Empowerment Technology short quiz Lesson 3 to 5

MarifeCapricho 6 views 31 slides Oct 19, 2025
Slide 1
Slide 1 of 31
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31

About This Presentation

Empowerment Technology short quiz


Slide Content

QUIZ # 2 LESSON 3 – LESSON 5

1. Always post your future vacation. A. TRUE B . Maybe C. FALSE D. Not sure

2. Arthur shared to his timeline the proper way on how use ChatGPT that he recently learned from his seminar. What Core Rules of Netiquette he considered? A. Rule 6: Share expert knowledge B. Rule 4: Respect other people's time and bandwidth C. Rule 8: Respect other people's privacy D. Rule 5: Make yourself look good online

3. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. What Core Rules of Netiquette is considered? A. Rule 4: Respect other people's time and bandwid B. Rule 5: Make yourself look good online C. Rule 9: Don't abuse your power D. Rule 8: Respect other people's privacy

4. Ashley always check for spelling and grammar errors before posting it in her timeline. What Core Rules of Netiquette she considered? A. Rule 5: Make yourself look good online B. Rule 3: Know where you are in cyberspace C. Rule 9: Don't abuse your power D. Rule 8: Respect other people's privacy

5. Sonny always make it to the point that he will not behave rudely to someone face-to-face and in the virtual world. What Core Rules of Netiquette he considered? A. Rule 6: Share expert knowledge B. Rule 2: Adhere to the same standards of behavior online that you follow in real life C. Rule 4: Respect other people's time and bandwidth D. Rule 1: Remember the Human

6. When Ben communicate electronically, whether through email, instant message, discussion post, text, or another method, he always practice the Golden Rule: Do unto others as you would have others do unto you. What Core Rules of Netiquette he considered? A. Rule 6: Share expert knowledge B. Rule 4: Respect other people's time and bandwidth C. Rule 5: Make yourself look good online D. Rule 1: Remember the Human

7. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? A. TRUE B. FALSE C. Maybe D. Not sure

8. Berlyn overheard that Dian has a Cancer. She immediately posted it in his timeline. What Core Rules of Netiquette she should considered? A. Rule 8: Respect other people's privacy B. Rule 3: Know where you are in cyberspace C. Rule 7: Help keep flame wars under control D. Rule 9: Don't abuse your power

9. Buy the software; do not use pirated ones. A. TRUE B. FALSE C. Maybe D. Not sure

10. Stands for malicious software. A. Malware B. None of these C. Spam D. Phishing

11. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. A. None of these B. Phishing C. Malware D. Spam

12. If you create something - an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others. A. Maybe B. FALSE C. TRUE D. Not sure

13. If you create something - an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others. This is called _________? A. Intellect Property B. None of these C. Intellectual Property D. Intellectual Proper

14. It can record email, messages, or any information you type using your keyboard. A. Keylaggers B. None of these C. Keylogging D. Keyloggers

15. It expose people and computer systems to harm online. A. Internet-based treats B. Internet-based threets C. Internet-based threats D. None of these

16. It is a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs. A. Spyware B. Adware C. Worm D. Virus

17. It is a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. A. Trojan B. Worm C. Adware D. Spyware

18. It is a malicious program that transfers from one computer to another by any type of means. A. Trojan B. Worm C. Spyware D. Adware

19. It is a more complicated way of phishing where it exploits the DNS (Domain Name Service) system. A. Spam B. Pharming C. Malware D. None of these

20. It is a program designed to send you advertisements, mostly as pop-ups. A. Worm B. Trojan C. Spyware D. Adware

21. It is a program that runs in the background without you knowing it. A. Adware B. Trojan C. Worm D. Spyware

22. It is a worm created by a Filipino. A. ILOVEYOU VIRUS B. ILIKEYOU VIRUS C. None of these D. IMISSYOU VIRUS

23. It is an unwanted email mostly from bots or advertisers. A. Malware B. Phishing C. None of these D. Spam

24. It is concerned with the "proper" manner of communication in the online environment. A. Netiquette B. Netiquete C. Nettiquete D. Netiqueete

25. It is defined as the information highway. A. Internet B. Web C. None of these D. Gateway

26. It is what people do when they express a strongly held opinion without holding back any emotion. A. Flame of Recca B. Flames C. Flaming D. Flame wars

27. It is when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. A. Flaming B. Flame wars C. Flame of Recca D. Flames

28. Michael is a great IT expert, but he used his talent to hacked other social media accounts to use for his criminal acts. What Core Rules of Netiquette he should considered? A. Rule 9: Don't abuse your power B. Rule 10: Be forgiving of other people's mistakes C. Rule 7: Help keep flame wars under control D. Rule 3: Know where you are in cyberspace

29. Netiquette varies from domain to domain depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What Core Rules of Netiquette is considered? A. Rule 7: Help keep flame wars under control B. Rule 2: Adhere to the same standards of behavior online that you follow in real life C. Rule 10: Be forgiving of other people's mistakes D. Rule 3: Know where you are in cyberspace

30. Pepito read an unwanted comment on his recently shared post, instead of exchanging angry post he decided to make h9is shared post change its privacy from public to private. What Core Rules of Netiquette he considered? A. Rule 2: Adhere to the same standards of behavior online that you follow in real life B. Rule 7: Help keep flame wars under control C. Rule 10: Be forgiving of other people's mistakes D. Rule 1: Remember the Human
Tags