No student devices needed. Know more
30 questions
It deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
ICT
CPU
ICU
ILY
It is known as flat page or stationary page in the sense that the page is "as is" and cannot be manipulated by the user.
WEB 1.0 - STATIC WEB PAGE
WEB 2.0 - DYNAMIC WEB PAGE
WEB 3.0 - SEMANTIC WEB PAGE
It is the evolution of Web 1.0 by adding dynamic web pages--the user is able to see and allows users to interact with the page.
WEB 1.0 - STATIC WEB PAGE
WEB 2.0 - DYNAMIC WEB PAGE
WEB 3.0 - SEMANTIC WEB PAGE
This web page aim is to have machines (or servers) understand the user's preferences to be able to deliver web content specifically targeting the user.
WEB 1.0 - STATIC WEB PAGE
WEB 2.0 - DYNAMIC WEB PAGE
WEB 3.0 - SEMANTIC WEB PAGE
THE FOLLOWING ARE EXAMPLES OF WEB 2.0 OR DYNAMIC EXCEPT?
YOUTUBE
BCP LMS PORTAL
NONE OF THE ABOVE
WHAT ARE THE 4 (FOUR) TRENDS IN ICT IN ORDER?
CONVERGENCE-SOCIAL MEDIA-MOBILE TECHNOLOGY-ASSISTIVE MEDIA
ASSISTIVE MEDIA-CONVERGENCE-SOCIAL MEDIA-MOBILE TECHNOLOGY
MOBILE TECHNOLOGY-ASSISTIVE MEDIA-CONVERGENCE-SOCIAL MEDIA
SOCIAL MEDIA-MOBILE TECHNOLOGY-ASSISTIVE MEDIA-CONVERGENCE
THE FOLLOWING ARE THE EXAMPLES OF SEVERAL PROBLEMS IN WEB 3.0 OR SEMANTIC WEB EXCEPT?
VASTNESS
VAGUENESS
VAGNETS
NONE OF THE ABOVE
The correct or acceptable way of communicating on the internet.
INTERNET
ETIQUETTE
NETIZENS
NETIQUETTE
It is a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones. It is also a source of entertainment through games, online communities, and everything in between.
INTERNET
SOCIAL MEDIA
FRIENDSTER
THE FOLLOWING ARE THE TIPS TO STAY SAFE ONLINE EXCEPT?
SHARE YOUR PASSWORD TO ANYONE
Do not talk to strangers whether online or face-to-face.
Avoid visiting untrusted websites.
Do not reply or click links from suspicious emails.
It is stands for malicious software?
HARDWARE
SOFTWARE
MALWARE
TOPERWARE
A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CD’s
WORM
VIRUS
ADWARE
SPYWARE
A malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.
WORM
VIRUS
ADWARE
TROJAN
A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
VIRUS
TROJAN
WORM
ADWARE
A program that runs in the background without you knowing it (thus called "spy"). It has the ability to monitor what you are currently doing and typing through keylogging.
ADWARE
SPYWARE
WORM
VIRUS
A program designed to send you advertisements, mostly as pop-ups.
SPYWARE
ADWARE
TROJAN
WORM
unwanted email mostly from bots or advertisers. It can be used to send malware.
SPAM
VIRUS
WORM
MALWARE
Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
PHISHING
SPAM
MALWARE
PHARMING
A more complicated way of phishing where it exploits the DNS (Domain Name Service) system.
PHARMING
PHISHING
SPAM
MALWARE
It is a graphical word processing program that users can type with. Its purpose is to allow users to type and save documents. Similar to other word processors, it has helpful tools to make documents.
MS WORD
MS EXCEL
ICT
MS PPT
Generally, these are electronic or digital pictures or photographs you have saved in any local storage device.
PICTURE
SHAPE
CLIP ARTS
SMART ART
.JPG STANDS FOR?
Photographic Experts Group
Photographic Experts Grass
Photo Experts Grass
Photographic Exports Group
.GIF stands for?
Graphics Interchange Format
Graphs Interchange Format
Graphics Interchange Formal
Graphics Inter Formal
.PNG Pronounced as?
PONG
PENG
PING
PANG
.PNG Pronounced as?
PONG
PENG
PING
PANG
THE FOLLOWING ARE KINDS OF MATERIAL EXCEPT?
PICTURES
SCREENSHOT
SMART ART
CIRCLE
THE FOLLOWING ARE IMAGE PLACEMENT EXCEPT?
IN LOVE WITH TEXT
SQUARE
TIGHT
TOP AND BOTTOM
WHAT IS MY FULLNAME?
RAINIER PACAYRA UDTUHAN
RAINIER PACEYRA UDTUHAN
RAINIER PACAYRA ODTUHAN
RAINIER PACAYRA UDTOHAN
ETECH STANDS FOR?
EMPOWERMENT TECHNOLOGY
EMPOWER TECHNOLOGY
EMPOWER TECHNOLOGIES
EMPOWERMENT TECHNOLOGIES
WHAT IS ICT STANDS FOR?
INFORMATION COMMUNICATION TECHNOLOGY
INFORMATION AND COMMUNICATION OF TECHNOLOGY
INFORMATION AND COMMUNICATION AND TECHNOLOGY
INFORMATION AND COMMUNICATION TECHNOLOGY
Explore all questions with a free account