Sunteți pe pagina 1din 2

Empowerment Technologies

Name:

I. Multiple Choice
1. Jonathan is on hurry. He urges to send the inquiries to his teachers without considering time. The teacher might
be sleeping or resting one moment. If he was not aware of the schedule in sending messages, what core rule of
netiquette was being violated?
A. Rule 6: Share Expert Knowledge.
B. Rule 5: Make yourself look good online.
C. Rule 7: Help Keep Flame Under Control.
D. Rule 4: Respect other people’s time and bandwidths.
2. To avoid cyber bullying, you should always _________.
A. Observe proper netiquette rules
B. Ignore any friend request online
C. Give out personal information to anyone who ask
D. Strike first, post mean things about other people on your wall on Facebook
3. If you got an embarrassing picture from someone you know. You should never _________.
A. Tell your parent or a teacher
B. Talk to the person again
C. Send it to other friends.
D. Discourage the person from sending pictures like that.
4. One such mechanism to protect the creation of human mind is the enactment of R.A 8293 “The Intellectual
Property Code of 1997”. According to this piece of legislation, intellectual property rights consist of the
following EXCEPT?
A. Industrial designs
B. Trademarks and service marks
C. Copyrights and related rights
D. Behavioral indications
5. What happens to the work after the copyright time has passed?
A. It can be bought
B. The work must be destroyed
C. It goes into the public domain
D. There is no time-limit on copyright
II. Identification
6. It is a global wide area network that connects computer systems across the world.
7. Allows users to interact with the page: instead of just reading a page, the user may be able to comment or
create a user account.
8. This features of Web 2.0 allows you to modify what you see in their website when logged on in your social
networking sites
9. This features allows user to subscribe to a software only when needed rather than purchasing them.
10. The synergy of technological advancements to work on a similar goal or task.
11. Sites that allow users to post their own news items or links to other news sources.
12. A nonprofit service designed to help people who have visual and reading impairments.
13. Refers to observing proper etiquette as you engage activities over the internet.
14. A type of offensive action toward another which takes place using electronic technology.
15. Using other people’s words and ideas without clearly acknowledging the source of the information.
16. Provides the opportunity to play games from computer to another device like a PlayStation.
17. Its goal is to acquire sensitive personal information like passwords and credit card details.
18. It is also known as Cybercrime Prevention Act of 2012.
19. The creations of the mind, such as inventions, literary and artistic works, designs and symbols used in
commerce.
20. Unwanted email mostly from bots or advertisers.

III. Enumeration
21 – 25. Types of Plagiarism (Sources Sited)

26 – 28. Feature of Web 2.0

29 – 32. Problems of Web 3.0

33 – 35. Give at least three things on how to avoid plagiarism?

IV. Essay
36 – 40.

Zoro is a full-time college professor in one university in Manila. He is a big fan of the movie “Heneral Luna”.
He sincerely believed that it could serve as an excellent educational video of the history and culture for his college
students. It also espouses love for country and patriotism, which, he feels, today’s youth lack.
He currently handles three classes of around 40 students each. In order to ensure that his students will be
able to watch the film, he obtained an original DVD copy of the film. He therefore planning to hold a film-viewing
class sometime next week in one of the viewing halls of the university. Is he violating any intellectual property
law by showing the film to his students as part of their class curriculum? Explain your answer for at least four
sentences.

S-ar putea să vă placă și