Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

1. This feature of Web 2.0 allows users to categorize information through tagging.

A. Folksonomy B. Taxonomy C. Hashtag D. User Participation


_____2.What type of file does key logger software typically use to store its recording?
A. Virus Files B. Text Files C. Log Files D. Data Files
_____3. The following are tips on how to stay safe online except
A. Buy the software, do not used pirated ones. C. Share your password with anyone.
B. Add friends you know in real life. D. Avoid visiting untrusted websites.
_____4. How does spyware infect a computer?
A. Theft of personal information c. Pop-ups
B. Recording web information d. All of the above
_____5. Ralph is using a technique that tries to take information from the user. He
commonly takes
things like credit cards, usernames, passwords, and home address. What type of threat
is depicted in
the scenario?
A. Scam B. Spam C. Phishing D. Fishing
1. This feature of Web 2.0 allows users to categorize information through tagging.
A. Folksonomy B. Taxonomy C. Hashtag D. User Participation
_____2.What type of file does key logger software typically use to store its recording?
A. Virus Files B. Text Files C. Log Files D. Data Files
_____3. The following are tips on how to stay safe online except
A. Buy the software, do not used pirated ones. C. Share your password with anyone.
B. Add friends you know in real life. D. Avoid visiting untrusted websites.
_____4. How does spyware infect a computer?
A. Theft of personal information c. Pop-ups
B. Recording web information d. All of the above
_____5. Ralph is using a technique that tries to take information from the user. He
commonly takes
things like credit cards, usernames, passwords, and home address. What type of threat
is depicted in
the scenario?
A. Scam B. Spam C. Phishing D. Fishing
1. This feature of Web 2.0 allows users to categorize information through tagging.
A. Folksonomy B. Taxonomy C. Hashtag D. User Participation
_____2.What type of file does key logger software typically use to store its recording?
A. Virus Files B. Text Files C. Log Files D. Data Files
_____3. The following are tips on how to stay safe online except
A. Buy the software, do not used pirated ones. C. Share your password with anyone.
B. Add friends you know in real life. D. Avoid visiting untrusted websites.
_____4. How does spyware infect a computer?
A. Theft of personal information c. Pop-ups
B. Recording web information d. All of the above
_____5. Ralph is using a technique that tries to take information from the user. He
commonly takes
things like credit cards, usernames, passwords, and home address. What type of threat
is depicted in
the scenario?
A. Scam B. Spam C. Phishing D. Fishing
1. This feature of Web 2.0 allows users to categorize information through tagging.
A. Folksonomy B. Taxonomy C. Hashtag D. User Participation
2.What type of file does key logger software typically use to store its recording?
A. Virus Files B. Text Files C. Log Files D. Data Files
3. The following are tips on how to stay safe online except
A. Buy the software, do not used pirated ones. C. Share your password with anyone.
B. Add friends you know in real life. D. Avoid visiting untrusted websites.
4. How does spyware infect a computer?
A. Theft of personal information c. Pop-ups
B. Recording web information d. All of the above
5. Ralph is using a technique that tries to take information from the user. He commonly
takes things like credit cards, usernames, passwords, and home address. What type of
threat is depicted in the scenario?
A. Scam B. Spam C. Phishing D. Fishing

B. 6. This is the process of


scanning the full text of a query
in order to understand what the
user
C. needs.
D. A. Communication Skills C.
Contextualized online research
E. B. Research Methodology D.
Data Collection
F. 6. This is the process of
scanning the full text of a query
in order to understand what the
user
G. needs.
H. A. Communication Skills C.
Contextualized online research
I. B. Research Methodology D.
Data Collection
6. This is the process of scanning the full text of a query in order to understand what the
user needs.
A. Communication Skills B. Research Methodology
C. Contextualized online research D. Data Collection

7. Any information coming from


these domain types are usually
reliable except
A. .org B. .edu C. .gov
D. .com
7. Any information coming from these domain types are usually reliable except
A. .org B. .edu C. .gov D. .com

8. What symbol will you use to


search for the exact term or
phrase?
a. ( ) B. & C. " " D. -
8. What symbol will you use to search for the exact term or phrase?
a. ( ) B. & C. " " D. –

9. This media is designed to help


people who have visual and
reading impairments.
A. Assistive Media B. Social
media C. Bookmarking
Sites D. Media Sharing
9. This media is designed to help people who have visual and reading impairments.
A. Assistive Media B. Social media C. Bookmarking Sites D. Media
Sharing
10. Pinterest is a social media website that can be classified as
A. Microblogging B. Blogs and Forums C. Bookmarking Sites D. Media
Sharing
What do you call a web page that allows interaction from the user?
A.Static B. Dynamic C. Semantic D. Social
Which of the following refers to the feature where users are able to categorize and
locate information through tagging?
A.Hashtags B. Folksonomy C. Taxonomy D. Rich User Experience
Which feature of a dynamic website allows users to put their own content?
A.Hashtags B. Folksonomy C. Taxonomy D. Rich User Experience
Which of the following aimed to have a machine or servers understand the
users’preference to be able to deliver web content specifically targeting the user?
A.Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0

TRUE 1. ICT deals with the use of different technologies to work on a similar goal or
task.
TRUE 2. Know the security features of the social networking site you use.
TRUE 3. Web pages that are the same regardless of the user are referred to static
FALSE 4. Web pages of Web 1.0 are dynamic and interactive.
TRUE 5. World Wide Web or www is invented by Sir Tim Bernes-Lee in 1999.
FALSE 6. Don't adhere to the same standards of behavior online that you follow in real
life
FALSE 7. Remember the human and abuse your power.
FALSE 8. Reply or click links from suspicious emails.
TRUE 9. Research skill is the ability to find answer to a question or a solution to a
problem.
FALSE 10. Don't make your self look good online.
1. A law that deals with all the
forms of cybercrime.
______________________2. It
refers to security of people and
practices that should be
observed when using the
internet to ensure that their
information are safe from
crimes.
______________________3.
Passwords must contained at
least how many characters?
______________________4. A
crime in which computer is
used as object and tool in
committing a crime such as
hacking, phishing, child
pornography, etc.
______________________5. A
form of pornography that
unlawfully exploits children for
sexual stimulation.
CYBERCRIME LAW 1. A law that deals with all the forms of cybercrime.
INTERNET SAFETY 2. It refers to security of people and practices that should be
observed when using the internet to ensure that their information are safe from crimes.
10 3. Passwords must contained at least how many characters?
CYBERCRIME 4. A crime in which computer is used as object and tool in
committing a crime such as hacking, phishing, child pornography, etc.
CHILD PORNOGRAPHY 5. A form of pornography that unlawfully exploits children for
sexual stimulation.

1. Also known as Malicious


Software
______2. A malicious program
that disguised as legitimate
program
that user will accept and use but
take control of your computer.
______3. A malicious program
that replicate itself by copying
itself to
another program.
______4. A malicious program
that copy itself and spreads to
other
computers.
______5. A malicious program
that gathers information from
victims
computer and send it back to the
hacker.
______6. An unwanted
advertisement that will pop-up
several times
on victims computer then
behave abnormally and tedious
to close
them.
______7. A program that runs
in the background and steals
credentials
and information and send back
to hack by recording every
keystroke
that a user makes on their
computer or device.
_____8. A ransom virus that
block the user from accessing
the
programs on files and demands
to pay a ransom through online
method for the removal of the
virus.
_____9. Known as junk email
or unwanted email send by
advertiser or
bot. It can be used to send
malware.
_____10. A cyber attack
method using deceptive emails
and websites
to acquiring sensitive personal
information.
MALWARE 1. Also known as Malicious Software
TROJAN 2. A malicious program that disguised as legitimate program
that user will accept and use but take control of your computer.
WORMS 3. A malicious program that replicate itself by copying itself to
another program.
VIRUS 4. A malicious program that copy itself and spreads to other
computers.
SPYWARE 5. A malicious program that gathers information from victims
computer and send it back to the hacker.
ADWARE 6. An unwanted advertisement that will pop-up several times
on victims computer then behave abnormally and tedious to close
them.
KEYLOGGER 7. A program that runs in the background and steals credentials
and information and send back to hack by recording every keystroke
that a user makes on their computer or device.
RANSOMWARE 8. A ransom virus that block the user from accessing the
programs on files and demands to pay a ransom through online
method for the removal of the virus.
SPAM 9. Known as junk email or unwanted email send by advertiser or
bot. It can be used to send malware.
PHISHING10. A cyber attack method using deceptive emails and websites
to acquiring sensitive personal information.

You might also like