1. The document is a quiz about rules of netiquette and the disadvantages of information and communication technology.
2. It asks questions about different cybercrimes committed by individuals and identifies malicious software.
3. It also lists topics to enumerate and terms to define related to proper internet usage and avoiding plagiarism.
1. The document is a quiz about rules of netiquette and the disadvantages of information and communication technology.
2. It asks questions about different cybercrimes committed by individuals and identifies malicious software.
3. It also lists topics to enumerate and terms to define related to proper internet usage and avoiding plagiarism.
1. The document is a quiz about rules of netiquette and the disadvantages of information and communication technology.
2. It asks questions about different cybercrimes committed by individuals and identifies malicious software.
3. It also lists topics to enumerate and terms to define related to proper internet usage and avoiding plagiarism.
1. The document is a quiz about rules of netiquette and the disadvantages of information and communication technology.
2. It asks questions about different cybercrimes committed by individuals and identifies malicious software.
3. It also lists topics to enumerate and terms to define related to proper internet usage and avoiding plagiarism.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1/ 2
Quiz #2: Rules of Netiquette and The Lord hates cheating and delights in
The Disadvantages of ICT
honesty. –Proverbs 11:1 Name: _________________________________ Score: __________ Prepared by RA Original Quiz #2: Rules of Netiquette and I. Situation Analysis. (2points each) The Disadvantages of ICT Directions: Give the correct answer on the blank provided after each question. Name: _________________________________ Score: __________ 1. In the 2018 Elections, Shella Mae, a Sangguniang Kabataan (SK) candidate, delivered her speech in public excellently and gained I. Situation Analysis. (2points each) popularity. A concerned staff revealed that her speech was copied Directions: Give the correct answer on the blank provided after each from a foreign politician without proper citation. What cybercrime question. was committed by Shella Mae? ____________________________ 1. In the 2018 Elections, Shella Mae, a Sangguniang Kabataan (SK) 2. After their break-up, Lloyd sent his ex-girlfriend some of their candidate, delivered her speech in public excellently and gained sensual photos to threaten and damage her reputation. He asked popularity. A concerned staff revealed that her speech was copied her to pay Php 50,000 in exchange of the photos. What cybercrime from a foreign politician without proper citation. What cybercrime was committed by Lloyd? _________________________________ was committed by Shella Mae? ____________________________ 3. Maricar, a computer expert, asked her seven-year old sister to dress 2. After their break-up, Lloyd sent his ex-girlfriend some of their off and dance while she is taking a video of her sister. She sent the sensual photos to threaten and damage her reputation. He asked video to her clients and asked them to pay her online. What her to pay Php 50,000 in exchange of the photos. What cybercrime cybercrime was committed by Maricar? ______________________ was committed by Lloyd? _________________________________ 4. Kim opened a website and an advertisement on a slimming tea 3. Maricar, a computer expert, asked her seven-year old sister to dress pops-up. Upon clicking, a virus was transferred to the computer. off and dance while she is taking a video of her sister. She sent the What malicious software was it? ___________________________ video to her clients and asked them to pay her online. What 5. Iran forgot that his essay for his Em-Tech class will due tomorrow. cybercrime was committed by Maricar? ______________________ He decided to research an essay related to the topic and submit it 4. Kim opened a website and an advertisement on a slimming tea for convenience. What crime was he committed? ______________ pops-up. Upon clicking, a virus was transferred to the computer. What malicious software was it? ___________________________ II. Enumeration. 5. Iran forgot that his essay for his Em-Tech class will due tomorrow. Directions: Enumerate the following. He decided to research an essay related to the topic and submit it 10—13. Four ICT tools useful in research for convenience. What crime was he committed? ______________ 14—19. Six ways to avoid Plagiarism 20—29. Ten Cybercrimes by Stephen Nale III. Enumeration. 30—32. Internet Threats Directions: Enumerate the following. 10—13. Four ICT tools useful in research III. Identification. 14—19. Six ways to avoid Plagiarism Directions: Give the meaning of the abbreviated words. 20—29. Ten Cybercrimes by Stephen Nale 33. MLA- 30—32. Internet Threats 34. APA- 35. Malware- III. Identification. Directions: Give the meaning of the abbreviated words. IV. Essay. (5 points each) 33. MLA- Directions: Answer each item in 10-sentences. 34. APA- 1. How can you help prevent or at least mitigate the occurrence of the 35. Malware- internet threats? _______________________________________________________ IV. Essay. (5 points each) _______________________________________________________ Directions: Answer each item in 10-sentences. _______________________________________________________ 1. How can you help prevent or at least mitigate the occurrence of the _______________________________________________________ internet threats? _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ 2. How does social networking help you in your daily life? _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ 2. How does social networking help you in your daily life? _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________