A) False B) True
A) Web 3.0 B) Web 2.0 C) Web D) Web 1.0
A) Culture practiced only in face-to-face meetings B) •Traditions passed through handwritten letters C) Behavior and interactions within online and digital communities
A) DOS & DDOS Attack B) Network Attack C) Wi-Fi Eavesdropping
A) Web 3.0 B) Web C) Web 1.0 D) Web 2.0
A) False B) True
A) False B) True
A) It's a legal requirement. B) Posts can't be deleted. C) Online posts are often permanent and can impact your reputation. D) You might lose followers.
A) Browser B) Internet C) Web
A) True B) False
A) Giving users free file backup B) Locking or encrypting files and demanding payment C) Speeding up a device after updates
A) A program used only for games B) Malicious software that harms or infiltrates systems C) A legal tool for updating software
A) Professional Reputation B) Promotes Respectful Communication C) Fosters Positive Online Communities
A) 1994 B) Mid-1990 C) Late 1990-2000
A) 1990 B) 1989 C) 1991
A) Advanced Research Projects Agency B) Agency Research Projects Advanced C) Advanced Reserve Projects Agency D) Agency Reserve Projects Advanced
A) True B) False
A) True B) False
A) Tone is easily misinterpreted in text-only communication. B) People might not find your joke funny. C) It's unprofessional in all settings. D) Humor reduces the seriousness of digital communication.
A) Sending a single email greeting B) Asking for feedback in an online survey C) Repeatedly sending online threats or intimidating messages
A) "You're wrong. That's not how it works." B) "That's dumb." C) No response is needed unless you're the instructor. D) "Interesting point—have you considered this alternative explanation?"
A) Regular use of social media B) Authorized repair of computer hardware C) Unauthorized access or manipulation of systems or networks
A) It helps reduce the number of replies in threads. B) It's only important in academic settings. C) It makes you look polite even when you disagree. D) It promotes a respectful and collaborative online environment.
A) Phishing B) Spyware C) Spam
A) False B) True
A) True B) False
A) 1979 B) 1989 C) 1969
A) Bahala na B) Browser C) HTTP D) HTML
A) Offering unsolicited technical advice to a colleague. B) Using the same public Wi-Fi network as a stranger. C) Logging into a group account you also have access to rotate for options D) Editing or deleting someone else's digital work without explicit permission.
A) True B) False
A) 1986 B) 1996 C) 1976
A) Republic Act 10175 B) Republic Act 10173 C) Republic Act 9995
A) True B) False
A) Web 2.0 B) Web 3.0 C) Web 1.0 D) Web
A) Reply only to the sender with your specific response. B) Ignore the email. C) Forward it to your team to delegate it. D) Respond to everyone with your thoughts.
A) White-Hat Hackers B) Black-Hat Hackers C) Grey-Hat Hackers
A) True B) False
A) Grey-Hat Hackers B) Black-Hat Hackers C) White-Hat Hackers
A) Republic Act 10175 B) Republic Act 7610 C) Republic Act 10173
A) Use it as long as you found it on social media. B) Use it only if it's humorous and not offensive. C) Attribute the creator or ensure it's allowed under copyright or fair use. D) Crop the watermark and use it freely.
A) Activities involving physical machines only B) Offline communication between people C) Anything related to computers, IT, and digital environments
A) 1989 B) 1992 C) 1982
A) Internet B) Web C) Browser
A) 1989 B) 1991 C) 1990
A) False B) True
A) Black-Hat Hackers B) Grey-Hat Hackers C) White-Hat Hackers
A) Ewan B) Hyperlink C) HTML D) HTTP
A) Transfer Control Protocol B) Transmission Control Protocol C) Transmit Control Protocol
A) Any activity done offline without digital tools B) Illegal activities done using computers, networks, or the internet C) Legal online activities done with government approval
A) Changing your username for privacy B) Creating your own secure digital identity C) Stealing and using someone else's personal information
A) Offline communication between people B) Anything related to computers, IT, and digital environments C) Activities involving physical machines only )
A) 1989 B) 2000 C) 1990 D) 2010
A) Ethics B) Netiquette C) Network
A) Personal Website B) Educational Website C) Ewan D) News Website
A) False B) True
A) False B) True
A) Spam B) Trojan Horse C) Worm
A) Asking for permission before sharing someone else's content. B) Forwarding emails to colleagues without checking with the sender. C) Copy-pasting a friend's comment into a public post. D) Sharing screenshots of a private message for transparency.
A) It helps users compare product prices B) It gives discounts to online buyers C) It deceives people online for financial gain
A) A website is redesigned for aesthetics B) A website is improved to load faster C) A website is overloaded with traffic until it becomes unavailable
A) A program used only for games B) A legal tool for updating software C) Malicious software that harms or infiltrates systems
A) Fosters Positive Online Communities B) Enhances Online Safety C) Promotes Respectful Communication
A) Tim Berners-Lee B) Tim Burners-Lee C) Tim Birners-Lee
A) To teach users how to make strong passwords B) To trick victims into giving sensitive information C) To upgrade someone's internet speed |