A) False B) True
A) Web 2.0 B) Web 3.0 C) Web D) Web 1.0
A) Behavior and interactions within online and digital communities B) •Traditions passed through handwritten letters C) Culture practiced only in face-to-face meetings
A) Network Attack B) Wi-Fi Eavesdropping C) DOS & DDOS Attack
A) Web B) Web 1.0 C) Web 2.0 D) Web 3.0
A) True B) False
A) False B) True
A) You might lose followers. B) Posts can't be deleted. C) Online posts are often permanent and can impact your reputation. D) It's a legal requirement.
A) Web B) Internet C) Browser
A) True B) False
A) Giving users free file backup B) Locking or encrypting files and demanding payment C) Speeding up a device after updates
A) A program used only for games B) A legal tool for updating software C) Malicious software that harms or infiltrates systems
A) Promotes Respectful Communication B) Professional Reputation C) Fosters Positive Online Communities
A) 1994 B) Mid-1990 C) Late 1990-2000
A) 1990 B) 1989 C) 1991
A) Agency Research Projects Advanced B) Agency Reserve Projects Advanced C) Advanced Research Projects Agency D) Advanced Reserve Projects Agency
A) False B) True
A) False B) True
A) Humor reduces the seriousness of digital communication. B) People might not find your joke funny. C) Tone is easily misinterpreted in text-only communication. D) It's unprofessional in all settings.
A) Asking for feedback in an online survey B) Sending a single email greeting C) Repeatedly sending online threats or intimidating messages
A) No response is needed unless you're the instructor. B) "That's dumb." C) "You're wrong. That's not how it works." D) "Interesting point—have you considered this alternative explanation?"
A) Regular use of social media B) Authorized repair of computer hardware C) Unauthorized access or manipulation of systems or networks
A) It helps reduce the number of replies in threads. B) It promotes a respectful and collaborative online environment. C) It's only important in academic settings. D) It makes you look polite even when you disagree.
A) Spyware B) Spam C) Phishing
A) False B) True
A) True B) False
A) 1989 B) 1969 C) 1979
A) Browser B) HTML C) Bahala na D) HTTP
A) Using the same public Wi-Fi network as a stranger. B) Offering unsolicited technical advice to a colleague. C) Logging into a group account you also have access to rotate for options D) Editing or deleting someone else's digital work without explicit permission.
A) True B) False
A) 1996 B) 1986 C) 1976
A) Republic Act 10175 B) Republic Act 9995 C) Republic Act 10173
A) True B) False
A) Web B) Web 3.0 C) Web 1.0 D) Web 2.0
A) Respond to everyone with your thoughts. B) Reply only to the sender with your specific response. C) Forward it to your team to delegate it. D) Ignore the email.
A) White-Hat Hackers B) Black-Hat Hackers C) Grey-Hat Hackers
A) False B) True
A) Grey-Hat Hackers B) White-Hat Hackers C) Black-Hat Hackers
A) Republic Act 10175 B) Republic Act 7610 C) Republic Act 10173
A) Use it as long as you found it on social media. B) Use it only if it's humorous and not offensive. C) Crop the watermark and use it freely. D) Attribute the creator or ensure it's allowed under copyright or fair use.
A) Offline communication between people B) Activities involving physical machines only C) Anything related to computers, IT, and digital environments
A) 1982 B) 1992 C) 1989
A) Web B) Internet C) Browser
A) 1991 B) 1989 C) 1990
A) True B) False
A) Black-Hat Hackers B) Grey-Hat Hackers C) White-Hat Hackers
A) Hyperlink B) HTTP C) HTML D) Ewan
A) Transfer Control Protocol B) Transmit Control Protocol C) Transmission Control Protocol
A) Any activity done offline without digital tools B) Illegal activities done using computers, networks, or the internet C) Legal online activities done with government approval
A) Changing your username for privacy B) Stealing and using someone else's personal information C) Creating your own secure digital identity
A) Offline communication between people B) Anything related to computers, IT, and digital environments C) Activities involving physical machines only )
A) 1990 B) 2010 C) 1989 D) 2000
A) Ethics B) Netiquette C) Network
A) Ewan B) News Website C) Personal Website D) Educational Website
A) False B) True
A) False B) True
A) Trojan Horse B) Worm C) Spam
A) Asking for permission before sharing someone else's content. B) Sharing screenshots of a private message for transparency. C) Forwarding emails to colleagues without checking with the sender. D) Copy-pasting a friend's comment into a public post.
A) It deceives people online for financial gain B) It gives discounts to online buyers C) It helps users compare product prices
A) A website is overloaded with traffic until it becomes unavailable B) A website is improved to load faster C) A website is redesigned for aesthetics
A) Malicious software that harms or infiltrates systems B) A program used only for games C) A legal tool for updating software
A) Promotes Respectful Communication B) Enhances Online Safety C) Fosters Positive Online Communities
A) Tim Berners-Lee B) Tim Burners-Lee C) Tim Birners-Lee
A) To teach users how to make strong passwords B) To trick victims into giving sensitive information C) To upgrade someone's internet speed |