ICT2112 Empowerment Technologies (E-Tech) ICT for Professional Tracks WEEK 1-10 WEWO PDF

Title ICT2112 Empowerment Technologies (E-Tech) ICT for Professional Tracks WEEK 1-10 WEWO
Course Information Technology
Institution ACLC College
Pages 88
File Size 778.4 KB
File Type PDF
Total Downloads 133
Total Views 270

Summary

ICT2112-2016S Empowerment Technologies (E-Tech): ICT for Professional TracksWEEK 3:Which of the following is NOT true about worms? A: A worm needs human action to spreadYou had to enter your email address in order to play a free game. A few days later, you started receiving multiple emails with link...


Description

By: Mike Adaure

ICT2112-2016S Empowerment Technologies (ETech): ICT for Professional Tracks

WEEK 3: Which of the following is NOT true about worms? A: A worm needs human action to spread You had to enter your email address in order to play a free game. A few days later, you started receiving multiple emails with links to other free games and downloads. You have been a victim of ______ A: Spam Which of the following information is ok to share with other people? A: Email address The following are benefits of cloud computing except _____ A: Proficiency Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file is probably a _____ A: Trojan At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members of the family via Wi-Fi,which you connect to using your phone.. In this scenario, Dad's laptop is a _____. A: Server (CORRECT) Network (INCORRECT) _____ are apps and websites used by people to interact with one another by sharing information, sending messages, and exchanging ideas A: Social Media Which of the following is NOT true? A: The cloud is not an actual cloud _____ is a program that is designed to cause harm to your computer or device A: Virus A task that is done by a computer for another computer is called a _____ The correct answer is: Service Server (INCORRECT)

Malware is short for _____ A: Malicious software A Web 3.0 characteristic in which events and information are made available to users as they happen. A: Real-Time The name Trojan is derived from a fictional wooden _____ A: Horse

By: Mike Adaure Programs that can only be accessed using a browser are called _____ A: Web applications Which of the following should not be shared with anyone? A: Password Which of the following can contain malware? A: All Real-time, ubiquitous, and machine learning are the defining elements of _____ A: Web 3.0 Which of the following does not help you avoid getting a virus? A: Downloading pirated programs Which of the following statements is NOT true? A: Phishing is a type of virus that can make copies of itself (CORRECT) - Phishing can be used to steal your credit card number (INCORRECT) Tricking people to submit their personal details is called _____ A: Phishing Computers can create data and make decisions based on the user's actions through _____ A: Machine Learning Which of the following can be used in identity theft? A: All At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members of the family via Wi-Fi, which you connect to using your phone. In this scenario, your phone is a _____. A: Client Which of the following is TRUE? A: Mobile phone apps are native apps because they are installed In our lesson, we visited the website of which movie? A: Space Jam A computer that does a task for other computers is called a _____ A: Server _____ is a type of malware that is disguised as a harmless or useful program or file. A: Trojan Which of the following is NOT true about Cloud-based services? A: Subscribing to cloud-based services is more expensive than building your own programs and buying your own servers. (CORRECT) - People from different places can work with one another through the cloud. (INCORRECT)

By: Mike Adaure You receive an email saying you won an iPhone. When you click the link in the email, you were asked to enter your credit card number. This is called _____ A: Phishing _____ is a secret group of characters used to unlock your account A: Password (CORRECT) Email address (INCORRECT) People who send unwanted and unsolicited emails are called _____ A: Spammers A _____ page is about a single topic and can be edited by anyone with the right credentials A: Wiki Is your alias, which is used by websites to represent your online presence. A: Username Which of the following is NOT a safe practice? A: Submitting your phone number every time you are asked. _____ is a browser add-on that prevents ads from being displayed in your browser. A: Ad blocker Which of the following mobile apps is not a native application? A: None of these _____ websites encourage user participation by allowing them share videos, music, articles, etc. A: Web 2.0 In the Internet, your _____ is as good as your actual name. A: Username Random pop-ups and advertisements started appearing in your screen after you installed a free program. This is caused by _____ attached to the program. A: Adware _____ Internet-based networks that are used to store, manage, and share resources and information A: Cloud Computing Wiki is derived from the Hawiian work wikiwiki, which means _____ A: Quick Which of the following CANNOT infect your computer? A: Spam Which of the following is NOT true about passwords? A: Passwords should not be memorized

By: Mike Adaure _____ Websites change appearance and behavior based on users' action A: Dynamic Which of the following statements is true? A: A computer virus can spread whenever a computer makes contact with another computer. _____ are programs that are directly installed in a computer or device A: Native applications

By: Mike Adaure

WEEK 5: Which of the following does not apply to Netiquette? A: Expect the unexpected (CORRECT) - Do unto others as you would have them do unto you. (INCORRECT) Which of the following is not true? A: Real-life etiquette does not apply online. You can make an online search by entering your keywords in the browser's _____ A: Address bar (CORRECT) Keyword bar (INCORRECT) Which of the following is an ethical thing to do while commuting? A: Listen to music using headphones The cloud enables people in different locations to work on the same project. This enables _____. A: Better collaboration If you break the rules of an online community, _____ may revoke your access/membership. A: Admins Which of the following is not a factor that can be used to determine a source's credibility? A: The article's length _____ are multiple accounts used by the same person A: Sock puppets The use of strength or power to intimidate someone into doing something that he does not want or to make him feel bad is called ____ A: Bullying _____ is the most common TLD A: .com You copied an essay that you found online and submitted it in an essay writing contest. You have committed _____. A: Plagiarism Which of the following is TRUE? A: Mobile phone apps are native apps because they are installed (CORRECT) - Mobile apps are all web apps because they can only be accessed using an Internet browser (INCORRECT) Which of the following is NOT true? A: Google's only server is located in California .org stands for A: organization

By: Mike Adaure You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is a _____ A: Client _____ is the legal right to own an original work A: Copyright A Web 3.0 characteristic in which users are always connected to the Internet. A: Ubiquitous _____ is bullying that is done using electronic technology. A: Cyberbullying Which of the following is TRUE about Cloud-based services? A: Some cloud-based services can be used for free What do you call the unauthorized copying of the material support, labels, artwork and packaging? A: Counterfeiting While you are typing your keyword in the address bar or the search bar, several _____ may appear bellow it Answer: Suggestions The URL and design of a website’s homepage changes depending on the preferences of the current user. This website is _____ A: Dynamic _____ is a web browser owned by Apple A: Safari ______ is harmful because it denies the rightful owners the proper compensation/payment for their work. A: Piracy HTML means _____ A: Hypertext Markup Language Netiquette is short for _____ A: Network Etiquette Which of the following is a polite thing to do? A: Asking permission before taking pictures of other people Someone keeps posting cat pictures in a forum about car maintenance. This act is called _____ A: Trolling (CORRECT) Spamming (INCORRECT) Websites that belong to the Web 1.0 generation were mostly _____ A: Static In which of the following situations is it ok to use your mobile phone? A: None of these

By: Mike Adaure Servers are housed in centralized locations called _____ A: Data centers Which of these is NOT ok to do while driving? A: All of these "IP Code" stands for A: Intellectual Property Code of the Philippines (CORRECT) - Internet Protocol Code of the Philippines (INCORRECT) .gov stands for A: government Netiquette involves a set of rules that are imposed by online groups A: formal REPUBLIC ACT NO. 8293 is also know as _____ A: Intellectual Property Code of the Philippines Reproducing and distributing materials without the owner's consent is called Answer: Piracy Contents of _____ websites like Wikipedia can be edited by anyone A: open-source You can check an article's _____ to know if the information that it contains is updated. A: Publication date Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law but are expected to be followed by everyone. A: Informal Netiquette You recorded a song on the radio and sent copies to your friends. What you did is called _____ A: Bootlegging According to the IP Code, how many types of works are covered by copyright protection? A: 15 Which of the following is NOT true? A: Some types of malware can spread through offline means such as flash drives and local area networks TLD stands for _____ A: Top-level domain A member of an online community constantly sends messages about products that he is selling. You can report this person for _____. A: Spamming .net stands for _____ A: network

By: Mike Adaure Which of the following is safe practice? A: Use a combination of letters, numbers, and symbols as a password You can go to google.com.ph to make a/an _____ A: Basic search Which of the following is NOT true about worms? A: A worm needs human action to spread (CORRECT) - A worm doesn't need human action to spread (INCORRECT) _____ is a single program or a system of programs designed to look for information in the Internet. A: Web search engines Which following actions are normally banned in online communities except _____ A: Joking Clicking on a search result using the _____ will open the link in a new tab. A: Mouse wheel Anyone can use the following TLD's except _____ A: .gov Which of the following TLD's is most likely to be owned by a university? A: .edu What is the official website of the Intellectual Property Code of the Philippines? A: ipophil.gov.ph Which of the following does not need human action to spread? A: Worm Which of the following is true? A: .Safari web browser's address bar doubles as the search bar (CORRECT) - Google Chrome connects to Google search by default (INCORRECT) .info stands for A: information

IP Code stands for A: Intellectual Property Code of the Philippines Week 4: Online Search Learning Activity 3 .com stands for _____ A: commercial Short Quiz 3 You can make online searches in Mozilla Firefox by typing your keywords in the _____ located on the upper right corner A: Search bar

By: Mike Adaure Most web search engines have an _____ feature which can be used to make complex web searches A: Advanced Search Which of the following details is NOT essential in citing a source A: name of the researcher Which of the following is not a factor that can be used to determine a source’s credibility? A: The article’s length You want to know if classes are suspended because of a storm. Which of the following TLD’s is most likely to have the most credible information A: .gov Which of the following is NOT a reason why you should give credit to your sources? A: To make the author notice you .edu stands for A: Education Week 6: Online Communication: Short Quiz 4 It is a unique name that represents a destination where emails can be delivered to and sent from. A: email address These are sections of an email client that are used to store different kinds of email. A: Email folders What is an email client? A: an application used for sending, receiving, and organizing emails Which of the following is/are true about email address? A: It is a destination for emails (CORRECT)

Outbox (INCORRECT)

This email folder contains the finished or unfinished emails that you have composed but did not send. A: Drafts This email folder is where suspicious emails are kept. This is done as a security measure to prevent you from accidentally opening these emails. A: Spam In an email client, instead of permanently deleting an email, it is sent to the A: Trash It contains the messages you have received. A: Inbox

By: Mike Adaure Email is short for A: electronic mail _____ Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law but are expected to be followed by everyone. A: Informal Netiquette Which of the following TLD's is most likely to be used by non-profit groups? A: .org Which of the following is not a malware? A: Ad blocker Your mom is calling you during class. In this situation, which of the following is the ethical thing to do? A: Ask for your teacher's permission to go outside so you can answer the call. Which of the following is not a search engine? A: Advanced Search Several members of a forum are a having a heated debate. Eventually, they started posting insults and threats against other members. The debate has escalated into a _____ A: Flame war You can make online searches in Mozilla Firefox by typing your keywords in the _____ located on the upper right corner. A: Search bar Which of the following statements is NOT true? A: Only your full name can be used as a username. Which of the following is not true? A: In your project, your teacher will decide which applications you will use. Which of the following is NOT true? The correct answer is: A spam is a type of virus _____ is a generation of the Internet when websites were mostly static A: Web 1.0 _____ Netiquette involves a set of rules that are imposed by online groups A: formal Which of the following is not true? A: All TLD's contain credible information

By: Mike Adaure

WEEK 7: In Calc, what is the default name of the cell that belongs to the second row and the third column? A: C2 What sign is used for division? A: / What is the name of word processor that we used in this chapter A: LibreOffice Writer (CORRECT) LibreOffice Word (INCORRECT) A program that is developed by a public community of developers and is made available to the public for free is described as _____ A: Open-source In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)

A: 3 (CORRECT)

440 (INCORRECT)

In the LibreOffice home screen, the database app is called _____. A: Base Database (CORRECT) LibreOffice Base (INCORRECT) What sign is used for multiplication? A: * In LibreOffice Writer, what function did we have to open to view the registered databases A: Datasources In the spreadsheet above, what result will you get if you use the formula =SUM(A1,B1,C1,B3)

A: 820 (CORRECT)

850 (INCORRECT)

What is the name of the of spreadsheet application that was used in this chapter? A: LibreOfficeCalc (CORRECT) Microsoft Excel (INCORRECT)

By: Mike Adaure

In the spreadsheet above, what result will you get if you use the formula =SUM(B1,B4)

A: 430 In Calc, what sign can be seen in the beginning of the formulas? A: = or c (CORRECT) What is the name of the spreadsheet tool that we made at the end of this chapter? A: Savings Tracker In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1

A: 25500 A group of programs used to view, manipulate, and print computer graphics is called a _____. A: Graphics suite The long textbox where you can write formulas is called _____. A: Input Line (CORRECT) Formula Line (INCORRECT) In LibreOffice, the sets of icons on the top part of the page are called _____. A: Toolbars In a spreadsheet, the vertical groupings are called _____. A: Columns (CORRECT) rows (INCORRECT) In a spreadsheet, the horizontal groupings are called _____. A: Rows (CORRECT) Columns (INCORRECT) In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)

A: 860 (CORRECT)

1200 (INCORRECT)

By: Mike Adaure In the spreadsheet above, what result will you get if you use the formula =C3-B2

A: 110 Productivity tools are normally made available in software bundles called _____. A: Office productivity suite In this chapter, the data that we linked to the document was created using what application? A: Calc In a spreadsheet, each box in a table is called a _____. A: Cell

A program used to create, store, and manage data in tables. A: Spreadsheet A mathematical equation that can be applied to one or multiple cells is called a _____. A: Formula

By: Mike Adaure

WEEK 9: Email stands for _____ A: Electronic mail Dummy accounts used by one person are called _____. A: Sock puppets What word best describes Web 1.0 websites and web pages? A: Static Which of the following does not infect your computer? A: Spam (CORRECT) Worm (INCORRECT) A network of servers that work together to provide a centralized service is called a _____. The correct answer is: Cloud Local Area Network (INCORRECT) You bought an artist's album then you made and sold copies of it. What you did is called _____. Bootlegging (INCORRECT) A: Counterfeiting (CORRECT) Adding information from a database to a document is called _____. A: Mail Merge _____ is done by tricking people into submitting their personal information. A: Phishing CAPTCHA stands for "Completely Automated Public _____ To Tell Computers and Humans Apart" A: Turing Test The _____ is the part of the email address that is chosen by the client. It follows strict naming rules. A: Local part You can click on a link with the _____ to immediately open it in a new tab. A: Mouse wheel Multiple fake accounts are called _____. A: Trolls Which of the following is NOT true? A: Emails that are sent to Trash are immediately deleted _____ deliberately break the rules in an online community to cause trouble or to get attention. A: Trolls

By: Mike Adaure Some websites refer to you by your _____ instead of your actual name. A: Username Illegally copying and distributing copyrighted materials is called A: Piracy (CORRECT) Plagiarism (INCORRECT) It's ok to use your phone while driving as long as you keep your eyes on the road. A: False Which of the following is not true? A: A web search engine can't be accessed using Internet browsers What do you call software that are used to create information like documents, spreadsheet, presentations, etc? A: Productivity tool A heated argument that escalates into threats and personal insults is called a _____. A: Flame wars (CORRECT) Troll (INCORRECT) In the spreadsheet above, what result will you get if you use the formula =A1*C1 A: 30000 Which is true? A: Gmail uses a flag icon to mark important emails You want to know if classes are suspended because of a storm. Which of the following TLD's is most likely to have the correct information? A: .gov While typing a keyword, several _____ may appear bellow it. A: Suggestions _____ represents a destination where emails can be sent fro or delivered to. A: Email address _____ are people who send unwanted and unsolicited messages. A: Spammers In the part of this chapter where we learned to create an email address, which information is required? A: Birthday Clicking a link with the mouse wheel will cause it to open in _____ A: A new tab _____ apps are used to connect with other people and make interactions such as messaging, writing comments and sharing pictures and videos. A: Social Media What do you call an app used for sending, receiving, and organizing emails. A: Email client Which is NOT true? A: You cannot manually mark an email as spam

By: Mike Adaure

Emails can be sent to the _____ instead of permanently deleting them A: Trash _____ causes unwanted advertisements to appear in your screen? A:...


Similar Free PDFs