Week 3: Long Quiz 1
Week 3: Long Quiz 1
Week 3: Long Quiz 1
A _____ page is about a single topic and can be edited by anyone with the right credentials
b. Wiki
Programs that can only be accessed using a browser are called _____
d. Web applications
Your computer became slow and unresponsive after you opened a file named
100freemp3s.exe. This file is probably a _____
a. Trojan
_____ are apps and websites used by people to interact with one another by sharing
information, sending messages, and exchanging ideas
d. Social Media
At home, Dad's laptop is the only device with direct Internet connection. He shares it to
other members of the family via Wi-Fi, which you connect to using your phone. In this
scenario, your phone is a _____.
b. Client
Websites that belong to the Web 1.0 generation were mostly _____
b. Static
People who send unwanted and unsolicited emails are called _____
c. Spammers
A Web 3.0 characteristic in which events and information are made available to users as
they happen.
c. Real-Time
Wiki is derived from the Hawiian work wikiwiki, which means _____
b. Quick
You had to enter your email address in order to play a free game. A few days later, you
started receiving multiple emails with links to other free games and downloads. You have
been a victim of ______
a. Spam
You can make an online search by entering your keywords in the browser's _____
b. Address bar
What do you call the unauthorized copying of the material support, labels, artwork and
packaging?
b. Counterfeiting
You can check an article's _____ to know if the information that it contains is updated.
a. Publication date
_____ Netiquette is similar to real-world etiquette in the sense that they are not strictly
upheld by law but are expected to be followed by everyone.
b. Informal Netiquette
______ is harmful because it denies the rightful owners the proper compensation/payment
for their work.
c. Piracy
You copied an essay that you found online and submitted it in an essay writing contest. You
have committed _____.
b. Plagiarism
Which of the following is NOT a reason why you should give credit to your sources?
c. To make the author notice you
.gov stands for
a. government
What is the official website of the Intellectual Property Code of the Philippines?
d. ipophil.gov.ph
In the spreadsheet above, what result will you get if you use the formula =C3-B2
c. 110
_____ Netiquette involves a set of rules that are imposed by online groups
a. formal
Which following actions are normally banned in online communities except _____
d. Joking
People who try to cause trouble by posting inappropriate or banned contents and off-topic
messages are called _____
c. Trolls
According to the IP Code, how many types of works are covered by copyright protection?
a. 15
If you break the rules of an online community, _____ may revoke your access/membership.
c. Admins
Several members of a forum are a having a heated debate. Eventually, they started posting
insults and threats against other members. The debate has escalated into a _____
b. Flame war
The use of strength or power to intimidate someone into doing something that he does not
want or to make him feel bad is called ____
d. Bullying
Your mom is calling you during class. In this situation, which of the following is the ethical
thing to do?
b. Ask for your teacher's permission to go outside so you can answer the call
Someone keeps posting cat pictures in a forum about car maintenance. This act is called
_____
b. Trolling