A) True B) False
A) Web B) Web 1.0 C) Web 2.0 D) Web 3.0
A) Culture practiced only in face-to-face meetings B) Behavior and interactions within online and digital communities C) •Traditions passed through handwritten letters
A) Network Attack B) DOS & DDOS Attack C) Wi-Fi Eavesdropping
A) Web 1.0 B) Web 2.0 C) Web 3.0 D) Web
A) False B) True
A) True B) False
A) You might lose followers. B) It's a legal requirement. C) Posts can't be deleted. D) Online posts are often permanent and can impact your reputation.
A) Web B) Internet C) Browser
A) False B) True
A) Locking or encrypting files and demanding payment B) Speeding up a device after updates C) Giving users free file backup
A) Malicious software that harms or infiltrates systems B) A program used only for games C) A legal tool for updating software
A) Promotes Respectful Communication B) Fosters Positive Online Communities C) Professional Reputation
A) Mid-1990 B) Late 1990-2000 C) 1994
A) 1991 B) 1989 C) 1990
A) Agency Research Projects Advanced B) Agency Reserve Projects Advanced C) Advanced Research Projects Agency D) Advanced Reserve Projects Agency
A) True B) False
A) True B) False
A) It's unprofessional in all settings. B) Tone is easily misinterpreted in text-only communication. C) People might not find your joke funny. D) Humor reduces the seriousness of digital communication.
A) Sending a single email greeting B) Asking for feedback in an online survey C) Repeatedly sending online threats or intimidating messages
A) No response is needed unless you're the instructor. B) "Interesting point—have you considered this alternative explanation?" C) "You're wrong. That's not how it works." D) "That's dumb."
A) Unauthorized access or manipulation of systems or networks B) Regular use of social media C) Authorized repair of computer hardware
A) It makes you look polite even when you disagree. B) It's only important in academic settings. C) It helps reduce the number of replies in threads. D) It promotes a respectful and collaborative online environment.
A) Spyware B) Spam C) Phishing
A) True B) False
A) False B) True
A) 1969 B) 1989 C) 1979
A) Bahala na B) HTTP C) HTML D) Browser
A) Offering unsolicited technical advice to a colleague. B) Editing or deleting someone else's digital work without explicit permission. C) Logging into a group account you also have access to rotate for options D) Using the same public Wi-Fi network as a stranger.
A) True B) False
A) 1996 B) 1986 C) 1976
A) Republic Act 10175 B) Republic Act 10173 C) Republic Act 9995
A) False B) True
A) Web 1.0 B) Web 3.0 C) Web D) Web 2.0
A) Respond to everyone with your thoughts. B) Forward it to your team to delegate it. C) Ignore the email. D) Reply only to the sender with your specific response.
A) Grey-Hat Hackers B) White-Hat Hackers C) Black-Hat Hackers
A) True B) False
A) White-Hat Hackers B) Black-Hat Hackers C) Grey-Hat Hackers
A) Republic Act 10175 B) Republic Act 7610 C) Republic Act 10173
A) Use it only if it's humorous and not offensive. B) Attribute the creator or ensure it's allowed under copyright or fair use. C) Use it as long as you found it on social media. D) Crop the watermark and use it freely.
A) Anything related to computers, IT, and digital environments B) Offline communication between people C) Activities involving physical machines only
A) 1982 B) 1989 C) 1992
A) Browser B) Internet C) Web
A) 1990 B) 1991 C) 1989
A) True B) False
A) Grey-Hat Hackers B) White-Hat Hackers C) Black-Hat Hackers
A) Hyperlink B) HTML C) HTTP D) Ewan
A) Transmit Control Protocol B) Transfer Control Protocol C) Transmission Control Protocol
A) Illegal activities done using computers, networks, or the internet B) Legal online activities done with government approval C) Any activity done offline without digital tools
A) Creating your own secure digital identity B) Changing your username for privacy C) Stealing and using someone else's personal information
A) Activities involving physical machines only ) B) Offline communication between people C) Anything related to computers, IT, and digital environments
A) 1990 B) 2000 C) 1989 D) 2010
A) Netiquette B) Ethics C) Network
A) Personal Website B) Ewan C) News Website D) Educational Website
A) True B) False
A) False B) True
A) Spam B) Worm C) Trojan Horse
A) Copy-pasting a friend's comment into a public post. B) Forwarding emails to colleagues without checking with the sender. C) Asking for permission before sharing someone else's content. D) Sharing screenshots of a private message for transparency.
A) It deceives people online for financial gain B) It helps users compare product prices C) It gives discounts to online buyers
A) A website is redesigned for aesthetics B) A website is improved to load faster C) A website is overloaded with traffic until it becomes unavailable
A) A program used only for games B) A legal tool for updating software C) Malicious software that harms or infiltrates systems
A) Promotes Respectful Communication B) Fosters Positive Online Communities C) Enhances Online Safety
A) Tim Burners-Lee B) Tim Berners-Lee C) Tim Birners-Lee
A) To teach users how to make strong passwords B) To upgrade someone's internet speed C) To trick victims into giving sensitive information |