A) True B) False
A) Web 3.0 B) Web 1.0 C) Web 2.0 D) Web
A) •Traditions passed through handwritten letters B) Behavior and interactions within online and digital communities C) Culture practiced only in face-to-face meetings
A) Wi-Fi Eavesdropping B) Network Attack C) DOS & DDOS Attack
A) Web 3.0 B) Web C) Web 1.0 D) Web 2.0
A) False B) True
A) False B) True
A) Posts can't be deleted. B) It's a legal requirement. C) Online posts are often permanent and can impact your reputation. D) You might lose followers.
A) Browser B) Web C) Internet
A) False B) True
A) Speeding up a device after updates B) Giving users free file backup C) Locking or encrypting files and demanding payment
A) Malicious software that harms or infiltrates systems B) A legal tool for updating software C) A program used only for games
A) Fosters Positive Online Communities B) Promotes Respectful Communication C) Professional Reputation
A) Late 1990-2000 B) 1994 C) Mid-1990
A) 1989 B) 1990 C) 1991
A) Advanced Research Projects Agency B) Advanced Reserve Projects Agency C) Agency Reserve Projects Advanced D) Agency Research Projects Advanced
A) False B) True
A) False B) True
A) Tone is easily misinterpreted in text-only communication. B) It's unprofessional in all settings. C) Humor reduces the seriousness of digital communication. D) People might not find your joke funny.
A) Sending a single email greeting B) Asking for feedback in an online survey C) Repeatedly sending online threats or intimidating messages
A) "Interesting point—have you considered this alternative explanation?" B) No response is needed unless you're the instructor. C) "You're wrong. That's not how it works." D) "That's dumb."
A) Unauthorized access or manipulation of systems or networks B) Regular use of social media C) Authorized repair of computer hardware
A) It makes you look polite even when you disagree. B) It promotes a respectful and collaborative online environment. C) It's only important in academic settings. D) It helps reduce the number of replies in threads.
A) Spyware B) Phishing C) Spam
A) False B) True
A) True B) False
A) 1989 B) 1969 C) 1979
A) HTML B) Bahala na C) HTTP D) Browser
A) Offering unsolicited technical advice to a colleague. B) Editing or deleting someone else's digital work without explicit permission. C) Logging into a group account you also have access to rotate for options D) Using the same public Wi-Fi network as a stranger.
A) False B) True
A) 1996 B) 1976 C) 1986
A) Republic Act 10173 B) Republic Act 10175 C) Republic Act 9995
A) False B) True
A) Web 1.0 B) Web 2.0 C) Web D) Web 3.0
A) Forward it to your team to delegate it. B) Ignore the email. C) Respond to everyone with your thoughts. D) Reply only to the sender with your specific response.
A) Grey-Hat Hackers B) Black-Hat Hackers C) White-Hat Hackers
A) False B) True
A) White-Hat Hackers B) Black-Hat Hackers C) Grey-Hat Hackers
A) Republic Act 10173 B) Republic Act 10175 C) Republic Act 7610
A) Crop the watermark and use it freely. B) Use it only if it's humorous and not offensive. C) Use it as long as you found it on social media. D) Attribute the creator or ensure it's allowed under copyright or fair use.
A) Offline communication between people B) Activities involving physical machines only C) Anything related to computers, IT, and digital environments
A) 1982 B) 1992 C) 1989
A) Browser B) Internet C) Web
A) 1989 B) 1990 C) 1991
A) False B) True
A) White-Hat Hackers B) Black-Hat Hackers C) Grey-Hat Hackers
A) HTML B) HTTP C) Ewan D) Hyperlink
A) Transmit Control Protocol B) Transmission Control Protocol C) Transfer Control Protocol
A) Any activity done offline without digital tools B) Legal online activities done with government approval C) Illegal activities done using computers, networks, or the internet
A) Changing your username for privacy B) Stealing and using someone else's personal information C) Creating your own secure digital identity
A) Anything related to computers, IT, and digital environments B) Activities involving physical machines only ) C) Offline communication between people
A) 2010 B) 1989 C) 1990 D) 2000
A) Ethics B) Network C) Netiquette
A) Educational Website B) Ewan C) Personal Website D) News Website
A) False B) True
A) False B) True
A) Worm B) Spam C) Trojan Horse
A) Asking for permission before sharing someone else's content. B) Sharing screenshots of a private message for transparency. C) Copy-pasting a friend's comment into a public post. D) Forwarding emails to colleagues without checking with the sender.
A) It deceives people online for financial gain B) It helps users compare product prices C) It gives discounts to online buyers
A) A website is redesigned for aesthetics B) A website is improved to load faster C) A website is overloaded with traffic until it becomes unavailable
A) A legal tool for updating software B) Malicious software that harms or infiltrates systems C) A program used only for games
A) Fosters Positive Online Communities B) Enhances Online Safety C) Promotes Respectful Communication
A) Tim Burners-Lee B) Tim Birners-Lee C) Tim Berners-Lee
A) To teach users how to make strong passwords B) To upgrade someone's internet speed C) To trick victims into giving sensitive information |