A) Malware B) Spam C) Viruses D) Spyware
A) A phase in the Middle Ages B) A term reffering to the Stone Age C) All of the above D) The current era characterized by the use of digital technologies
A) Extremely large physical documents B) Larged-sized computer hardware C) Massive datasets that require advanced analytics D) Extremely large physical documents
A) 2003 B) 2001 C) 2000 D) 2005
A) Video Sharing Sites B) Blogs C) Wikis D) Social Networking
A) Charles Babbage B) Grace Hopper C) John von Neumann D) Ada Lovelace
A) Babbage B) Byron C) Edison D) Mauchly
A) Calculator B) Analytical Engine C) Telephone D) Computer
A) A network of interconnected smart devices that communicate and share data B) The internet used exclusively for gaming C) A type of computer programming language D) The latest version of internet browsers
A) Hacking B) Fishing C) Clicking D) Phishing
A) Excessive device durability B) Limited data storage capabilities C) Unauthorized access to personal data D) Improved user control over device functionalities
A) Augmented Reality B) Blockchain Data C) Internet of Things D) 5G
A) Limited access to medical information B) Slower response time in emergencies C) Increased paperwork and administrative tasks D) Improved patient care and treatment options
A) Limited access to movies and music B) Decreased options for entertainment C) Enabled on-demand and personalized entertainment choices D) Increased cost of entertainment
A) Tiktok B) Instagram C) Twitter D) Facebook
A) None of the above B) Social Constructivism C) Technological Change D) Technological Determinism
A) Slowed down economic growth B) Enhanced productivity and efficiency C) Led to economic recession D) Increased unemployment rates
A) Prison major B) Prison mayor C) Reclusion temporary D) Reclusion temporal
A) Virtual Reality B) Wi-Fi Eavesdropping C) Cloud Computing D) Automation
A) All of these B) Through postal mail C) Through wired telephone lines D) Wirelessly through the internet
A) A harmless online park B) Pretending to be someone else in online forums C) Creating fake social media profiles D) Stealing someone's personal information to impersonate them for fraudulent purposes
A) Virus B) Spyware C) Worms D) Malware
A) Using the same password across multiple accounts B) Using a combination of uppercase, lowercase, numbers, and symbols C) Using the same password across multiple accounts D) Regularly changing passwords every few years
A) Vulnerabilities in IoT device security B) Lack of device connectivity C) Excessive power consumption D) Incompatibility with modern networks
A) To convey emotion or tone in text-based conversation B) To show off one's technical skills C) To confuse the recipient D) To make the message longer
A) Augmented Reality B) Internet of Things C) Virtual Reality D) Artificial Intelligence
A) Can help people to communicate trough online games B) Students can access teaching materials from all over the world C) Increase in access to information and services that has accompanied the growth of the internet D) Reduced personal interaction
A) 2014 B) 2008 C) 2023 D) 2020
A) Wirelessly through the internet B) Wirelessly through the internet C) Through wired telephone lines D) Through postal mail
A) Technological Change B) Technological Determinism C) None of the above D) Social Constructivism
A) Trojan Horses B) Spyware C) Spam D) Ransomware
A) John Mauchly B) Grace Hopper C) Blaise Pascal D) Charles Babbage
A) Worms B) Viruses C) Trojan Horses D) Wi-Fi Eavesdropping
A) Communication of things B) Internet of Things C) Internet devices D) Communication devices
A) Z1 B) 5G C) ED1 D) AI
A) Pharming B) Malware C) Phishing D) Spamming
A) All of the above B) Work from outside of the Country C) Work inside the Company D) Teleworking (Work from Home)
A) They involve physical break-ins B) They are always detected and prevented by antivirus software C) They are always detected and prevented by antivirus software D) They attempt to trick individuals into revealing sensitive information
A) Republic Act No. 10175 Cybercrime Prevention Act of 2013 B) Republic Act No. 10173 Data Privacy Act of 2013 C) Republic Act No. 10175 Cybercrime Prevention Act of 2012 D) Republic Act No. 10173 Data Privacy Act of 2012
A) Vinton Gray B) Timothy John Berners-Lee C) Jack Dorsey D) Mark Zuckerberg
A) Adware B) Spyware C) Trojan Horse D) Ransomware
A) Web 2.0 B) Web 3.0 C) Web 1.0 D) Web 1.1
A) Phoenician Alphabet B) Abacus C) Petroglyphs D) Papyrus Plant
A) Data Communication B) Dataset C) Database D) Data transmission
A) Improved user control over device functionalities B) Excessive device durability C) Unauthorized access to personal data D) Limited data storage capabilities
A) Smart thermostat B) Traditional desktop computer C) Standard printer D) Basic mobile phone
A) No impact on the environment B) Increased pollution and waste C) Positive contribution to environmental conservation D) Decreased use of natural resources
A) Conducting online surveys B) Real-time data transmission of audio or video content C) Securing online transactions D) Fast downloading of files
A) Virtual Reality B) Augmented Reality C) Blockchain Data D) Augmented Virtual
A) Blockchain Message B) Blockchain Data C) Blockchain Communication D) Blockchain Reality
A) 2020 B) 2008 C) 2014 D) 2023
A) Decreased access to educational resources B) Improved access to a variety of learning materials C) Limited interaction with teachers D) Increased travel time to physical classrooms
A) Wi-Fi Eavesdropping B) Automation C) Cloud computing D) Virtual Reality
A) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive B) All of the above C) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods D) Helps people live and work smarter, as well as gain complete control over their lives
A) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses B) All of the above C) Because of the new gadget that will be released D) Because of many modern technologies
A) Malware B) Hacking C) Viruses D) Identity theft
A) Improved data-driven decision-making through analytics B) Increased reliance on intuition C) Decreased need for strategic planning D) All of the above
A) Analog computing B) Mainframe computing C) Blockchain D) Cloud computing
A) To teach hacking techniques B) To raise awareness about potential internet threats and safe online practices C) To promote ethical hacking practices D) To increase vulnerability to cyber attacks
A) Application server B) File server C) Policy server D) Mailserver
A) Never, because it's not important in the Digital world B) Only when communicating with close friends C) Only when writing formal emails D) Always, to ensure clarity and professionalism
A) Cybersex B) Cyber Defamation C) Cyberbullying D) Child Pornography
A) IPsec B) FTP C) HTTPS D) SSH
A) Penalty atleast Php 500,000 and or prison mayor B) Penalty atleast Php 200,000 and or prison mayor C) Prison mayor only D) Penalty atleast Php 5,000
A) Internet Search Provider B) Internet Service Provider C) Internet Security Protocol D) Internet Support Program
A) Networking and Technology B) None of the above C) Network and Etiquette D) Internet and Etiquette
A) Penalty of 20,000 B) Penalty of 1 year of imprisonment or prison mayor C) Penalty of 6-12 years of imprisonment or prison mayor D) Penalty at least Php 500, 000 and or prison mayor
A) Plagiarism B) Computer Addiction C) Copyright infringement D) Piracy
A) A set of rules for polite and respectful behavior on the Internet B) A social media platform C) A social media platform D) A type of computer virus
A) Prison mayor B) Prison major C) Reclusion temporary D) Reclusion temporal
A) The email contains confidential information B) The email is spam and should be deleted C) The sender is emphasizing the importance of the email D) The sender is shouting or being rude
A) A software that provides free services B) Malicious software that encrypts a victims data and demands a ransom for its release C) A software that provides free services D) A legitimate form of remote work
A) Amazon B) eBay C) Facebook D) YouTube
A) Bit B) Byt C) Byte D) Bait
A) Personal Website B) Educational Website C) Media Website D) Nonprofit Website
A) DNS B) Server C) Browser D) IP address
A) A type of computer game B) The practice of securing computer systems and networks from cyber threats C) The study of the stock market D) The science of artificial intelligence
A) Thou shall be prompt B) Thou shall respect personal space C) Thou shall avoid eye contact D) Thou shall be prompt
A) Wordpress B) Blogger C) Tumbler D) Pinterest |