Empowerment Technology Quarter 1 Reviewer
40 Questions
0 Views

Empowerment Technology Quarter 1 Reviewer

Created by
@AffableMaroon

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What best describes the primary focus of social media platforms?

  • Encouraging private communication between users
  • Facilitating content creation and engagement with a wide audience (correct)
  • Providing a platform for video games
  • Offering technical support for software issues
  • Which type of malware is specifically designed to hold data hostage until a ransom is paid?

  • Adware
  • Spyware
  • Ransomware (correct)
  • Trojan
  • What is the purpose of phishing attacks?

  • To steal physical hardware from a user
  • To promote legitimate marketing campaigns
  • To enhance user security through password prompts
  • To acquire sensitive personal information through deceptive means (correct)
  • Which of the following is a characteristic of virtual conferences?

    <p>They facilitate real-time engagement without physical presence</p> Signup and view all the answers

    What kind of malicious software is designed to gather information about a user without their knowledge?

    <p>Spyware</p> Signup and view all the answers

    Which of the following is NOT a type of malware mentioned?

    <p>Phantom</p> Signup and view all the answers

    What is the defining feature of a streaming application?

    <p>It enables real-time access to digital content</p> Signup and view all the answers

    Which of the following online threats involves the unsolicited sending of emails, often linked to malware?

    <p>Spam</p> Signup and view all the answers

    Which of the following actions constitutes copyright infringement?

    <p>Using a copyrighted image without permission</p> Signup and view all the answers

    What is the primary purpose of batch editing in image manipulation?

    <p>To edit all images based on a single setting</p> Signup and view all the answers

    Which technique is used to focus solely on a subject by removing unwanted parts of an image?

    <p>Cropping</p> Signup and view all the answers

    What software would be most appropriate for advanced image manipulation tasks?

    <p>GIMP</p> Signup and view all the answers

    Which of the following best describes the technique of combining text and image in design?

    <p>A planned composition to convey a message</p> Signup and view all the answers

    What is the outcome of using brightness or contrast adjustments in image editing?

    <p>It alters the image's light balance</p> Signup and view all the answers

    What does the technique called cloning or double exposure achieve?

    <p>Copying an area of the image to a new location</p> Signup and view all the answers

    Which of the following actions is an example of plagiarism?

    <p>Using one’s previous work without citation</p> Signup and view all the answers

    What characterizes assistive media in the context of digital accessibility?

    <p>It is an online audio reading accessibility service for people with visual or perceptual impairments.</p> Signup and view all the answers

    Which of the following best defines online platforms?

    <p>They are specially developed platforms using Internet technology for teaching and learning.</p> Signup and view all the answers

    What is a major component of online safety measures?

    <p>Keeping personal information private to avoid identity theft.</p> Signup and view all the answers

    Which practice can enhance online security for individuals?

    <p>Employing firewalls and antivirus software.</p> Signup and view all the answers

    What is the primary function of social networking sites (SNS)?

    <p>To facilitate connections and interactions between users.</p> Signup and view all the answers

    What is a common characteristic of cyberstalking?

    <p>Is often conducted through digital communication tools</p> Signup and view all the answers

    Which statement accurately describes the term 'best practice' in the context of online safety?

    <p>Using multi-factor authentication as an additional security layer.</p> Signup and view all the answers

    Which of the following best describes cyberbullying?

    <p>Repeated harassment with intent to cause emotional distress</p> Signup and view all the answers

    What distinguishes online platforms from traditional websites?

    <p>They facilitate user interactions and transactions through the Internet.</p> Signup and view all the answers

    What is a common misconception about online safety?

    <p>Using strong passwords is sufficient without additional measures.</p> Signup and view all the answers

    What is a key component of internet scamming?

    <p>Deceptive tactics to gain unauthorized access</p> Signup and view all the answers

    Which term refers to the use of threats to extract valuables from victims online?

    <p>Cyberextortion</p> Signup and view all the answers

    How does mobile technology enhance user connectivity?

    <p>Through portable devices that allow for communication anywhere</p> Signup and view all the answers

    Which of the following is NOT an example of online learning platforms?

    <p>Netflix</p> Signup and view all the answers

    What is a fundamental principle of computer ethics?

    <p>Governance of behavior in technology use</p> Signup and view all the answers

    Which function would you use in Excel to calculate the average of a set of numbers?

    <p>AVERAGE</p> Signup and view all the answers

    What is the primary purpose of Microsoft Word?

    <p>To type and save documents</p> Signup and view all the answers

    Which of the following best describes infographics?

    <p>Graphic visual representations of information or data</p> Signup and view all the answers

    What is the role of a search engine in online research?

    <p>To retrieve requested information from online databases</p> Signup and view all the answers

    Which application serves as an alternative to Microsoft PowerPoint?

    <p>Google Slides</p> Signup and view all the answers

    What is the definition of netiquette?

    <p>Rules for behaving properly online</p> Signup and view all the answers

    What does the term 'online search' refer to?

    <p>Interacting with a search engine to find information</p> Signup and view all the answers

    Which of the following describes a web browser?

    <p>Software to retrieve and present web content</p> Signup and view all the answers

    Image manipulation is also known as what?

    <p>Image retouching</p> Signup and view all the answers

    Study Notes

    Empowerment Technology

    • Assistive Media provides an online audio reading service for individuals with visual or perceptual impairments.
    • Online platforms are designed for teaching and learning, facilitating interaction, information exchange, and commerce through the internet.

    Online Safety

    • Online safety involves measures to protect personal information while using the internet.
    • Best practices include using strong, unique passwords, keeping personal information private, avoiding public Wi-Fi, and being cautious with connections.

    Online Security

    • Online security refers to protective measures for safeguarding digital systems against unauthorized access and cyberattacks.
    • Recommended practices include using firewalls, antivirus software, multi-factor authentication, and regularly updating software.

    Social Networking Sites (SNS)

    • SNS are platforms for building connections and sharing personal information, with examples like LinkedIn, Facebook, and Instagram.
    • They focus on creating and maintaining relationships within a digital network.

    Social Media

    • Social media is a broader category that includes content creation and sharing across platforms like YouTube and TikTok.
    • Emphasizes engagement with a wider audience beyond personal connections.

    Virtual Conferences

    • Virtual conferences allow participants to engage online without physical presence, utilizing platforms like Zoom and Microsoft Teams for discussions and networking.

    Movie/Film Streaming Service

    • Streaming applications enable real-time access to digital content without downloading; popular services include Netflix and Viu.

    Online Learning Platforms

    • Online learning platforms such as Coursera and Khan Academy facilitate educational opportunities remotely.

    Mobile Technology

    • Mobile technology includes portable communication devices and networking, allowing technology to accompany users, with examples like smartphones and tablets.

    Cybercrime Terminology

    • Understand different forms of cybercrime: phishing (deceptive information gathering), cyberstalking (repeated harassment), and cyberbullying (digital harassment).

    Excel Functions/ Formulas

    • Common Excel functions include SUM, AVERAGE, MIN, MAX, COUNT, and IF for data manipulation and analysis.

    Computer Ethics

    • Computer ethics involves moral principles governing behavior in computing and technology environments.

    Netiquette

    • Netiquette is a set of guidelines for proper online communication and behavior.

    Online Research

    • Online research refers to data collection via the internet, also called internet research, and involves issues like copyright infringement and plagiarism.

    Web Browser and Search Engines

    • A web browser retrieves and displays web content while search engines like Google facilitate information retrieval through keyword searching.

    Image Manipulation

    • Image manipulation involves altering images for visual appeal, using software like Adobe Photoshop and GIMP, applying techniques such as cropping and color balance.

    Productivity Tools

    • Microsoft Excel and similar tools aid in organizing and analyzing numerical data through various functions and formulas.

    Batch Editing and Common Techniques

    • Batch editing allows simultaneous modification of multiple images, while common techniques include brightness adjustment, compression, filters, and combining text and images for enhanced presentations.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz focuses on key concepts from the Empowerment Technology course, specifically covering assistive media and online safety measures. It is designed to help students understand the relevance of technology in providing accessibility to individuals with visual or perceptual impairments. Prepare yourself to explore various online platforms and their functionalities.

    More Like This

    Assistive Media
    5 questions

    Assistive Media

    ThoughtfulTopaz avatar
    ThoughtfulTopaz
    Social Media and Assistive Technology Quiz
    30 questions
    Empowerment Technologies: Social Media
    37 questions
    Use Quizgecko on...
    Browser
    Browser