A) Viruses B) Malware C) Spam D) Spyware
A) A phase in the Middle Ages B) All of the above C) The current era characterized by the use of digital technologies D) A term reffering to the Stone Age
A) Larged-sized computer hardware B) Massive datasets that require advanced analytics C) Extremely large physical documents D) Extremely large physical documents
A) 2003 B) 2000 C) 2005 D) 2001
A) Wikis B) Blogs C) Social Networking D) Video Sharing Sites
A) Grace Hopper B) Charles Babbage C) John von Neumann D) Ada Lovelace
A) Edison B) Mauchly C) Byron D) Babbage
A) Calculator B) Analytical Engine C) Computer D) Telephone
A) The latest version of internet browsers B) A type of computer programming language C) A network of interconnected smart devices that communicate and share data D) The internet used exclusively for gaming
A) Phishing B) Hacking C) Fishing D) Clicking
A) Limited data storage capabilities B) Unauthorized access to personal data C) Improved user control over device functionalities D) Excessive device durability
A) Augmented Reality B) Blockchain Data C) 5G D) Internet of Things
A) Improved patient care and treatment options B) Slower response time in emergencies C) Increased paperwork and administrative tasks D) Limited access to medical information
A) Limited access to movies and music B) Enabled on-demand and personalized entertainment choices C) Decreased options for entertainment D) Increased cost of entertainment
A) Twitter B) Instagram C) Facebook D) Tiktok
A) Technological Change B) Technological Determinism C) Social Constructivism D) None of the above
A) Enhanced productivity and efficiency B) Increased unemployment rates C) Slowed down economic growth D) Led to economic recession
A) Prison mayor B) Prison major C) Reclusion temporary D) Reclusion temporal
A) Cloud Computing B) Virtual Reality C) Automation D) Wi-Fi Eavesdropping
A) Wirelessly through the internet B) Through postal mail C) Through wired telephone lines D) All of these
A) Pretending to be someone else in online forums B) A harmless online park C) Creating fake social media profiles D) Stealing someone's personal information to impersonate them for fraudulent purposes
A) Virus B) Malware C) Worms D) Spyware
A) Using a combination of uppercase, lowercase, numbers, and symbols B) Using the same password across multiple accounts C) Using the same password across multiple accounts D) Regularly changing passwords every few years
A) Excessive power consumption B) Vulnerabilities in IoT device security C) Incompatibility with modern networks D) Lack of device connectivity
A) To make the message longer B) To confuse the recipient C) To show off one's technical skills D) To convey emotion or tone in text-based conversation
A) Augmented Reality B) Internet of Things C) Artificial Intelligence D) Virtual Reality
A) Can help people to communicate trough online games B) Students can access teaching materials from all over the world C) Increase in access to information and services that has accompanied the growth of the internet D) Reduced personal interaction
A) 2023 B) 2020 C) 2008 D) 2014
A) Wirelessly through the internet B) Through wired telephone lines C) Through postal mail D) Wirelessly through the internet
A) Technological Determinism B) Social Constructivism C) Technological Change D) None of the above
A) Trojan Horses B) Spyware C) Ransomware D) Spam
A) Charles Babbage B) Grace Hopper C) John Mauchly D) Blaise Pascal
A) Trojan Horses B) Viruses C) Worms D) Wi-Fi Eavesdropping
A) Communication devices B) Communication of things C) Internet of Things D) Internet devices
A) 5G B) AI C) Z1 D) ED1
A) Spamming B) Phishing C) Malware D) Pharming
A) Teleworking (Work from Home) B) Work from outside of the Country C) All of the above D) Work inside the Company
A) They are always detected and prevented by antivirus software B) They involve physical break-ins C) They attempt to trick individuals into revealing sensitive information D) They are always detected and prevented by antivirus software
A) Republic Act No. 10173 Data Privacy Act of 2012 B) Republic Act No. 10175 Cybercrime Prevention Act of 2013 C) Republic Act No. 10175 Cybercrime Prevention Act of 2012 D) Republic Act No. 10173 Data Privacy Act of 2013
A) Mark Zuckerberg B) Timothy John Berners-Lee C) Jack Dorsey D) Vinton Gray
A) Ransomware B) Trojan Horse C) Adware D) Spyware
A) Web 2.0 B) Web 3.0 C) Web 1.1 D) Web 1.0
A) Petroglyphs B) Abacus C) Papyrus Plant D) Phoenician Alphabet
A) Data Communication B) Database C) Data transmission D) Dataset
A) Excessive device durability B) Unauthorized access to personal data C) Improved user control over device functionalities D) Limited data storage capabilities
A) Traditional desktop computer B) Smart thermostat C) Standard printer D) Basic mobile phone
A) Positive contribution to environmental conservation B) Decreased use of natural resources C) No impact on the environment D) Increased pollution and waste
A) Real-time data transmission of audio or video content B) Conducting online surveys C) Fast downloading of files D) Securing online transactions
A) Virtual Reality B) Blockchain Data C) Augmented Virtual D) Augmented Reality
A) Blockchain Reality B) Blockchain Data C) Blockchain Message D) Blockchain Communication
A) 2014 B) 2023 C) 2020 D) 2008
A) Limited interaction with teachers B) Improved access to a variety of learning materials C) Decreased access to educational resources D) Increased travel time to physical classrooms
A) Wi-Fi Eavesdropping B) Automation C) Cloud computing D) Virtual Reality
A) All of the above B) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive C) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods D) Helps people live and work smarter, as well as gain complete control over their lives
A) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses B) All of the above C) Because of many modern technologies D) Because of the new gadget that will be released
A) Hacking B) Identity theft C) Viruses D) Malware
A) Improved data-driven decision-making through analytics B) Increased reliance on intuition C) All of the above D) Decreased need for strategic planning
A) Cloud computing B) Mainframe computing C) Analog computing D) Blockchain
A) To promote ethical hacking practices B) To raise awareness about potential internet threats and safe online practices C) To increase vulnerability to cyber attacks D) To teach hacking techniques
A) Application server B) Mailserver C) Policy server D) File server
A) Never, because it's not important in the Digital world B) Always, to ensure clarity and professionalism C) Only when communicating with close friends D) Only when writing formal emails
A) Cyber Defamation B) Cybersex C) Cyberbullying D) Child Pornography
A) FTP B) SSH C) IPsec D) HTTPS
A) Penalty atleast Php 200,000 and or prison mayor B) Prison mayor only C) Penalty atleast Php 500,000 and or prison mayor D) Penalty atleast Php 5,000
A) Internet Service Provider B) Internet Search Provider C) Internet Support Program D) Internet Security Protocol
A) Internet and Etiquette B) Networking and Technology C) None of the above D) Network and Etiquette
A) Penalty at least Php 500, 000 and or prison mayor B) Penalty of 6-12 years of imprisonment or prison mayor C) Penalty of 20,000 D) Penalty of 1 year of imprisonment or prison mayor
A) Piracy B) Plagiarism C) Computer Addiction D) Copyright infringement
A) A type of computer virus B) A social media platform C) A set of rules for polite and respectful behavior on the Internet D) A social media platform
A) Reclusion temporal B) Prison mayor C) Prison major D) Reclusion temporary
A) The email contains confidential information B) The sender is shouting or being rude C) The email is spam and should be deleted D) The sender is emphasizing the importance of the email
A) Malicious software that encrypts a victims data and demands a ransom for its release B) A software that provides free services C) A software that provides free services D) A legitimate form of remote work
A) YouTube B) Facebook C) eBay D) Amazon
A) Byte B) Bait C) Bit D) Byt
A) Personal Website B) Nonprofit Website C) Educational Website D) Media Website
A) DNS B) Server C) Browser D) IP address
A) The science of artificial intelligence B) The study of the stock market C) A type of computer game D) The practice of securing computer systems and networks from cyber threats
A) Thou shall avoid eye contact B) Thou shall be prompt C) Thou shall respect personal space D) Thou shall be prompt
A) Wordpress B) Blogger C) Tumbler D) Pinterest |