A) Spam B) Viruses C) Malware D) Spyware
A) A phase in the Middle Ages B) The current era characterized by the use of digital technologies C) All of the above D) A term reffering to the Stone Age
A) Massive datasets that require advanced analytics B) Extremely large physical documents C) Extremely large physical documents D) Larged-sized computer hardware
A) 2001 B) 2000 C) 2003 D) 2005
A) Social Networking B) Video Sharing Sites C) Wikis D) Blogs
A) Ada Lovelace B) John von Neumann C) Grace Hopper D) Charles Babbage
A) Mauchly B) Byron C) Edison D) Babbage
A) Computer B) Calculator C) Analytical Engine D) Telephone
A) A network of interconnected smart devices that communicate and share data B) The internet used exclusively for gaming C) The latest version of internet browsers D) A type of computer programming language
A) Clicking B) Hacking C) Phishing D) Fishing
A) Excessive device durability B) Limited data storage capabilities C) Unauthorized access to personal data D) Improved user control over device functionalities
A) Blockchain Data B) 5G C) Internet of Things D) Augmented Reality
A) Increased paperwork and administrative tasks B) Slower response time in emergencies C) Limited access to medical information D) Improved patient care and treatment options
A) Increased cost of entertainment B) Enabled on-demand and personalized entertainment choices C) Decreased options for entertainment D) Limited access to movies and music
A) Tiktok B) Facebook C) Twitter D) Instagram
A) Social Constructivism B) Technological Determinism C) None of the above D) Technological Change
A) Increased unemployment rates B) Slowed down economic growth C) Led to economic recession D) Enhanced productivity and efficiency
A) Reclusion temporary B) Reclusion temporal C) Prison mayor D) Prison major
A) Wi-Fi Eavesdropping B) Cloud Computing C) Virtual Reality D) Automation
A) Through wired telephone lines B) Through postal mail C) Wirelessly through the internet D) All of these
A) Creating fake social media profiles B) Pretending to be someone else in online forums C) A harmless online park D) Stealing someone's personal information to impersonate them for fraudulent purposes
A) Virus B) Worms C) Malware D) Spyware
A) Using the same password across multiple accounts B) Using a combination of uppercase, lowercase, numbers, and symbols C) Using the same password across multiple accounts D) Regularly changing passwords every few years
A) Lack of device connectivity B) Incompatibility with modern networks C) Excessive power consumption D) Vulnerabilities in IoT device security
A) To make the message longer B) To convey emotion or tone in text-based conversation C) To confuse the recipient D) To show off one's technical skills
A) Internet of Things B) Artificial Intelligence C) Virtual Reality D) Augmented Reality
A) Reduced personal interaction B) Students can access teaching materials from all over the world C) Can help people to communicate trough online games D) Increase in access to information and services that has accompanied the growth of the internet
A) 2020 B) 2023 C) 2008 D) 2014
A) Wirelessly through the internet B) Through postal mail C) Wirelessly through the internet D) Through wired telephone lines
A) None of the above B) Technological Determinism C) Technological Change D) Social Constructivism
A) Spyware B) Spam C) Trojan Horses D) Ransomware
A) Charles Babbage B) Blaise Pascal C) John Mauchly D) Grace Hopper
A) Worms B) Viruses C) Wi-Fi Eavesdropping D) Trojan Horses
A) Internet of Things B) Communication of things C) Internet devices D) Communication devices
A) AI B) 5G C) Z1 D) ED1
A) Pharming B) Spamming C) Malware D) Phishing
A) Work from outside of the Country B) Teleworking (Work from Home) C) All of the above D) Work inside the Company
A) They are always detected and prevented by antivirus software B) They attempt to trick individuals into revealing sensitive information C) They are always detected and prevented by antivirus software D) They involve physical break-ins
A) Republic Act No. 10173 Data Privacy Act of 2013 B) Republic Act No. 10173 Data Privacy Act of 2012 C) Republic Act No. 10175 Cybercrime Prevention Act of 2012 D) Republic Act No. 10175 Cybercrime Prevention Act of 2013
A) Jack Dorsey B) Mark Zuckerberg C) Timothy John Berners-Lee D) Vinton Gray
A) Adware B) Ransomware C) Spyware D) Trojan Horse
A) Web 2.0 B) Web 3.0 C) Web 1.0 D) Web 1.1
A) Abacus B) Phoenician Alphabet C) Petroglyphs D) Papyrus Plant
A) Database B) Data transmission C) Dataset D) Data Communication
A) Unauthorized access to personal data B) Excessive device durability C) Limited data storage capabilities D) Improved user control over device functionalities
A) Basic mobile phone B) Standard printer C) Traditional desktop computer D) Smart thermostat
A) No impact on the environment B) Decreased use of natural resources C) Positive contribution to environmental conservation D) Increased pollution and waste
A) Fast downloading of files B) Conducting online surveys C) Real-time data transmission of audio or video content D) Securing online transactions
A) Augmented Reality B) Blockchain Data C) Virtual Reality D) Augmented Virtual
A) Blockchain Data B) Blockchain Communication C) Blockchain Reality D) Blockchain Message
A) 2023 B) 2020 C) 2014 D) 2008
A) Increased travel time to physical classrooms B) Limited interaction with teachers C) Decreased access to educational resources D) Improved access to a variety of learning materials
A) Wi-Fi Eavesdropping B) Automation C) Cloud computing D) Virtual Reality
A) Helps people live and work smarter, as well as gain complete control over their lives B) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive C) All of the above D) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods
A) Because of many modern technologies B) All of the above C) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses D) Because of the new gadget that will be released
A) Hacking B) Viruses C) Malware D) Identity theft
A) Increased reliance on intuition B) Improved data-driven decision-making through analytics C) All of the above D) Decreased need for strategic planning
A) Mainframe computing B) Blockchain C) Analog computing D) Cloud computing
A) To teach hacking techniques B) To increase vulnerability to cyber attacks C) To promote ethical hacking practices D) To raise awareness about potential internet threats and safe online practices
A) Application server B) Policy server C) Mailserver D) File server
A) Only when communicating with close friends B) Always, to ensure clarity and professionalism C) Never, because it's not important in the Digital world D) Only when writing formal emails
A) Child Pornography B) Cyberbullying C) Cyber Defamation D) Cybersex
A) HTTPS B) IPsec C) FTP D) SSH
A) Penalty atleast Php 200,000 and or prison mayor B) Penalty atleast Php 500,000 and or prison mayor C) Prison mayor only D) Penalty atleast Php 5,000
A) Internet Service Provider B) Internet Support Program C) Internet Security Protocol D) Internet Search Provider
A) Networking and Technology B) None of the above C) Internet and Etiquette D) Network and Etiquette
A) Penalty at least Php 500, 000 and or prison mayor B) Penalty of 1 year of imprisonment or prison mayor C) Penalty of 20,000 D) Penalty of 6-12 years of imprisonment or prison mayor
A) Computer Addiction B) Plagiarism C) Piracy D) Copyright infringement
A) A social media platform B) A set of rules for polite and respectful behavior on the Internet C) A type of computer virus D) A social media platform
A) Reclusion temporary B) Reclusion temporal C) Prison major D) Prison mayor
A) The email is spam and should be deleted B) The email contains confidential information C) The sender is emphasizing the importance of the email D) The sender is shouting or being rude
A) A software that provides free services B) A legitimate form of remote work C) A software that provides free services D) Malicious software that encrypts a victims data and demands a ransom for its release
A) YouTube B) Amazon C) Facebook D) eBay
A) Byte B) Bait C) Byt D) Bit
A) Educational Website B) Personal Website C) Nonprofit Website D) Media Website
A) IP address B) Browser C) DNS D) Server
A) The study of the stock market B) The practice of securing computer systems and networks from cyber threats C) The science of artificial intelligence D) A type of computer game
A) Thou shall avoid eye contact B) Thou shall be prompt C) Thou shall be prompt D) Thou shall respect personal space
A) Tumbler B) Pinterest C) Wordpress D) Blogger |