Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
45 views4 pages

Pointers To Review-Ict

The document contains a series of multiple-choice questions, true/false statements, and identification prompts related to information and communication technology (ICT) and online behavior. It covers topics such as assistive technology, web development phases, netiquette, and online safety practices. Additionally, it includes definitions of terms like malware, internet scams, and cyberbullying.

Uploaded by

arjaycaging23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views4 pages

Pointers To Review-Ict

The document contains a series of multiple-choice questions, true/false statements, and identification prompts related to information and communication technology (ICT) and online behavior. It covers topics such as assistive technology, web development phases, netiquette, and online safety practices. Additionally, it includes definitions of terms like malware, internet scams, and cyberbullying.

Uploaded by

arjaycaging23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

REVIEWER IN ICT :

MULTIPLE CHOICE
1. A generic term used to refer to its group of software or hardware devices by which people with
disabilities can access computers. (Assistive Media)​

2. It compasses broad range of technologies used to create, store, process and share information.
​ ​ (ICT)​ ​ ​

3. It uses GPS to detect location and used for navigation. What kind of platform is this?
​ ​ (Mapping Platform)​

4. These are sites that focus on short updates from the user. You will be able to receive updates. Posts are
briefly range typically from 140-200 characters? (Microblogging)​
​ ​ ​
5. It is concerned with the “proper” manner of communication in the online environment. Short term of
network etiquettes. (Netiquettes)​ ​

6. What Web page is decentralized and semantic? (Web 3.0)

7. What is website application or online channel that enable web users to create, co-create, modify, and
exchange user-generated content. (Social Media)​ ​

8. What Web page is static and not interactive and also read only web? (Web 1.0)​​ ​

9. It is commonly reoffered to WWW, to 3W or simply the web is interconnected system to public


webpages accessible through the internet. (World Wide Web)

10. What Web page is interactive and social? And also you can create, posts and comments.
​ ​ (Web 2.0)​

YES OR NO

Your friend told you that his college application was rejected because you posted a video of him doing
crazy stuff at a party. You posted the video several years ago but later took it down to protect your
friend's reputation. Is it possible that the college found the video? (YES)

My computer has an antivirus, so it is okay to open most email attachments like e-cards and video files.
(NO)

You and your best friend play a lot of video games. One time, she asks you for your password so she can
help you level up and get in-game money. She promises to keep your password a secret. Is it okay to
give away your password? (NO)

You forgot that your essay for English class is due tomorrow. While doing your research, you found a
website offering free essays. (NO)
There is a danger in posting information about a future vacation. (YES)

You received an email stating that your mother's bank account is going to be forfeited if you do not
respond to the email. Is it safe to reply? (NO)

Lurking is sometimes considered impolite. It is the practice of reading discussions without contributing
to them (YES)

Letting people know your birthday is probably a must if you want to get as many gifts as possible. But
having it in your profile makes you vulnerable to identity theft. (YES)

If there is no copyright notice, it's okay to copy a Web page. (NO)

If someone uses offensive language online, always respond and not worry as no one knows who you are
online. (NO)

If someone insults and uses offensive language towards you online, you should reply in the same
manner. (NO)

Your cousin asked for your fabulous zucchini cake recipe at the last family function. While you're
sending it to him, you decide to e-mail it to all 500 people in your address book as well. It is an example
of email spam. (YES)

You are responsible for your actions on the internet. (YES)

Remember your audience. If you are putting something on a web page remember that everyone in the
world will have access to it. (YES)

It is ok to constantly give our friends e-mail or items online which they do not need. (NO)

IDENTIFICATION
Which of the following should you never give on the Internet? ( All of the above)

What should you do if you receive a text or email from someone you don't
​ (Leave it in your inbox until you figure out who it is)

What is Netiquettes? (Showing manners and etiquette on the Internet)​

What should you never do if you get an embarrassing picture from someone?
(Discourage the person from sending pictures like that )

What should you do to avoid being cyber-bullied? (Observe proper netiquette rules)​
​ ​
What should you do if you feel you are being cyber-bullied?
​ ( Tell a trusted adult like a parent or teacher)​ ​
​ ​
Before posting to a discussion group you should __________________.
(All of the above.)
It is OK to forward or post an email message that you received if__________.
​ ( It does not contain any copyrighted material)

What should you avoid doing in a chat room? (All of the above)​

Spamming is very poor Netiquette and means _________.


(Posting or emailing unsolicited advertising messages to a wide audience.)

The Golden Rule of Netiquette is ____.(Remember the human! )

A flame is _____________________________
(a post or email message that expresses a strong opinion or criticism)

Knowledge and understanding of netiquette is useful because _________


(all of the above)

You've been sent a virus warning, what should you do now?


( Go to a security Web site to learn if it is a real virus.)

As a common courtesy, when in a chat room you should:


(All of the above)

IDENTIFY THE FOLLOWING: PUT A. IF ITS RISKY AND SMALL RISKY. (10 ITEMS)

_________ Last Name​​ ​ ​

_________ Current and previous schools​ ​

_________ Middle Name​ ​ ​ ​

_________ Who your Mother and Father are​


​ ​
_________ Your home phone number​​

FILL IN THE BLANKS (10 POINTS)

MALWARE. or malicious software, is any program or file that is harmful to a computer user.
INTERNET SCAM generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain.
CYBERBULLYING refers to the act of tormenting, harassing, or embarrassing another person using the
internet.
INTERNET ROBOTS are also known as spiders, crawlers, and web bots. It is a software application that is
programmed to do certain tasks.
PHARMING happens when a hacker or pharmer directs an internet user to a fake website instead of a
legitimate one. These “spoofed” sites can capture a victim’s confidential information, including usernames,
passwords, and credit card data, or install malware on their computer

You might also like