EMPOWERMENT TECHNOLOGIES Lesson 1
40 Questions
1 Views

EMPOWERMENT TECHNOLOGIES Lesson 1

Created by
@MemorableAwareness7673

Questions and Answers

What is the primary function of a keylogger?

  • To provide internet security
  • To destroy user data
  • To capture user’s keyboard actions (correct)
  • To filter unwanted emails
  • Which of the following crimes is most closely associated with identity theft?

  • Software development
  • Keylogging (correct)
  • Data encryption
  • Pharming
  • What distinguishes pharming from phishing?

  • Pharming uses official emails
  • Pharming operates without fake web pages
  • Pharming only targets bank accounts
  • Pharming exploits the DNS system (correct)
  • What does fair use allow individuals to do with copyrighted material?

    <p>Transform and copy for commentary without permission</p> Signup and view all the answers

    What constitutes copyright infringement?

    <p>Producing protected material without permission</p> Signup and view all the answers

    What is meant by the term 'public domain'?

    <p>Creative materials not protected by copyright laws</p> Signup and view all the answers

    What is one of the primary goals of Information and Communication Technology?

    <p>To improve the methods of creating and sharing information</p> Signup and view all the answers

    How does ICT benefit education?

    <p>It facilitates e-learning and expands access to resources.</p> Signup and view all the answers

    How can individuals avoid copyright infringement?

    <p>Understanding what copyright protects and does not protect</p> Signup and view all the answers

    Which of the following is an example of phishing?

    <p>Receiving an email masquerading as a bank</p> Signup and view all the answers

    What role does ICT play in business?

    <p>It supports online marketing and remote work.</p> Signup and view all the answers

    Which of the following is NOT considered a benefit of ICT?

    <p>Creating information monopolies</p> Signup and view all the answers

    What does malware encompass?

    <p>A range of malicious software, including viruses and trojans</p> Signup and view all the answers

    Which of the following best describes adware?

    <p>Software that displays unwanted advertisements during browsing</p> Signup and view all the answers

    What characteristic defines a Trojan?

    <p>It appears as a normal program to deceive users.</p> Signup and view all the answers

    Which of the following threats focuses primarily on capturing keystrokes?

    <p>Keylogger</p> Signup and view all the answers

    What should you do when using someone else's creative work?

    <p>Give credit to the source</p> Signup and view all the answers

    Which of the following best describes Web 1.0?

    <p>Read-only web with limited interaction</p> Signup and view all the answers

    What does the term 'folksonomy' refer to in Web 2.0?

    <p>User-generated tagging for content organization</p> Signup and view all the answers

    What is a characteristic of the Semantic Web or Web 3.0?

    <p>The web understands user preferences</p> Signup and view all the answers

    Which of the following is NOT a type of social media?

    <p>Email providers</p> Signup and view all the answers

    What does 'technology convergence' refer to?

    <p>The combining of different technologies for common goals</p> Signup and view all the answers

    Which of the following trends pertains to the rise of smartphones and tablets?

    <p>Mobile technology</p> Signup and view all the answers

    What is a limitation in copyright laws in the Philippines?

    <p>They last for the author's lifetime plus 50 years</p> Signup and view all the answers

    What is the primary purpose of a contextual search engine?

    <p>To refine search results based on user needs</p> Signup and view all the answers

    Which of the following is NOT a step in the contextual research process?

    <p>Creating a visual presentation</p> Signup and view all the answers

    In online searching, what happens when the words 'NOT' and 'OR' are not capitalized?

    <p>They are ignored as stop words</p> Signup and view all the answers

    Which type of sources are considered credible?

    <p>Scientific journals and established news sites</p> Signup and view all the answers

    What does the term 'mail merge' refer to in word processing?

    <p>Producing multiple documents from a template using structured data</p> Signup and view all the answers

    Which component of mail merge contains the main message that stays constant?

    <p>Form document</p> Signup and view all the answers

    Which domain suffix is typically considered reliable but not guaranteed?

    <p>.org</p> Signup and view all the answers

    What is indicated by the use of quotation marks in an online search?

    <p>It ensures that the exact phrase is searched for</p> Signup and view all the answers

    What is the function of the placeholder in a document template?

    <p>To mark where data needs to be filled in</p> Signup and view all the answers

    Which function in MS Excel can be used to obtain the highest value in a dataset?

    <p>MAX()</p> Signup and view all the answers

    Which step comes first when creating a mail merge?

    <p>Create a dataset with title headings in Excel</p> Signup and view all the answers

    What does the IF() function do in MS Excel?

    <p>Returns one value based on a specified condition</p> Signup and view all the answers

    Which of the following is NOT a feature of MS PowerPoint?

    <p>Data Calculation</p> Signup and view all the answers

    Which function would you use to calculate the difference between two dates in MS Excel?

    <p>DATEDIF()</p> Signup and view all the answers

    Which feature in MS PowerPoint helps in standardizing the look of presentations?

    <p>Templates and Themes</p> Signup and view all the answers

    What is the purpose of the COUNTA() function in MS Excel?

    <p>Counts all non-empty cells regardless of data type</p> Signup and view all the answers

    Study Notes

    Introduction to Information and Communication Technology

    • ICT encompasses technologies like mobile phones, internet, and software to facilitate the creation, processing, and sharing of information.
    • Aims to enhance human capabilities across various fields, including business, education, and entertainment.

    Importance of ICT in Different Fields

    • Communication: Enhances global connections through email, video conferencing, and social media.
    • Education: Expands access to learning materials and e-learning platforms, promoting accessibility and lifelong learning.
    • Business: Transforms operations via data management, online transactions, and remote work, increasing efficiency and productivity.
    • Social and Economic Development: Drives job creation and entrepreneurship, especially in developing countries.
    • Innovation: Supports advancements in medicine, science, and engineering through data analysis tools.

    Challenges in ICT

    • Common Internet Threats:
      • Spam: Unwanted messages that may contain malware.
      • Malware: Includes viruses, trojans, and adware, designed to damage or exploit systems.
      • Phishing: Fraudulent attempts to obtain sensitive data through impersonation.
      • Keyloggers: Track keystrokes to steal information like passwords.
      • Hackers: Individuals who exploit systems for malicious purposes.

    Rules of Netiquette

    • Netiquette: Guidelines for acceptable online communication, ensuring respectful interaction in digital environments.
    • Copyright Infringement: Using protected material without permission, which violates owner rights and can lead to legal consequences.
    • Fair Use: Allows limited use of copyrighted materials without infringement for purposes such as commentary and education.

    History of the World Wide Web

    • Web 1.0: The static web where users consumed content without interaction.
    • Web 2.0: Characterized by user-generated content and social media interactions, enhancing engagement.
    • Web 3.0: The semantic web that personalizes user experiences through understanding and preferences.
    • Technology Convergence: Integration of different technologies to achieve common objectives.
    • Mobile Technology: Growth in the use of smartphones and tablets for communication and services.
    • Social Media: Platforms for sharing user-generated content and networking.

    Contextualized Online Research

    • Contextual Search: Enhances search precision by refining results based on user queries.
    • Research Steps: Include topic selection, resource identification, result compilation, and evaluation.
    • Evaluating Credibility: Reliable sources often include academic journals, government sites, and established news outlets.

    Advanced Word Processing in MS Word

    • Mail Merge: Technique for generating personalized documents using data sets.
    • Components of Mail Merge:
      • Form Document: Template for the main message with placeholders for data.
      • Data File: Maintains individual information to be merged into the template.

    Advanced Spreadsheet Skills in MS Excel

    • Functions:
      • SUM(): Totals values in a cell range.
      • AVERAGE(): Calculates the mean of selected values.
      • IF(): Returns results based on conditional expressions.
      • VLOOKUP(): Searches for data within a table.

    Advanced Presentation Skills in MS PowerPoint

    • Slide Creation: Users can create individual slides with varied content types for presentations.
    • Templates and Themes: Provides pre-designed formats for consistent and appealing presentations.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the fundamentals of Information and Communication Technology in this lesson. Learn how various communication technologies are used to manage and share information effectively, enhancing our processing and sharing capabilities. This quiz will test your understanding of the significant goals and tools associated with ICT.

    More Quizzes Like This

    Online Safety and ICT Quiz
    6 questions
    Grade 7 ICT: Online Communication Tools
    22 questions
    ICT in the Philippines - Unit 1 Quiz
    8 questions
    Introduction to ICT
    5 questions

    Introduction to ICT

    SnazzySquirrel avatar
    SnazzySquirrel
    Use Quizgecko on...
    Browser
    Browser