67% found this document useful (3 votes)
11K views12 pages

ICT Not All Answer

The document contains multiple choice questions about topics related to the internet, technology, and ethics. The questions cover subjects such as web browsers, search engines, email, passwords, cyberbullying, and intellectual property.

Uploaded by

jer montilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
11K views12 pages

ICT Not All Answer

The document contains multiple choice questions about topics related to the internet, technology, and ethics. The questions cover subjects such as web browsers, search engines, email, passwords, cyberbullying, and intellectual property.

Uploaded by

jer montilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Which of the following is true?

- Safari web browser’s address bar doubles as the


search bar

Which one is NOT true?


Select one: -SEO is a popular practice used by websites to earn money by featuring
contents from other websites.

Which of the following does not apply to Netiquette? -Expect the unexpected

Which of the following is NOT true about passwords? -Passwords should not be
memorized

Which of the following statements is NOT true?- Phishing is a type of virus that can
make copies of itself

Which of the following is true?- Blogs can be hosted by a CMS for free

Which of the following can be used in identity theft?-  All

Which of the following qualifies as web content?- All of these

Which one is true?


Select one:- Web traffic is used to measure the popularity of websites and web
contents.

Contents of _____ websites like Wikipedia can be edited by anyone-  open-source

In the Internet, your _____ is as good as your actual name.-  Username


Which one does not belong to the group?- Archiving

Which of the following information is ok to share with other people?-  Email address

Anyone can use the following TLDs except _____- .gov

In which of the following situations is it ok to use your mobile phone?- None of these

The name Trojan is derived from a fictional wooden _____- Horse

What is the official website of the Intellectual Property Code of the Philippines?-
ipophil.gov.ph

Which of the following does not help you avoid getting a virus?- Downloading
pirated programs

Which of these is NOT ok to do while driving?-  All of these

Which of the following is true?-  Modern CMSs have collaborative environments,


which allow multiple users to work on a single project.

Which of the following is not a browser?- Wikipedia

Which of the following is an ethical thing to do while commuting?


Select one:- Listen to music using headphones

You can check an article’s _____ to know if the information that it contains is
updated.
Select one:- Publication date

Which of the following is not true?


Select one:- A web search engine can’t be accessed using Internet browsers

Which of the following is not true?


Select one:- All TLDs contain credible information
According to the IP Code, how many types of works are covered by copyright
protection?
Select one:- 15

Which of the following is a polite thing to do?- Asking permission before taking
pictures of other people

Which of the following TLDs is most likely to be used by non-profit groups?- .org

A web content that is published on a blog is called a _____.-post

Which of the following is true?- As of 2016, there are more than 1 billion websites
in the Internet.

Email is short for-electronic mail

These are sections of an email client that are used to store different kinds of email.-
Email folders

In an email client, instead of permanently deleting an email, it is sent to the- Trash

This email folder is where suspicious emails are kept. This is done as a security


measure to prevent you from accidentally opening these emails.-   Spam

What is an email client?- an application used for sending, receiving, and organizing


emails

It is a unique name that represents a destination where emails can be delivered to


and sent from.- email address

Which of the following is/are true about email address?-  It is a destination for


emails

In an email client, it is the folder for the emails that you sent- Outbox

It contains the messages you have received.-  Inbox

This email folder contains the finished or unfinished emails that you have composed
but did not send.- Drafts
After the web content is finished and approved for publication, we are now ready for
the _____ stage.-  Deployment

The _____ stage involves research, writing, and other tasks like graphics design,
photography, and video editing.- Creation

During the _____ stage, some elements of the content are updated to keep it fresh,
useful, and interesting to the viewers.- Maintenance

Keywords are strategically placed in titles, sentences and URLs to increase the
chance that a search engine will pick up your content. This is a _______ technique.-
Search Engine Optimization

You can give other websites permission to publish your content. This is called _____.-
web syndication

Blog is short for _____.- weblog

During the _____ stage, old web contents are either deleted or archived.-
Retirement

After the web content is finished and approved for publication, we are now ready for
the _____ stage.- Deployment

The _____ stage involves research, writing, and other tasks like graphics design,
photography, and video editing.- Creation

_____ has to be done to reach potential viewers and to persuade them to view your
web content.
Select one:- Promotion

The _____ determines how the parts of your blog will be arranged.- . layout

_____ is a software application or a set of software applications that is used to


create, publish, and manage online content.- Content Management System

A website can promote its content by sending emails to potential viewers. This is
called _____.-Email Advertisement
A _____ is a set of design elements such as font, colors and icons that work together
to your blog a certain style.- theme

When creating a WordPress blog, you have to select a ______ that best describes
what your blog is about.- Category

SEO stands for _____.- Search Engine Optimization

Outdated web contents are unpublished moved to a different location for future use.
This practice is called _____.Archiving

Web _____ is the number of visitors in a website and the number of web pages that
they visit.- Traffic

_____ is the process of planning, researching, creating, publishing, and maintaining


information for online publication.- Web Content Development

The _____ is the series of steps or phases that web content has to go through before
and after it is published.- Web Content Lifecycle

Text, sounds, images, videos, and other media that are published in a website are
called ______.- web content

During the _____ stage, we determine what type of web content should be created
and how it fits in the websiteís objectives.- Planning

Most web search engines have an _____ feature which can be used to make complex
web searches-  Advanced Search

You want to know if classes are suspended because of a storm. Which of the
following TLDís is most likely to have the most credible information
Select one:- .gov

Which of the following details is NOT essential in citing a source- name of the
researcher

.org stands for- organization


While you are typing your keyword in the address bar or the search bar, several
_____ may appear bellow it- Suggestions

Which of the following is not a factor that can be used to determine a sourceís
credibility?- The articleís length

.gov stands for- government

.edu stands for- education

You can make online searches in Mozilla Firefox by typing your keywords in the
_____ located on the upper right corner.-  Search bar

Clicking on a search result using the _____ will open the link in a new tab.- Mouse
wheel

.info stands for-  information

Which of the following is NOT a reason why you should give credit to your sources?-
To make the author notice you

_____ is the most common TLD- .com

You can go to google.com.ph to make a/an _____


Select one:- Basic search

_____ is a web browser owned by Apple- Safari

.com stands for _____- commercial

_____ is a single program or a system of programs designed to look for information


in the Internet.- Web search engines

TLD stands for _____- Top-level domain

You can make an online search by entering your keywords in the browserís _____-
Address bar

.net stands for _____-  network


Reproducing and distributing materials without the ownerís consent is called- Piracy

What do you call the unauthorized copying of the material support, labels, artwork
and packaging?
Select one:- Counterfeiting

_____ is bullying that is done using electronic technology.- Cyberbullying

_____ is the legal right to own an original work- Copyright

IP Code stands for- Intellectual Property Code of the Philippines

Several members of a forum are a having a heated debate. Eventually, they started
posting insults and threats against other members. The debate has escalated into a
_____- Flame war

______ is harmful because it denies the rightful owners the proper


compensation/payment for their work.-  Piracy

You recorded a song on the radio and sent copies to your friends. What you did is
called _____- Bootlegging

_____ Netiquette involves a set of rules that are imposed by online groups- formal

Someone keeps posting cat pictures in a forum about car maintenance. This act is
called _____- Trolling

A member of an online community constantly sends messages about products that


he is selling. You can report this person for _____.- Spamming

REPUBLIC ACT NO. 8293 is also know as _____- Intellectual Property Code of the
Philippines
If you break the rules of an online community, _____ may revoke your
access/membership.- Admins

You copied an essay that you found online and submitted it in an essay writing
contest. You have committed _____.- Plagiarism

_____ Netiquette is similar to real-world etiquette in the sense that they are not
strictly upheld by law but are expected to be followed by everyone.-
Informal Netiquette

Netiquette is short for _____-  Network Etiquette

People who try to cause trouble by posting inappropriate or banned contents and
off-topic messages are called _____- Trolls

The use of strength or power to intimidate someone into doing something that he
does not want or to make him feel bad is called ____-  Bullying

Which following actions are normally banned in online communities except


_____- Joking

_____ are multiple accounts used by the same person- Sock puppets

You had to enter your email address in order to play a free game. A few days later,
you started receiving multiple emails with links to other free games and downloads.
You have been a victim of ______- Spam

Which of the following is not a malware?-  Ad blocker

Tricking people to submit their personal details is called _____- Phishing

You receive an email saying you won an iPhone. When you click the link in the email,
you were asked to enter your credit card number. This is called _____- Phishing

Random pop-ups and advertisements started appearing in your screen after you
installed a free program. This is caused by _____ attached to the program.- Adware
Which of the following does not need human action to spread?- Worm

Which of the following should not be shared with anyone?- Password

_____ is a type of malware that is disguised as a harmless or useful program or file.-


Trojan

Malware is short for _____-  Malicious software

Which of the following can contain malware?-  All

Which of the following statements is true?- A computer virus can spread whenever
a computer makes contact with another computer.

_____ is a program that is designed to cause harm to your computer or device- virus

Your computer became slow and unresponsive after you opened a file named
100freemp3s.exe. This file is probably a _____- Trojan

Which of the following is NOT true?- A spam is a type of virus

Which of the following CANNOT infect your computer?- Spam

Which of the following is safe practice?- Use a combination of letters, numbers, and
symbols as a password

_____ is a browser add-on that prevents ads from being displayed in your browser.-
Ad blocker

_____ is a secret group of characters used to unlock your account- Password

Which of the following is NOT a safe practice?- Submitting your phone number
every time you are asked.

_____ is your alias, which is used by websites to represent your online presence.-
Username

Which of the following is against the law?- Taking videos in movie theatres
Which of the following statements is NOT true?- Only your full name can be used as
a username.

Which of the following TLDs is most likely to be owned by a university?- .edu

Which of the following is not a search engine?- Advanced Search

Computers can create data and make decisions based on the user's actions through _____

-Machine Learning
Which of the following is NOT true about Cloud-based services?- Subscribing to cloud-based
services is more expensive than building your own programs and buying your own servers.

A Web 3.0 characteristic in which events and information are made available to users as they
happen.- Real-Time

Wiki is derived from the Hawiian work wikiwiki, which means _____- Quick

The cloud enables people in different locations to work on the same project. This enables _____.-
Better collaboration

_____ is a generation of the Internet when websites were mostly static- Web 1.0

HTML means _____- Hypertext Markup Language

"IP Code" stands for-Intellectual Property Code of the Philippines

A Web 3.0 characteristic in which users are always connected to the Internet.- Ubiquitous

Programs that can only be accessed using a browser are called _____-Web applications

The URL and design of a website's homepage changes depending on the preferences of the current
user. This website is _____- Dynamic
What sign is used for multiplication?-  “ * ”

Adding information from a database to a document is called _____.- Mail Merge

In this chapter, the data that we linked to the document was created using what application?- Excel

The long textbox where you can write formulas is called _____.-Formula Line

What sign is used for division?- “ / “

What do you call software that are used to create information like documents, spreadsheet,
presentations, etc?- DBMS

In a spreadsheet, the vertical groupings are called _____.- Columns

A program used to create, edit, and print documents is called a _____-Word processor

What is the name of the spreadsheet tool that we made at the end of this chapter?- Savings
Tracker

In a spreadsheet, the horizontal groupings are called _____.-Rows

In LibreOffice Writer, what function did we have to open to view the registered databases-
Datasources

In LibreOffice, the sets of icons on the top part of the page are called _____.-Toolbars

A program used to create, store, and manage data in tables.- Spreadsheet

In the LibreOffice home screen, the database app is called _____.-LibreOffice Base
A group of programs used to view, manipulate, and print computer graphics is called a _____.-
Graphics suite

You might also like