A) False B) True
A) Web 3.0 B) Web 1.0 C) Web D) Web 2.0
A) Culture practiced only in face-to-face meetings B) •Traditions passed through handwritten letters C) Behavior and interactions within online and digital communities
A) DOS & DDOS Attack B) Network Attack C) Wi-Fi Eavesdropping
A) Web 3.0 B) Web C) Web 2.0 D) Web 1.0
A) False B) True
A) True B) False
A) Online posts are often permanent and can impact your reputation. B) You might lose followers. C) It's a legal requirement. D) Posts can't be deleted.
A) Web B) Browser C) Internet
A) True B) False
A) Speeding up a device after updates B) Locking or encrypting files and demanding payment C) Giving users free file backup
A) Malicious software that harms or infiltrates systems B) A program used only for games C) A legal tool for updating software
A) Professional Reputation B) Fosters Positive Online Communities C) Promotes Respectful Communication
A) Late 1990-2000 B) Mid-1990 C) 1994
A) 1989 B) 1991 C) 1990
A) Advanced Reserve Projects Agency B) Agency Research Projects Advanced C) Agency Reserve Projects Advanced D) Advanced Research Projects Agency
A) True B) False
A) False B) True
A) Tone is easily misinterpreted in text-only communication. B) Humor reduces the seriousness of digital communication. C) It's unprofessional in all settings. D) People might not find your joke funny.
A) Repeatedly sending online threats or intimidating messages B) Asking for feedback in an online survey C) Sending a single email greeting
A) "Interesting point—have you considered this alternative explanation?" B) No response is needed unless you're the instructor. C) "That's dumb." D) "You're wrong. That's not how it works."
A) Authorized repair of computer hardware B) Unauthorized access or manipulation of systems or networks C) Regular use of social media
A) It's only important in academic settings. B) It makes you look polite even when you disagree. C) It promotes a respectful and collaborative online environment. D) It helps reduce the number of replies in threads.
A) Spam B) Phishing C) Spyware
A) False B) True
A) False B) True
A) 1979 B) 1989 C) 1969
A) Browser B) Bahala na C) HTML D) HTTP
A) Using the same public Wi-Fi network as a stranger. B) Logging into a group account you also have access to rotate for options C) Editing or deleting someone else's digital work without explicit permission. D) Offering unsolicited technical advice to a colleague.
A) True B) False
A) 1986 B) 1976 C) 1996
A) Republic Act 10173 B) Republic Act 9995 C) Republic Act 10175
A) True B) False
A) Web 2.0 B) Web 3.0 C) Web 1.0 D) Web
A) Reply only to the sender with your specific response. B) Forward it to your team to delegate it. C) Ignore the email. D) Respond to everyone with your thoughts.
A) Grey-Hat Hackers B) Black-Hat Hackers C) White-Hat Hackers
A) True B) False
A) Black-Hat Hackers B) White-Hat Hackers C) Grey-Hat Hackers
A) Republic Act 7610 B) Republic Act 10173 C) Republic Act 10175
A) Attribute the creator or ensure it's allowed under copyright or fair use. B) Use it only if it's humorous and not offensive. C) Use it as long as you found it on social media. D) Crop the watermark and use it freely.
A) Activities involving physical machines only B) Anything related to computers, IT, and digital environments C) Offline communication between people
A) 1992 B) 1982 C) 1989
A) Browser B) Internet C) Web
A) 1989 B) 1990 C) 1991
A) False B) True
A) Black-Hat Hackers B) Grey-Hat Hackers C) White-Hat Hackers
A) Ewan B) Hyperlink C) HTTP D) HTML
A) Transmit Control Protocol B) Transmission Control Protocol C) Transfer Control Protocol
A) Any activity done offline without digital tools B) Illegal activities done using computers, networks, or the internet C) Legal online activities done with government approval
A) Stealing and using someone else's personal information B) Changing your username for privacy C) Creating your own secure digital identity
A) Offline communication between people B) Anything related to computers, IT, and digital environments C) Activities involving physical machines only )
A) 2000 B) 1990 C) 2010 D) 1989
A) Netiquette B) Ethics C) Network
A) Ewan B) News Website C) Educational Website D) Personal Website
A) False B) True
A) True B) False
A) Trojan Horse B) Spam C) Worm
A) Forwarding emails to colleagues without checking with the sender. B) Sharing screenshots of a private message for transparency. C) Copy-pasting a friend's comment into a public post. D) Asking for permission before sharing someone else's content.
A) It deceives people online for financial gain B) It gives discounts to online buyers C) It helps users compare product prices
A) A website is improved to load faster B) A website is overloaded with traffic until it becomes unavailable C) A website is redesigned for aesthetics
A) A program used only for games B) A legal tool for updating software C) Malicious software that harms or infiltrates systems
A) Enhances Online Safety B) Promotes Respectful Communication C) Fosters Positive Online Communities
A) Tim Birners-Lee B) Tim Berners-Lee C) Tim Burners-Lee
A) To teach users how to make strong passwords B) To upgrade someone's internet speed C) To trick victims into giving sensitive information |