A) False B) True
A) Web 3.0 B) Web C) Web 2.0 D) Web 1.0
A) Culture practiced only in face-to-face meetings B) Behavior and interactions within online and digital communities C) •Traditions passed through handwritten letters
A) Network Attack B) DOS & DDOS Attack C) Wi-Fi Eavesdropping
A) Web 2.0 B) Web C) Web 3.0 D) Web 1.0
A) True B) False
A) True B) False
A) Online posts are often permanent and can impact your reputation. B) Posts can't be deleted. C) It's a legal requirement. D) You might lose followers.
A) Browser B) Internet C) Web
A) True B) False
A) Giving users free file backup B) Locking or encrypting files and demanding payment C) Speeding up a device after updates
A) Malicious software that harms or infiltrates systems B) A legal tool for updating software C) A program used only for games
A) Fosters Positive Online Communities B) Professional Reputation C) Promotes Respectful Communication
A) 1994 B) Late 1990-2000 C) Mid-1990
A) 1990 B) 1989 C) 1991
A) Advanced Research Projects Agency B) Agency Research Projects Advanced C) Advanced Reserve Projects Agency D) Agency Reserve Projects Advanced
A) True B) False
A) False B) True
A) It's unprofessional in all settings. B) Humor reduces the seriousness of digital communication. C) Tone is easily misinterpreted in text-only communication. D) People might not find your joke funny.
A) Repeatedly sending online threats or intimidating messages B) Sending a single email greeting C) Asking for feedback in an online survey
A) "Interesting point—have you considered this alternative explanation?" B) No response is needed unless you're the instructor. C) "You're wrong. That's not how it works." D) "That's dumb."
A) Regular use of social media B) Unauthorized access or manipulation of systems or networks C) Authorized repair of computer hardware
A) It helps reduce the number of replies in threads. B) It makes you look polite even when you disagree. C) It's only important in academic settings. D) It promotes a respectful and collaborative online environment.
A) Spam B) Spyware C) Phishing
A) True B) False
A) True B) False
A) 1989 B) 1969 C) 1979
A) Bahala na B) HTTP C) HTML D) Browser
A) Using the same public Wi-Fi network as a stranger. B) Editing or deleting someone else's digital work without explicit permission. C) Offering unsolicited technical advice to a colleague. D) Logging into a group account you also have access to rotate for options
A) False B) True
A) 1996 B) 1976 C) 1986
A) Republic Act 10173 B) Republic Act 9995 C) Republic Act 10175
A) True B) False
A) Web 2.0 B) Web 1.0 C) Web 3.0 D) Web
A) Forward it to your team to delegate it. B) Reply only to the sender with your specific response. C) Respond to everyone with your thoughts. D) Ignore the email.
A) White-Hat Hackers B) Grey-Hat Hackers C) Black-Hat Hackers
A) True B) False
A) White-Hat Hackers B) Grey-Hat Hackers C) Black-Hat Hackers
A) Republic Act 7610 B) Republic Act 10175 C) Republic Act 10173
A) Use it as long as you found it on social media. B) Crop the watermark and use it freely. C) Use it only if it's humorous and not offensive. D) Attribute the creator or ensure it's allowed under copyright or fair use.
A) Activities involving physical machines only B) Offline communication between people C) Anything related to computers, IT, and digital environments
A) 1982 B) 1992 C) 1989
A) Internet B) Web C) Browser
A) 1990 B) 1991 C) 1989
A) True B) False
A) Grey-Hat Hackers B) Black-Hat Hackers C) White-Hat Hackers
A) HTTP B) HTML C) Ewan D) Hyperlink
A) Transfer Control Protocol B) Transmission Control Protocol C) Transmit Control Protocol
A) Illegal activities done using computers, networks, or the internet B) Legal online activities done with government approval C) Any activity done offline without digital tools
A) Stealing and using someone else's personal information B) Creating your own secure digital identity C) Changing your username for privacy
A) Offline communication between people B) Activities involving physical machines only ) C) Anything related to computers, IT, and digital environments
A) 1990 B) 2010 C) 2000 D) 1989
A) Ethics B) Netiquette C) Network
A) News Website B) Educational Website C) Personal Website D) Ewan
A) True B) False
A) True B) False
A) Trojan Horse B) Worm C) Spam
A) Sharing screenshots of a private message for transparency. B) Copy-pasting a friend's comment into a public post. C) Forwarding emails to colleagues without checking with the sender. D) Asking for permission before sharing someone else's content.
A) It helps users compare product prices B) It gives discounts to online buyers C) It deceives people online for financial gain
A) A website is overloaded with traffic until it becomes unavailable B) A website is improved to load faster C) A website is redesigned for aesthetics
A) Malicious software that harms or infiltrates systems B) A program used only for games C) A legal tool for updating software
A) Fosters Positive Online Communities B) Enhances Online Safety C) Promotes Respectful Communication
A) Tim Berners-Lee B) Tim Burners-Lee C) Tim Birners-Lee
A) To trick victims into giving sensitive information B) To teach users how to make strong passwords C) To upgrade someone's internet speed |