A) True B) False
A) Web 3.0 B) Web 1.0 C) Web D) Web 2.0
A) Culture practiced only in face-to-face meetings B) Behavior and interactions within online and digital communities C) •Traditions passed through handwritten letters
A) Wi-Fi Eavesdropping B) DOS & DDOS Attack C) Network Attack
A) Web 3.0 B) Web 1.0 C) Web 2.0 D) Web
A) True B) False
A) True B) False
A) Posts can't be deleted. B) You might lose followers. C) It's a legal requirement. D) Online posts are often permanent and can impact your reputation.
A) Browser B) Web C) Internet
A) True B) False
A) Locking or encrypting files and demanding payment B) Giving users free file backup C) Speeding up a device after updates
A) Malicious software that harms or infiltrates systems B) A program used only for games C) A legal tool for updating software
A) Fosters Positive Online Communities B) Promotes Respectful Communication C) Professional Reputation
A) 1994 B) Late 1990-2000 C) Mid-1990
A) 1990 B) 1989 C) 1991
A) Advanced Research Projects Agency B) Agency Research Projects Advanced C) Agency Reserve Projects Advanced D) Advanced Reserve Projects Agency
A) False B) True
A) False B) True
A) It's unprofessional in all settings. B) Tone is easily misinterpreted in text-only communication. C) People might not find your joke funny. D) Humor reduces the seriousness of digital communication.
A) Asking for feedback in an online survey B) Repeatedly sending online threats or intimidating messages C) Sending a single email greeting
A) "Interesting point—have you considered this alternative explanation?" B) "That's dumb." C) No response is needed unless you're the instructor. D) "You're wrong. That's not how it works."
A) Regular use of social media B) Unauthorized access or manipulation of systems or networks C) Authorized repair of computer hardware
A) It helps reduce the number of replies in threads. B) It makes you look polite even when you disagree. C) It promotes a respectful and collaborative online environment. D) It's only important in academic settings.
A) Spyware B) Spam C) Phishing
A) True B) False
A) True B) False
A) 1969 B) 1979 C) 1989
A) HTTP B) Browser C) Bahala na D) HTML
A) Using the same public Wi-Fi network as a stranger. B) Offering unsolicited technical advice to a colleague. C) Editing or deleting someone else's digital work without explicit permission. D) Logging into a group account you also have access to rotate for options
A) True B) False
A) 1976 B) 1986 C) 1996
A) Republic Act 9995 B) Republic Act 10175 C) Republic Act 10173
A) True B) False
A) Web 2.0 B) Web 1.0 C) Web D) Web 3.0
A) Reply only to the sender with your specific response. B) Forward it to your team to delegate it. C) Ignore the email. D) Respond to everyone with your thoughts.
A) Grey-Hat Hackers B) Black-Hat Hackers C) White-Hat Hackers
A) True B) False
A) White-Hat Hackers B) Grey-Hat Hackers C) Black-Hat Hackers
A) Republic Act 10173 B) Republic Act 7610 C) Republic Act 10175
A) Crop the watermark and use it freely. B) Use it as long as you found it on social media. C) Attribute the creator or ensure it's allowed under copyright or fair use. D) Use it only if it's humorous and not offensive.
A) Activities involving physical machines only B) Anything related to computers, IT, and digital environments C) Offline communication between people
A) 1989 B) 1982 C) 1992
A) Internet B) Browser C) Web
A) 1989 B) 1991 C) 1990
A) True B) False
A) Grey-Hat Hackers B) White-Hat Hackers C) Black-Hat Hackers
A) Hyperlink B) HTML C) Ewan D) HTTP
A) Transfer Control Protocol B) Transmit Control Protocol C) Transmission Control Protocol
A) Illegal activities done using computers, networks, or the internet B) Any activity done offline without digital tools C) Legal online activities done with government approval
A) Changing your username for privacy B) Stealing and using someone else's personal information C) Creating your own secure digital identity
A) Anything related to computers, IT, and digital environments B) Activities involving physical machines only ) C) Offline communication between people
A) 1989 B) 2000 C) 2010 D) 1990
A) Ethics B) Network C) Netiquette
A) Ewan B) Personal Website C) News Website D) Educational Website
A) False B) True
A) False B) True
A) Worm B) Spam C) Trojan Horse
A) Asking for permission before sharing someone else's content. B) Sharing screenshots of a private message for transparency. C) Copy-pasting a friend's comment into a public post. D) Forwarding emails to colleagues without checking with the sender.
A) It deceives people online for financial gain B) It helps users compare product prices C) It gives discounts to online buyers
A) A website is redesigned for aesthetics B) A website is improved to load faster C) A website is overloaded with traffic until it becomes unavailable
A) Malicious software that harms or infiltrates systems B) A legal tool for updating software C) A program used only for games
A) Promotes Respectful Communication B) Enhances Online Safety C) Fosters Positive Online Communities
A) Tim Birners-Lee B) Tim Berners-Lee C) Tim Burners-Lee
A) To upgrade someone's internet speed B) To trick victims into giving sensitive information C) To teach users how to make strong passwords |