A) Malware B) Spam C) Viruses D) Spyware
A) The current era characterized by the use of digital technologies B) A term reffering to the Stone Age C) A phase in the Middle Ages D) All of the above
A) Extremely large physical documents B) Larged-sized computer hardware C) Massive datasets that require advanced analytics D) Extremely large physical documents
A) 2001 B) 2005 C) 2000 D) 2003
A) Wikis B) Video Sharing Sites C) Social Networking D) Blogs
A) Charles Babbage B) Ada Lovelace C) Grace Hopper D) John von Neumann
A) Babbage B) Mauchly C) Byron D) Edison
A) Analytical Engine B) Telephone C) Computer D) Calculator
A) The internet used exclusively for gaming B) The latest version of internet browsers C) A network of interconnected smart devices that communicate and share data D) A type of computer programming language
A) Phishing B) Clicking C) Fishing D) Hacking
A) Limited data storage capabilities B) Improved user control over device functionalities C) Excessive device durability D) Unauthorized access to personal data
A) Internet of Things B) 5G C) Augmented Reality D) Blockchain Data
A) Improved patient care and treatment options B) Increased paperwork and administrative tasks C) Limited access to medical information D) Slower response time in emergencies
A) Increased cost of entertainment B) Limited access to movies and music C) Decreased options for entertainment D) Enabled on-demand and personalized entertainment choices
A) Facebook B) Tiktok C) Instagram D) Twitter
A) None of the above B) Social Constructivism C) Technological Determinism D) Technological Change
A) Enhanced productivity and efficiency B) Led to economic recession C) Increased unemployment rates D) Slowed down economic growth
A) Reclusion temporal B) Reclusion temporary C) Prison major D) Prison mayor
A) Wi-Fi Eavesdropping B) Cloud Computing C) Automation D) Virtual Reality
A) Wirelessly through the internet B) Through postal mail C) All of these D) Through wired telephone lines
A) Creating fake social media profiles B) Pretending to be someone else in online forums C) A harmless online park D) Stealing someone's personal information to impersonate them for fraudulent purposes
A) Spyware B) Malware C) Worms D) Virus
A) Using a combination of uppercase, lowercase, numbers, and symbols B) Using the same password across multiple accounts C) Using the same password across multiple accounts D) Regularly changing passwords every few years
A) Excessive power consumption B) Incompatibility with modern networks C) Lack of device connectivity D) Vulnerabilities in IoT device security
A) To make the message longer B) To confuse the recipient C) To show off one's technical skills D) To convey emotion or tone in text-based conversation
A) Virtual Reality B) Internet of Things C) Augmented Reality D) Artificial Intelligence
A) Students can access teaching materials from all over the world B) Reduced personal interaction C) Increase in access to information and services that has accompanied the growth of the internet D) Can help people to communicate trough online games
A) 2023 B) 2014 C) 2008 D) 2020
A) Wirelessly through the internet B) Wirelessly through the internet C) Through wired telephone lines D) Through postal mail
A) Technological Change B) None of the above C) Technological Determinism D) Social Constructivism
A) Ransomware B) Spam C) Trojan Horses D) Spyware
A) Grace Hopper B) Charles Babbage C) Blaise Pascal D) John Mauchly
A) Viruses B) Wi-Fi Eavesdropping C) Worms D) Trojan Horses
A) Internet of Things B) Communication of things C) Communication devices D) Internet devices
A) AI B) 5G C) ED1 D) Z1
A) Spamming B) Malware C) Phishing D) Pharming
A) Work from outside of the Country B) Work inside the Company C) Teleworking (Work from Home) D) All of the above
A) They attempt to trick individuals into revealing sensitive information B) They are always detected and prevented by antivirus software C) They involve physical break-ins D) They are always detected and prevented by antivirus software
A) Republic Act No. 10173 Data Privacy Act of 2013 B) Republic Act No. 10173 Data Privacy Act of 2012 C) Republic Act No. 10175 Cybercrime Prevention Act of 2013 D) Republic Act No. 10175 Cybercrime Prevention Act of 2012
A) Vinton Gray B) Jack Dorsey C) Mark Zuckerberg D) Timothy John Berners-Lee
A) Adware B) Spyware C) Ransomware D) Trojan Horse
A) Web 2.0 B) Web 1.0 C) Web 3.0 D) Web 1.1
A) Abacus B) Papyrus Plant C) Petroglyphs D) Phoenician Alphabet
A) Database B) Data Communication C) Dataset D) Data transmission
A) Unauthorized access to personal data B) Limited data storage capabilities C) Excessive device durability D) Improved user control over device functionalities
A) Smart thermostat B) Traditional desktop computer C) Basic mobile phone D) Standard printer
A) Decreased use of natural resources B) Increased pollution and waste C) Positive contribution to environmental conservation D) No impact on the environment
A) Securing online transactions B) Fast downloading of files C) Conducting online surveys D) Real-time data transmission of audio or video content
A) Augmented Reality B) Blockchain Data C) Augmented Virtual D) Virtual Reality
A) Blockchain Communication B) Blockchain Data C) Blockchain Reality D) Blockchain Message
A) 2014 B) 2008 C) 2023 D) 2020
A) Decreased access to educational resources B) Increased travel time to physical classrooms C) Improved access to a variety of learning materials D) Limited interaction with teachers
A) Cloud computing B) Automation C) Wi-Fi Eavesdropping D) Virtual Reality
A) All of the above B) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods C) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive D) Helps people live and work smarter, as well as gain complete control over their lives
A) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses B) All of the above C) Because of the new gadget that will be released D) Because of many modern technologies
A) Identity theft B) Hacking C) Malware D) Viruses
A) Decreased need for strategic planning B) All of the above C) Increased reliance on intuition D) Improved data-driven decision-making through analytics
A) Analog computing B) Cloud computing C) Blockchain D) Mainframe computing
A) To increase vulnerability to cyber attacks B) To teach hacking techniques C) To promote ethical hacking practices D) To raise awareness about potential internet threats and safe online practices
A) File server B) Application server C) Mailserver D) Policy server
A) Always, to ensure clarity and professionalism B) Only when communicating with close friends C) Never, because it's not important in the Digital world D) Only when writing formal emails
A) Cyber Defamation B) Child Pornography C) Cyberbullying D) Cybersex
A) IPsec B) HTTPS C) FTP D) SSH
A) Penalty atleast Php 500,000 and or prison mayor B) Penalty atleast Php 5,000 C) Penalty atleast Php 200,000 and or prison mayor D) Prison mayor only
A) Internet Security Protocol B) Internet Search Provider C) Internet Service Provider D) Internet Support Program
A) Internet and Etiquette B) None of the above C) Network and Etiquette D) Networking and Technology
A) Penalty at least Php 500, 000 and or prison mayor B) Penalty of 6-12 years of imprisonment or prison mayor C) Penalty of 1 year of imprisonment or prison mayor D) Penalty of 20,000
A) Piracy B) Plagiarism C) Computer Addiction D) Copyright infringement
A) A social media platform B) A social media platform C) A set of rules for polite and respectful behavior on the Internet D) A type of computer virus
A) Reclusion temporary B) Prison major C) Prison mayor D) Reclusion temporal
A) The sender is shouting or being rude B) The sender is emphasizing the importance of the email C) The email is spam and should be deleted D) The email contains confidential information
A) Malicious software that encrypts a victims data and demands a ransom for its release B) A software that provides free services C) A legitimate form of remote work D) A software that provides free services
A) Facebook B) Amazon C) eBay D) YouTube
A) Byte B) Bait C) Bit D) Byt
A) Media Website B) Nonprofit Website C) Personal Website D) Educational Website
A) DNS B) Browser C) IP address D) Server
A) The practice of securing computer systems and networks from cyber threats B) A type of computer game C) The science of artificial intelligence D) The study of the stock market
A) Thou shall be prompt B) Thou shall be prompt C) Thou shall respect personal space D) Thou shall avoid eye contact
A) Wordpress B) Blogger C) Pinterest D) Tumbler |