Vous êtes sur la page 1sur 1

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region IV-A CALABARZON
Division of Biňan
BINAN CITY SENIOR HIGH SCHOOL
Barangay San Antonio, Binan, Laguna

EMPOWERMENT TECHNOLOGY

1. Business A wanted to boost its social media follower. You were assigned to launch a social media campaign about the company’s
product. In order to do that you contacted the site to pay for an advertisement slot. That is considered as?

a. Reach b. organic c. paid d. shared post

2. Website operators use this to determine the visitor’s demographic and the time and day they usually log in.

a. Website statistics b. insights c. page visitors d. page settings

3. As an Empowerment Technology student, you were assigned to do a social media campaign about your advocacy against
“Cyberbullying”. To fully utilize the potential of the site you mention all your Facebook friends in the post and share it to different
pages. This type of reach is called?

a. Organic b. paid c. shared post d. reach

4. You were tasked to conceptualize a social media campaign. Your teacher will play the role of the sponsor and you have to convince him
or her that your project is worth your time and effort. You will need to present this type of document to convince him or her to approve
your program.

a. Concept paper b. project proposal c. thesis d. feasibility study

5. The internet will give you plenty of options in gathering your audience’s feedback. One of the easiest way to gather feedback is by using
this program.

a. Weebly b. Google Drive c. dropbox d. Google Form

6. Allows your site’s visitors to have their say about the site’s strengths and weaknesses.

a. Google form b. Comments c. feedback d. reaction

7. It is an email service that automatically put suspicious emails to a different folder.

a. Drafts b. spam folder c. inbox d. outbox

8. In late 2014, a group of hackers hacked Sony’s website because of the impending release of the controversial film the “The Interview”.
This is considered as what type of cybercrime?

a. Phising b. extortion c. accessing stored communication d. blackmail

9. The act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to
the email.

a. Sports betting b. extortion c. phising d. accessing stored communications

10. Before a hacker can get through the unauthorized file he or she is targeting, the hacker has to get through several security measures like
firewalls.

a. Investigation b. network security c. penalties d. tracker

11. Used in combatting cybercrimes to trace hackers. URL tracing and logging are used by websites to track your unique IP addresses.

a. Network security b. tracker c. penalties d. investigation

12. The act of asking something in return of not showing something that could damage someone’s reputation

a. Blackmail b. spam c. hacking d. encryption

13. In late 2014, PirateBay was raided for the second time due to years of illegal distribution of movies, music, games, books and other
software. What type of cybercrime is this?

a. Copyright infringement b. spam c. hacking d. spoofing

14. The act of devising a scheme wherein a culprit posts an item or service for sale on the internet and once the transactions have been
done, does not really give the item or service.

a. Drug trafficking b. non-delivery of merchandise c. spoofing d. pharming

15. The following are acts of electronic harassment EXCEPT for?

a. Annoy b. threatens c. praise d. harass

Vous aimerez peut-être aussi