A) True B) False
A) Web 2.0 B) Web C) Web 3.0 D) Web 1.0
A) •Traditions passed through handwritten letters B) Behavior and interactions within online and digital communities C) Culture practiced only in face-to-face meetings
A) Network Attack B) Wi-Fi Eavesdropping C) DOS & DDOS Attack
A) Web 3.0 B) Web 2.0 C) Web 1.0 D) Web
A) True B) False
A) True B) False
A) Posts can't be deleted. B) You might lose followers. C) It's a legal requirement. D) Online posts are often permanent and can impact your reputation.
A) Internet B) Web C) Browser
A) True B) False
A) Giving users free file backup B) Locking or encrypting files and demanding payment C) Speeding up a device after updates
A) Malicious software that harms or infiltrates systems B) A program used only for games C) A legal tool for updating software
A) Promotes Respectful Communication B) Fosters Positive Online Communities C) Professional Reputation
A) 1994 B) Mid-1990 C) Late 1990-2000
A) 1989 B) 1991 C) 1990
A) Advanced Research Projects Agency B) Advanced Reserve Projects Agency C) Agency Research Projects Advanced D) Agency Reserve Projects Advanced
A) False B) True
A) True B) False
A) It's unprofessional in all settings. B) Humor reduces the seriousness of digital communication. C) People might not find your joke funny. D) Tone is easily misinterpreted in text-only communication.
A) Sending a single email greeting B) Repeatedly sending online threats or intimidating messages C) Asking for feedback in an online survey
A) "You're wrong. That's not how it works." B) "That's dumb." C) "Interesting point—have you considered this alternative explanation?" D) No response is needed unless you're the instructor.
A) Unauthorized access or manipulation of systems or networks B) Regular use of social media C) Authorized repair of computer hardware
A) It's only important in academic settings. B) It makes you look polite even when you disagree. C) It helps reduce the number of replies in threads. D) It promotes a respectful and collaborative online environment.
A) Spam B) Phishing C) Spyware
A) True B) False
A) True B) False
A) 1969 B) 1979 C) 1989
A) Bahala na B) HTTP C) Browser D) HTML
A) Logging into a group account you also have access to rotate for options B) Using the same public Wi-Fi network as a stranger. C) Editing or deleting someone else's digital work without explicit permission. D) Offering unsolicited technical advice to a colleague.
A) False B) True
A) 1986 B) 1976 C) 1996
A) Republic Act 10175 B) Republic Act 9995 C) Republic Act 10173
A) True B) False
A) Web 2.0 B) Web C) Web 3.0 D) Web 1.0
A) Respond to everyone with your thoughts. B) Reply only to the sender with your specific response. C) Ignore the email. D) Forward it to your team to delegate it.
A) Black-Hat Hackers B) White-Hat Hackers C) Grey-Hat Hackers
A) True B) False
A) Grey-Hat Hackers B) Black-Hat Hackers C) White-Hat Hackers
A) Republic Act 10175 B) Republic Act 10173 C) Republic Act 7610
A) Use it only if it's humorous and not offensive. B) Crop the watermark and use it freely. C) Use it as long as you found it on social media. D) Attribute the creator or ensure it's allowed under copyright or fair use.
A) Offline communication between people B) Activities involving physical machines only C) Anything related to computers, IT, and digital environments
A) 1982 B) 1992 C) 1989
A) Internet B) Web C) Browser
A) 1989 B) 1991 C) 1990
A) True B) False
A) White-Hat Hackers B) Grey-Hat Hackers C) Black-Hat Hackers
A) HTML B) Hyperlink C) Ewan D) HTTP
A) Transmission Control Protocol B) Transmit Control Protocol C) Transfer Control Protocol
A) Any activity done offline without digital tools B) Illegal activities done using computers, networks, or the internet C) Legal online activities done with government approval
A) Creating your own secure digital identity B) Changing your username for privacy C) Stealing and using someone else's personal information
A) Offline communication between people B) Activities involving physical machines only ) C) Anything related to computers, IT, and digital environments
A) 2010 B) 1990 C) 2000 D) 1989
A) Netiquette B) Ethics C) Network
A) Educational Website B) Personal Website C) Ewan D) News Website
A) False B) True
A) False B) True
A) Worm B) Trojan Horse C) Spam
A) Copy-pasting a friend's comment into a public post. B) Sharing screenshots of a private message for transparency. C) Asking for permission before sharing someone else's content. D) Forwarding emails to colleagues without checking with the sender.
A) It deceives people online for financial gain B) It gives discounts to online buyers C) It helps users compare product prices
A) A website is redesigned for aesthetics B) A website is improved to load faster C) A website is overloaded with traffic until it becomes unavailable
A) A program used only for games B) Malicious software that harms or infiltrates systems C) A legal tool for updating software
A) Fosters Positive Online Communities B) Enhances Online Safety C) Promotes Respectful Communication
A) Tim Burners-Lee B) Tim Birners-Lee C) Tim Berners-Lee
A) To upgrade someone's internet speed B) To trick victims into giving sensitive information C) To teach users how to make strong passwords |