No student devices needed. Know more
40 questions
It refers to the online security or safety of people and their information when using the internet.
It is defined as a set of rules for acceptable online behavior. Do’s and don’ts Online.
These internet threats is a program that runs in the background without you knowing it.
A malicious program designed to replicate itself and transfer from one computer to another.
This internet threats are unwanted emails mostly from bots or advertisers.
A program designed to send you advertisements, mostly as pop-ups.
It is a software application that runs automated tasks (scripts) over the Internet.
It is an internet threats that attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons.
A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hacker to get you information.
A malicious program that transfers from one computer to another by any type of means.
These browser-based threats include a range of malicious software programs that are designed to infect victims’ computers.
Example of these are Spyware and Keyloggers.
THE FINANCIAL THREATS
THE CONTAGIOUS THREATS
THE MASKED THREATS
A web page that allows interaction from the user
static
social
dynamic
comment
This refers to the feature where users are able to categorize and locate information through tagging
hashtags
folksonomy
taxonomy
rich user experience
A feature of a dynamic website that allows user to put their own comment
rich user experience
long tail
user participation
mass participation
It provides a common framework to allow data to be shared and reused across platform,enterprise, and community boundaries
W3C
semantic web
web 1.0
web 2.0
Which of the following is NOT a definition for dynamic web pages
The user is able to see a website differently than the others
allow users to interact with the page
user is able to comment or create a user account
allows the web to give results depending on how you made your choices in the past
web 2.0's content is based on people in various cultures
rich user experience
user participation
mass participation
long tail
call centers or BPO in the philippines is a proof of huge growth in ICT. What does BPO means?
Business process owner
Business process optimization
Best possible outcome
business process outsourcing
It is a group of software or hardware devices by which people with disabilities can access computers.
Assistive Media
Collaborative Media
Social Media
Convergence
What type of social media is presented by the image?
Social News Site
Bookmarking Site
Media Sharing Site
Social Networking Site
It is the evolution of Web 1.0 by adding dynamic web pages--- the user is able to see a website differently than others.
Web 2.0
Web 3.0
web 1.0
W3C
Which is not Key features of Web 2.0 Platform
Mobile Technologies
Folksonomy
Long Tail
Mass Participation
Folksonomy is also known as
Convergence
Compatibility
Social Tagging
Vastness
Currently, this is the fastest mobile network
2G
3G
4G
5G
Pinterest is a social media website that can be classified as ___
bookmarking sites
microblogging
Media Sharing
Blogs and forums
Which is not a component of ICT?
Communication
Technopreneurship
Media
Technology
It is dubbed as the “ICT Hub of Asia”
China
malaysia
Japan
Philippines
You should worry about grammar and punctuation online:
Only when you are sending a message to your colleagues
Only when you are sending a message to your seniors
All of the time
Whenever you have the time to pay attention to it
Proper Netiquette means the following :
(check all that apply)
If you would not say something to someone in person, don't send it by emil
Remember to avoid flaming in the text
Use technology as a teaching learning tool in class, not to socialize
Read twice, send once
Which of the following best describes netiquette?
Manners in dealing with people at parties.
Appropriate behavior in a public vehicle.
Appropriate behavior in interacting with friends.q
Manners in communicating through the web.
Which of the following should you NOT give out publicly on the internet?
Address
Phone number
Bank account details
All of the given
As a netizen, who among the following observes an appropriate netiquette?
Anne writes in all caps so that her post can be easily read.
Martha writes her posts in complete spelling, grammar and punctuation.
Tracy post anything that comes to her mind to express herself.
Carlo shares his personal information on social media so that he will become popular.
Why do we have to be responsible for the "public face" that the connected world sees?
We all create a digital tattoo and we leave digital footprints on our online activities.
Our happiness depends on the digital friends that we have.
We could use social media for our personal gains.
Social media will help boost popularity.
Which of the following is appropriate when sharing a quotation from a known author?
Acknowledge the author by citing his/her name.
Create a pseudo name for the author.
Claim that the line is your original idea.
Use another author's name.
The following supports a healthy interaction on social media EXCEPT ONE.
Respect others
Share your personal information.
Remember the intellectual property.
Think about who you are representing
Explore all questions with a free account