Page 1
ICCT Colleges Foundation, Inc.
V.V. Soliven Avenue II, Cainta, Rizal
Senior High School
A.Y. 2017 – 2018
MIDTERM EXAMINATION
MEDIA AND INFORMATION TECHNOLOGY
General Directions:
 Read and understand each statement carefully.
 Indicate your answer on the TEST BOOKLET
 Avoid erasures.
 Use black or blue pen only.
I. Write H if the first statement is true and second is false. Write M if the first statement is false and the
statement is true. Write I if the twostatements are both true. Write L if the both statements are false.
1. A. Code is a system of signs, put together to create meaning.
B. Conventions are habits or long accepted ways of doing things.
2. A. Read is to analyze for meaning.
B. Representation is based upon what the product does and who it is for.
3. A. Fad is the money earned by brand name.
B. Jingle is the verse or song that repeats sounds or has a catchy rhythm.
4. A. Cyber relationship addiction is the compulsive use of internet photography and adult fantasy role play
sites impacting negatively on real life intimate relationship.
B. Cyber addiction to social networking and messaging to the point where virtual becomes more
important than real life relationship.
5. A. Cyber bullying is the use of information technology to harm or to harass other people in deliberate,
repeated and hostile manner.
B. Digital divide is an economic and social inequality according to categories of persons in a given
population in their access.
6. A. Massive open online course is an online course aimed at unlimited participation and open access via
web.
B. Crowdsourcing simply means telling people that you might reach for opinions.
7. A. Augmented reality is a technique which enables three dimensional images to be made.
B. Augmented reality is a live direct or indirect view of a physical, real world environment whose
elements are presented by computer generated sensors.
8. A. Media literacy means understanding and using the media of mass communication in a proactive,
non-passive, and assertive ways.
B. Information literacy refers to a set of characteristics that transform an ordinary student into wise
information owner, and lifelong learner.
9. A. People media is a good source of current news and events which broadens social consciousness.
B. Print media is the primary tool of transferring knowledge and information.
10. A. Radio media is a powerful mass medium used in education.
B. TV media is the medium that uses the television set to present information.
II. Identification. Choose your answer inside the box.
1. It is the cybercrime prevention act of 2012 which is a law in the Philippines approved on September 12, 2012
which aims to address legal issues concerning online interactions and the internet.
2. It is relating to or involving computer networks such as the internet.
3. It refers to the virtual computer world, and more specifically, is an electronic medium used to form a global
computer networks to facilitate online communication.
4. It refers to the criminal activities carried out by means of computers or the internet.
5. It is the use of electronic communications to bully a person, typically by sending messages of an intimidating
or threatening nature.
6. It refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is
considered to be outside of the creator’s original objective.
REPUBLICACTNO.10175 REPUBLICACTNO.11275 INTELLIGENT ROUTING DEVICESCYBER
CONTEXTUAL AWARENESS CYBER SPACE HAPTICS TECHNOLOGY CYBER CRIME
HAPTICS CYBER BULLYING NETIQUETTEHACKING VIRTUAL SELFPHISHING
PLAGIARISM ILLEGAL DOWNLOADING INFRINGEMENT IDENTITY THEFT COPYRIGHT
CYBER DEFAMATION CHILDPORNOGRAPHY
Page 2
7. It is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, and
indirectly money, often for malicious reasons, by distinguishing as a trustworthy entity in an electronic
communication.
8. It refers to obtaining files that you do not have the right to use from the internet.
9. It is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain
credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss.
10. It is unprivileged false statement of fact which tends to harm the reputation of a person or a company.
11. It is a form of child sexual exploitation.
12. It is a legal device that gives the creator of a literary, artistic, musical, or other creative work that solely right
to publish and sell that work.
13. Violation of a copyright is called?
14. It is an act of instance of using or closely imitating the language and thoughts of another author without
authorization; the representation of that author’s work as one’s own , as by not crediting the original author.
15. It is the persona you create about yourself virtually.
16. It is the correct or acceptable way of communicating on the internet.
17. It is the science of applying touch (tactile) sensation and control to interaction with computer applications.
18. It is a feedback technology, using computer applications, that takes advantage of the user’s sense of touch by
applying force, vibrations and/or motions to the user.
19. It is by combining hard sensor information such as where you are and the conditions around you, combined
with soft sensors such as your calendar, your social network and past preferences, and future devices will
constantly learn about who you are and how you live, work and play.
20. It is the future technology will be useful to, for example, local councils. While on the move, staff will be able
to provide the precise description and location of a street-based issue using smartphones.
III. Choose the letter of the correct answer.
1. These are common interpretations of people on things around them.
A. Conventions B. Codes C. Both A and B D. None of these
2. The following are the categories of codes except:
A. Oral B. Symbolic C. Written D. Technical
3. A payment made to an author or composer for each copy of a work sold or to an inventor for each article sold
under patent.
A. Copyright
B. Fair use
C. Intellectual property
D. Royalty
4. The use of information technology to harm or to harass other people in deliberate, repeated, and hostile
manner.
A. Bashing
B. Cyber bullying
C. Internet addiction
D. Gossip
5. Different companies send representatives to accept job application usually held in a big mall or a university.
A. Job fair
B. Job ads
C. Job site
D. Job opportunity
6. This government office records the population of the Philippines, which include birthdate, marriage, and
death date.
A. Government Service Insurance System
B. National Bureau of Investigation
C. National Statistics Office
D. Social Security System
7. is a brand new trend where people are given the convenience of literally wearing their gadgets
for multiple purposes.
A. Gadget care
B. Wearable
C. Interconnectivity
D. High tech clothing
8. Diana Obinger, President and CEO of EDUCAUSE, says MOOCs go beyond information giving and seeking, thus,
it elevates to ______________.
A. Interaction
B. Connectedness
C. Opportunities
D. None
9. An individual who knows how to use the different computer applications is called____________.
A. Computer literate
B. Educated
C. Intelligent
D. Skilled
10. A computer literate individual appreciates the convenience of ___________ in preparing letters, reports, and
researches.
A. Encoding
B. Decoding
C. Typing
D. Word processing
III. Enumeration.
1-5. Types of cybersex addicted user.
6-10. Techniques on hacking.

More Related Content

PDF
Q3 G11 Empowerment Technologies Module 2.pdf
PDF
Q3 G11 Empowerment Technologies Module 1.pdf
PDF
Final reflection digital citizenship
PPTX
The 9 elements of digital citizenship
PPT
Misuse of Internet
KEY
Digital Citizenship & Media Literacy
PDF
Globalcompose.com sample essay paper on cyber ethics
PPTX
The disadvantages of ict
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 1.pdf
Final reflection digital citizenship
The 9 elements of digital citizenship
Misuse of Internet
Digital Citizenship & Media Literacy
Globalcompose.com sample essay paper on cyber ethics
The disadvantages of ict

What's hot (19)

PPTX
Introduction to ICT (Web 1.0 and Web 2.0)
PPT
Digital citizenship basics
PPTX
Digital Citizenship Powerpoint 1
PPTX
LESSON 1, 2 & 3-ETECH 1S
DOCX
empowerment technology speech "The Higher Technology for Human Being"
PPT
Digital Citizenship: Responsible Behavior in a Digital World
DOCX
PPT
Cyber Ethics
PPTX
Internet presentation
PPTX
Digital citizenship lesson 1
PPTX
Ethics in Cyber Space
PPTX
Introduction to-internet-n-emails
DOC
Advantages and disantvantages of internet
PPTX
advantages and disadvantages of internet
PPTX
How the internet aids communication
PPT
Digital Citizenship
PPTX
Nine elements of digital citizenship
PPTX
Misuse of social media
PPTX
Internet.Presentation
Introduction to ICT (Web 1.0 and Web 2.0)
Digital citizenship basics
Digital Citizenship Powerpoint 1
LESSON 1, 2 & 3-ETECH 1S
empowerment technology speech "The Higher Technology for Human Being"
Digital Citizenship: Responsible Behavior in a Digital World
Cyber Ethics
Internet presentation
Digital citizenship lesson 1
Ethics in Cyber Space
Introduction to-internet-n-emails
Advantages and disantvantages of internet
advantages and disadvantages of internet
How the internet aids communication
Digital Citizenship
Nine elements of digital citizenship
Misuse of social media
Internet.Presentation
Ad

Similar to Hm122 midterm-exam-media (20)

PPTX
1 MODULE 7 MEDIA AND INFORMATION LITERACY
DOCX
quiz 100 items
PPTX
Media and Information Literacy lesson 7-8.pptx
DOCX
Cyber ethics
PPTX
Lesson1.pptx
DOCX
WEK-9-16.docxasdasdasdasdasdasdasdasdasdasdadsdasdas
PPTX
digital-citizenship-empowerment-technology-secondquarter.pptx
PPTX
The-Current-State-of-ICT-Empowerment Technology.pptx
PPTX
Social media (sanju)
PPTX
MEDIA INFORMATION LITERACY GRADE 12.pptx
PPTX
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
PPTX
MEDIA INFORMATION LITERACY FOR (1).pptx
DOCX
Reviewer make it private because it's nee
PPTX
MIL_Q1_M6_Intellectual-Property-Guidelines.pptx
PPTX
EMPOWERMENT TECHNOLOGIES.pptx
PPTX
Introduction to empowerment technology and rules of netiquette.pptx
PPTX
1_Q1-Emp-Technology.pptxThe document discusses the use of multimedia in diffe...
PPTX
EMPOWERMENT TECHNOLOGIES.
PPTX
MIL-WEEK-7-LEGAL-AND-ETHICAL-AND-SOCIETAL-ISSUES-IN-MEDIA-AND-INFORMATION.pptx
PPTX
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
1 MODULE 7 MEDIA AND INFORMATION LITERACY
quiz 100 items
Media and Information Literacy lesson 7-8.pptx
Cyber ethics
Lesson1.pptx
WEK-9-16.docxasdasdasdasdasdasdasdasdasdasdadsdasdas
digital-citizenship-empowerment-technology-secondquarter.pptx
The-Current-State-of-ICT-Empowerment Technology.pptx
Social media (sanju)
MEDIA INFORMATION LITERACY GRADE 12.pptx
Week 1. Opportunities, Challenges and Power of Media and Information [Autosav...
MEDIA INFORMATION LITERACY FOR (1).pptx
Reviewer make it private because it's nee
MIL_Q1_M6_Intellectual-Property-Guidelines.pptx
EMPOWERMENT TECHNOLOGIES.pptx
Introduction to empowerment technology and rules of netiquette.pptx
1_Q1-Emp-Technology.pptxThe document discusses the use of multimedia in diffe...
EMPOWERMENT TECHNOLOGIES.
MIL-WEEK-7-LEGAL-AND-ETHICAL-AND-SOCIETAL-ISSUES-IN-MEDIA-AND-INFORMATION.pptx
PCK-6-MODULE-9.pptx Digital/ Cyber Literacy
Ad

More from ICCT foundation inc (20)

DOCX
Hm122 prelim exam-media
DOCX
Chapter 2-types of media
DOCX
Chapter 6 media codes and convention
DOCX
Chapter 8.legal. opportunities
DOCX
Chapter 9 current trends
DOCX
Chapter 11 people media
DOCX
Chapter 10 meida
DOCX
Question aire hackcing.bullly,
PPTX
Comic sample
PPTX
Shooting star
PPTX
Ppt animation-trigger
DOCX
A long quiz
DOCX
Q1= anwer key
DOCX
DOCX
Hand out of lesson
DOCX
A long quiz
PPTX
Custom animation
PPTX
Cross word puzzle.
PPTX
Ppt 2007 lesson mhs
Hm122 prelim exam-media
Chapter 2-types of media
Chapter 6 media codes and convention
Chapter 8.legal. opportunities
Chapter 9 current trends
Chapter 11 people media
Chapter 10 meida
Question aire hackcing.bullly,
Comic sample
Shooting star
Ppt animation-trigger
A long quiz
Q1= anwer key
Hand out of lesson
A long quiz
Custom animation
Cross word puzzle.
Ppt 2007 lesson mhs

Recently uploaded (20)

PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
HVAC Specification 2024 according to central public works department
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Education and Perspectives of Education.pptx
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
International_Financial_Reporting_Standa.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
English Textual Question & Ans (12th Class).pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
advance database management system book.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Race Reva University – Shaping Future Leaders in Artificial Intelligence
HVAC Specification 2024 according to central public works department
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Education and Perspectives of Education.pptx
AI-driven educational solutions for real-life interventions in the Philippine...
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
International_Financial_Reporting_Standa.pdf
Introduction to pro and eukaryotes and differences.pptx
Virtual and Augmented Reality in Current Scenario
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
English Textual Question & Ans (12th Class).pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
advance database management system book.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf

Hm122 midterm-exam-media

  • 1. Page 1 ICCT Colleges Foundation, Inc. V.V. Soliven Avenue II, Cainta, Rizal Senior High School A.Y. 2017 – 2018 MIDTERM EXAMINATION MEDIA AND INFORMATION TECHNOLOGY General Directions:  Read and understand each statement carefully.  Indicate your answer on the TEST BOOKLET  Avoid erasures.  Use black or blue pen only. I. Write H if the first statement is true and second is false. Write M if the first statement is false and the statement is true. Write I if the twostatements are both true. Write L if the both statements are false. 1. A. Code is a system of signs, put together to create meaning. B. Conventions are habits or long accepted ways of doing things. 2. A. Read is to analyze for meaning. B. Representation is based upon what the product does and who it is for. 3. A. Fad is the money earned by brand name. B. Jingle is the verse or song that repeats sounds or has a catchy rhythm. 4. A. Cyber relationship addiction is the compulsive use of internet photography and adult fantasy role play sites impacting negatively on real life intimate relationship. B. Cyber addiction to social networking and messaging to the point where virtual becomes more important than real life relationship. 5. A. Cyber bullying is the use of information technology to harm or to harass other people in deliberate, repeated and hostile manner. B. Digital divide is an economic and social inequality according to categories of persons in a given population in their access. 6. A. Massive open online course is an online course aimed at unlimited participation and open access via web. B. Crowdsourcing simply means telling people that you might reach for opinions. 7. A. Augmented reality is a technique which enables three dimensional images to be made. B. Augmented reality is a live direct or indirect view of a physical, real world environment whose elements are presented by computer generated sensors. 8. A. Media literacy means understanding and using the media of mass communication in a proactive, non-passive, and assertive ways. B. Information literacy refers to a set of characteristics that transform an ordinary student into wise information owner, and lifelong learner. 9. A. People media is a good source of current news and events which broadens social consciousness. B. Print media is the primary tool of transferring knowledge and information. 10. A. Radio media is a powerful mass medium used in education. B. TV media is the medium that uses the television set to present information. II. Identification. Choose your answer inside the box. 1. It is the cybercrime prevention act of 2012 which is a law in the Philippines approved on September 12, 2012 which aims to address legal issues concerning online interactions and the internet. 2. It is relating to or involving computer networks such as the internet. 3. It refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer networks to facilitate online communication. 4. It refers to the criminal activities carried out by means of computers or the internet. 5. It is the use of electronic communications to bully a person, typically by sending messages of an intimidating or threatening nature. 6. It refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. REPUBLICACTNO.10175 REPUBLICACTNO.11275 INTELLIGENT ROUTING DEVICESCYBER CONTEXTUAL AWARENESS CYBER SPACE HAPTICS TECHNOLOGY CYBER CRIME HAPTICS CYBER BULLYING NETIQUETTEHACKING VIRTUAL SELFPHISHING PLAGIARISM ILLEGAL DOWNLOADING INFRINGEMENT IDENTITY THEFT COPYRIGHT CYBER DEFAMATION CHILDPORNOGRAPHY
  • 2. Page 2 7. It is the attempt to obtain sensitive information such as usernames, passwords, and credit card details, and indirectly money, often for malicious reasons, by distinguishing as a trustworthy entity in an electronic communication. 8. It refers to obtaining files that you do not have the right to use from the internet. 9. It is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name, and perhaps to the other person’s disadvantage or loss. 10. It is unprivileged false statement of fact which tends to harm the reputation of a person or a company. 11. It is a form of child sexual exploitation. 12. It is a legal device that gives the creator of a literary, artistic, musical, or other creative work that solely right to publish and sell that work. 13. Violation of a copyright is called? 14. It is an act of instance of using or closely imitating the language and thoughts of another author without authorization; the representation of that author’s work as one’s own , as by not crediting the original author. 15. It is the persona you create about yourself virtually. 16. It is the correct or acceptable way of communicating on the internet. 17. It is the science of applying touch (tactile) sensation and control to interaction with computer applications. 18. It is a feedback technology, using computer applications, that takes advantage of the user’s sense of touch by applying force, vibrations and/or motions to the user. 19. It is by combining hard sensor information such as where you are and the conditions around you, combined with soft sensors such as your calendar, your social network and past preferences, and future devices will constantly learn about who you are and how you live, work and play. 20. It is the future technology will be useful to, for example, local councils. While on the move, staff will be able to provide the precise description and location of a street-based issue using smartphones. III. Choose the letter of the correct answer. 1. These are common interpretations of people on things around them. A. Conventions B. Codes C. Both A and B D. None of these 2. The following are the categories of codes except: A. Oral B. Symbolic C. Written D. Technical 3. A payment made to an author or composer for each copy of a work sold or to an inventor for each article sold under patent. A. Copyright B. Fair use C. Intellectual property D. Royalty 4. The use of information technology to harm or to harass other people in deliberate, repeated, and hostile manner. A. Bashing B. Cyber bullying C. Internet addiction D. Gossip 5. Different companies send representatives to accept job application usually held in a big mall or a university. A. Job fair B. Job ads C. Job site D. Job opportunity 6. This government office records the population of the Philippines, which include birthdate, marriage, and death date. A. Government Service Insurance System B. National Bureau of Investigation C. National Statistics Office D. Social Security System 7. is a brand new trend where people are given the convenience of literally wearing their gadgets for multiple purposes. A. Gadget care B. Wearable C. Interconnectivity D. High tech clothing 8. Diana Obinger, President and CEO of EDUCAUSE, says MOOCs go beyond information giving and seeking, thus, it elevates to ______________. A. Interaction B. Connectedness C. Opportunities D. None 9. An individual who knows how to use the different computer applications is called____________. A. Computer literate B. Educated C. Intelligent D. Skilled 10. A computer literate individual appreciates the convenience of ___________ in preparing letters, reports, and researches. A. Encoding B. Decoding C. Typing D. Word processing III. Enumeration. 1-5. Types of cybersex addicted user. 6-10. Techniques on hacking.