POST TEST
POST TEST
ICT Technologies
ROMEL JASON F. BIBOSO, MIT
POST - TEST
MULTIPLE CHOICE
1. It happens when someone intentionally abused,
harass, and mistreated by other person using
electronic communication.
A. Malware C. Worm
A. Rootkit C. Malware
B. Botnet D. Adware
9. A collection of infected internet–
connected devices such as PC and
mobile phone that are controlled by a
common type of malware.
A. Malware C. Worm
B. Botnet D. Adware
12. A cyberattack method using
deceptive emails and websites to
acquiring sensitive personal
information.
A. Adware C. Keylogger
B. Cybercrime D.
Phishing
13. Also known as junk email or
unwanted email send by advertiser
or bot. It can be used to send
malware.
A. Worm C. Trojan Horse
B. Social Media D.
Semantic Web
18. A reliable source of information
from the internet is
_________________.
A. Convergence C. Mobile
Technologies
B. URL D. HTML
47. Which of the following is an
easy way to navigate slides during
your presentation?
A. Use hyperlinks
B. Flood your slides with text
C. Use a mouse instead of arrow keys
D. Press escape to locate the slides
48. Marco used bullets and short
sentences in his presentation. What
tip in creating an effective
presentation did he apply?
A. Contrast
B. Clarity
C. Consistency
D. Simplicity
49. What external material is best
to use if you want to present the
data on how stock market price
changes over time?
A. Chart
B. Smart Art
C. Clip Art
D. Screenshot
50. Which image compression type
allows you to display images in full
color just like in digital pictures?
A. .bmp
A. .gif
C. .jpg
D. .png