- 1. The objective of Information and Communication Technologies.
A) Communicate B) Surf The Net C) Play Games
A) USA B) Philippines C) Japan
- 3. In NSO, in 2010, the ICT industry shares the total employment population in the Philippines.
A) 19.3% B) 21.6% C) 35.7%
- 4. Which web version has static web pages?
A) 2.0 B) 3.0 C) 1.0
- 5. The author who coined Web v2.
A) Mike Sendall B) Darcy DiNucci C) Tim Berners-Lee
- 6. This feature categorizes and arranges information.
A) Folksonomy B) Rich User Experience C) User Participation
- 7. Which symbol is used to categorize and arrange information? (Example: X AKA Twitter)
A) ! B) @ C) #
- 8. This feature saves your search data, even if you accidentally close your browser.
A) Rich User Experience B) User Participation C) Folksonomy
- 9. This feature involves the audience to judge your content.
A) Rich User Experience B) Folksonomy C) User Participation
- 10. This feature uses time-based pricing. If it expires, you have to pay again with the same or different price.
A) Software as a Service B) Mass Participation C) Long Tail
- 11. This feature enables subscription to a software, but ownership is limited.
A) Software as a Service B) Mass Participation C) Long Tail
- 12. This feature has universal access.
A) Mass participation B) Long Tail C) Software as a Service
- 13. Which organization is created by Tim Berners-Lee?
A) W3C B) CERN C) MIT
- 14. This issue means some files cannot support Web v3.
A) Vastness B) Compatibility C) Security
- 15. This issue questions if his/her preferences are saved or not.
A) Security B) Vastness C) Compatibility
- 16. This issue contains billions of web pages.
A) Compatibility B) Security C) Vastness
- 17. This article is the reason how Web v2 is created.
A) Fragmented Future B) Information Reality C) The Internet and You
- 18. This issue has imprecise words.
A) Logic B) Vastness C) Vagueness
- 19. This issue caused certain limitations for a computer to predict the user's intentions.
A) Security B) Logic C) Vastness
- 20. "Many devices, one goal."
A) Convergence B) Social Media C) Assistive Media
- 21. A website, application, or online channel that makes users talk about whatever they want.
A) Mobile Technologies B) Convergence C) Social Media
- 22. This social media creates his/her account before chatting.
A) Social Networks B) Bookmarking Sites C) Social News
- 23. This social media allows you to store and manage links.
A) Social Networks B) Bookmarking Sites C) Media Sharing
- 24. This social media keeps you updated, but other users can comment and rate
A) Social Networks B) Social Buzz C) Social News
- 25. This social media uploads any content.
A) Media Sharing B) Microblogging C) Bookmarking Sites
- 26. This social media focuses small updates.
A) Blogs and Forums B) Microblogging C) Forums
- 27. This social media focuses on discussion while posting content.
A) Blogs and Forums B) Social Networks C) Microblogging
- 28. Which OS has this logo?
A) Symbian B) iOS C) Android
- 29. Which OS has this brand?
A) Blackberry OS B) Symbian C) Android
- 30. Which OS has this brand?
A) WebOS B) Android C) Blackberry OS
- 31. You cannot just walk in a room and introduce yourself.
A) Middle Name B) First Name C) Siblings' Names
- 32. Matching a name with a face as your profile picture is a modus to identity theft.
A) First Name B) Middle Name C) Last Name
- 33. Never post this information or random strangers will call you.
A) OTP Number B) Home Phone Number C) Cellphone Number
- 34. This information is used as a secret question if you lost your password. Never disclose this.
A) Parents' Names B) Friends' Names C) Siblings' Names
- 35. This information makes criminals easy to find you.
A) Address B) Birthday C) Home Phone Number
- 36. This is the browser's Private Mode.
A) Private B) Guest C) Incognito
- 37. Malware that replicates and corrupts your computer.
A) Worm B) Spyware C) Virus
- 38. This malware acts innocent but leaves you vulnerable when opened.
A) Worm B) Rogue Security Software C) Trojan
- 39. This malware transfers from one computer to another and it uses a computer network to spread itself.
A) Worm B) Virus C) Trojan
- 40. This malware sees you typing and record it.
A) Spyware B) Worm C) Keyloggers
- 41. What does spam bring you?
A) Updates B) Job Requests C) Suspicious Emails
- 42. What is phishing's true goal?
A) To acquire sensitive information B) To catch fish C) To steal your money
A) Fair Use B) Trademark C) Copyright
A) Copyright B) Trademark C) Fair Use
- 45. In Bing, Microsoft's Search Engine, which symbol finds the exact words in a phrase?
A) " " B) + C) ( )
- 46. This image format has 16.7 million colors and are mostly used as background images or backdrops.
A) .png B) .jpg/jpeg C) .gif
- 47. This image format has 256 base colors and can animate pictures.
A) .jpg/jpeg B) .gif C) .png
- 48. This image format has 16 million colors and supports transparency.
A) .jpg/jpeg B) .gif C) .png
- 49. This new selection makes an organizational chart based on the process flow or ranking system.
A) Art B) Smart Art C) Clip Art
- 50. This image placement puts the text in front of the image. This makes images turn into background images.
A) In Front of Text B) Behind Text C) Square
|