Professional Documents
Culture Documents
The cloud enables people in different locations to work on the same project. This enables
Better collaboration
Static
Web applications
Worm
A Web 3.0 characteristic in which users are always connected to the Internet.
Ubiquitous
All
Mobile apps are all web apps because they can only be accessed using an Internet browser
Internet-based networks that are used to store, manage, and share resources and information
Cloud Computing
are apps and websites used by people to interact with one another by sharing information, sending
messages, and exchanging ideas
Social Media
Email address
Spammers
Web 1.0
Phishing
Email address
Trojan
Space Jam
You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the most credible information
.gov
What do you call the unauthorized copying of the material support, labels, artwork and packaging?
Counterfeiting
Server
page is about a single topic and can be edited by anyone with the right credentials
Wiki
You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of Spam
.net stands for network
You can make an online search by entering your keywords in the browser's
Address bar
Some types of malware can spread through offline means such as flash drives and local area networks
.com
The cloud enables people in different locations to work on the same project. This enables
Better collaboration
Which of the following is not a factor that can be used to determine a source's credibility?
Formal
Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law but are
expected to be followed by everyone.
Informal Netiquette
Which of the following mobile apps is not a native application? None of these
You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is
a Client
In the Internet, your _____ is as good as your actual name. Username
You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called Pharming
You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of Spam
REPUBLIC ACT NO. 8293 is also know as Intellectual Property Code of the Philippines
The use of strength or power to intimidate someone into doing something that he does not want or to
make him feel bad "BULLYING"
In which of the following situations is it ok to use your mobile phone? None of these
According to the IP Code, how many types of works are covered by copyright protection? 15
Computers can create data and make decisions based on the user's actions through
Machine Learning
A Web 3.0 characteristic in which events and information are made available to users as they happen.
Real-Time
Clicking on a search result using the _____ will open the link in a new tab.
Mouse wheel
In the spreadsheet above, what result will you get if you use the formula =C3-B2
110
What do you call software that are used to create information like documents, spreadsheet,
presentations, etc? Productivity tool
In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)
440
In LibreOffice Writer, what function did we have to open to view the registered databases
Datasources
In the LibreOffice home screen, the database app is called LibreOffice Base
In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)
1200
In the spreadsheet above, what result will you get if you use the formula =SUM(A1,B1,C1,B3) 850
A program that is developed by a public community of developers and is made available to the public for
free is described as Open-source
In the spreadsheet above, what result will you get if you use the formula =A1*C1
30000
In the spreadsheet above, what result will you get if you use the formula =SUM(B1,B4)
430
The long textbox where you can write formulas is called Formula Line
Many trusted anti-virus companies give out free versions which are good enough to protect your
computer from malware True
Which is true?
All of the following types of malware can "infect" your computer except
Spam
You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the correct information?
.gov
In LibreOffice, the sets of icons on the top part of the page are called
Toolbars
The unauthorized copying of the material support, labels, artwork and packaging is called
Counterfeiting
It's ok to play loud music in public as long as you only play popular songs. False
CC Stands for Carbon Copy
Advanced Search
What is the name of the spreadsheet tool that we made at the end of this chapter?
Savings Tracker
is the act of forcing or intimidating someone into doing something that he/she does not want to.
Bullying
apps are used to connect with other people and make interactions such as messaging, writing comments
and sharing pictures and videos.
Social Media
Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program Adware.
Which of the following statements is true? No one can steal your personal information without asking
for permission.
At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi, which you connect to using your phone. In this scenario, your phone is a Server
Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a Trojan
Which of the following is NOT a reason why you should give credit to your sources
The URL and design of a website's homepage changes depending on the preferences of the current
Dynamic
Real-time, ubiquitous, and machine learning are the defining elements of Web 3.0
Which of the following does not need human action to spread? Worm
You can make online searches in Mozilla Firefox by typing your keywords I Search bar
b. .gov
Your mom is calling you during class. In this situation, which of the following is the ethical thing to do?
Ask for your teacher's permission to go outside so you can answer the call.
What is the official website of the Intellectual Property Code of the Philippines? ipophil.gov.ph
is a single program or a system of programs designed to look for information in the Internet. Web
search engines
Several members of a forum are a having a heated debate. Eventually, they started posting insults and
threats against other members. The debate has escalated into a
Sock puppet
You can check an article's _____ to know if the information that it contains is updated.
Publication date
are programs that are directly installed in a computer or device Native applications
Collumn
In this chapter, the data that we linked to the document was created using what application?
Excel
What sign is used for multiplication? c. *
A program used to create, edit, and print documents is called a Word processor
Cell
Suggestions
A heated argument that escalates into threats and personal insults is called a
Flame war
You bought an artist's album then you made and sold copies of it. What you did is called
Counterfeiting
What is the sign that separates the two parts of the email address?
At sign
Read-only websites and web pages that were single files and saved in HTML format belong to what
generation? Web 1.0
What word best describes Web 1.0 websites and web pages?
Static
The Golden Rule states "Do unto others before they do unto you."
True
The following personal information should not be shared with other people except
Bullying
Plagiarism
.com
Inbox
Sock puppets
Domain part
. A different website
Non-profit groups prefer to use which TLD?
.org
What do you call an app used for sending, receiving, and organizing emails.
Email client
Some websites refer to you by your _____ instead of your actual name.
Username
s a type of malware that automatically spreads in a computer or a system even without human
interaction.
Worm
The only way to do a web search in Mozilla Firefox is to type the keywords in the search bar. True
Snail mail
Formal
Several _____ may appear below the search bar or address bar while you are typing a keyword.
In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1
25500
.gov
A website that contains articles written by users and can be edited by other users is called a
Web 2.0
contains emails that have been composed but were not sent.
Drafts
Password
Piracy
Advanced Search
is an incident where members of an online community get into arguments and start posting insults and
personal attacks.
Flame war
Which of the following personal information should not be shared with other people
Password
Spam can spread when the infected computer makes contact with another computer
TRUE
allows you to use multiple keywords and entire phrases and narrow down your search by selecting
language, region, date, etc.
Advanced Search
It's bad to receive a lot of _____ because they are annoying take up memory space
Spam
Based on the spreadsheet above, give the answer to the following formula:
=SUM(C1:C5)
A group of programs used to create, edit, view, and print computer graphics is called a
relies on users to contribute web contents.
Social Media
It is ok to post your passwords in your social media accounts so you won't forget them.
False
Ad-blockers are browser add-ons that prevent advertisements from being displayed in your browser.
True
Scammers
Quick
While typing a keyword in a search bar, _____ may appear below it.
Suggestions
=B2/C2+B4
UNESCO
may appear in web search engines, address bars, and search bars while you are typing a keyword
Suggestions
Password
Web 1.0 websites are defined as static or Web based
Trolls use _____, which are fake accounts so that they can post as different users.
Sock puppets
is the generation of the Internet that is characterized by the increased focus on user participation and
the prevalence of dynamic websites.
Web 2.0
The _____ lists 15 types of works that are covered by copyright protection.
web application
LibreOffice Word
Adware
False
What is the name of the open-source productivity suite that we used in Chapter 5?
websites can change their appearance and behavior based on the users' actions.
Dynamic
A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.
Productivity tool
A website that allows users to edit its contents and structure is called a
Wiki
Recording live performances or broadcasts without permission from the owner is called
Streaming
People who try to cause trouble by posting inappropriate or banned contents and off-topic messages
are called
Trolls
Trojan
When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called
Streaming
LibreOffice is an open-source
Web Browsers
What is the name given to software used to create, store and collections of information?
In Calc, what is the default name of the cell that belongs to the second row and the third column?
C:2
Most web search engines have an _____ feature which can be used to make complex web searches
Advanced Search
Piracy
Websites that belong to _____ generation encourages a give-and-take relationship between the
websites and the users by allowing them to leave comments, upload files and to publish their own
contents.
Web kg
Copyright
Static
In LibreOffice, the sets of icons on the top part of the page are called
Formula bar
Other that your username or email address, what else is almost always required to access your online
accounts? Password
Scammers
aresections of an email client that are used to store different kinds of email.
Folders
True