A) Viruses B) Spam C) Spyware D) Malware
A) All of the above B) A phase in the Middle Ages C) The current era characterized by the use of digital technologies D) A term reffering to the Stone Age
A) Larged-sized computer hardware B) Extremely large physical documents C) Extremely large physical documents D) Massive datasets that require advanced analytics
A) 2005 B) 2003 C) 2000 D) 2001
A) Video Sharing Sites B) Social Networking C) Blogs D) Wikis
A) Charles Babbage B) Ada Lovelace C) Grace Hopper D) John von Neumann
A) Byron B) Babbage C) Edison D) Mauchly
A) Analytical Engine B) Telephone C) Calculator D) Computer
A) The latest version of internet browsers B) A type of computer programming language C) A network of interconnected smart devices that communicate and share data D) The internet used exclusively for gaming
A) Phishing B) Clicking C) Hacking D) Fishing
A) Excessive device durability B) Unauthorized access to personal data C) Limited data storage capabilities D) Improved user control over device functionalities
A) 5G B) Internet of Things C) Augmented Reality D) Blockchain Data
A) Limited access to medical information B) Increased paperwork and administrative tasks C) Improved patient care and treatment options D) Slower response time in emergencies
A) Enabled on-demand and personalized entertainment choices B) Limited access to movies and music C) Decreased options for entertainment D) Increased cost of entertainment
A) Instagram B) Tiktok C) Facebook D) Twitter
A) Technological Change B) Technological Determinism C) None of the above D) Social Constructivism
A) Led to economic recession B) Slowed down economic growth C) Increased unemployment rates D) Enhanced productivity and efficiency
A) Reclusion temporary B) Prison major C) Prison mayor D) Reclusion temporal
A) Wi-Fi Eavesdropping B) Automation C) Cloud Computing D) Virtual Reality
A) Through wired telephone lines B) All of these C) Wirelessly through the internet D) Through postal mail
A) Pretending to be someone else in online forums B) Stealing someone's personal information to impersonate them for fraudulent purposes C) Creating fake social media profiles D) A harmless online park
A) Virus B) Worms C) Spyware D) Malware
A) Regularly changing passwords every few years B) Using the same password across multiple accounts C) Using the same password across multiple accounts D) Using a combination of uppercase, lowercase, numbers, and symbols
A) Excessive power consumption B) Vulnerabilities in IoT device security C) Incompatibility with modern networks D) Lack of device connectivity
A) To make the message longer B) To confuse the recipient C) To show off one's technical skills D) To convey emotion or tone in text-based conversation
A) Artificial Intelligence B) Virtual Reality C) Augmented Reality D) Internet of Things
A) Increase in access to information and services that has accompanied the growth of the internet B) Can help people to communicate trough online games C) Students can access teaching materials from all over the world D) Reduced personal interaction
A) 2014 B) 2020 C) 2023 D) 2008
A) Through wired telephone lines B) Wirelessly through the internet C) Wirelessly through the internet D) Through postal mail
A) Social Constructivism B) Technological Change C) None of the above D) Technological Determinism
A) Ransomware B) Spam C) Trojan Horses D) Spyware
A) John Mauchly B) Blaise Pascal C) Grace Hopper D) Charles Babbage
A) Viruses B) Trojan Horses C) Worms D) Wi-Fi Eavesdropping
A) Communication of things B) Internet of Things C) Communication devices D) Internet devices
A) AI B) Z1 C) ED1 D) 5G
A) Pharming B) Phishing C) Spamming D) Malware
A) Work inside the Company B) All of the above C) Work from outside of the Country D) Teleworking (Work from Home)
A) They are always detected and prevented by antivirus software B) They involve physical break-ins C) They attempt to trick individuals into revealing sensitive information D) They are always detected and prevented by antivirus software
A) Republic Act No. 10175 Cybercrime Prevention Act of 2012 B) Republic Act No. 10173 Data Privacy Act of 2013 C) Republic Act No. 10175 Cybercrime Prevention Act of 2013 D) Republic Act No. 10173 Data Privacy Act of 2012
A) Timothy John Berners-Lee B) Mark Zuckerberg C) Jack Dorsey D) Vinton Gray
A) Ransomware B) Adware C) Spyware D) Trojan Horse
A) Web 2.0 B) Web 1.1 C) Web 1.0 D) Web 3.0
A) Papyrus Plant B) Abacus C) Phoenician Alphabet D) Petroglyphs
A) Data Communication B) Dataset C) Data transmission D) Database
A) Limited data storage capabilities B) Improved user control over device functionalities C) Unauthorized access to personal data D) Excessive device durability
A) Standard printer B) Smart thermostat C) Basic mobile phone D) Traditional desktop computer
A) No impact on the environment B) Positive contribution to environmental conservation C) Increased pollution and waste D) Decreased use of natural resources
A) Fast downloading of files B) Securing online transactions C) Real-time data transmission of audio or video content D) Conducting online surveys
A) Virtual Reality B) Blockchain Data C) Augmented Virtual D) Augmented Reality
A) Blockchain Reality B) Blockchain Data C) Blockchain Communication D) Blockchain Message
A) 2014 B) 2023 C) 2008 D) 2020
A) Improved access to a variety of learning materials B) Increased travel time to physical classrooms C) Decreased access to educational resources D) Limited interaction with teachers
A) Cloud computing B) Wi-Fi Eavesdropping C) Virtual Reality D) Automation
A) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive B) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods C) All of the above D) Helps people live and work smarter, as well as gain complete control over their lives
A) Because of many modern technologies B) Because of the new gadget that will be released C) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses D) All of the above
A) Viruses B) Hacking C) Malware D) Identity theft
A) All of the above B) Decreased need for strategic planning C) Increased reliance on intuition D) Improved data-driven decision-making through analytics
A) Blockchain B) Cloud computing C) Analog computing D) Mainframe computing
A) To teach hacking techniques B) To promote ethical hacking practices C) To raise awareness about potential internet threats and safe online practices D) To increase vulnerability to cyber attacks
A) Mailserver B) Application server C) Policy server D) File server
A) Never, because it's not important in the Digital world B) Only when writing formal emails C) Only when communicating with close friends D) Always, to ensure clarity and professionalism
A) Cyber Defamation B) Cybersex C) Cyberbullying D) Child Pornography
A) HTTPS B) IPsec C) FTP D) SSH
A) Penalty atleast Php 200,000 and or prison mayor B) Prison mayor only C) Penalty atleast Php 5,000 D) Penalty atleast Php 500,000 and or prison mayor
A) Internet Security Protocol B) Internet Search Provider C) Internet Service Provider D) Internet Support Program
A) Internet and Etiquette B) Networking and Technology C) Network and Etiquette D) None of the above
A) Penalty at least Php 500, 000 and or prison mayor B) Penalty of 6-12 years of imprisonment or prison mayor C) Penalty of 20,000 D) Penalty of 1 year of imprisonment or prison mayor
A) Computer Addiction B) Piracy C) Plagiarism D) Copyright infringement
A) A type of computer virus B) A set of rules for polite and respectful behavior on the Internet C) A social media platform D) A social media platform
A) Prison major B) Reclusion temporary C) Prison mayor D) Reclusion temporal
A) The sender is shouting or being rude B) The sender is emphasizing the importance of the email C) The email contains confidential information D) The email is spam and should be deleted
A) Malicious software that encrypts a victims data and demands a ransom for its release B) A legitimate form of remote work C) A software that provides free services D) A software that provides free services
A) YouTube B) Amazon C) eBay D) Facebook
A) Bit B) Byt C) Bait D) Byte
A) Nonprofit Website B) Personal Website C) Media Website D) Educational Website
A) IP address B) DNS C) Server D) Browser
A) A type of computer game B) The study of the stock market C) The practice of securing computer systems and networks from cyber threats D) The science of artificial intelligence
A) Thou shall respect personal space B) Thou shall avoid eye contact C) Thou shall be prompt D) Thou shall be prompt
A) Wordpress B) Pinterest C) Blogger D) Tumbler |