Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

In the First Chapter, we visited the website of what 90's movie?

Space Jam
Answer: 

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
_____ is a type of malware that does not need human action to spread

Select one:

a.
Phishing

b.
Trojan

c.
Worm

d.
Spam

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Based on the spreadsheet above, give the answer to the following formula:
=A1*B5-A5
950
Answer: 

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
_____ is a TLD that was created for online communities, open-source projects and non-profit
entities.

Select one:

a.
.net

b.
.org

c.
.com

d.
.edu
Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
People who send unwanted and unsolicited emails are called _____

Select one:

a.
Scammers

b.
Phishers

c.
Hackers

d.
Spammers

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Spam can spread when the infected computer makes contact with another computer.

Select one:
True
False

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Ad-blockers are browser add-ons that prevent advertisements from being displayed in your
browser.

Select one:
True
False

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
LibreOffice is an open-source _____

Select one:

a.
Graphics suite

b.
Productivity tool

c.
Office productivity suite

d.
Word processor

Question 9
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Wiki is derived from the Hawiian work wikiwiki, which means _____

Select one:

a.
Quick

b.
Free

c.
Super-free

d.
Many

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The alias that you use when you sign up in a website is called a _____.

Select one:

a.
Domain name

b.
Full name
c.
Username

d.
Maiden name

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text
.com stands for _____

Select one:

a.
complicated

b.
communication

c.
company

d.
commercial

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information stolen via _____ such as credit card and bank account information can be used in
identity theft and stealing money.
Select one:

a.
Trojan

b.
Spam

c.
Worm

d.
Phishing

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text

 
Based on the spreadsheet above, give the answer to the following formula:
4. =D1*B5+A5
11150
Answer: 

Question 14
Complete
Mark 1.00 out of 1.00
Flag question

Question text
In a spreadsheet, the horizontal groupings are called _____.

Select one:

a.
Collumns

b.
Rows

c.
Formulas

d.
Cells

Question 15
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Adware are browser add-ons that prevent advertisements from being displayed in your
browser.

Select one:
True
False

Question 16
Complete
Mark 1.00 out of 1.00
Flag question

Question text
By default, Gmail will delete a message in the Trash after 30 days.

Select one:
True
False

Question 17
Not answered
Marked out of 1.00

Flag question

Question text
_____ was initially created for business entities but today, it can be used by anyone.

Select one:

a.
.org

b.
.info

c.
.net

d.
.com

Question 18
Complete
Mark 1.00 out of 1.00
Flag question

Question text
_____ is a type of malware that causes unwanted advertisements to appear in your screen.

Select one:

a.
Firmware

b.
Adblocker

c.
Hardware

d.
Adware

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A household has four laptops but only dad's laptop has direct access to the internet. To
share the Internet connection, he turns his laptop into a Wifi hotspot for the rest of the
family to connect to. In this scenario, dad's laptop is the _____

Select one:

a.
Service

b.
Server
c.
Client

d.
Network

Question 20
Complete
Mark 0.00 out of 1.00

Flag question

Question text

Based on the spreadsheet above, give the answers to the following formula:
=SUM(B1:B5)
120
Answer: 

Question 21
Complete
Mark 0.00 out of 1.00

Flag question

Question text
REPUBLIC ACT NO. 8293, also known as the IP Code governs the protection of intellectual
property and online etiquette in the Philippines.

Select one:
True
False

Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Web A
A Answer  is an Internet-based application that can be accessed using browsers.

Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text
_____ is a type of malware that is named after a fictional horse.

Select one:

a.
Spam

b.
Worm

c.
Trojan

d.
Adware
Question 24
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Other than the search bar, you can also enter your search keywords in your browser's _____.

Select one:

a.
Address bar

b.
Keyword bar

c.
Domain bar

d.
Space bar

Question 25
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Based on the spreadsheet above, give the answer to the following formula:
=D5/D1
5
Answer: 

Question 26
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Server
A computer that does a task for other computers is called a Answer .

Question 27
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A link will open in a new tab if you click on it with your _____

Select one:

a.
Mouse wheel
b.
Left and right buttons at the same time

c.
Right button

d.
Left button

Question 28
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Unwanted and unsolicited messages are called _____

Select one:

a.
Adware

b.
Spam

c.
Trojan

d.
Phishing

Question 29
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Based on the spreadsheet above, give the answer to the following formula:
5. =B2/C2-D1
-107
Answer: 

Question 30
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The _____ is usually the name of the website that provides the email service.

Select one:

a.
Local part

b.
Client part

c.
Domain part
d.
Name part

Question 31
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A _____ can be a single program or a system of programs designed to look for information
in the Internet.

Select one:

a.
Web search engine

b.
Advanced search

c.
Search bar

d.
Facebook

Question 32
Complete
Mark 1.00 out of 1.00

Flag question

Question text
REPUBLIC ACT NO. 8293 is also known as the World Anti-Piracy Observatory

Select one:
True
False

Question 33
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A _____ is a software that is used to create information like documents, spreadsheet,
presentations, etc.

Select one:

a.
Word processor

b.
Graphics suite

c.
DBMS

d.
Productivity tool

Question 34
Complete
Mark 1.00 out of 1.00

Flag question

Question text
By default, Gmail will delete a message in the Trash after 50 days.

Select one:
True
False

Question 35
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Websites from the 2.0 or later generations of the internet that can change their appearance
and behavior depending on the user's action, location, preferences, etc. are called _____
websites.

Select one:

a.
Static

b.
Native

c.
Dynamic

d.
Social Media

Question 36
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The practice of tricking people into submitting their personal details is called _____.

Select one:
a.
Trojan

b.
Phishing

c.
Worm

d.
Spam

Question 37
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are
web apps.

Select one:
True
False

Question 38
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Websites that belong in different generations of the internet cannot co-exist in a given time
period

Select one:
True
False

Question 39
Not answered
Marked out of 1.00

Flag question

Question text
_____ is reserved for schools and universities

Select one:

a.
.edu

b.
.gov

c.
.org

d.
.sch

Question 40
Complete
Mark 1.00 out of 1.00

Flag question

Question text
What is the group of characters that when combined with your username or email address,
can be used to open your online account?

Select one:

a.
Birth Date

b.
Password

c.
Location

d.
Address

Question 41
Complete
Mark 1.00 out of 1.00

Flag question

Question text
In a spreadsheet, a box in a table is called a _____.

Select one:

a.
Row

b.
Cell

c.
Formula

d.
Collumn

Question 42
Complete
Mark 1.00 out of 1.00
Flag question

Question text
The names of _____ are numbers

Select one:

a.
Rows

b.
Cells

c.
Collumns

d.
Formulas

Question 43
Not answered
Marked out of 1.00

Flag question

Question text
_____ are unruly members who deliberately break the rules of an online community.

Select one:

a.
Bullies

b.
Pirates
c.
Trolls

d.
Spammers

Question 44
Complete
Mark 1.00 out of 1.00

Flag question

Question text
A centralized location for numerous servers is called a _____

Select one:

a.
Server hub

b.
Library

c.
Data farm

d.
Data center

Question 45
Not answered
Marked out of 1.00

Flag question

Question text
The default name of a ____ is a letter and a number

Select one:
a.
Cell

b.
Formula

c.
Collumn

d.
Row

Question 46
Complete
Mark 1.00 out of 1.00

Flag question

Question text
What is the sign that separates the two parts of the email address?

Select one:

a.
At sign

b.
.com sign

c.
www sign

d.
Dot sign

Question 47
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Recording live performances or broadcasts without permission from the owner is called
_____.

Select one:

a.
Bootlegging

b.
Streaming

c.
Trolling

d.
Counterfeiting

Question 48
Complete
Mark 1.00 out of 1.00

Flag question

Question text
The most common acts of _____ include posting inappropriate or banned contents, posting
off topic messages

Select one:

a.
Piracy

b.
Hacking
c.
Trolling

d.
Spamming

Question 49
Not answered
Marked out of 1.00

Flag question

Question text
.com and .net are examples of _____

Select one:

a.
Top-level domains

b.
Websites

c.
Web Addresses

d.
Search Engines

Question 50
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Anyone who knows your username can open your account
Select one:
True
False

You might also like