A) Malware B) Spam C) Viruses D) Spyware
A) The current era characterized by the use of digital technologies B) All of the above C) A phase in the Middle Ages D) A term reffering to the Stone Age
A) Extremely large physical documents B) Larged-sized computer hardware C) Extremely large physical documents D) Massive datasets that require advanced analytics
A) 2003 B) 2005 C) 2000 D) 2001
A) Video Sharing Sites B) Wikis C) Social Networking D) Blogs
A) Charles Babbage B) Grace Hopper C) John von Neumann D) Ada Lovelace
A) Edison B) Mauchly C) Babbage D) Byron
A) Telephone B) Analytical Engine C) Computer D) Calculator
A) A network of interconnected smart devices that communicate and share data B) A type of computer programming language C) The latest version of internet browsers D) The internet used exclusively for gaming
A) Fishing B) Phishing C) Clicking D) Hacking
A) Excessive device durability B) Unauthorized access to personal data C) Limited data storage capabilities D) Improved user control over device functionalities
A) Blockchain Data B) 5G C) Augmented Reality D) Internet of Things
A) Increased paperwork and administrative tasks B) Slower response time in emergencies C) Improved patient care and treatment options D) Limited access to medical information
A) Decreased options for entertainment B) Limited access to movies and music C) Increased cost of entertainment D) Enabled on-demand and personalized entertainment choices
A) Facebook B) Instagram C) Twitter D) Tiktok
A) Technological Determinism B) None of the above C) Social Constructivism D) Technological Change
A) Increased unemployment rates B) Led to economic recession C) Slowed down economic growth D) Enhanced productivity and efficiency
A) Prison major B) Reclusion temporal C) Reclusion temporary D) Prison mayor
A) Cloud Computing B) Virtual Reality C) Automation D) Wi-Fi Eavesdropping
A) Through postal mail B) Wirelessly through the internet C) Through wired telephone lines D) All of these
A) A harmless online park B) Pretending to be someone else in online forums C) Creating fake social media profiles D) Stealing someone's personal information to impersonate them for fraudulent purposes
A) Malware B) Virus C) Spyware D) Worms
A) Using the same password across multiple accounts B) Using the same password across multiple accounts C) Using a combination of uppercase, lowercase, numbers, and symbols D) Regularly changing passwords every few years
A) Lack of device connectivity B) Vulnerabilities in IoT device security C) Excessive power consumption D) Incompatibility with modern networks
A) To show off one's technical skills B) To confuse the recipient C) To make the message longer D) To convey emotion or tone in text-based conversation
A) Internet of Things B) Augmented Reality C) Artificial Intelligence D) Virtual Reality
A) Students can access teaching materials from all over the world B) Can help people to communicate trough online games C) Increase in access to information and services that has accompanied the growth of the internet D) Reduced personal interaction
A) 2023 B) 2014 C) 2008 D) 2020
A) Through wired telephone lines B) Wirelessly through the internet C) Wirelessly through the internet D) Through postal mail
A) Technological Determinism B) None of the above C) Technological Change D) Social Constructivism
A) Spam B) Spyware C) Ransomware D) Trojan Horses
A) Charles Babbage B) John Mauchly C) Blaise Pascal D) Grace Hopper
A) Worms B) Viruses C) Trojan Horses D) Wi-Fi Eavesdropping
A) Internet devices B) Communication devices C) Internet of Things D) Communication of things
A) Z1 B) AI C) 5G D) ED1
A) Spamming B) Phishing C) Pharming D) Malware
A) Teleworking (Work from Home) B) Work inside the Company C) Work from outside of the Country D) All of the above
A) They are always detected and prevented by antivirus software B) They involve physical break-ins C) They attempt to trick individuals into revealing sensitive information D) They are always detected and prevented by antivirus software
A) Republic Act No. 10173 Data Privacy Act of 2012 B) Republic Act No. 10175 Cybercrime Prevention Act of 2012 C) Republic Act No. 10173 Data Privacy Act of 2013 D) Republic Act No. 10175 Cybercrime Prevention Act of 2013
A) Vinton Gray B) Jack Dorsey C) Timothy John Berners-Lee D) Mark Zuckerberg
A) Ransomware B) Adware C) Trojan Horse D) Spyware
A) Web 1.0 B) Web 2.0 C) Web 3.0 D) Web 1.1
A) Petroglyphs B) Abacus C) Phoenician Alphabet D) Papyrus Plant
A) Database B) Data Communication C) Dataset D) Data transmission
A) Unauthorized access to personal data B) Improved user control over device functionalities C) Excessive device durability D) Limited data storage capabilities
A) Standard printer B) Smart thermostat C) Traditional desktop computer D) Basic mobile phone
A) No impact on the environment B) Positive contribution to environmental conservation C) Increased pollution and waste D) Decreased use of natural resources
A) Real-time data transmission of audio or video content B) Fast downloading of files C) Conducting online surveys D) Securing online transactions
A) Blockchain Data B) Augmented Virtual C) Augmented Reality D) Virtual Reality
A) Blockchain Reality B) Blockchain Communication C) Blockchain Message D) Blockchain Data
A) 2014 B) 2008 C) 2020 D) 2023
A) Increased travel time to physical classrooms B) Improved access to a variety of learning materials C) Decreased access to educational resources D) Limited interaction with teachers
A) Cloud computing B) Automation C) Virtual Reality D) Wi-Fi Eavesdropping
A) Helps people live and work smarter, as well as gain complete control over their lives B) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive C) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods D) All of the above
A) Because of the new gadget that will be released B) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses C) Because of many modern technologies D) All of the above
A) Identity theft B) Viruses C) Malware D) Hacking
A) All of the above B) Decreased need for strategic planning C) Improved data-driven decision-making through analytics D) Increased reliance on intuition
A) Analog computing B) Mainframe computing C) Cloud computing D) Blockchain
A) To raise awareness about potential internet threats and safe online practices B) To teach hacking techniques C) To increase vulnerability to cyber attacks D) To promote ethical hacking practices
A) Mailserver B) File server C) Policy server D) Application server
A) Always, to ensure clarity and professionalism B) Never, because it's not important in the Digital world C) Only when communicating with close friends D) Only when writing formal emails
A) Cybersex B) Cyber Defamation C) Cyberbullying D) Child Pornography
A) FTP B) SSH C) IPsec D) HTTPS
A) Penalty atleast Php 500,000 and or prison mayor B) Prison mayor only C) Penalty atleast Php 200,000 and or prison mayor D) Penalty atleast Php 5,000
A) Internet Support Program B) Internet Service Provider C) Internet Security Protocol D) Internet Search Provider
A) None of the above B) Network and Etiquette C) Networking and Technology D) Internet and Etiquette
A) Penalty of 6-12 years of imprisonment or prison mayor B) Penalty of 20,000 C) Penalty at least Php 500, 000 and or prison mayor D) Penalty of 1 year of imprisonment or prison mayor
A) Computer Addiction B) Copyright infringement C) Piracy D) Plagiarism
A) A social media platform B) A social media platform C) A set of rules for polite and respectful behavior on the Internet D) A type of computer virus
A) Reclusion temporary B) Reclusion temporal C) Prison major D) Prison mayor
A) The email contains confidential information B) The sender is emphasizing the importance of the email C) The sender is shouting or being rude D) The email is spam and should be deleted
A) A software that provides free services B) A software that provides free services C) Malicious software that encrypts a victims data and demands a ransom for its release D) A legitimate form of remote work
A) Amazon B) YouTube C) Facebook D) eBay
A) Bait B) Bit C) Byt D) Byte
A) Personal Website B) Educational Website C) Media Website D) Nonprofit Website
A) IP address B) DNS C) Server D) Browser
A) The science of artificial intelligence B) A type of computer game C) The practice of securing computer systems and networks from cyber threats D) The study of the stock market
A) Thou shall be prompt B) Thou shall respect personal space C) Thou shall avoid eye contact D) Thou shall be prompt
A) Pinterest B) Tumbler C) Wordpress D) Blogger |