Sie sind auf Seite 1von 4

ICT Test: 2nd Semester Midterms

I. Identification
________________1. Layman’s term: Umbilical cord is connected to your mother’s womb.
________________2. Refers to the process of giving yourself or other people the capacity to
achieve a specific end-goal.
________________3. Collection of techniques, skills, methods, and processes used in the
production of goods or services or in the accomplishments of objectives (such as scientific
investigation).
________________4. May kwenta ba shinare mo?
________________5. Hindi porket nirephrase mo, sa’yo na.
________________6. Pagkakaroon ng end-goal.
________________7. Legal matters.
________________8. You add your own information or understanding to the presented
information.
________________9. Ability to use a digital technology, communication tools, and/or networks
to define an information need, access, manage, integrate and evaluate information, create new
information or knowledge and be able to communicate this information to others.
________________10. Deals with the use of different communication technologies such as
mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
________________11. Created the internet or World Wide Web (WWW) by using unifrom
Resource Locator (URL).
________________12. When did he create Web 1.0- Crawl
________________13. Documents which are formatted and annottated using HDML or other
web resources (unique fingerprints).
________________14. Are the first computers used by the military during World War II.
________________15. The content users see are the same.
________________16. Read-only web.
________________17. No design.
________________18. Who created the Web 2.0- Walk?
________________19. Co-create and create own content.
________________20. Different profile pictures, ability to upload. Bloggers.
________________21. When?
________________22. “Read-Write Web, Web of interaction, or Participative Web”
________________23. Allowed users to interact and collaborate with each other through social
media dialogue.
________________24. Feature that allows user to categorize and classify/arrange information
using freely chosen keywords (E.g. Tagging).
________________25. Importance of Folksonomy.
________________26. Main idea is the user’s ability to modify user interface (E.g. Background)
________________27. Content is dynamic and is responsive to user’s input.
________________28. Time purchase.
________________29. What is the importance of Long Tail?
________________30. Services are offered on demand rather than on a one-time purchase.
________________31. What is the importance of User Participation?
________________32. The owner of the website is not the only one who is able to put content.
________________33. E.g. Amazon
________________34. Users will be able to subscribe to a software only when needed rather
than purchasing them.
________________35. Rent the software for minimum fee. (other cracks)
________________36. Give an example of Software as a Service
________________37. Importance: various culture.
________________38. Content is based on the culture of the people.
________________39. A diverse information sharing through universal web access.
________________40. What type of web is Web 3.0- RUN?
________________41. Aim:Understand the user's preference.
________________42. Worked as a personal assistant.
________________43. Advertising in which it is based on the behavior of the user.
________________44. HTML files and current web browsers could not support Web 3.0.
________________45. User's security is also in question since the machine is saving his or her
preferences.
________________46. WWW already contains billions of web pages.
________________47. Certain words are imprecise. The words "old" and "small" would depend
on the user.
________________48. Since machine uses logic, there are certain limitations for a computer to
be able to predict what the user is referring to at a given time.
________________49. A synergy of technological advancement to work on a similar goal or
task.
________________50. A website, application, or online channel that enables web users to
create, co-create, discuss, modify, and exchange user-generated content.
________________51. Sites that allow you to connect with other people with the same interests
or background.
________________52. To store and manage links of favorite websites.
________________53. Are websites that allow you to post news.
________________54. Share images, videos, and music.
________________55. Short updates from websites that allow you to post own contents.
________________56. Site where you can only give opinions and comments.
________________57. Site that, in addition, can do Q&As at the same thread.
________________58. Form of technology that's mostly used in cellular.
________________59. Help people with impairment.
________________60. Nonprofit service designed to help people who have visual and reading
impairments.
________________61. Internet+Etiquette
________________62. Disease; You think someone texted or you felt your phone vibrated but
in reality, it didn’t.
________________63. Malicious software. (Shortcut term, first of the internet threats)
________________64. Designed to replicate itself and transfer itself from one computer to
another.
________________65. Virus can transfer itself via (2 possible answers)
________________66. Replicates itself and transfers from one computer to another by any
means. (Clue for realizing: Many files of copies)
________________67. Once downloaded, can leave computer unprotected.
________________68. A malware that happens when you download an app.
________________69. Disguises itself as a useful program.
________________70. A program that runs in the background of your computer (w/o you
knowing it).
________________71. How to fix the problem stated above?
________________72. Once connected to a network, you get ads.
________________73. Designed to send advertisement in the form of pop-ups.
________________74. An internet threat where malware can start.
________________75. Unwanted mail, mostly from bots or advertisers.
________________76. They acquire sensitive information like passwords and credit card
details. (Aim: Get perseonal info)
________________77. A variant other than phising, only difference is that when clicked,
immediately starts. (Aim: Get information immediately)
________________78. What should you be good at to avoid plagiarising?
________________79. True or false: Quoting is different from referencing.

II. Explain and give examples.


1. Give examples of how you can empower yourself or others. Site situations.

2. Explain the Competencies for Info Literacy.

3. Explain the characteristics of Web 1.0.


4. Explain the characteristic of Web 2.0.

5. What are the fifteen (15) rules on how to be safe online?


Hints: 1. Bmowysawsysit
2. Dnjatac
3. Cotpppoaw
4. Ktsfotsnsyu
5. Dnsypwa
6. Alitpn/w-f
7. Dnttswoof-t-f
8. Afykirl
9. Npaafv
10. Avuw
11. Iauanavsoyc
12. Iyhawah,miapnbaap
13. Ndpfus
14. Bts,dnupo
15. Dnroclfse

6. AVOID PLAGIARISM
Hints: 1. P
2. C
3. Q
4. R

Das könnte Ihnen auch gefallen