Empowerment Technologies
G11 ICT 112 WEEK 1 TO 9
The cloud enables people in different locations to work on the same project. This enables
Better collaboration
Websites that belong to the Web 1.0 generation were mostly
Static
Programs that can only be accessed using a browser are called
Web applications
Which of the following is TRUE about Cloud-based services?
Some cloud-based services can be used for free
Which of the following is NOT a safe practice?
Submitting your phone number every time you are asked.
Which of the following is not a malware?
Worm
A Web 3.0 characteristic in which users are always connected to the Internet.
Ubiquitous
Which of the following can contain malware?
All
Which of the following is TRUE?
Mobile apps are all web apps because they can only be accessed using an Internet browser
Internet-based networks that are used to store, manage, and share resources and information
Cloud Computing
are apps and websites used by people to interact with one another by sharing information, sending
messages, and exchanging ideas
Social Media
Which of the following is NOT true about passwords?
Passwords should not be memorized
Which of the following statements is NOT true?
Some apps and websites address you by your username.
is a secret group of characters used to unlock your account
Email address
People who send unwanted and unsolicited emails are called
Spammers
is a generation of the Internet when websites were mostly static
Web 1.0
Tricking people to submit their personal details is called
Phishing
Which of the following information is ok to share with other people?
Email address
HTML means HyperText Markup Language
is a type of malware that is disguised as a harmless or useful program or file.
Trojan
In our lesson, we visited the website of which movie?
Space Jam
You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the most credible information
.gov
Which of the following does not apply to Netiquette?
Do unto others as you would have them do unto you.
Which of the following is NOT true?
Google's only server is located in California
What do you call the unauthorized copying of the material support, labels, artwork and packaging?
Counterfeiting
A task that is done by a computer for another computer is called a
Server
page is about a single topic and can be edited by anyone with the right credentials
Wiki
Netiquette is short for Network Etiquette
You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of Spam
.net stands for network
You can make an online search by entering your keywords in the browser's
Address bar
Which of the following is NOT true?
Some types of malware can spread through offline means such as flash drives and local area networks
is the most common TLD
.com
The cloud enables people in different locations to work on the same project. This enables
Better collaboration
Which of the following is not a factor that can be used to determine a source's credibility?
The article's length
Netiquette involves a set of rules that are imposed by online groups
Formal
Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law but are
expected to be followed by everyone.
Informal Netiquette
Servers are housed in centralized locations called Data centers
Which of the following mobile apps is not a native application? None of these
You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is
a Client
In the Internet, your _____ is as good as your actual name. Username
The name Trojan is derived from a fictional wooden Horse
You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called Pharming
You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of Spam
REPUBLIC ACT NO. 8293 is also know as Intellectual Property Code of the Philippines
Malware is short for Malicious hardware
.info stands for information
The use of strength or power to intimidate someone into doing something that he does not want or to
make him feel bad "BULLYING"
In which of the following situations is it ok to use your mobile phone? None of these
Which of the following is NOT true about worms?
A worm doesn't need human action to spread
is a program that is designed to cause harm to your computer or device virus
According to the IP Code, how many types of works are covered by copyright protection? 15
"IP Code" stands for Internet Protocol Code of the Philippines
Which of the following is not true?
A web search engine can't be accessed using Internet browsers
Computers can create data and make decisions based on the user's actions through
Machine Learning
A Web 3.0 characteristic in which events and information are made available to users as they happen.
Real-Time
Clicking on a search result using the _____ will open the link in a new tab.
Mouse wheel
TLD stands for Top-Level Domain.
In a spreadsheet, the horizontal groupings are called Columns
A program used to create, store, and manage data in tables. Spreadsheet
In the spreadsheet above, what result will you get if you use the formula =C3-B2
110
What do you call software that are used to create information like documents, spreadsheet,
presentations, etc? Productivity tool
In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)
440
In LibreOffice Writer, what function did we have to open to view the registered databases
Datasources
In the LibreOffice home screen, the database app is called LibreOffice Base
What sign is used for multiplication? *
In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)
1200
In the spreadsheet above, what result will you get if you use the formula =SUM(A1,B1,C1,B3) 850
Adding information from a database to a document is called Mail Merge
A program that is developed by a public community of developers and is made available to the public for
free is described as Open-source
In a spreadsheet, the vertical groupings are called Columns
Productivity tools are normally made available in software bundles called
Office productivity suite
In the spreadsheet above, what result will you get if you use the formula =A1*C1
30000
In Calc, what sign can be seen in the beginning of the formulas?
In the spreadsheet above, what result will you get if you use the formula =SUM(B1,B4)
430
What is the name of word processor that we used in this chapter
LibreOffice Word
What sign is used for division?
The long textbox where you can write formulas is called Formula Line
Many trusted anti-virus companies give out free versions which are good enough to protect your
computer from malware True
Which is true?
Gmail uses a flag icon to mark important emails
All of the following types of malware can "infect" your computer except
Spam
You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the correct information?
.gov
In LibreOffice, the sets of icons on the top part of the page are called
Toolbars
Which of the following is not an Internet Browser? Safari
The unauthorized copying of the material support, labels, artwork and packaging is called
Counterfeiting
It's ok to play loud music in public as long as you only play popular songs. False
CC Stands for Carbon Copy
is a feature that can be used to make complex web search.
Advanced Search
What is the name of the spreadsheet tool that we made at the end of this chapter?
Savings Tracker
is the act of forcing or intimidating someone into doing something that he/she does not want to.
Bullying
In Calc, what sign can be seen in the beginning of the formulas? C
is the legal right to own an original work Copyright
Bcc stands for Blind Carbon Copy
apps are used to connect with other people and make interactions such as messaging, writing comments
and sharing pictures and videos.
Social Media
Multiple fake accounts are called Trolls
Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program Adware.
Which of the following statements is true? No one can steal your personal information without asking
for permission.
At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi, which you connect to using your phone. In this scenario, your phone is a Server
Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a Trojan
Which of the following is not true?
All TLD's contain credible information
Which of the following is NOT a reason why you should give credit to your sources
To make the author notice you
The URL and design of a website's homepage changes depending on the preferences of the current
Dynamic
Which of the following TLD's is most likely to be owned by a university? ORG
Real-time, ubiquitous, and machine learning are the defining elements of Web 3.0
Which of the following does not need human action to spread? Worm
You can make online searches in Mozilla Firefox by typing your keywords I Search bar
Anyone can use the following TLD's except
b. .gov
Which of the following can be used in identity theft? d. Full name
Which of the following is not a search engine? Advanced Search
Tricking people to submit their personal details is calle Phishing
Your mom is calling you during class. In this situation, which of the following is the ethical thing to do?
Ask for your teacher's permission to go outside so you can answer the call.
The following are benefits of cloud computing except
What is the official website of the Intellectual Property Code of the Philippines? ipophil.gov.ph
is a single program or a system of programs designed to look for information in the Internet. Web
search engines
Several members of a forum are a having a heated debate. Eventually, they started posting insults and
threats against other members. The debate has escalated into a
Sock puppet
Which of the following should not be shared with anyone?
You can check an article's _____ to know if the information that it contains is updated.
Publication date
are programs that are directly installed in a computer or device Native applications
A mathematical equation that can be applied to one or multiple cells is called a
Collumn
In this chapter, the data that we linked to the document was created using what application?
Excel
What sign is used for multiplication? c. *
A program used to create, edit, and print documents is called a Word processor
In a spreadsheet, each box in a table is called a
Cell
Which of the following can "infect" your computer spam
are official rules in an online community. Formal
A _____ is a computer that does a task for other computers. Server
Google.com is an example of a dynamic website True
While typing a keyword, several _____ may appear bellow it.
Suggestions
A heated argument that escalates into threats and personal insults is called a
Flame war
Which of the following is NOT a search engine? Firefox
You bought an artist's album then you made and sold copies of it. What you did is called
Counterfeiting
What is the sign that separates the two parts of the email address?
At sign
Read-only websites and web pages that were single files and saved in HTML format belong to what
generation? Web 1.0
What word best describes Web 1.0 websites and web pages?
Static
The Golden Rule states "Do unto others before they do unto you."
True
The following personal information should not be shared with other people except
Bullying
Pretending to own someone else's work or product is called
Plagiarism
What is the most common TLD
.com
Emails can be sent to the _____ instead of permanently deleting them
Inbox
Dummy accounts used by one person are called
Sock puppets
In "aaaaa@bbbbb.com" what is bbbbb.com?
Domain part
Clicking a link with the mouse wheel will cause it to open in
. A different website
Non-profit groups prefer to use which TLD?
.org
Unwanted and suspicious emails are kept in the Spam folder
What do you call an app used for sending, receiving, and organizing emails.
Email client
In this chapter, what email service did we use? Gmail
Some websites refer to you by your _____ instead of your actual name.
Username
s a type of malware that automatically spreads in a computer or a system even without human
interaction.
Worm
The only way to do a web search in Mozilla Firefox is to type the keywords in the search bar. True
Which is NOT true?
By default, Gmail will delete a message in the Trash after 30 days
The name given to traditional postal mail
Snail mail
Netiquette is considered _____ if it is strictly upheld in an online community.
Formal
Several _____ may appear below the search bar or address bar while you are typing a keyword.
In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1
25500
Which of the following TLD's cannot be used by the public?
.gov
A website that contains articles written by users and can be edited by other users is called a
Web 2.0
contains emails that have been composed but were not sent.
Drafts
is a web browser owned by Apple Safari
Which of the following does not infect your computer? Spam
It's ok to tell other people the following personal information except
Password
Illegally copying and distributing copyrighted materials is called
Piracy
Use _____ to make complex web searches.
Advanced Search
is an incident where members of an online community get into arguments and start posting insults and
personal attacks.
Flame war
Which of the following personal information should not be shared with other people
Password
Spam can spread when the infected computer makes contact with another computer
TRUE
allows you to use multiple keywords and entire phrases and narrow down your search by selecting
language, region, date, etc.
Advanced Search
It's bad to receive a lot of _____ because they are annoying take up memory space
Spam
Based on the spreadsheet above, give the answer to the following formula:
=SUM(C1:C5)
The default name of a ____ is a letter and a number Cell
Yahoo, Google, and Bing are examples of a _____.
Web search engine
In Calc, what is the symbol used for subtraction?
A group of programs used to create, edit, view, and print computer graphics is called a
relies on users to contribute web contents.
Social Media
It is ok to post your passwords in your social media accounts so you won't forget them.
False
Ad-blockers are browser add-ons that prevent advertisements from being displayed in your browser.
True
People who send unwanted and unsolicited emails are called
Scammers
Wiki is derived from the Hawiian work wikiwiki, which means
Quick
While typing a keyword in a search bar, _____ may appear below it.
Suggestions
=B2/C2+B4
The World Anti-Piracy Observatory is operated by
UNESCO
may appear in web search engines, address bars, and search bars while you are typing a keyword
Suggestions
A combination of characters that can unlock your account is called a
Password
Web 1.0 websites are defined as static or Web based
Trolls use _____, which are fake accounts so that they can post as different users.
Sock puppets
is the generation of the Internet that is characterized by the increased focus on user participation and
the prevalence of dynamic websites.
Web 2.0
The names of _____ are letters Cells
The _____ lists 15 types of works that are covered by copyright protection.
Intellectual Property Code of the Philippines
is an Internet-based application that can be accessed using browsers.
web application
What is the name of word processor that we used in Chapter 5?
LibreOffice Word
is a type of malware that causes unwanted advertisements to appear in your screen.
Adware
By default, Gmail will delete a message in the Trash after 50 days.
False
A computer that receives a service in a network is called a
Server
What is the name of the open-source productivity suite that we used in Chapter 5?
Libre Office word processor
websites can change their appearance and behavior based on the users' actions.
Dynamic
A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.
Productivity tool
A website that allows users to edit its contents and structure is called a
Wiki
Recording live performances or broadcasts without permission from the owner is called
Streaming
People who try to cause trouble by posting inappropriate or banned contents and off-topic messages
are called
Trolls
is a type of malware that disguises itself as a harmless program or file.
Trojan
When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called
Streaming
is a type of malware that is named after a fictional horse.
Trojan
LibreOffice is an open-source
Office productivity suite
Bcc Stands for
Blind Carbon Copy
Chrome, Firefox, and Internet explorer are examples of
Web Browsers
What is the name given to software used to create, store and collections of information?
In Calc, what is the default name of the cell that belongs to the second row and the third column?
C:2
Most web search engines have an _____ feature which can be used to make complex web searches
Advanced Search
Reproducing and distributing materials without the owner's consent is called
Piracy
Which of the following details is NOT essential in citing a source
name of the researcher
Websites that belong to _____ generation encourages a give-and-take relationship between the
websites and the users by allowing them to leave comments, upload files and to publish their own
contents.
Web kg
is the legal right to own an original work
Copyright
Web 1.0 websites is best described by which of the following?
Static
In LibreOffice, the sets of icons on the top part of the page are called
Formula bar
Email stands for Electronic mail
Other that your username or email address, what else is almost always required to access your online
accounts? Password
are people who send unwanted and unsolicited messages.
Scammers
aresections of an email client that are used to store different kinds of email.
Folders
Chrome's default search engine is Google Search.
True
Which is NOT true?