A) Spyware B) Spam C) Viruses D) Malware
A) The current era characterized by the use of digital technologies B) All of the above C) A phase in the Middle Ages D) A term reffering to the Stone Age
A) Extremely large physical documents B) Larged-sized computer hardware C) Extremely large physical documents D) Massive datasets that require advanced analytics
A) 2000 B) 2005 C) 2003 D) 2001
A) Social Networking B) Blogs C) Video Sharing Sites D) Wikis
A) Grace Hopper B) Charles Babbage C) John von Neumann D) Ada Lovelace
A) Byron B) Edison C) Mauchly D) Babbage
A) Calculator B) Analytical Engine C) Telephone D) Computer
A) A network of interconnected smart devices that communicate and share data B) The internet used exclusively for gaming C) The latest version of internet browsers D) A type of computer programming language
A) Clicking B) Phishing C) Fishing D) Hacking
A) Limited data storage capabilities B) Unauthorized access to personal data C) Improved user control over device functionalities D) Excessive device durability
A) Augmented Reality B) Blockchain Data C) Internet of Things D) 5G
A) Slower response time in emergencies B) Increased paperwork and administrative tasks C) Improved patient care and treatment options D) Limited access to medical information
A) Limited access to movies and music B) Decreased options for entertainment C) Increased cost of entertainment D) Enabled on-demand and personalized entertainment choices
A) Facebook B) Twitter C) Instagram D) Tiktok
A) Technological Determinism B) Social Constructivism C) Technological Change D) None of the above
A) Slowed down economic growth B) Led to economic recession C) Enhanced productivity and efficiency D) Increased unemployment rates
A) Reclusion temporary B) Reclusion temporal C) Prison major D) Prison mayor
A) Virtual Reality B) Wi-Fi Eavesdropping C) Automation D) Cloud Computing
A) Through postal mail B) All of these C) Wirelessly through the internet D) Through wired telephone lines
A) Stealing someone's personal information to impersonate them for fraudulent purposes B) Creating fake social media profiles C) A harmless online park D) Pretending to be someone else in online forums
A) Virus B) Malware C) Spyware D) Worms
A) Using a combination of uppercase, lowercase, numbers, and symbols B) Using the same password across multiple accounts C) Regularly changing passwords every few years D) Using the same password across multiple accounts
A) Vulnerabilities in IoT device security B) Incompatibility with modern networks C) Excessive power consumption D) Lack of device connectivity
A) To confuse the recipient B) To convey emotion or tone in text-based conversation C) To make the message longer D) To show off one's technical skills
A) Augmented Reality B) Internet of Things C) Virtual Reality D) Artificial Intelligence
A) Can help people to communicate trough online games B) Reduced personal interaction C) Students can access teaching materials from all over the world D) Increase in access to information and services that has accompanied the growth of the internet
A) 2014 B) 2008 C) 2023 D) 2020
A) Wirelessly through the internet B) Wirelessly through the internet C) Through wired telephone lines D) Through postal mail
A) None of the above B) Technological Determinism C) Technological Change D) Social Constructivism
A) Spam B) Ransomware C) Spyware D) Trojan Horses
A) Blaise Pascal B) Charles Babbage C) Grace Hopper D) John Mauchly
A) Wi-Fi Eavesdropping B) Trojan Horses C) Worms D) Viruses
A) Internet of Things B) Communication devices C) Internet devices D) Communication of things
A) 5G B) AI C) ED1 D) Z1
A) Spamming B) Phishing C) Malware D) Pharming
A) All of the above B) Teleworking (Work from Home) C) Work inside the Company D) Work from outside of the Country
A) They attempt to trick individuals into revealing sensitive information B) They are always detected and prevented by antivirus software C) They involve physical break-ins D) They are always detected and prevented by antivirus software
A) Republic Act No. 10173 Data Privacy Act of 2013 B) Republic Act No. 10173 Data Privacy Act of 2012 C) Republic Act No. 10175 Cybercrime Prevention Act of 2012 D) Republic Act No. 10175 Cybercrime Prevention Act of 2013
A) Timothy John Berners-Lee B) Vinton Gray C) Mark Zuckerberg D) Jack Dorsey
A) Ransomware B) Adware C) Spyware D) Trojan Horse
A) Web 3.0 B) Web 2.0 C) Web 1.0 D) Web 1.1
A) Papyrus Plant B) Phoenician Alphabet C) Petroglyphs D) Abacus
A) Dataset B) Database C) Data Communication D) Data transmission
A) Improved user control over device functionalities B) Excessive device durability C) Limited data storage capabilities D) Unauthorized access to personal data
A) Basic mobile phone B) Standard printer C) Smart thermostat D) Traditional desktop computer
A) Increased pollution and waste B) Decreased use of natural resources C) No impact on the environment D) Positive contribution to environmental conservation
A) Securing online transactions B) Fast downloading of files C) Conducting online surveys D) Real-time data transmission of audio or video content
A) Virtual Reality B) Augmented Reality C) Augmented Virtual D) Blockchain Data
A) Blockchain Data B) Blockchain Communication C) Blockchain Reality D) Blockchain Message
A) 2014 B) 2008 C) 2020 D) 2023
A) Improved access to a variety of learning materials B) Limited interaction with teachers C) Increased travel time to physical classrooms D) Decreased access to educational resources
A) Wi-Fi Eavesdropping B) Automation C) Virtual Reality D) Cloud computing
A) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods B) All of the above C) Helps people live and work smarter, as well as gain complete control over their lives D) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive
A) Because of many modern technologies B) Because of the new gadget that will be released C) All of the above D) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses
A) Identity theft B) Viruses C) Hacking D) Malware
A) Improved data-driven decision-making through analytics B) Increased reliance on intuition C) Decreased need for strategic planning D) All of the above
A) Blockchain B) Analog computing C) Mainframe computing D) Cloud computing
A) To increase vulnerability to cyber attacks B) To promote ethical hacking practices C) To teach hacking techniques D) To raise awareness about potential internet threats and safe online practices
A) Mailserver B) File server C) Policy server D) Application server
A) Always, to ensure clarity and professionalism B) Never, because it's not important in the Digital world C) Only when writing formal emails D) Only when communicating with close friends
A) Cyberbullying B) Cyber Defamation C) Cybersex D) Child Pornography
A) FTP B) SSH C) IPsec D) HTTPS
A) Penalty atleast Php 200,000 and or prison mayor B) Prison mayor only C) Penalty atleast Php 5,000 D) Penalty atleast Php 500,000 and or prison mayor
A) Internet Support Program B) Internet Search Provider C) Internet Security Protocol D) Internet Service Provider
A) None of the above B) Network and Etiquette C) Networking and Technology D) Internet and Etiquette
A) Penalty of 20,000 B) Penalty at least Php 500, 000 and or prison mayor C) Penalty of 1 year of imprisonment or prison mayor D) Penalty of 6-12 years of imprisonment or prison mayor
A) Computer Addiction B) Piracy C) Plagiarism D) Copyright infringement
A) A social media platform B) A type of computer virus C) A social media platform D) A set of rules for polite and respectful behavior on the Internet
A) Reclusion temporary B) Prison mayor C) Prison major D) Reclusion temporal
A) The sender is shouting or being rude B) The email contains confidential information C) The email is spam and should be deleted D) The sender is emphasizing the importance of the email
A) Malicious software that encrypts a victims data and demands a ransom for its release B) A software that provides free services C) A legitimate form of remote work D) A software that provides free services
A) Facebook B) eBay C) Amazon D) YouTube
A) Byte B) Bait C) Byt D) Bit
A) Personal Website B) Media Website C) Nonprofit Website D) Educational Website
A) Browser B) Server C) IP address D) DNS
A) The study of the stock market B) The practice of securing computer systems and networks from cyber threats C) A type of computer game D) The science of artificial intelligence
A) Thou shall be prompt B) Thou shall be prompt C) Thou shall respect personal space D) Thou shall avoid eye contact
A) Tumbler B) Blogger C) Wordpress D) Pinterest |