A) Viruses B) Spam C) Malware D) Spyware
A) A phase in the Middle Ages B) All of the above C) A term reffering to the Stone Age D) The current era characterized by the use of digital technologies
A) Extremely large physical documents B) Massive datasets that require advanced analytics C) Extremely large physical documents D) Larged-sized computer hardware
A) 2003 B) 2001 C) 2005 D) 2000
A) Wikis B) Social Networking C) Blogs D) Video Sharing Sites
A) Grace Hopper B) John von Neumann C) Charles Babbage D) Ada Lovelace
A) Mauchly B) Edison C) Babbage D) Byron
A) Calculator B) Telephone C) Computer D) Analytical Engine
A) A type of computer programming language B) A network of interconnected smart devices that communicate and share data C) The internet used exclusively for gaming D) The latest version of internet browsers
A) Clicking B) Phishing C) Hacking D) Fishing
A) Unauthorized access to personal data B) Excessive device durability C) Improved user control over device functionalities D) Limited data storage capabilities
A) Blockchain Data B) Augmented Reality C) 5G D) Internet of Things
A) Improved patient care and treatment options B) Limited access to medical information C) Slower response time in emergencies D) Increased paperwork and administrative tasks
A) Limited access to movies and music B) Enabled on-demand and personalized entertainment choices C) Increased cost of entertainment D) Decreased options for entertainment
A) Instagram B) Facebook C) Twitter D) Tiktok
A) Social Constructivism B) Technological Determinism C) Technological Change D) None of the above
A) Enhanced productivity and efficiency B) Increased unemployment rates C) Led to economic recession D) Slowed down economic growth
A) Prison major B) Prison mayor C) Reclusion temporary D) Reclusion temporal
A) Wi-Fi Eavesdropping B) Automation C) Virtual Reality D) Cloud Computing
A) All of these B) Through postal mail C) Through wired telephone lines D) Wirelessly through the internet
A) Stealing someone's personal information to impersonate them for fraudulent purposes B) Creating fake social media profiles C) A harmless online park D) Pretending to be someone else in online forums
A) Malware B) Worms C) Spyware D) Virus
A) Using the same password across multiple accounts B) Using the same password across multiple accounts C) Regularly changing passwords every few years D) Using a combination of uppercase, lowercase, numbers, and symbols
A) Incompatibility with modern networks B) Lack of device connectivity C) Excessive power consumption D) Vulnerabilities in IoT device security
A) To make the message longer B) To show off one's technical skills C) To confuse the recipient D) To convey emotion or tone in text-based conversation
A) Artificial Intelligence B) Internet of Things C) Augmented Reality D) Virtual Reality
A) Increase in access to information and services that has accompanied the growth of the internet B) Reduced personal interaction C) Students can access teaching materials from all over the world D) Can help people to communicate trough online games
A) 2014 B) 2008 C) 2023 D) 2020
A) Wirelessly through the internet B) Wirelessly through the internet C) Through postal mail D) Through wired telephone lines
A) Technological Change B) Social Constructivism C) None of the above D) Technological Determinism
A) Ransomware B) Trojan Horses C) Spyware D) Spam
A) John Mauchly B) Blaise Pascal C) Grace Hopper D) Charles Babbage
A) Trojan Horses B) Wi-Fi Eavesdropping C) Worms D) Viruses
A) Internet of Things B) Internet devices C) Communication of things D) Communication devices
A) Z1 B) AI C) 5G D) ED1
A) Pharming B) Malware C) Spamming D) Phishing
A) Work from outside of the Country B) Teleworking (Work from Home) C) All of the above D) Work inside the Company
A) They involve physical break-ins B) They attempt to trick individuals into revealing sensitive information C) They are always detected and prevented by antivirus software D) They are always detected and prevented by antivirus software
A) Republic Act No. 10173 Data Privacy Act of 2013 B) Republic Act No. 10175 Cybercrime Prevention Act of 2013 C) Republic Act No. 10175 Cybercrime Prevention Act of 2012 D) Republic Act No. 10173 Data Privacy Act of 2012
A) Mark Zuckerberg B) Timothy John Berners-Lee C) Vinton Gray D) Jack Dorsey
A) Spyware B) Trojan Horse C) Adware D) Ransomware
A) Web 3.0 B) Web 1.0 C) Web 2.0 D) Web 1.1
A) Phoenician Alphabet B) Abacus C) Petroglyphs D) Papyrus Plant
A) Data Communication B) Data transmission C) Database D) Dataset
A) Unauthorized access to personal data B) Limited data storage capabilities C) Improved user control over device functionalities D) Excessive device durability
A) Smart thermostat B) Standard printer C) Traditional desktop computer D) Basic mobile phone
A) Increased pollution and waste B) Positive contribution to environmental conservation C) No impact on the environment D) Decreased use of natural resources
A) Conducting online surveys B) Securing online transactions C) Fast downloading of files D) Real-time data transmission of audio or video content
A) Augmented Reality B) Augmented Virtual C) Virtual Reality D) Blockchain Data
A) Blockchain Reality B) Blockchain Data C) Blockchain Communication D) Blockchain Message
A) 2014 B) 2008 C) 2023 D) 2020
A) Decreased access to educational resources B) Improved access to a variety of learning materials C) Limited interaction with teachers D) Increased travel time to physical classrooms
A) Wi-Fi Eavesdropping B) Cloud computing C) Automation D) Virtual Reality
A) Helps people live and work smarter, as well as gain complete control over their lives B) All of the above C) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods D) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive
A) All of the above B) Because of the new gadget that will be released C) Because of many modern technologies D) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses
A) Malware B) Identity theft C) Hacking D) Viruses
A) Decreased need for strategic planning B) Increased reliance on intuition C) Improved data-driven decision-making through analytics D) All of the above
A) Blockchain B) Analog computing C) Mainframe computing D) Cloud computing
A) To raise awareness about potential internet threats and safe online practices B) To promote ethical hacking practices C) To teach hacking techniques D) To increase vulnerability to cyber attacks
A) Application server B) Policy server C) File server D) Mailserver
A) Never, because it's not important in the Digital world B) Only when writing formal emails C) Only when communicating with close friends D) Always, to ensure clarity and professionalism
A) Cyber Defamation B) Cybersex C) Cyberbullying D) Child Pornography
A) IPsec B) SSH C) HTTPS D) FTP
A) Prison mayor only B) Penalty atleast Php 200,000 and or prison mayor C) Penalty atleast Php 500,000 and or prison mayor D) Penalty atleast Php 5,000
A) Internet Service Provider B) Internet Support Program C) Internet Security Protocol D) Internet Search Provider
A) Network and Etiquette B) Internet and Etiquette C) None of the above D) Networking and Technology
A) Penalty of 1 year of imprisonment or prison mayor B) Penalty of 20,000 C) Penalty of 6-12 years of imprisonment or prison mayor D) Penalty at least Php 500, 000 and or prison mayor
A) Computer Addiction B) Plagiarism C) Piracy D) Copyright infringement
A) A type of computer virus B) A set of rules for polite and respectful behavior on the Internet C) A social media platform D) A social media platform
A) Reclusion temporary B) Reclusion temporal C) Prison major D) Prison mayor
A) The sender is emphasizing the importance of the email B) The email contains confidential information C) The email is spam and should be deleted D) The sender is shouting or being rude
A) Malicious software that encrypts a victims data and demands a ransom for its release B) A software that provides free services C) A software that provides free services D) A legitimate form of remote work
A) Amazon B) Facebook C) YouTube D) eBay
A) Bit B) Bait C) Byte D) Byt
A) Educational Website B) Personal Website C) Nonprofit Website D) Media Website
A) IP address B) DNS C) Browser D) Server
A) The science of artificial intelligence B) The practice of securing computer systems and networks from cyber threats C) The study of the stock market D) A type of computer game
A) Thou shall be prompt B) Thou shall respect personal space C) Thou shall avoid eye contact D) Thou shall be prompt
A) Wordpress B) Blogger C) Tumbler D) Pinterest |