Académique Documents
Professionnel Documents
Culture Documents
DEPARTMENT OF EDUCATION
Region IV-A CALABARZON
Division of Biňan
BINAN CITY SENIOR HIGH SCHOOL
Barangay San Antonio, Binan, Laguna
EMPOWERMENT TECHNOLOGY
1. Business A wanted to boost its social media follower. You were assigned to launch a social media campaign about the company’s
product. In order to do that you contacted the site to pay for an advertisement slot. That is considered as?
2. Website operators use this to determine the visitor’s demographic and the time and day they usually log in.
3. As an Empowerment Technology student, you were assigned to do a social media campaign about your advocacy against
“Cyberbullying”. To fully utilize the potential of the site you mention all your Facebook friends in the post and share it to different
pages. This type of reach is called?
4. You were tasked to conceptualize a social media campaign. Your teacher will play the role of the sponsor and you have to convince him
or her that your project is worth your time and effort. You will need to present this type of document to convince him or her to approve
your program.
5. The internet will give you plenty of options in gathering your audience’s feedback. One of the easiest way to gather feedback is by using
this program.
6. Allows your site’s visitors to have their say about the site’s strengths and weaknesses.
8. In late 2014, a group of hackers hacked Sony’s website because of the impending release of the controversial film the “The Interview”.
This is considered as what type of cybercrime?
9. The act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to
the email.
10. Before a hacker can get through the unauthorized file he or she is targeting, the hacker has to get through several security measures like
firewalls.
11. Used in combatting cybercrimes to trace hackers. URL tracing and logging are used by websites to track your unique IP addresses.
12. The act of asking something in return of not showing something that could damage someone’s reputation
13. In late 2014, PirateBay was raided for the second time due to years of illegal distribution of movies, music, games, books and other
software. What type of cybercrime is this?
14. The act of devising a scheme wherein a culprit posts an item or service for sale on the internet and once the transactions have been
done, does not really give the item or service.