Week 3: Long Quiz 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6
At a glance
Powered by AI
Some key takeaways from the passages include HTML standing for Hypertext Markup Language, social media being used to interact and share information, and cloud computing providing benefits like flexibility and cost savings.

Examples of malware mentioned include viruses, trojans, and worms. A virus is a type of malware that can spread to other computers, a trojan is malware disguised as useful software, and a worm can spread without human action.

Benefits of cloud computing mentioned include flexibility, cost savings, and proficiency. Cloud computing allows access to computing resources from anywhere without needing to own and maintain the physical hardware.

Week 3: Long Quiz 1

HTML means _____


d. Hypertext Markup Language

A _____ page is about a single topic and can be edited by anyone with the right credentials
b. Wiki

Which of the following does not need human action to spread?


c. Worm

is your alias, which is used by websites to represent your online presence.


b. Username

Programs that can only be accessed using a browser are called _____
d. Web applications

Which of the following is not a malware?


d. Ad blocker

The following are benefits of cloud computing except _____


a. Proficiency

Which of the following is TRUE?


b. Mobile phone apps are native apps because they are installed

_____ websites change appearance and behavior based on users' action


b. Dynamic

Your computer became slow and unresponsive after you opened a file named
100freemp3s.exe. This file is probably a _____
a. Trojan

_____ are apps and websites used by people to interact with one another by sharing
information, sending messages, and exchanging ideas
d. Social Media

A computer that does a task for other computers is called a _____


a. Server

_____ is a type of malware that is disguised as a harmless or useful program or file.


a. Trojan

At home, Dad's laptop is the only device with direct Internet connection. He shares it to
other members of the family via Wi-Fi, which you connect to using your phone. In this
scenario, your phone is a _____.
b. Client

Which of the following is NOT true?


b. A spam is a type of virus

Websites that belong to the Web 1.0 generation were mostly _____
b. Static

People who send unwanted and unsolicited emails are called _____
c. Spammers

Which of the following can be used in identity theft?


a. Address
b. All (ans)
c. Birth Date
d. Full name

Servers are housed in centralized locations called _____


c. Data centers

A Web 3.0 characteristic in which events and information are made available to users as
they happen.
c. Real-Time

The name Trojan is derived from a fictional wooden _____


d. Horse

Wiki is derived from the Hawiian work wikiwiki, which means _____
b. Quick

Which of the following CANNOT infect your computer?


d. Spam

Which of the following is NOT true?


b. Google's only server is located in California

Which of the following statements is NOT true?


b. Only your full name can be used as a username.

Which of the following should not be shared with anyone?


a. Password

You had to enter your email address in order to play a free game. A few days later, you
started receiving multiple emails with links to other free games and downloads. You have
been a victim of ______
a. Spam

_____ is a program that is designed to cause harm to your computer or device


b. virus

Which of the following is NOT true about passwords?


a. Passwords should not be memorized
You want to know if classes are suspended because of a storm. Which of the following
TLD's is most likely to have the most credible information
b. .gov

You can make an online search by entering your keywords in the browser's _____
b. Address bar

What do you call the unauthorized copying of the material support, labels, artwork and
packaging?
b. Counterfeiting

You can check an article's _____ to know if the information that it contains is updated.
a. Publication date

_____ Netiquette is similar to real-world etiquette in the sense that they are not strictly
upheld by law but are expected to be followed by everyone.
b. Informal Netiquette

A member of an online community constantly sends messages about products that he is


selling. You can report this person for _____.
b. Spamming

Which of the following TLD's is most likely to be used by non-profit groups?


d. .org

REPUBLIC ACT NO. 8293 is also known as _____


a. Intellectual Property Code of the Philippines

______ is harmful because it denies the rightful owners the proper compensation/payment
for their work.
c. Piracy

.net stands for _____


c. network

Contents of _____ websites like Wikipedia can be edited by anyone


a. open-source

Netiquette is short for _____


c. Network Etiquette

TLD stands for _____


c. Top-level domain

You copied an essay that you found online and submitted it in an essay writing contest. You
have committed _____.
b. Plagiarism

Which of the following is a polite thing to do?


b. Asking permission before taking pictures of other people

.com stands for _____


b. commercial

Anyone can use the following TLD's except _____


d. .gov

Which of the following is true?


a. Safari web browser's address bar doubles as the search bar

_____ is a web browser owned by Apple


c. Safari

Which of these is NOT ok to do while driving?


d. All of these

In which of the following situations is it ok to use your mobile phone?


b. None of these

Which of the following is not a browser?


d. Wikipedia

_____ is bullying that is done using electronic technology.


a. Cyberbullying

Which of the following is not true?


b. A web search engine can't be accessed using Internet browsers

Which of the following is NOT a reason why you should give credit to your sources?
c. To make the author notice you
.gov stands for
a. government

"IP Code" stands for


c. Intellectual Property Code of the Philippines

_____ are multiple accounts used by the same person


b. Sock puppets

Which of the following is against the law?


a. Taking videos in movie theatres

What is the official website of the Intellectual Property Code of the Philippines?
d. ipophil.gov.ph

In Calc, what sign can be seen in the beginning of the formulas?


b. =

In the spreadsheet above, what result will you get if you use the formula =C3-B2
c. 110

What is the name of word processor that we used in this chapter


b. LibreOffice Writer

In a spreadsheet, each box in a table is called a _____.


c. Cell
Week 4: Netiquette / Learning Activity 3

_____ Netiquette involves a set of rules that are imposed by online groups
a. formal

_____ is the legal right to own an original work


c. Copyright

Reproducing and distributing materials without the owner's consent is called


a. Piracy

Which of the following is an ethical thing to do while commuting?


b. Listen to music using headphones

Which following actions are normally banned in online communities except _____
d. Joking

Week 4: Netiquette / Short Quiz 3


You recorded a song on the radio and sent copies to your friends. What you did is called
_____
d. Bootlegging

People who try to cause trouble by posting inappropriate or banned contents and off-topic
messages are called _____
c. Trolls

According to the IP Code, how many types of works are covered by copyright protection?
a. 15

If you break the rules of an online community, _____ may revoke your access/membership.
c. Admins

Several members of a forum are a having a heated debate. Eventually, they started posting
insults and threats against other members. The debate has escalated into a _____
b. Flame war

Which of the following is not true?


b. Real-life etiquette does not apply online.

The use of strength or power to intimidate someone into doing something that he does not
want or to make him feel bad is called ____
d. Bullying

Your mom is calling you during class. In this situation, which of the following is the ethical
thing to do?
b. Ask for your teacher's permission to go outside so you can answer the call

Which of the following does not apply to Netiquette?


c. Expect the unexpected

Someone keeps posting cat pictures in a forum about car maintenance. This act is called
_____
b. Trolling

You might also like