A) Malware B) Spyware C) Viruses D) Spam
A) The current era characterized by the use of digital technologies B) A phase in the Middle Ages C) A term reffering to the Stone Age D) All of the above
A) Massive datasets that require advanced analytics B) Extremely large physical documents C) Extremely large physical documents D) Larged-sized computer hardware
A) 2000 B) 2003 C) 2005 D) 2001
A) Video Sharing Sites B) Blogs C) Social Networking D) Wikis
A) John von Neumann B) Charles Babbage C) Ada Lovelace D) Grace Hopper
A) Edison B) Byron C) Mauchly D) Babbage
A) Analytical Engine B) Computer C) Telephone D) Calculator
A) The internet used exclusively for gaming B) The latest version of internet browsers C) A type of computer programming language D) A network of interconnected smart devices that communicate and share data
A) Phishing B) Hacking C) Fishing D) Clicking
A) Improved user control over device functionalities B) Unauthorized access to personal data C) Excessive device durability D) Limited data storage capabilities
A) Blockchain Data B) 5G C) Internet of Things D) Augmented Reality
A) Limited access to medical information B) Improved patient care and treatment options C) Increased paperwork and administrative tasks D) Slower response time in emergencies
A) Enabled on-demand and personalized entertainment choices B) Increased cost of entertainment C) Limited access to movies and music D) Decreased options for entertainment
A) Tiktok B) Instagram C) Facebook D) Twitter
A) Technological Determinism B) Technological Change C) None of the above D) Social Constructivism
A) Led to economic recession B) Increased unemployment rates C) Enhanced productivity and efficiency D) Slowed down economic growth
A) Prison mayor B) Prison major C) Reclusion temporal D) Reclusion temporary
A) Virtual Reality B) Wi-Fi Eavesdropping C) Cloud Computing D) Automation
A) Through postal mail B) Through wired telephone lines C) Wirelessly through the internet D) All of these
A) A harmless online park B) Pretending to be someone else in online forums C) Stealing someone's personal information to impersonate them for fraudulent purposes D) Creating fake social media profiles
A) Malware B) Spyware C) Worms D) Virus
A) Using the same password across multiple accounts B) Using a combination of uppercase, lowercase, numbers, and symbols C) Using the same password across multiple accounts D) Regularly changing passwords every few years
A) Incompatibility with modern networks B) Excessive power consumption C) Lack of device connectivity D) Vulnerabilities in IoT device security
A) To make the message longer B) To confuse the recipient C) To convey emotion or tone in text-based conversation D) To show off one's technical skills
A) Artificial Intelligence B) Augmented Reality C) Virtual Reality D) Internet of Things
A) Can help people to communicate trough online games B) Students can access teaching materials from all over the world C) Increase in access to information and services that has accompanied the growth of the internet D) Reduced personal interaction
A) 2020 B) 2023 C) 2008 D) 2014
A) Through postal mail B) Through wired telephone lines C) Wirelessly through the internet D) Wirelessly through the internet
A) None of the above B) Technological Change C) Technological Determinism D) Social Constructivism
A) Ransomware B) Spam C) Trojan Horses D) Spyware
A) John Mauchly B) Blaise Pascal C) Grace Hopper D) Charles Babbage
A) Trojan Horses B) Viruses C) Worms D) Wi-Fi Eavesdropping
A) Internet devices B) Communication devices C) Communication of things D) Internet of Things
A) 5G B) Z1 C) ED1 D) AI
A) Spamming B) Pharming C) Phishing D) Malware
A) Work from outside of the Country B) Work inside the Company C) Teleworking (Work from Home) D) All of the above
A) They are always detected and prevented by antivirus software B) They are always detected and prevented by antivirus software C) They involve physical break-ins D) They attempt to trick individuals into revealing sensitive information
A) Republic Act No. 10173 Data Privacy Act of 2012 B) Republic Act No. 10175 Cybercrime Prevention Act of 2013 C) Republic Act No. 10173 Data Privacy Act of 2013 D) Republic Act No. 10175 Cybercrime Prevention Act of 2012
A) Mark Zuckerberg B) Timothy John Berners-Lee C) Jack Dorsey D) Vinton Gray
A) Ransomware B) Trojan Horse C) Adware D) Spyware
A) Web 1.1 B) Web 2.0 C) Web 1.0 D) Web 3.0
A) Phoenician Alphabet B) Petroglyphs C) Abacus D) Papyrus Plant
A) Dataset B) Data Communication C) Database D) Data transmission
A) Unauthorized access to personal data B) Excessive device durability C) Improved user control over device functionalities D) Limited data storage capabilities
A) Traditional desktop computer B) Standard printer C) Basic mobile phone D) Smart thermostat
A) No impact on the environment B) Positive contribution to environmental conservation C) Decreased use of natural resources D) Increased pollution and waste
A) Conducting online surveys B) Fast downloading of files C) Real-time data transmission of audio or video content D) Securing online transactions
A) Augmented Reality B) Augmented Virtual C) Blockchain Data D) Virtual Reality
A) Blockchain Reality B) Blockchain Data C) Blockchain Message D) Blockchain Communication
A) 2023 B) 2014 C) 2008 D) 2020
A) Improved access to a variety of learning materials B) Decreased access to educational resources C) Limited interaction with teachers D) Increased travel time to physical classrooms
A) Wi-Fi Eavesdropping B) Virtual Reality C) Automation D) Cloud computing
A) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods B) All of the above C) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive D) Helps people live and work smarter, as well as gain complete control over their lives
A) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses B) Because of the new gadget that will be released C) All of the above D) Because of many modern technologies
A) Hacking B) Malware C) Identity theft D) Viruses
A) Decreased need for strategic planning B) Increased reliance on intuition C) Improved data-driven decision-making through analytics D) All of the above
A) Blockchain B) Cloud computing C) Analog computing D) Mainframe computing
A) To increase vulnerability to cyber attacks B) To promote ethical hacking practices C) To raise awareness about potential internet threats and safe online practices D) To teach hacking techniques
A) Policy server B) File server C) Mailserver D) Application server
A) Only when communicating with close friends B) Never, because it's not important in the Digital world C) Only when writing formal emails D) Always, to ensure clarity and professionalism
A) Cybersex B) Cyberbullying C) Child Pornography D) Cyber Defamation
A) IPsec B) SSH C) HTTPS D) FTP
A) Penalty atleast Php 5,000 B) Prison mayor only C) Penalty atleast Php 500,000 and or prison mayor D) Penalty atleast Php 200,000 and or prison mayor
A) Internet Service Provider B) Internet Support Program C) Internet Security Protocol D) Internet Search Provider
A) Network and Etiquette B) Internet and Etiquette C) None of the above D) Networking and Technology
A) Penalty of 1 year of imprisonment or prison mayor B) Penalty of 20,000 C) Penalty at least Php 500, 000 and or prison mayor D) Penalty of 6-12 years of imprisonment or prison mayor
A) Copyright infringement B) Computer Addiction C) Piracy D) Plagiarism
A) A set of rules for polite and respectful behavior on the Internet B) A social media platform C) A type of computer virus D) A social media platform
A) Reclusion temporary B) Prison mayor C) Reclusion temporal D) Prison major
A) The sender is shouting or being rude B) The email is spam and should be deleted C) The email contains confidential information D) The sender is emphasizing the importance of the email
A) A software that provides free services B) A legitimate form of remote work C) Malicious software that encrypts a victims data and demands a ransom for its release D) A software that provides free services
A) Facebook B) Amazon C) eBay D) YouTube
A) Bit B) Bait C) Byt D) Byte
A) Personal Website B) Educational Website C) Nonprofit Website D) Media Website
A) IP address B) Server C) Browser D) DNS
A) The study of the stock market B) A type of computer game C) The science of artificial intelligence D) The practice of securing computer systems and networks from cyber threats
A) Thou shall avoid eye contact B) Thou shall be prompt C) Thou shall be prompt D) Thou shall respect personal space
A) Wordpress B) Tumbler C) Blogger D) Pinterest |