Which of the following is true?
- Safari web browser’s address bar doubles as the
search bar
Which one is NOT true?
Select one: -SEO is a popular practice used by websites to earn money by featuring
contents from other websites.
Which of the following does not apply to Netiquette? -Expect the unexpected
Which of the following is NOT true about passwords? -Passwords should not be
memorized
Which of the following statements is NOT true?- Phishing is a type of virus that can
make copies of itself
Which of the following is true?- Blogs can be hosted by a CMS for free
Which of the following can be used in identity theft?- All
Which of the following qualifies as web content?- All of these
Which one is true?
Select one:- Web traffic is used to measure the popularity of websites and web
contents.
Contents of _____ websites like Wikipedia can be edited by anyone- open-source
In the Internet, your _____ is as good as your actual name.- Username
Which one does not belong to the group?- Archiving
Which of the following information is ok to share with other people?- Email address
Anyone can use the following TLDs except _____- .gov
In which of the following situations is it ok to use your mobile phone?- None of these
The name Trojan is derived from a fictional wooden _____- Horse
What is the official website of the Intellectual Property Code of the Philippines?-
ipophil.gov.ph
Which of the following does not help you avoid getting a virus?- Downloading
pirated programs
Which of these is NOT ok to do while driving?- All of these
Which of the following is true?- Modern CMSs have collaborative environments,
which allow multiple users to work on a single project.
Which of the following is not a browser?- Wikipedia
Which of the following is an ethical thing to do while commuting?
Select one:- Listen to music using headphones
You can check an article’s _____ to know if the information that it contains is
updated.
Select one:- Publication date
Which of the following is not true?
Select one:- A web search engine can’t be accessed using Internet browsers
Which of the following is not true?
Select one:- All TLDs contain credible information
According to the IP Code, how many types of works are covered by copyright
protection?
Select one:- 15
Which of the following is a polite thing to do?- Asking permission before taking
pictures of other people
Which of the following TLDs is most likely to be used by non-profit groups?- .org
A web content that is published on a blog is called a _____.-post
Which of the following is true?- As of 2016, there are more than 1 billion websites
in the Internet.
Email is short for-electronic mail
These are sections of an email client that are used to store different kinds of email.-
Email folders
In an email client, instead of permanently deleting an email, it is sent to the- Trash
This email folder is where suspicious emails are kept. This is done as a security
measure to prevent you from accidentally opening these emails.- Spam
What is an email client?- an application used for sending, receiving, and organizing
emails
It is a unique name that represents a destination where emails can be delivered to
and sent from.- email address
Which of the following is/are true about email address?- It is a destination for
emails
In an email client, it is the folder for the emails that you sent- Outbox
It contains the messages you have received.- Inbox
This email folder contains the finished or unfinished emails that you have composed
but did not send.- Drafts
After the web content is finished and approved for publication, we are now ready for
the _____ stage.- Deployment
The _____ stage involves research, writing, and other tasks like graphics design,
photography, and video editing.- Creation
During the _____ stage, some elements of the content are updated to keep it fresh,
useful, and interesting to the viewers.- Maintenance
Keywords are strategically placed in titles, sentences and URLs to increase the
chance that a search engine will pick up your content. This is a _______ technique.-
Search Engine Optimization
You can give other websites permission to publish your content. This is called _____.-
web syndication
Blog is short for _____.- weblog
During the _____ stage, old web contents are either deleted or archived.-
Retirement
After the web content is finished and approved for publication, we are now ready for
the _____ stage.- Deployment
The _____ stage involves research, writing, and other tasks like graphics design,
photography, and video editing.- Creation
_____ has to be done to reach potential viewers and to persuade them to view your
web content.
Select one:- Promotion
The _____ determines how the parts of your blog will be arranged.- . layout
_____ is a software application or a set of software applications that is used to
create, publish, and manage online content.- Content Management System
A website can promote its content by sending emails to potential viewers. This is
called _____.-Email Advertisement
A _____ is a set of design elements such as font, colors and icons that work together
to your blog a certain style.- theme
When creating a WordPress blog, you have to select a ______ that best describes
what your blog is about.- Category
SEO stands for _____.- Search Engine Optimization
Outdated web contents are unpublished moved to a different location for future use.
This practice is called _____.Archiving
Web _____ is the number of visitors in a website and the number of web pages that
they visit.- Traffic
_____ is the process of planning, researching, creating, publishing, and maintaining
information for online publication.- Web Content Development
The _____ is the series of steps or phases that web content has to go through before
and after it is published.- Web Content Lifecycle
Text, sounds, images, videos, and other media that are published in a website are
called ______.- web content
During the _____ stage, we determine what type of web content should be created
and how it fits in the websiteís objectives.- Planning
Most web search engines have an _____ feature which can be used to make complex
web searches- Advanced Search
You want to know if classes are suspended because of a storm. Which of the
following TLDís is most likely to have the most credible information
Select one:- .gov
Which of the following details is NOT essential in citing a source- name of the
researcher
.org stands for- organization
While you are typing your keyword in the address bar or the search bar, several
_____ may appear bellow it- Suggestions
Which of the following is not a factor that can be used to determine a sourceís
credibility?- The articleís length
.gov stands for- government
.edu stands for- education
You can make online searches in Mozilla Firefox by typing your keywords in the
_____ located on the upper right corner.- Search bar
Clicking on a search result using the _____ will open the link in a new tab.- Mouse
wheel
.info stands for- information
Which of the following is NOT a reason why you should give credit to your sources?-
To make the author notice you
_____ is the most common TLD- .com
You can go to google.com.ph to make a/an _____
Select one:- Basic search
_____ is a web browser owned by Apple- Safari
.com stands for _____- commercial
_____ is a single program or a system of programs designed to look for information
in the Internet.- Web search engines
TLD stands for _____- Top-level domain
You can make an online search by entering your keywords in the browserís _____-
Address bar
.net stands for _____- network
Reproducing and distributing materials without the ownerís consent is called- Piracy
What do you call the unauthorized copying of the material support, labels, artwork
and packaging?
Select one:- Counterfeiting
_____ is bullying that is done using electronic technology.- Cyberbullying
_____ is the legal right to own an original work- Copyright
IP Code stands for- Intellectual Property Code of the Philippines
Several members of a forum are a having a heated debate. Eventually, they started
posting insults and threats against other members. The debate has escalated into a
_____- Flame war
______ is harmful because it denies the rightful owners the proper
compensation/payment for their work.- Piracy
You recorded a song on the radio and sent copies to your friends. What you did is
called _____- Bootlegging
_____ Netiquette involves a set of rules that are imposed by online groups- formal
Someone keeps posting cat pictures in a forum about car maintenance. This act is
called _____- Trolling
A member of an online community constantly sends messages about products that
he is selling. You can report this person for _____.- Spamming
REPUBLIC ACT NO. 8293 is also know as _____- Intellectual Property Code of the
Philippines
If you break the rules of an online community, _____ may revoke your
access/membership.- Admins
You copied an essay that you found online and submitted it in an essay writing
contest. You have committed _____.- Plagiarism
_____ Netiquette is similar to real-world etiquette in the sense that they are not
strictly upheld by law but are expected to be followed by everyone.-
Informal Netiquette
Netiquette is short for _____- Network Etiquette
People who try to cause trouble by posting inappropriate or banned contents and
off-topic messages are called _____- Trolls
The use of strength or power to intimidate someone into doing something that he
does not want or to make him feel bad is called ____- Bullying
Which following actions are normally banned in online communities except
_____- Joking
_____ are multiple accounts used by the same person- Sock puppets
You had to enter your email address in order to play a free game. A few days later,
you started receiving multiple emails with links to other free games and downloads.
You have been a victim of ______- Spam
Which of the following is not a malware?- Ad blocker
Tricking people to submit their personal details is called _____- Phishing
You receive an email saying you won an iPhone. When you click the link in the email,
you were asked to enter your credit card number. This is called _____- Phishing
Random pop-ups and advertisements started appearing in your screen after you
installed a free program. This is caused by _____ attached to the program.- Adware
Which of the following does not need human action to spread?- Worm
Which of the following should not be shared with anyone?- Password
_____ is a type of malware that is disguised as a harmless or useful program or file.-
Trojan
Malware is short for _____- Malicious software
Which of the following can contain malware?- All
Which of the following statements is true?- A computer virus can spread whenever
a computer makes contact with another computer.
_____ is a program that is designed to cause harm to your computer or device- virus
Your computer became slow and unresponsive after you opened a file named
100freemp3s.exe. This file is probably a _____- Trojan
Which of the following is NOT true?- A spam is a type of virus
Which of the following CANNOT infect your computer?- Spam
Which of the following is safe practice?- Use a combination of letters, numbers, and
symbols as a password
_____ is a browser add-on that prevents ads from being displayed in your browser.-
Ad blocker
_____ is a secret group of characters used to unlock your account- Password
Which of the following is NOT a safe practice?- Submitting your phone number
every time you are asked.
_____ is your alias, which is used by websites to represent your online presence.-
Username
Which of the following is against the law?- Taking videos in movie theatres
Which of the following statements is NOT true?- Only your full name can be used as
a username.
Which of the following TLDs is most likely to be owned by a university?- .edu
Which of the following is not a search engine?- Advanced Search
Computers can create data and make decisions based on the user's actions through _____
-Machine Learning
Which of the following is NOT true about Cloud-based services?- Subscribing to cloud-based
services is more expensive than building your own programs and buying your own servers.
A Web 3.0 characteristic in which events and information are made available to users as they
happen.- Real-Time
Wiki is derived from the Hawiian work wikiwiki, which means _____- Quick
The cloud enables people in different locations to work on the same project. This enables _____.-
Better collaboration
_____ is a generation of the Internet when websites were mostly static- Web 1.0
HTML means _____- Hypertext Markup Language
"IP Code" stands for-Intellectual Property Code of the Philippines
A Web 3.0 characteristic in which users are always connected to the Internet.- Ubiquitous
Programs that can only be accessed using a browser are called _____-Web applications
The URL and design of a website's homepage changes depending on the preferences of the current
user. This website is _____- Dynamic
What sign is used for multiplication?- “ * ”
Adding information from a database to a document is called _____.- Mail Merge
In this chapter, the data that we linked to the document was created using what application?- Excel
The long textbox where you can write formulas is called _____.-Formula Line
What sign is used for division?- “ / “
What do you call software that are used to create information like documents, spreadsheet,
presentations, etc?- DBMS
In a spreadsheet, the vertical groupings are called _____.- Columns
A program used to create, edit, and print documents is called a _____-Word processor
What is the name of the spreadsheet tool that we made at the end of this chapter?- Savings
Tracker
In a spreadsheet, the horizontal groupings are called _____.-Rows
In LibreOffice Writer, what function did we have to open to view the registered databases-
Datasources
In LibreOffice, the sets of icons on the top part of the page are called _____.-Toolbars
A program used to create, store, and manage data in tables.- Spreadsheet
In the LibreOffice home screen, the database app is called _____.-LibreOffice Base
A group of programs used to view, manipulate, and print computer graphics is called a _____.-
Graphics suite