ThatQuiz Test Library Take this test now
GENEL1
Contributed by: Manlavi
  • 1. It's acceptable to delay responding to emails indefinitely if you're not interested
A) True
B) False
  • 2. This started in the early 2000s
A) Web 2.0
B) Web
C) Web 3.0
D) Web 1.0
  • 3. What is cyber culture?
A) •Traditions passed through handwritten letters
B) Behavior and interactions within online and digital communities
C) Culture practiced only in face-to-face meetings
  • 4. Occurs when cybercriminals intercept the data being transmitted over an unsecured Wi-Fi network. This can happen in public places like coffee shops, airports, or libraries where unsecured Wi-Fi is available.
A) Network Attack
B) Wi-Fi Eavesdropping
C) DOS & DDOS Attack
  • 5. Websites became interactive. The web started responding to what we do.
A) Web 3.0
B) Web 2.0
C) Web 1.0
D) Web
  • 6. Netiquette is only necessary in formal or professional settings.
A) True
B) False
  • 7. Grey-hat hackers may sometimes expose vulnerabilities without permission but without malicious intent.
A) True
B) False
  • 8. What's the best reason to think before you post something online?
A) Posts can't be deleted.
B) You might lose followers.
C) It's a legal requirement.
D) Online posts are often permanent and can impact your reputation.
  • 9. It allows us to: Share information, Communicate and Access resources.
A) Internet
B) Web
C) Browser
  • 10. Black-hat hackers follow no ethical guidelines and are driven by selfish motives.
A) True
B) False
  • 11. Ransomware works by?
A) Giving users free file backup
B) Locking or encrypting files and demanding payment
C) Speeding up a device after updates
  • 12. What is malware?
A) Malicious software that harms or infiltrates systems
B) A program used only for games
C) A legal tool for updating software
  • 13. By following netiquette, online discussions become more respectful, avoiding unnecessary conflict or misunderstanding.
A) Promotes Respectful Communication
B) Fosters Positive Online Communities
C) Professional Reputation
  • 14. Search engines like Yahoo! and Google made finding info faster.
A) 1994
B) Mid-1990
C) Late 1990-2000
  • 15. By ___, he successfully created the first web browser (like an early version of Chrome or Firefox)
A) 1989
B) 1991
C) 1990
  • 16. ARPA stands for
A) Advanced Research Projects Agency
B) Advanced Reserve Projects Agency
C) Agency Research Projects Advanced
D) Agency Reserve Projects Advanced
  • 17. Tone and intent are always clear in written digital communication.
A) False
B) True
  • 18. Grey-hat hackers work within the law
A) True
B) False
  • 19. What is the best reason to be cautious when using humor or sarcasm online?
A) It's unprofessional in all settings.
B) Humor reduces the seriousness of digital communication.
C) People might not find your joke funny.
D) Tone is easily misinterpreted in text-only communication.
  • 20. Which is an example of cyberstalking?
A) Sending a single email greeting
B) Repeatedly sending online threats or intimidating messages
C) Asking for feedback in an online survey
  • 21. Which of the following most accurately reflects good netiquette when replying to a classmate in an online course forum?
A) "You're wrong. That's not how it works."
B) "That's dumb."
C) "Interesting point—have you considered this alternative explanation?"
D) No response is needed unless you're the instructor.
  • 22. What is hacking?
A) Unauthorized access or manipulation of systems or networks
B) Regular use of social media
C) Authorized repair of computer hardware
  • 23. Why is acknowledging others' contributions important in digital communication?
A) It's only important in academic settings.
B) It makes you look polite even when you disagree.
C) It helps reduce the number of replies in threads.
D) It promotes a respectful and collaborative online environment.
  • 24. type of cyber-attack where attackers attempt to trick individuals into revealing sensitive information (like usernames, passwords, or credit card numbers) by masquerading as a trustworthy entity, often via email or fake websites.
A) Spam
B) Phishing
C) Spyware
  • 25. Vinton Cerf and Bob Kahn called Fathers of the Web
A) True
B) False
  • 26. White-hat hackers operate illegally and without consent.
A) True
B) False
  • 27. ARPANET starts ____
A) 1969
B) 1979
C) 1989
  • 28. To build web pages. it creates the structure of a website.
A) Bahala na
B) HTTP
C) Browser
D) HTML
  • 29. Which of the following is most likely to be considered interference with someone's computer work?
A) Logging into a group account you also have access to rotate for options
B) Using the same public Wi-Fi network as a stranger.
C) Editing or deleting someone else's digital work without explicit permission.
D) Offering unsolicited technical advice to a colleague.
  • 30. The Internet wasn't just for research — it could be used for education, communication, and community building.
A) False
B) True
  • 31. In ___, Case Western Reserve University in Cleveland, Ohio, made history by launching the very first 'Free Net.'
A) 1986
B) 1976
C) 1996
  • 32. Which law protects personal data and privacy?
A) Republic Act 10175
B) Republic Act 9995
C) Republic Act 10173
  • 33. White-Hat Hacker are Find vulnerabilities without authorization and often report them.
A) True
B) False
  • 34. Is about making the web intelligent, private, and user-controlled.
A) Web 2.0
B) Web
C) Web 3.0
D) Web 1.0
  • 35. You receive a group email and only one part of the message applies to you. What is the best action?
A) Respond to everyone with your thoughts.
B) Reply only to the sender with your specific response.
C) Ignore the email.
D) Forward it to your team to delegate it.
  • 36. They are individuals who may violate ethical or legal boundaries but do not have malicious intent. While they may find and exploit vulnerabilities, they typically do not cause harm or financial loss. However, they often do not seek permission before performing their hacking activities.
A) Black-Hat Hackers
B) White-Hat Hackers
C) Grey-Hat Hackers
  • 37. If something is online, it's okay to share it publicly without credit.
A) True
B) False
  • 38. They are often employed by organizations to test and improve the security of their systems by finding vulnerabilities before malicious hackers can exploit them.
A) Grey-Hat Hackers
B) Black-Hat Hackers
C) White-Hat Hackers
  • 39. Which law focuses on preventing cybercrimes in the Philippines?
A) Republic Act 10175
B) Republic Act 10173
C) Republic Act 7610
  • 40. If you want to use a meme in your
    presentation, what is the most ethical action?
A) Use it only if it's humorous and not offensive.
B) Crop the watermark and use it freely.
C) Use it as long as you found it on social media.
D) Attribute the creator or ensure it's allowed under copyright or fair use.
  • 41. What does the term cyber mainly refer to?
A) Offline communication between people
B) Activities involving physical machines only
C) Anything related to computers, IT, and digital environments
  • 42. The birth of the term "internet" was _____
A) 1982
B) 1992
C) 1989
  • 43. It allows us to: Share information, communicate and Access resources.
A) Internet
B) Web
C) Browser
  • 44. The U.S. government allowed private companies to use the Internet.
A) 1989
B) 1991
C) 1990
  • 45. Internet It is basically a set of rules that every computer on the Internet must follow so that they can talk to each other, even if they are on completely different networks.
A) True
B) False
  • 46. These hackers often have harmful intentions, such as stealing data, causing disruptions, or committing fraud.
A) White-Hat Hackers
B) Grey-Hat Hackers
C) Black-Hat Hackers
  • 47. The set of rules that lets computer request and deliver web pages?
A) HTML
B) Hyperlink
C) Ewan
D) HTTP
  • 48. TCP stands for
A) Transmission Control Protocol
B) Transmit Control Protocol
C) Transfer Control Protocol
  • 49. Which best describes cybercrime?
A) Any activity done offline without digital tools
B) Illegal activities done using computers, networks, or the internet
C) Legal online activities done with government approval
  • 50. Identity theft involves?
A) Creating your own secure digital identity
B) Changing your username for privacy
C) Stealing and using someone else's personal information
  • 51. What does the term cyber mainly refer to?
A) Offline communication between people
B) Activities involving physical machines only )
C) Anything related to computers, IT, and digital environments
  • 52. The web was invented in?
A) 2010
B) 1990
C) 2000
D) 1989
  • 53. Is the proper manners or rules when interacting online
A) Netiquette
B) Ethics
C) Network
  • 54. These are websites made by individuals to share about themselves
A) Educational Website
B) Personal Website
C) Ewan
D) News Website
  • 55. 1P Makes sure packets arrive complete and in order.
A) False
B) True
  • 56. Sarcasm is easy to understand online because people can hear your tone.
A) False
B) True
  • 57. Refers to unsolicited, usually irrelevant, or inappropriate messages, typically sent in bulk via email. It is often used to promote products or services or as a vehicle for spreading
A) Worm
B) Trojan Horse
C) Spam
  • 58. Which of the following best respects another person's digital privacy?
A) Copy-pasting a friend's comment into a public post.
B) Sharing screenshots of a private message for transparency.
C) Asking for permission before sharing someone else's content.
D) Forwarding emails to colleagues without checking with the sender.
  • 59. What makes online fraud a cybercrime?
A) It deceives people online for financial gain
B) It gives discounts to online buyers
C) It helps users compare product prices
  • 60. What happens in a DDoS attack?
A) A website is redesigned for aesthetics
B) A website is improved to load faster
C) A website is overloaded with traffic until it becomes unavailable
  • 61. What is malware?
A) A program used only for games
B) Malicious software that harms or infiltrates systems
C) A legal tool for updating software
  • 62. Adhering to netiquette guidelines reduces the likelihood of harmful online behaviors, such as trolling, bullying, or harassment.
A) Fosters Positive Online Communities
B) Enhances Online Safety
C) Promotes Respectful Communication
  • 63. He was a British computer scientist
A) Tim Burners-Lee
B) Tim Birners-Lee
C) Tim Berners-Lee
  • 64. What is the goal of phishing attacks?
A) To upgrade someone's internet speed
B) To trick victims into giving sensitive information
C) To teach users how to make strong passwords
Created with That Quiz — the site for test creation and grading in math and other subjects.