Empowerment Technology Long Quiz (August 22, 2024) PDF
Document Details
Uploaded by RealisticBeech
2024
Tags
Related
- ICT and its Current State - Empowerment Technology PDF
- Empowerment Technologies Reviewer First Quarter PDF
- Empowerment Technology & Online Safety - ETECH Q1 Reviewer - PDF
- Empowerment Technologies PDF
- Reviewer Empowerment Technologies 11-12 Online Safety and Security PDF
- Empowerment Technology Review PDF
Summary
This is a multiple-choice quiz on empowerment technology, covering social media, netiquette, and online threats. The quiz focuses on topics such as netiquette, types of social media platforms, and online safety.
Full Transcript
Empowerment technology Long quiz (August 22, 2024) Name: _______________________________ Score:_________ Test I: Multiple choice (Write the letter of the correct an...
Empowerment technology Long quiz (August 22, 2024) Name: _______________________________ Score:_________ Test I: Multiple choice (Write the letter of the correct answer on the space provided before each number.) ____1. Twitter statuses are only composed of a few characters. What type of social media site does Twitter belong? A. Micro blogging C. Social Networks B. Media Sharing D. Bookmarking Sites ____2. Watson is creating a cover video of his favorite song. Which online platform must he publish this? A. Social News C. YouTube B. Bookmarking Site D. Blogs ____3. Cathy has created a very good slideshow presentation on a certain topic, and she wants to share it to other teachers around the world. Which online platform must she publish this? A. Presentation Platforms C. File Management Platforms B. Cloud Computing Platforms D. Social Media Platforms ____4. What is Netiquette? A. The proper use of manners and etiquette on the Internet. B. Using a net to catch fish. C. Being mean to other people on Facebook. D. Using proper manners at the dinner table. ____5. What is considered shouting over the Internet? A. Screaming at your computer. B. Writing in all CAPS. C. Putting a lot of exclamation marks at the end of a sentence. D. Not answering a friend request on Facebook. ___6. It is OK to forward or post an email message that you received if __________ A. the message is typed in all capitals. B. the author of the message has given you permission to forward or post it. C. it does not contain any copyrighted material. D. the author of the message hasn't marked it as confidential. ___7.. What is a flame in cyberspace? A. A person who follows the rules of Netiquette. B. An expert programmer. C. An online chain letter. D. A post or email message that expresses a strong opinion or criticism. ____8. Knowledge and understanding of netiquette is useful because ___________ A. it will help you create a positive impression on those you meet in cyberspace. B. it explains some of the technical limitations of online communications. C. it explains the conventions already being used by millions of cybernauts. D. All of the above. ___9. What type of online threat happens when an attacker uses electronic devices to do unwanted surveillance against its victim? A. Cyberbullying C. Spamming B. Phishing D. Cyberstalking ___10. What type of online threat happens when the attacker impersonates another individual or organization to gather personal or business information? A. Cyberstalking C. Scamming B. Spoofing D. Pharming ____11. What type of information should you avoid giving when using the internet?17 A. Phone number B. Profile Picture C. Shirt Size D. Religion ____12. What is the golden rule of netiquette? A. Remember the human. C. Use correct grammar. B. Put a smiley in every message. D. Respect people’s time. ____13.You get an email telling you that you won a hundred thousand without joining in a competition. You should ____________. A. Claim the prize. C. Return the email with response. B. Ignore the email. D. Send rude message as revenge ____14. Your family is going out on a vacation. What should you do? A. Post pictures when you return home. B. Post the dates you will be gone online. C. Post updates of where you are currently checking in hotels or places. D. Tell no one. Vacations are for getting away. _____15. Do you have the same passwords for all your accounts? A. Yes. That is how I remember all my passwords. B. I have different passwords for all different accounts. C. I keep it simple. I don’t have any passwords. D. I have two similar passwords that I alternately use for all my accounts. Test II – True or False ( 2 points each correct answer) _____________1. Never give any personal information out about yourself over the internet. _____________2. Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service. _____________3. Never open messages or attachments from someone you do not know. _____________4. Regularly review your privacy settings in your online accounts to make sure you are not sharing important personal information. _____________5. When using a public computer terminal, be sure to save your browsing data before leaving. _____________6. Keep your software updated to avoid security holes. _____________7. Download or install software or anything on your computer or cell phone that is unknown to you. _____________8. Netiquette is a combination of the words netizen and etiquette. _____________9. There is no risk in sharing information about your siblings especially younger siblings because they cannot use the internet yet. _____________10. Your social media friends list should only be composed of anyone who sends you friend request. Test III – Core rules of netiquette 1. Remember the ______________. 2. Adhere to the same standards of behavior online that you follow in _____________. 3. Know where you are in __________________. 4. Respect other people's __________ and bandwidth. 5. Make _____________ look good online. 6. Share expert _________________. 7. Help keep _______________ under control. 8. Respect other people's _______________. 9. Don't _______________ your power. 10. Be _________________ of other people's mistakes.