
3. It was a series of protests that happened during august 22 to 26, 2013 that was caused by the misuse of the pork
barrel.
a. Edsa tres c. Million People March
b. Edsa Dos d. Digital Revolution
4. Which radio station did Cardinal Sin use to call on the Filipino people to support the rally against President
Marcos?
a. DZMM c. DZRH
b. Radyo Veritas d. ABAM
5. The Yolanda People Finder that was used to locate individuals during and after the storm was created by
a. GMA 7 c. Google
b. ABS-CBN d. Microsoft
6. It is dubbed as the “world’s platform for change.”
a. Weebly c. Change.org
b. Pinterest d. Better.net
7. The Million People March never reached a million. What was the estimated number of protesters for this
protest?
a. 400k c. 600k
b. 500k d. 700k
8. What made EDSA Dos protest successful?
a. Facebook social campaign c. A radio broadcast
b. Text Brigades d. None of the above
9. The People Power Revolution protest mainly happened along EDSA from February 22 to 25 of what year?
a. 1983 c. 1986
b. 1985 d. 1988
10. The Million people March was a series of protest around key cities in the Philippines and around the world.
Where did the Million People March happen mainly?
a. New People’s Park c. Mendiola
b. EDSA d. Luneta park
11. It is a document that is used to convince a panel of potential funders to help a product, program or service
become a reality.
a. Business paper c. Resume
b. Concept paper d. Promissory Note
12. This statistics includes ( but not limited to ) your audience’s age, location, gender, language and country.
a. Demographics c. Organic
b. Reach d. insights
13. It allows your site visitor’s to have their say about the site’s strengths and weaknesses.
a. Google forms c. Feedback
b. Paragraph text d. Checkboxes
14. A question that can be answered by only one answer in a set of options.
a. Multiple Choice c. Feedback
b. Paragraph Text d. Checkboxes
15. A link intended to be a short version of a URL.
a. Scale c. Text
b. Short URL d. Grid
16. A question that can be answered with a numerical range.
a. Scale c. Text
b. Short URL d. Grid
17. A question that can be answered with multiple answers in a set of options.
a. Multiple Choice c. Feedback
b. Paragraph d. Checkboxes
18. A question that contains sub-questions with similar options.
a. Scale c. Text
b. Short URL d. Grid
19. A tool used to get user feedback.
a. Feedback c. Text
b. Google Forms d. Paragraph Text
20. A question that can be answered in a long text.
a. Feedback c. text
b. Google Forms d. Paragraph Text
21. It is commonly known as unwanted emails.
a. Blackmail c. Phishing
b. Hacking d. Spam
22. A process of converting data into code. However, these methods are not 100% secure because there will be
always a way for a hacker to a hack it.
a. Network Security c. Investigation
b. Encryption d. Blackmail
23. The act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links
attached to the email.
a. Phishing c. Electronic harassment
b. Blackmail d. Accessing Stored information
24. It is an act of harassment using electronic means.
a. Electronic harassment c. Blackmail
b. Copyright Infringement d. cybercrime
25. It is an act of obtaining unauthorized information.
a. Spoofing c. Blackmail
b. Hacking d. Phishing
26. An act of asking something in return of not showing something that could damage someone’s reputation.
a. Spoofing c. Blackmail
b. Hacking d. Phishing
27. It is one of the elements of creating a concept paper that includes your group’s mission and vision and brief
introduction of your project.
a. Introduction c. Support
b. Purpose d. Description
28. It is one of the elements of creating a concept paper that includes the necessary information about the project.
In ICT, it involves the sites you are going to produce and the purpose of each and how they work in unison.
a. Introduction c. Support
b. Purpose d. Description
29. It is an online courses that simulate the classroom online.
a. Courseware c. Podcast
b. Multimedia d. Vodcast
30. It uses multiple media contents like videos, sounds, applications, etc.
a. Courseware c. Podcast
b. Multimedia d. Vodcast

II. True or False: Write T if the statement is correct; otherwise, replace the underlined word/s to make the
statement correct.
____________1. Phishing is the act of sending multiple emails to multiple users in hopes of having a number of
Them clicking the links or malwares attached to the email.
____________2. Spoofing is the act of obtaining unauthorized access to data from a computer network.
____________3. Extortion is the act of using the internet to threaten or damage someone’s reputation to extort
money or anything else of value.
____________4. In late 2014, LimeWire was raided for the second time due to years of pirating movies, music,
games, books, and other software.
____________5. Electronic harassment is also referred to as cyberbullying.
____________6. Non-delivery of service is the act of devising a scheme wherein a culprit post an item or service for
sale over the internet, and once the transactions have been done, does not give the item or service.
____________7. Encryption is the process of converting raw data into code.
____________8. In piracy, trackers are used to identify IP addresses currently sharing a pirated file.
____________9. Wager gambling is the act of betting on any sports event over the Internet.
___________10. Most email services today have spam or bulk folder that automatically puts these suspicious emails
to that folder.
III. Arrange the following steps in order using the numbers 1-4. Write X if the step is not part of the process.

ICT Project Process


_____ Release and Promotion
_____ Development
_____ Maintenance
_____ Coding
_____ Planning

IV. Enumerate at least five things that should be accomplished or considered during the planning stage of an
ICT project.
1.
2.
3.
4.
5.

“To know, is to know that you know nothing. That is the meaning of true knowledge.”

-Socrates-

GOODLUCK

You might also like