Professional Documents
Culture Documents
ICT2112 1st Quarter Exam 2023
ICT2112 1st Quarter Exam 2023
Space Jam
Answer:
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a type of malware that does not need human action to spread
Select one:
a.
Phishing
b.
Trojan
c.
Worm
d.
Spam
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
=A1*B5-A5
950
Answer:
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a TLD that was created for online communities, open-source projects and non-profit
entities.
Select one:
a.
.net
b.
.org
c.
.com
d.
.edu
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
People who send unwanted and unsolicited emails are called _____
Select one:
a.
Scammers
b.
Phishers
c.
Hackers
d.
Spammers
Question 6
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Spam can spread when the infected computer makes contact with another computer.
Select one:
True
False
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Ad-blockers are browser add-ons that prevent advertisements from being displayed in your
browser.
Select one:
True
False
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
LibreOffice is an open-source _____
Select one:
a.
Graphics suite
b.
Productivity tool
c.
Office productivity suite
d.
Word processor
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Wiki is derived from the Hawiian work wikiwiki, which means _____
Select one:
a.
Quick
b.
Free
c.
Super-free
d.
Many
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The alias that you use when you sign up in a website is called a _____.
Select one:
a.
Domain name
b.
Full name
c.
Username
d.
Maiden name
Question 11
Complete
Mark 1.00 out of 1.00
Flag question
Question text
.com stands for _____
Select one:
a.
complicated
b.
communication
c.
company
d.
commercial
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information stolen via _____ such as credit card and bank account information can be used in
identity theft and stealing money.
Select one:
a.
Trojan
b.
Spam
c.
Worm
d.
Phishing
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
4. =D1*B5+A5
11150
Answer:
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In a spreadsheet, the horizontal groupings are called _____.
Select one:
a.
Collumns
b.
Rows
c.
Formulas
d.
Cells
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Adware are browser add-ons that prevent advertisements from being displayed in your
browser.
Select one:
True
False
Question 16
Complete
Mark 1.00 out of 1.00
Flag question
Question text
By default, Gmail will delete a message in the Trash after 30 days.
Select one:
True
False
Question 17
Not answered
Marked out of 1.00
Flag question
Question text
_____ was initially created for business entities but today, it can be used by anyone.
Select one:
a.
.org
b.
.info
c.
.net
d.
.com
Question 18
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a type of malware that causes unwanted advertisements to appear in your screen.
Select one:
a.
Firmware
b.
Adblocker
c.
Hardware
d.
Adware
Question 19
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A household has four laptops but only dad's laptop has direct access to the internet. To
share the Internet connection, he turns his laptop into a Wifi hotspot for the rest of the
family to connect to. In this scenario, dad's laptop is the _____
Select one:
a.
Service
b.
Server
c.
Client
d.
Network
Question 20
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answers to the following formula:
=SUM(B1:B5)
120
Answer:
Question 21
Complete
Mark 0.00 out of 1.00
Flag question
Question text
REPUBLIC ACT NO. 8293, also known as the IP Code governs the protection of intellectual
property and online etiquette in the Philippines.
Select one:
True
False
Question 22
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Web A
A Answer is an Internet-based application that can be accessed using browsers.
Question 23
Complete
Mark 1.00 out of 1.00
Flag question
Question text
_____ is a type of malware that is named after a fictional horse.
Select one:
a.
Spam
b.
Worm
c.
Trojan
d.
Adware
Question 24
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Other than the search bar, you can also enter your search keywords in your browser's _____.
Select one:
a.
Address bar
b.
Keyword bar
c.
Domain bar
d.
Space bar
Question 25
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
=D5/D1
5
Answer:
Question 26
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Server
A computer that does a task for other computers is called a Answer .
Question 27
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A link will open in a new tab if you click on it with your _____
Select one:
a.
Mouse wheel
b.
Left and right buttons at the same time
c.
Right button
d.
Left button
Question 28
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Unwanted and unsolicited messages are called _____
Select one:
a.
Adware
b.
Spam
c.
Trojan
d.
Phishing
Question 29
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Based on the spreadsheet above, give the answer to the following formula:
5. =B2/C2-D1
-107
Answer:
Question 30
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The _____ is usually the name of the website that provides the email service.
Select one:
a.
Local part
b.
Client part
c.
Domain part
d.
Name part
Question 31
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A _____ can be a single program or a system of programs designed to look for information
in the Internet.
Select one:
a.
Web search engine
b.
Advanced search
c.
Search bar
d.
Facebook
Question 32
Complete
Mark 1.00 out of 1.00
Flag question
Question text
REPUBLIC ACT NO. 8293 is also known as the World Anti-Piracy Observatory
Select one:
True
False
Question 33
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A _____ is a software that is used to create information like documents, spreadsheet,
presentations, etc.
Select one:
a.
Word processor
b.
Graphics suite
c.
DBMS
d.
Productivity tool
Question 34
Complete
Mark 1.00 out of 1.00
Flag question
Question text
By default, Gmail will delete a message in the Trash after 50 days.
Select one:
True
False
Question 35
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Websites from the 2.0 or later generations of the internet that can change their appearance
and behavior depending on the user's action, location, preferences, etc. are called _____
websites.
Select one:
a.
Static
b.
Native
c.
Dynamic
d.
Social Media
Question 36
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The practice of tricking people into submitting their personal details is called _____.
Select one:
a.
Trojan
b.
Phishing
c.
Worm
d.
Spam
Question 37
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are
web apps.
Select one:
True
False
Question 38
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Websites that belong in different generations of the internet cannot co-exist in a given time
period
Select one:
True
False
Question 39
Not answered
Marked out of 1.00
Flag question
Question text
_____ is reserved for schools and universities
Select one:
a.
.edu
b.
.gov
c.
.org
d.
.sch
Question 40
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is the group of characters that when combined with your username or email address,
can be used to open your online account?
Select one:
a.
Birth Date
b.
Password
c.
Location
d.
Address
Question 41
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In a spreadsheet, a box in a table is called a _____.
Select one:
a.
Row
b.
Cell
c.
Formula
d.
Collumn
Question 42
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The names of _____ are numbers
Select one:
a.
Rows
b.
Cells
c.
Collumns
d.
Formulas
Question 43
Not answered
Marked out of 1.00
Flag question
Question text
_____ are unruly members who deliberately break the rules of an online community.
Select one:
a.
Bullies
b.
Pirates
c.
Trolls
d.
Spammers
Question 44
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A centralized location for numerous servers is called a _____
Select one:
a.
Server hub
b.
Library
c.
Data farm
d.
Data center
Question 45
Not answered
Marked out of 1.00
Flag question
Question text
The default name of a ____ is a letter and a number
Select one:
a.
Cell
b.
Formula
c.
Collumn
d.
Row
Question 46
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is the sign that separates the two parts of the email address?
Select one:
a.
At sign
b.
.com sign
c.
www sign
d.
Dot sign
Question 47
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Recording live performances or broadcasts without permission from the owner is called
_____.
Select one:
a.
Bootlegging
b.
Streaming
c.
Trolling
d.
Counterfeiting
Question 48
Complete
Mark 1.00 out of 1.00
Flag question
Question text
The most common acts of _____ include posting inappropriate or banned contents, posting
off topic messages
Select one:
a.
Piracy
b.
Hacking
c.
Trolling
d.
Spamming
Question 49
Not answered
Marked out of 1.00
Flag question
Question text
.com and .net are examples of _____
Select one:
a.
Top-level domains
b.
Websites
c.
Web Addresses
d.
Search Engines
Question 50
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Anyone who knows your username can open your account
Select one:
True
False