A) Spam B) Spyware C) Malware D) Viruses
A) All of the above B) A phase in the Middle Ages C) A term reffering to the Stone Age D) The current era characterized by the use of digital technologies
A) Larged-sized computer hardware B) Extremely large physical documents C) Massive datasets that require advanced analytics D) Extremely large physical documents
A) 2003 B) 2005 C) 2000 D) 2001
A) Wikis B) Social Networking C) Video Sharing Sites D) Blogs
A) Ada Lovelace B) Charles Babbage C) Grace Hopper D) John von Neumann
A) Edison B) Byron C) Babbage D) Mauchly
A) Analytical Engine B) Calculator C) Computer D) Telephone
A) The internet used exclusively for gaming B) The latest version of internet browsers C) A type of computer programming language D) A network of interconnected smart devices that communicate and share data
A) Hacking B) Phishing C) Clicking D) Fishing
A) Excessive device durability B) Unauthorized access to personal data C) Improved user control over device functionalities D) Limited data storage capabilities
A) Internet of Things B) 5G C) Blockchain Data D) Augmented Reality
A) Slower response time in emergencies B) Improved patient care and treatment options C) Increased paperwork and administrative tasks D) Limited access to medical information
A) Increased cost of entertainment B) Limited access to movies and music C) Decreased options for entertainment D) Enabled on-demand and personalized entertainment choices
A) Twitter B) Tiktok C) Instagram D) Facebook
A) Technological Change B) Technological Determinism C) Social Constructivism D) None of the above
A) Slowed down economic growth B) Enhanced productivity and efficiency C) Led to economic recession D) Increased unemployment rates
A) Prison mayor B) Reclusion temporary C) Reclusion temporal D) Prison major
A) Automation B) Wi-Fi Eavesdropping C) Cloud Computing D) Virtual Reality
A) Through postal mail B) Through wired telephone lines C) All of these D) Wirelessly through the internet
A) Stealing someone's personal information to impersonate them for fraudulent purposes B) Pretending to be someone else in online forums C) Creating fake social media profiles D) A harmless online park
A) Malware B) Worms C) Virus D) Spyware
A) Using the same password across multiple accounts B) Regularly changing passwords every few years C) Using a combination of uppercase, lowercase, numbers, and symbols D) Using the same password across multiple accounts
A) Lack of device connectivity B) Incompatibility with modern networks C) Vulnerabilities in IoT device security D) Excessive power consumption
A) To convey emotion or tone in text-based conversation B) To show off one's technical skills C) To make the message longer D) To confuse the recipient
A) Virtual Reality B) Internet of Things C) Augmented Reality D) Artificial Intelligence
A) Students can access teaching materials from all over the world B) Can help people to communicate trough online games C) Increase in access to information and services that has accompanied the growth of the internet D) Reduced personal interaction
A) 2008 B) 2020 C) 2014 D) 2023
A) Wirelessly through the internet B) Through wired telephone lines C) Through postal mail D) Wirelessly through the internet
A) Social Constructivism B) Technological Determinism C) None of the above D) Technological Change
A) Ransomware B) Trojan Horses C) Spam D) Spyware
A) Grace Hopper B) John Mauchly C) Charles Babbage D) Blaise Pascal
A) Viruses B) Worms C) Trojan Horses D) Wi-Fi Eavesdropping
A) Communication devices B) Internet of Things C) Communication of things D) Internet devices
A) 5G B) AI C) Z1 D) ED1
A) Phishing B) Spamming C) Pharming D) Malware
A) Work inside the Company B) Work from outside of the Country C) Teleworking (Work from Home) D) All of the above
A) They are always detected and prevented by antivirus software B) They involve physical break-ins C) They attempt to trick individuals into revealing sensitive information D) They are always detected and prevented by antivirus software
A) Republic Act No. 10175 Cybercrime Prevention Act of 2013 B) Republic Act No. 10175 Cybercrime Prevention Act of 2012 C) Republic Act No. 10173 Data Privacy Act of 2013 D) Republic Act No. 10173 Data Privacy Act of 2012
A) Jack Dorsey B) Mark Zuckerberg C) Vinton Gray D) Timothy John Berners-Lee
A) Adware B) Spyware C) Ransomware D) Trojan Horse
A) Web 1.1 B) Web 1.0 C) Web 3.0 D) Web 2.0
A) Papyrus Plant B) Abacus C) Phoenician Alphabet D) Petroglyphs
A) Database B) Data Communication C) Dataset D) Data transmission
A) Improved user control over device functionalities B) Limited data storage capabilities C) Excessive device durability D) Unauthorized access to personal data
A) Standard printer B) Smart thermostat C) Basic mobile phone D) Traditional desktop computer
A) No impact on the environment B) Increased pollution and waste C) Decreased use of natural resources D) Positive contribution to environmental conservation
A) Securing online transactions B) Fast downloading of files C) Real-time data transmission of audio or video content D) Conducting online surveys
A) Augmented Reality B) Virtual Reality C) Augmented Virtual D) Blockchain Data
A) Blockchain Data B) Blockchain Message C) Blockchain Communication D) Blockchain Reality
A) 2014 B) 2020 C) 2023 D) 2008
A) Decreased access to educational resources B) Limited interaction with teachers C) Increased travel time to physical classrooms D) Improved access to a variety of learning materials
A) Cloud computing B) Wi-Fi Eavesdropping C) Virtual Reality D) Automation
A) All of the above B) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive C) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods D) Helps people live and work smarter, as well as gain complete control over their lives
A) All of the above B) Because of many modern technologies C) Because of the new gadget that will be released D) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses
A) Identity theft B) Malware C) Hacking D) Viruses
A) Increased reliance on intuition B) All of the above C) Decreased need for strategic planning D) Improved data-driven decision-making through analytics
A) Cloud computing B) Mainframe computing C) Blockchain D) Analog computing
A) To increase vulnerability to cyber attacks B) To raise awareness about potential internet threats and safe online practices C) To promote ethical hacking practices D) To teach hacking techniques
A) File server B) Mailserver C) Policy server D) Application server
A) Always, to ensure clarity and professionalism B) Only when communicating with close friends C) Never, because it's not important in the Digital world D) Only when writing formal emails
A) Cybersex B) Child Pornography C) Cyber Defamation D) Cyberbullying
A) IPsec B) SSH C) FTP D) HTTPS
A) Penalty atleast Php 500,000 and or prison mayor B) Penalty atleast Php 5,000 C) Penalty atleast Php 200,000 and or prison mayor D) Prison mayor only
A) Internet Security Protocol B) Internet Support Program C) Internet Service Provider D) Internet Search Provider
A) Networking and Technology B) Internet and Etiquette C) None of the above D) Network and Etiquette
A) Penalty of 6-12 years of imprisonment or prison mayor B) Penalty of 20,000 C) Penalty at least Php 500, 000 and or prison mayor D) Penalty of 1 year of imprisonment or prison mayor
A) Piracy B) Plagiarism C) Computer Addiction D) Copyright infringement
A) A social media platform B) A set of rules for polite and respectful behavior on the Internet C) A type of computer virus D) A social media platform
A) Reclusion temporary B) Reclusion temporal C) Prison major D) Prison mayor
A) The sender is emphasizing the importance of the email B) The email is spam and should be deleted C) The email contains confidential information D) The sender is shouting or being rude
A) Malicious software that encrypts a victims data and demands a ransom for its release B) A legitimate form of remote work C) A software that provides free services D) A software that provides free services
A) YouTube B) eBay C) Amazon D) Facebook
A) Bit B) Byte C) Byt D) Bait
A) Media Website B) Nonprofit Website C) Educational Website D) Personal Website
A) IP address B) Server C) Browser D) DNS
A) The practice of securing computer systems and networks from cyber threats B) The study of the stock market C) A type of computer game D) The science of artificial intelligence
A) Thou shall avoid eye contact B) Thou shall be prompt C) Thou shall be prompt D) Thou shall respect personal space
A) Wordpress B) Pinterest C) Blogger D) Tumbler |