Sunteți pe pagina 1din 2

Name: ____________________________________________________________ Score: __________________

Section: ________________________ Date: __________________

A. Multiple Choice: Circle the letter that corresponds to the correct answer.
1. A web page that allows interaction from the user.
a. Static b. dynamic c. social d. comment
2. This refers to the feature where users are able to categorize and locate information through tagging.
a. hashtags b. folksonomy c. taxonomy d. rich user experience
3. A feature of a dynamic website that allows users to put their own content.
a. rich user experience c. user participation
b. long tail d. mass participation
4. It provides a common framework to allow data to be shared and reused across platform, enterprise, and
community boundaries.
a. W3C b. Semantic Web c. Web 1.0 d. Web 2.0
5. The synergy of technological advancements to work on a similar goal or task.
a. Technological convergence b. Social Media c. Mobile Technologies d. Assistive Media
6. This is the operating system for Apple devices such as the IPhone and iPad.
a. Blackberry OS b. Symbian c. Windows Mobile d. iOS
7. Pinterest is a social media website that can be classified as
a. Bookmarking site b. media sharing c. microblogging d. blogs and forums
8. Currently, this is the fastest mobile network,
a. 2G b. 3G c. 4G d. 5G
9. This media is designed to help people who have visual and reading impairments.
a. Assistive b. social c. bookmark d. accessibility
10. This type of social media website focuses on short updates posted by the user.
a. Blogging b. microblogging c. social media d. hashtagging

B. Matching type: Match Column A with Column B. Write the letter of the correct answer on the space before each
number.

A B

_____ 1. Virus a. designed to send you advertisements

_____ 2. Rogue b. sends an official-looking email and is designed to steal


sensitive personal information

_____ 3. Keylogger c. a provision that allows you to use copyrighted work without
consent with certain limitations

_____ 4. Adware d. a browser feature that is synonymous to “private” browsing

_____ 5. Spam e. replicates and can transfer from one computer to another

_____ 6. Phishing f. exploits DNS system

_____ 7. Fair use g. states that anyone who uses your work without your consent
is punishable by law

_____ 8. Spyware h. runs in the background and monitors what you are doing

_____ 9. Private i. unwanted email mostly from bots

_____ 10. Malware j. disguised as a useful program but is not

_____ 11. Incognito k. the information superhighway

_____ 12. Internet l. tricks the user into posing that it is a security software
_____ 13. Trojan m. a malicious software

_____ 14. Copyright n. an option to hide a post so that search engines could not scan
it

_____ 15. Pharming o. used to record the keystrokes done by the user

C. Give 5 tips to help you stay safe when using the internet.

1.

2.

3.

5.

S-ar putea să vă placă și