Vous êtes sur la page 1sur 1

Kapatagan National High School

Kapatagan Digos City


SY 2017-2018
Name:________________________________________________ Section: ____________

I. True or False: Write true if the statement is true and false if the statement is false.

________1. ICT means Information and communication technology.


________2. ICT encompasses both the internet-enabled sphere as well as the mobile one
powered by wireless networks.
________3. Telecommunications qualifies to be called a part of the ICT.
________4. DERP was the US department that has developed the early internet.
________5. The first stage of the internet’s world wide web was called 1.0
________6. During the web 1.0, the internet was not used as an information portal
________7. Web 2.0 is also known as the old internet.
________8. The current web is known as the web 3.0
________9. News find you is a characteristic of web 2.0
________10. When yahoo and youtube popped up, it was during the web 1.0
________11. Web 3.0 is also known as the semantic web.
________12. The name web 3.0 was coined by John Markoff of the New York times.
________13. All application on web 3.0 on web or mobile can be upgraded

II. Fill in the blanks: Write your answer in the blanks provided.

________1. A software that records the key sequence and strokes of your keyboard into a log
file on your machine
________2. A hacker will try to attack you based on your schedule and when you use a public
wifi hotspot to trick you in using their own wifi so that they’ll have access to you sensitive data.
________3. The aim of this hacking method is to get some information without being identified.
These types of hackers can target email, instant messaging services, phone calls, web browsing,
and other methods of communication.
________4. Hacking technique to take down a site or server by flooding that site or server with
a lot of traffic that the server is unable to process all the requests in the real time and finally
crashes down.
________5. Malicious software programs which get installed into the victim’s system and keeps
sending the victims data to the hacker..
________6. A hacking technique using which a hacker replicates the most-accessed sites and
traps the victim by sending that spoofed link.
________7. John has managed to win the lottery based on the number of his birthday and the
block lot of where he lives now. Now every decision he makes are all based on these facts as he
has decided that the universe somehow has decided for him that these were the magic
numbers.
________8. Revan has not changed prices since his bakery has started as he has fully
remembered that these prices are what makes his business successful.
________9. After making the wrong decision, John believes that he could have made the
correct one.
________10. Luke knows that the outcome and therefore has made the right decision every
time.
III. Essay: Answer briefly and Concisely
1. What makes you think is the reason that an organization chart exists? For what reason
does making a chart makes it useful for an organization? (5 points)
2. Why is it a good idea to delegate when in an organization?

Vous aimerez peut-être aussi