ThatQuiz Test Library Take this test now
genel 1
Contributed by: Illustrisimo
  • 1. One of the more common methods of both sending information out and collecting it from unsuspecting people is called________?
A) Malware
B) Spam
C) Viruses
D) Spyware
  • 2. What is Digital Age?
A) The current era characterized by the use of digital technologies
B) A term reffering to the Stone Age
C) A phase in the Middle Ages
D) All of the above
  • 3. What was the term "Big Data" refer to in the Digital Age?
A) Extremely large physical documents
B) Larged-sized computer hardware
C) Massive datasets that require advanced analytics
D) Extremely large physical documents
  • 4. LG introduces its first connected refrigerator with a $20,000 pricetag in what year?
A) 2001
B) 2005
C) 2000
D) 2003
  • 5. Which refers to the uses of internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients?
A) Wikis
B) Video Sharing Sites
C) Social Networking
D) Blogs
  • 6. She is a computer scientist and mathematicians is known for creating the first algorithm intended to be processed by a machine, making her the world's first programmer.
A) Charles Babbage
B) Ada Lovelace
C) Grace Hopper
D) John von Neumann
  • 7. Who is often credited with designing the first programmable computer, known as the "Analytical Engine"?
A) Babbage
B) Mauchly
C) Byron
D) Edison
  • 8. What is the most popular forms of communication ever created by Alexander Graham Bell in 1876?
A) Analytical Engine
B) Telephone
C) Computer
D) Calculator
  • 9. What does the term "internet of Things" (IoT) refer to?
A) The internet used exclusively for gaming
B) The latest version of internet browsers
C) A network of interconnected smart devices that communicate and share data
D) A type of computer programming language
  • 10. This is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort is called_________?
A) Phishing
B) Clicking
C) Fishing
D) Hacking
  • 11. What is a common privacy concern associated with the widespread use of IoT devices?
A) Limited data storage capabilities
B) Improved user control over device functionalities
C) Excessive device durability
D) Unauthorized access to personal data
  • 12. This features interactive scenarios that enhance the real world with images and sound that create an altered experience.
A) Internet of Things
B) 5G
C) Augmented Reality
D) Blockchain Data
  • 13. What is one positive impact of technology on healthcare?
A) Improved patient care and treatment options
B) Increased paperwork and administrative tasks
C) Limited access to medical information
D) Slower response time in emergencies
  • 14. How has technology influenced entertainment consumption?
A) Increased cost of entertainment
B) Limited access to movies and music
C) Decreased options for entertainment
D) Enabled on-demand and personalized entertainment choices
  • 15. Which social media platform is known for sharing short video content?
A) Facebook
B) Tiktok
C) Instagram
D) Twitter
  • 16. What is the opposite of the Technological Determinism that believes that humans play a main role in shaping technology rather than technology shaping society?
A) None of the above
B) Social Constructivism
C) Technological Determinism
D) Technological Change
  • 17. In what way has technology impacted the economy?
A) Enhanced productivity and efficiency
B) Led to economic recession
C) Increased unemployment rates
D) Slowed down economic growth
  • 18. The act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years also known as?
A) Reclusion temporal
B) Reclusion temporary
C) Prison major
D) Prison mayor
  • 19. What is the use of computer modeling and simulation that enables a person to interact with an artificial three-dimensional (3-D) visual or other sensory environment?
A) Wi-Fi Eavesdropping
B) Cloud Computing
C) Automation
D) Virtual Reality
  • 20. How do IoT devices typically communicate with each other?
A) Wirelessly through the internet
B) Through postal mail
C) All of these
D) Through wired telephone lines
  • 21. What is "identity theft" in the context of Cybercrimes?
A) Creating fake social media profiles
B) Pretending to be someone else in online forums
C) A harmless online park
D) Stealing someone's personal information to impersonate them for fraudulent purposes
  • 22. What is type of software that collects personal information about you without you knowing?
A) Spyware
B) Malware
C) Worms
D) Virus
  • 23. Which of the following is a strong password practice?
A) Using a combination of uppercase, lowercase, numbers, and symbols
B) Using the same password across multiple accounts
C) Using the same password across multiple accounts
D) Regularly changing passwords every few years
  • 24. What is a major security challenge associated with the Internet of Things?
A) Excessive power consumption
B) Incompatibility with modern networks
C) Lack of device connectivity
D) Vulnerabilities in IoT device security
  • 25. What is the purpose of using "emotions" or "emoji" in online communication?
A) To make the message longer
B) To confuse the recipient
C) To show off one's technical skills
D) To convey emotion or tone in text-based conversation
  • 26. What is the ability of a digital computer or computer controlled robot to perform tasks commonly associated with intelligent beings?
A) Virtual Reality
B) Internet of Things
C) Augmented Reality
D) Artificial Intelligence
  • 27. Communication Technology in our society?
A) Students can access teaching materials from all over the world
B) Reduced personal interaction
C) Increase in access to information and services that has accompanied the growth of the internet
D) Can help people to communicate trough online games
  • 28. Amazon introduces the Echos speaker, along with the Alexa voice assistant---a new way in the year of_____?
A) 2023
B) 2014
C) 2008
D) 2020
  • 29. How do IoT devices typically communicate with each other?
A) Wirelessly through the internet
B) Wirelessly through the internet
C) Through wired telephone lines
D) Through postal mail
  • 30. Humans are slaves to technology as they are forced to adapt to the Technological environment that surrounds them which of Theories in Technology that belong?
A) Technological Change
B) None of the above
C) Technological Determinism
D) Social Constructivism
  • 31. What is malicious program that is disguised as, of embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded?
A) Ransomware
B) Spam
C) Trojan Horses
D) Spyware
  • 32. Who developed the difference engine which tabulated polynomial equations using the method of finite differences?
A) Grace Hopper
B) Charles Babbage
C) Blaise Pascal
D) John Mauchly
  • 33. What is another method used by Cyber criminals to capture personal information?
A) Viruses
B) Wi-Fi Eavesdropping
C) Worms
D) Trojan Horses
  • 34. What is an emerging movement of products with integrated Wi-Fi and network connectivity abilities?
A) Internet of Things
B) Communication of things
C) Communication devices
D) Internet devices
  • 35. A new global wireless standard after 1G, 2G, 3G,and 4G networks is called_______?
A) AI
B) 5G
C) ED1
D) Z1
  • 36. What is a common type of online fraud?
A) Spamming
B) Malware
C) Phishing
D) Pharming
  • 37. How does people allows to save time and combine their work and personal lives?
A) Work from outside of the Country
B) Work inside the Company
C) Teleworking (Work from Home)
D) All of the above
  • 38. What is a common characteristic of phishing attacks?
A) They attempt to trick individuals into revealing sensitive information
B) They are always detected and prevented by antivirus software
C) They involve physical break-ins
D) They are always detected and prevented by antivirus software
  • 39. What law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet?
A) Republic Act No. 10173 Data Privacy Act of 2013
B) Republic Act No. 10173 Data Privacy Act of 2012
C) Republic Act No. 10175 Cybercrime Prevention Act of 2013
D) Republic Act No. 10175 Cybercrime Prevention Act of 2012
  • 40. He is an English engineer and computer scientist best known as the inventor of the World Wide Web, who is he?
A) Vinton Gray
B) Jack Dorsey
C) Mark Zuckerberg
D) Timothy John Berners-Lee
  • 41. Which of the following is a type of malware that encrypts files and demands payment for their release?
A) Adware
B) Spyware
C) Ransomware
D) Trojan Horse
  • 42. What is an old internet that only allows people to read from the internet. First stage worldwide linking web pages and hyperlink?
A) Web 2.0
B) Web 1.0
C) Web 3.0
D) Web 1.1
  • 43. When humans first started communicating they would try to use language or simple picture drawings known as________?
A) Abacus
B) Papyrus Plant
C) Petroglyphs
D) Phoenician Alphabet
  • 44. What is collection of data that is stored in a computer system. Databases allow their users to enter, access, and analyze their data quickly and easily?
A) Database
B) Data Communication
C) Dataset
D) Data transmission
  • 45. What is a common privacy concern associated with the widespread use of IoT devices?
A) Unauthorized access to personal data
B) Limited data storage capabilities
C) Excessive device durability
D) Improved user control over device functionalities
  • 46. Which of the following is an example of an IoT device?
A) Smart thermostat
B) Traditional desktop computer
C) Basic mobile phone
D) Standard printer
  • 47. What is the environmental impact of technology usage?
A) Decreased use of natural resources
B) Increased pollution and waste
C) Positive contribution to environmental conservation
D) No impact on the environment
  • 48. What does the term "streaming" refer to in the context of the internet?
A) Securing online transactions
B) Fast downloading of files
C) Conducting online surveys
D) Real-time data transmission of audio or video content
  • 49. This is a more versatile and practical version of virtual Reality, as it does not fully immerse individuals in an experience, What it is?
A) Augmented Reality
B) Blockchain Data
C) Augmented Virtual
D) Virtual Reality
  • 50. Cryptocurrency Bitcoin is one of the example of_______?
A) Blockchain Communication
B) Blockchain Data
C) Blockchain Reality
D) Blockchain Message
  • 51. Amazon introduces the Echos speaker, along with the Alexa voice assistant - a new way in the year of_________?
A) 2014
B) 2008
C) 2023
D) 2020
  • 52. You are considering implementing ICT in education. What advantage can students gain?
A) Decreased access to educational resources
B) Increased travel time to physical classrooms
C) Improved access to a variety of learning materials
D) Limited interaction with teachers
  • 53. What is a network of resources a company can access, and this method of using a digital drive increases the efficiency of organizations?
A) Cloud computing
B) Automation
C) Wi-Fi Eavesdropping
D) Virtual Reality
  • 54. Why IoT is important?
A) All of the above
B) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods
C) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive
D) Helps people live and work smarter, as well as gain complete control over their lives
  • 55. Why does the number of Internet connected devices, by some estimates, exceeds 20 billion?
A) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses
B) All of the above
C) Because of the new gadget that will be released
D) Because of many modern technologies
  • 56. What term describes a Cybercrime in which perpetrators gain unauthorized access to computer systems, networks, or data?
A) Identity theft
B) Hacking
C) Malware
D) Viruses
  • 57. In what way can IoT enhance decision-making in business?
A) Decreased need for strategic planning
B) All of the above
C) Increased reliance on intuition
D) Improved data-driven decision-making through analytics
  • 58. Which technology enables the decentralized and secure storage of digital transactions?
A) Analog computing
B) Cloud computing
C) Blockchain
D) Mainframe computing
  • 59. What is the purpose of Cybersecurity awareness training for individuals and organizations?
A) To increase vulnerability to cyber attacks
B) To teach hacking techniques
C) To promote ethical hacking practices
D) To raise awareness about potential internet threats and safe online practices
  • 60. Which type of server is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery?
A) File server
B) Application server
C) Mailserver
D) Policy server
  • 61. When should you use proper capitalization and punctuation in online communication?
A) Always, to ensure clarity and professionalism
B) Only when communicating with close friends
C) Never, because it's not important in the Digital world
D) Only when writing formal emails
  • 62. What is a form of child sexual exploitation?
A) Cyber Defamation
B) Child Pornography
C) Cyberbullying
D) Cybersex
  • 63. Which of the following is a common internet security protocol used to encrypt data transmitted between a web browser and a web server?
A) IPsec
B) HTTPS
C) FTP
D) SSH
  • 64. What is a maximum penalty for Cybersex?
A) Penalty atleast Php 500,000 and or prison mayor
B) Penalty atleast Php 5,000
C) Penalty atleast Php 200,000 and or prison mayor
D) Prison mayor only
  • 65. What does "ISP" stand for in the context of the internet?
A) Internet Security Protocol
B) Internet Search Provider
C) Internet Service Provider
D) Internet Support Program
  • 66. What is the term "etiquette" a combination of?
A) Internet and Etiquette
B) None of the above
C) Network and Etiquette
D) Networking and Technology
  • 67. What is a penalty for Cyber Defamation?
A) Penalty at least Php 500, 000 and or prison mayor
B) Penalty of 6-12 years of imprisonment or prison mayor
C) Penalty of 1 year of imprisonment or prison mayor
D) Penalty of 20,000
  • 68. What is the violation, piracy or their of the copyright holders exclusive rights through the unauthorized use of a copyright material or work?
A) Piracy
B) Plagiarism
C) Computer Addiction
D) Copyright infringement
  • 69. What is "netiquette"?
A) A social media platform
B) A social media platform
C) A set of rules for polite and respectful behavior on the Internet
D) A type of computer virus
  • 70. Six years up to twelve years of imprisonment also known as?
A) Reclusion temporary
B) Prison major
C) Prison mayor
D) Reclusion temporal
  • 71. If you receive an email with a subject line in ALL CAPS, it is generally interpreted as:
A) The sender is shouting or being rude
B) The sender is emphasizing the importance of the email
C) The email is spam and should be deleted
D) The email contains confidential information
  • 72. What does the term "ransomware" refer to in the context of Cybercrime?
A) Malicious software that encrypts a victims data and demands a ransom for its release
B) A software that provides free services
C) A legitimate form of remote work
D) A software that provides free services
  • 73. Which of the following is an example of popular social networking platform?
A) Facebook
B) Amazon
C) eBay
D) YouTube
  • 74. What is a single digit in the binary numbering system (base 2). For example: 1 is a bit or 0 is a bit?
A) Byte
B) Bait
C) Bit
D) Byt
  • 75. What types websites have the primary goal of either providing educational materials to visitors or providing information on an educational institution to them?
A) Media Website
B) Nonprofit Website
C) Personal Website
D) Educational Website
  • 76. Which often refer is a computer program that provides service to another computer program and it's user?
A) DNS
B) Browser
C) IP address
D) Server
  • 77. What is Cybersecurity?
A) The practice of securing computer systems and networks from cyber threats
B) A type of computer game
C) The science of artificial intelligence
D) The study of the stock market
  • 78. Which of the following is not one of the "Ten Commandments of Etiquette" ?
A) Thou shall be prompt
B) Thou shall be prompt
C) Thou shall respect personal space
D) Thou shall avoid eye contact
  • 79. Which of the following is not example of Blogs?
A) Wordpress
B) Blogger
C) Pinterest
D) Tumbler
Created with That Quiz — a math test site for students of all grade levels.