Professional Documents
Culture Documents
WEEK 3:
Which of the following is NOT true about worms? A: A worm needs human action to spread
You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of ______
A: Spam
Which of the following information is ok to share with other people? A: Email address
Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a _____
A: Trojan
At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi,which you connect to using your phone.. In this scenario, Dad's laptop is a _____.
A: Server (CORRECT)
Network (INCORRECT)
_____ are apps and websites used by people to interact with one another by sharing information,
sending messages, and exchanging ideas
A: Social Media
Which of the following is NOT true? A: The cloud is not an actual cloud
_____ is a program that is designed to cause harm to your computer or device A: Virus
A task that is done by a computer for another computer is called a _____ The correct answer is: Service
Server (INCORRECT)
A Web 3.0 characteristic in which events and information are made available to users as they happen.
A: Real-Time
Programs that can only be accessed using a browser are called _____ A: Web applications
Real-time, ubiquitous, and machine learning are the defining elements of _____ A: Web 3.0
Which of the following does not help you avoid getting a virus? A: Downloading pirated programs
Which of the following statements is NOT true? A: Phishing is a type of virus that can make copies of
itself (CORRECT)
Computers can create data and make decisions based on the user's actions through _____ A: Machine
Learning
At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi, which you connect to using your phone. In this scenario, your phone is a _____.
A: Client
Which of the following is TRUE? A: Mobile phone apps are native apps because they are installed
A computer that does a task for other computers is called a _____ A: Server
_____ is a type of malware that is disguised as a harmless or useful program or file. A: Trojan
A: Subscribing to cloud-based services is more expensive than building your own programs and buying
your own servers. (CORRECT)
-People from different places can work with one another through the cloud. (INCORRECT)
You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called _____
A: Phishing
_____ is a secret group of characters used to unlock your account
People who send unwanted and unsolicited emails are called _____ A: Spammers
A _____ page is about a single topic and can be edited by anyone with the right credentials A: Wiki
Is your alias, which is used by websites to represent your online presence. A: Username
Which of the following is NOT a safe practice? A: Submitting your phone number every time you are
asked.
_____ is a browser add-on that prevents ads from being displayed in your browser. A: Ad blocker
Which of the following mobile apps is not a native application? A: None of these
_____ websites encourage user participation by allowing them share videos, music, articles, etc.
A: Web 2.0
Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program.
A: Adware
_____ Internet-based networks that are used to store, manage, and share resources and information
A: Cloud Computing
Wiki is derived from the Hawiian work wikiwiki, which means _____ A: Quick
Which of the following is NOT true about passwords? A: Passwords should not be memorized
_____ Websites change appearance and behavior based on users' action A: Dynamic
Which of the following statements is true? A: A computer virus can spread whenever a computer makes
contact with another computer.
_____ are programs that are directly installed in a computer or device A: Native applications
WEEK 5:
Which of the following does not apply to Netiquette? A: Expect the unexpected (CORRECT)
-Do unto others as you would have them do unto you. (INCORRECT)
Which of the following is not true? A: Real-life etiquette does not apply online.
You can make an online search by entering your keywords in the browser's _____
Which of the following is an ethical thing to do while commuting? A: Listen to music using headphones
The cloud enables people in different locations to work on the same project. This enables _____.
A: Better collaboration
If you break the rules of an online community, _____ may revoke your access/membership. A: Admins
Which of the following is not a factor that can be used to determine a source's credibility? A: The
article's length
_____ are multiple accounts used by the same person A: Sock puppets
The use of strength or power to intimidate someone into doing something that he does not want or to
make him feel bad is called ____
A: Bullying
You copied an essay that you found online and submitted it in an essay writing contest. You have
committed _____.
A: Plagiarism
A: Mobile phone apps are native apps because they are installed (CORRECT)
-Mobile apps are all web apps because they can only be accessed using an Internet browser
(INCORRECT)
Which of the following is NOT true? A: Google's only server is located in California
.org stands for A: organization You used your smartphone to access Yahoo mail and send an email. In
this scenario, your smartphone is a _____
A: Client
A Web 3.0 characteristic in which users are always connected to the Internet. A: Ubiquitous
Which of the following is TRUE about Cloud-based services? A: Some cloud-based services can be used
for free
What do you call the unauthorized copying of the material support, labels, artwork and packaging?
A: Counterfeiting
While you are typing your keyword in the address bar or the search bar, several _____ may appear
bellow it
Answer: Suggestions
The URL and design of a website’s homepage changes depending on the preferences of the current user.
This website is _____
A: Dynamic
A: Piracy
Which of the following is a polite thing to do? A: Asking permission before taking pictures of other
people
Someone keeps posting cat pictures in a forum about car maintenance. This act is called
A: Trolling (CORRECT)
Spamming (INCORRECT)
Websites that belong to the Web 1.0 generation were mostly _____ A: Static
In which of the following situations is it ok to use your mobile phone? A: None of these
"IP Code" stands for A: Intellectual Property Code of the Philippines (CORRECT)
Netiquette involves a set of rules that are imposed by online groups A: formal
REPUBLIC ACT NO. 8293 is also know as _____ A: Intellectual Property Code of the Philippines
Reproducing and distributing materials without the owner's consent is called Answer: Piracy
You can check an article's _____ to know if the information that it contains is updated. A: Publication
date
Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law but are
expected to be followed by everyone.
A: Informal Netiquette
You recorded a song on the radio and sent copies to your friends. What you did is called A: Bootlegging
According to the IP Code, how many types of works are covered by copyright protection? A: 15
A: Some types of malware can spread through offline means such as flash drives and local area networks
A member of an online community constantly sends messages about products that he is selling. You can
report this person for _____.
A: Spamming
Which of the following is safe practice? A: Use a combination of letters, numbers, and symbols as a
password
A: Basic search
Which of the following is NOT true about worms? A: A worm needs human action to spread (CORRECT)
_____ is a single program or a system of programs designed to look for information in the Internet.
Which following actions are normally banned in online communities except _____ A: Joking
Clicking on a search result using the _____ will open the link in a new tab. A: Mouse wheel
What is the official website of the Intellectual Property Code of the Philippines? A: ipophil.gov.ph
Which of the following does not need human action to spread? A: Worm
Which of the following is true? A: .Safari web browser's address bar doubles as the search bar
(CORRECT)
Week 4: Online Search Learning Activity 3 .com stands for _____ A: commercial
Short Quiz 3
You can make online searches in Mozilla Firefox by typing your keywords in the _____ located on the
upper right corner
A: Search bar
Most web search engines have an _____ feature which can be used to make complex web searches
A: Advanced Search
Which of the following details is NOT essential in citing a source A: name of the researcher
Which of the following is not a factor that can be used to determine a source’s credibility? A: The
article’s length
You want to know if classes are suspended because of a storm. Which of the following TLD’s is most
likely to have the most credible information
A: .gov
Which of the following is NOT a reason why you should give credit to your sources? A: To make the
author notice you
It is a unique name that represents a destination where emails can be delivered to and sent from.
A: email address
These are sections of an email client that are used to store different kinds of email. A: Email folders
What is an email client? A: an application used for sending, receiving, and organizing emails
Which of the following is/are true about email address? A: It is a destination for emails (CORRECT)
Outbox (INCORRECT)
This email folder contains the finished or unfinished emails that you have composed but did not send.
A: Drafts
This email folder is where suspicious emails are kept. This is done as a security measure to prevent you
from accidentally opening these emails.
A: Spam
In an email client, instead of permanently deleting an email, it is sent to the A: Trash
_____ Netiquette is similar to real-world etiquette in the sense that they are not strictly upheld by law
but are expected to be followed by everyone.
A: Informal Netiquette
Which of the following TLD's is most likely to be used by non-profit groups? A: .org
Your mom is calling you during class. In this situation, which of the following is the ethical thing to do?
A: Ask for your teacher's permission to go outside so you can answer the call.
Several members of a forum are a having a heated debate. Eventually, they started posting insults and
threats against other members. The debate has escalated into a _____
A: Flame war
You can make online searches in Mozilla Firefox by typing your keywords in the _____ located on the
upper right corner.
A: Search bar
Which of the following statements is NOT true? A: Only your full name can be used as a username.
Which of the following is not true? A: In your project, your teacher will decide which applications you
will use.
Which of the following is NOT true? The correct answer is: A spam is a type of virus
_____ is a generation of the Internet when websites were mostly static A: Web 1.0
_____ Netiquette involves a set of rules that are imposed by online groups A: formal
Which of the following is not true? A: All TLD's contain credible information
WEEK 7:
In Calc, what is the default name of the cell that belongs to the second row and the third column?
A: C2
A: Open-source
In the spreadsheet above, what result will you get if you use the formula =SUM(C4/A2)
In LibreOffice Writer, what function did we have to open to view the registered databases A:
Datasources
In the spreadsheet above, what result will you get if you use the formula =SUM(A1,B1,C1,B3)
A: 820 (CORRECT)
850 (INCORRECT)
What is the name of the of spreadsheet application that was used in this chapter?
A: 430
A: = or c (CORRECT)
What is the name of the spreadsheet tool that we made at the end of this chapter? A: Savings Tracker
In the spreadsheet above, what result will you get if you use the formula =A3*B2+C1
A: 25500
A group of programs used to view, manipulate, and print computer graphics is called a _____. A:
Graphics suite
The long textbox where you can write formulas is called _____. A: Input Line (CORRECT)
In LibreOffice, the sets of icons on the top part of the page are called _____. A: Toolbars
Columns (INCORRECT)
In the spreadsheet above, what result will you get if you use the formula =SUM(B1:B4)
In the spreadsheet above, what result will you get if you use the formula =C3-B2
A: 110
Productivity tools are normally made available in software bundles called _____. A: Office productivity
suite
In this chapter, the data that we linked to the document was created using what application? A: Calc
A mathematical equation that can be applied to one or multiple cells is called a _____. A: Formula
WEEK 9:
What word best describes Web 1.0 websites and web pages? A: Static
Which of the following does not infect your computer? A: Spam (CORRECT)
Worm (INCORRECT)
A network of servers that work together to provide a centralized service is called a _____. The correct
answer is: Cloud
You bought an artist's album then you made and sold copies of it. What you did is called _____.
_____ is done by tricking people into submitting their personal information. A: Phishing
CAPTCHA stands for "Completely Automated Public _____ To Tell Computers and Humans Apart"
A: Turing Test
The _____ is the part of the email address that is chosen by the client. It follows strict naming rules.
A: Local part
You can click on a link with the _____ to immediately open it in a new tab. A: Mouse wheel
Multiple fake accounts are called _____. A: Trolls
Which of the following is NOT true? A: Emails that are sent to Trash are immediately deleted
_____ deliberately break the rules in an online community to cause trouble or to get attention.
A: Trolls
Some websites refer to you by your _____ instead of your actual name. A: Username
Plagiarism (INCORRECT)
It's ok to use your phone while driving as long as you keep your eyes on the road. A: False
Which of the following is not true? A: A web search engine can't be accessed using Internet browsers
What do you call software that are used to create information like documents, spreadsheet,
presentations, etc?
A: Productivity tool
A heated argument that escalates into threats and personal insults is called a _____. A: Flame wars
(CORRECT)
Troll (INCORRECT)
In the spreadsheet above, what result will you get if you use the formula =A1*C1 A: 30000
Which is true? A: Gmail uses a flag icon to mark important emails
You want to know if classes are suspended because of a storm. Which of the following TLD's is most
likely to have the correct information?
A: .gov
While typing a keyword, several _____ may appear bellow it. A: Suggestions
_____ represents a destination where emails can be sent fro or delivered to. A: Email address
_____ are people who send unwanted and unsolicited messages. A: Spammers
In the part of this chapter where we learned to create an email address, which information is required?
A: Birthday
Clicking a link with the mouse wheel will cause it to open in _____ A: A new tab
_____ apps are used to connect with other people and make interactions such as messaging, writing
comments and sharing pictures and videos.
A: Social Media
What do you call an app used for sending, receiving, and organizing emails. A: Email client
Emails can be sent to the _____ instead of permanently deleting them A: Trash
_____ causes unwanted advertisements to appear in your screen? A: Adware
_____ is done by tricking people into submitting their personal information. A: Phishing
Websites that belong to _____ generation encourages a give-and-take relationship between the
websites and the users by allowing them to leave comments, upload files and to publish their own
contents.
A: Web 2.0
Causing trouble in an online community by deliberately breaking the rules is called _____. A: Trolling
Which is true? A: Gmail uses a star icon to mark important emails (CORRECT)
It's ok to play loud music in public as long as you only play popular songs. A: False
The unauthorized copying of the material support, labels, artwork and packaging is called _____.
A: Counterfeiting
Several _____ may appear below the search bar or address bar while you are typing a keyword.
A: Suggestions
All of the following types of malware can "infect" your computer except _____. A: Spam
_____ aresections of an email client that are used to store different kinds of email. A: Folders
What is the sign that separates the two parts of the email address? A: At sign
A _____ is a program that is designed to cause harm to your computer or device A: virus
Which of the following is TRUE? A: By default, Gmail will delete a message in the Trash after 30 days.
What generation of the internet is defined by characteristics such as real time, ubiquitous, and machine
learning?
A: Web 3.0
False (INCORRECT)
_____ contains emails that have been composed but were not sent. A: Drafts
A virus needs to be copied and sent by people in order to spread while a _____ can spread and replicate
itself automatically
A: Worm
You can install an _____ to prevent unwanted advertisements to appear in your browser or computer
screen?
A: Adblocker
_____ is the act of recording a live performance without the consent of the owner. A: Bootlegging
_____ can be received by your email account and contain other types of malware. A: Trojan
Which of the following is NOT true? A: The local part is on the right of the @ sign
What's is type of malware that causes unwanted advertisements to appear in your screen?
A: Adware
_____ deliberately break the rules in an online community to cause trouble or to get attention.
A: Trolls
_____ is the act of forcing or intimidating someone into doing something that he/she does not want to.
A: Bullying
Chrome, Firefox, and Internet explorer are examples of Answer: Web browser
_____ websites can change their appearance and behavior based on the users' actions.
A: Dynamic
Reproducing and distributing materials without the owner's consent is called A: Piracy
In the spreadsheet app that you learned about in Chapter 5, what is the default name of the cell that
belongs to the second row and the third column?
A: C2
What do you call a program that is used to create, view, edit, and print documents? A: Word processor
What is the name of the of spreadsheet application that was used in Chapter 5? A: LibreOfficeCalc
Some search engines have _____ features that can be used to do complex web search.
A: Advanced Search
Anyone who knows your username can open your account A: False
Other than the search bar, you can also enter your search keywords in your browser's _____. A: Address
bar
In the First Chapter, we visited the website of what 90's movie? A: Space jam
Based on the spreadsheet above, give the answers to the following formula:
=SUM(B1:B5) A: 300
Based on the spreadsheet above, give the answer to the following formula:
5. =B2/C2-D1
A: -107
Which generation of the internet is defined by characteristics such as real-time, ubiquitous, and machine
learning?
A: Web 3.0
With Google Chrome and Mozilla Firefox, you can make an online search by typing the keywords in the
_____
A: Address bar
What is the group of characters that when combined with your username or email address, can be used
to open your online account?
A: Password
By default, Gmail will delete a message in the Trash after 30 days. A: True
Based on the spreadsheet above, give the answer to the following formula:
=A1*B5-A5 A: 950
The _____ is usually the name of the website that provides the email service. A: Domain part
A Web A
A: Web Applications
The most common acts of _____ include posting inappropriate or banned contents, posting off topic
messages
A: Trolling
Adware are browser add-ons that prevent advertisements from being displayed in your browser.
A: False
It is considered ok to use your phone in a movie theater as long as you use earphones
A: False
It is ok to post your passwords in your social media accounts so you won't forget them.
A: False
Ad-blockers are browser add-ons that prevent advertisements from being displayed in your browser.
A: True
The practice of tricking people into submitting their personal details is called _____. A: Phishing
By default, Gmail will delete a message in the Trash after 50 days. A: False
Web 1.0 websites are defined as static or _____ A: Read-only
People who send unwanted and unsolicited emails are called _____ A: Spammers
A link will open in a new tab if you click on it with your _____ A: Mouse wheel
Based on the spreadsheet above, give the answer to the following formula:
2. =D3/A3
A: 11.1
Based on the spreadsheet above, give the answer to the following formula:
=B2/C2+B4 A: 84
A group of programs used to create, edit, view, and print computer graphics is called a
A: Graphics suite
A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.
A: Productivity tool
Based on the spreadsheet above, give the answer to the following formula:
=B3*C1/B4
A: 3.75
People who try to cause trouble by posting inappropriate or banned contents and off-topic messages
are called _____
A: Trolls
_____ is the act of claiming someone else's work as your own. A: Plagiarism
All the forms of piracy are violations of _____ which is the legal right to own an original work.
A: Copyright What name is given to a network of servers that provide different services? A: Cloud
What is the name given to a program or a set of programs used to look for information in the internet.
A: Browser
Fake accounts that belong to the same person are called _____ A: Sock puppets
The ".gov" TLD was originally intended to be used solely by government agencies but today anyone can
purchase and use it.
A: False
Based on the spreadsheet above, give the answer to the following formula: =SUM(C1:C5) A: 75
_____ is a TLD that was created for online communities, open-source projects and non-profit entities.
A: .org
A _____ can be a single program or a system of programs designed to look for information in the
Internet.
Recording live performances or broadcasts without permission from the owner is called _____.
A: Bootlegging
_____ is a type of malware that causes unwanted advertisements to appear in your screen.
A: Adware
A household has four laptops but only dad's laptop has direct access to the internet. To share the
Internet connection, he turns his laptop into a Wifi hotspot for the rest of the family to connect to. In
this scenario, dad's laptop is the _____
A: Server
Websites that belong in different generations of the internet cannot co-exist in a given time period
A: False
You can use _____ to create multiple letters with the same body or message but are addressed to
different people.
A: Mail Merge
The alias that you use when you sign up in a website is called a _____. A: Username
What is the name of the LibreOffice version with the latest features? A: LibreOffice Fresh
What is the sign that separates the two parts of the email address? A: At sign
In many cases, _____ occurs when someone uses a quote or a part of a published work without
mentioning who originally wrote it and which publication it belongs to.
A: Plagiarism
Information stolen via _____ such as credit card and bank account information can be used in identity
theft and stealing money.
A: Phishing
What do you call an application used for sending, receiving, and organizing emails? A: Email Client
What do you call a program that is used to create, view, edit, and print documents? A: Word processor
In the spreadsheet application that you learned about, what sign is used for division? A: /
An office has one computer that is connected to a printer. It prints documents that are sent to it by
other computers via Local Area Network In this setup, the computer connected to printer is the _____.
A: Server
When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called _____
A: Streaming
REPUBLIC ACT NO. 8293 is also known as the World Anti-Piracy Observatory A: False
Based on the spreadsheet above, give the answer to the following formula:
4. =D1*B5+A5
A: 11150
_____ is a type of malware that does not need human action to spread A: Worm
The apps in your smart phone are web-based apps because they connect to the Internet.
A: True
Spam can spread when the infected computer makes contact with another computer. A: False
Some search engines have _____ features that can be used to do complex web search.
A: Advanced Search
Wiki is derived from the Hawiian work wikiwiki, which means _____ A: Quick
While typing a keyword in a search bar, _____ may appear below it. A: Suggestions
Based on the spreadsheet above, give the answer to the following formula: 2. =D3/A3 A: 11.1
REPUBLIC ACT NO. 8293, also known as the IP Code governs the protection of intellectual property and
online etiquette in the Philippines.
A: True
The _____ lists 15 types of works that are covered by copyright protection. A: Intellectual Property Code
of the Philippines
What is the name of word processor that we used in Chapter 5? A: LibreOffice Writer
_____ is a TLD that was originally intended for non profit entities. A: .org
Clicking on a search result using the _____ will open the link in a new tab. A: Mouse wheel
HTML stands for A: Hypertext Markup Language A centralized location for numerous servers is called a
_____ A: Data center
Many trusted anti-virus companies give out free versions which are good enough to protect your
computer from malware True
All of the following types of malware can "infect" your computer except
Spam
The unauthorized copying of the material support, labels, artwork and packaging is called
Counterfeiting
It's ok to play loud music in public as long as you only play popular songs. False
CC Stands for Carbon Copy
Advanced Search
is the act of forcing or intimidating someone into doing something that he/she does not want to.
Bullying
apps are used to connect with other people and make interactions such as messaging, writing comments
and sharing pictures and videos.
Social Media
While typing a keyword in a search bar, _____ may appear below it.
= Suggestions
What is the name given to a program or a set of programs used to look for information in the internet.
What is the name given to applications that allow people to interact with one another in online
communities
= Social Media
What is the name of the LibreOffice version with the latest features?
= LibreOffice Fresh
What do you call an application used for sending, receiving, and organizing emails?
= Email Client
Information stolen via _____ such as credit card and bank account information can be used in identity
theft and stealing money.
= Phishing
= Server
_____ is a type of malware that does not need human action to spread
= Worm
= Web Application
= True
= Data Center
= Quick
A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.
= Productivity tool
= LibreOffice Writter
When you sign up to an app or website, you normally have to set an alias. This alias is called a _____.
= Alias
= Spamming
Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are web apps.
= True
What is the name given to software used to create, store and collections of information?
Websites from the 2.0 or later generations of the internet that can change their appearance and
behavior depending on the user's action, location, preferences, etc. are called _____ websites.
= Dynamic Websites
A website that allows users to edit its contents and structure is called a _____.
= Wiki
_____ is a type of malware that causes unwanted advertisements to appear in your screen.
= Adware
Other than the search bar, you can also enter your search keywords in your browser's _____.
= Address Bar
= space Jam
With Google Chrome and Mozilla Firefox, you can make an online search by typing the keywords in the
_____
= Address Bar
When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called _____
= Streaming
= Social Media
Adware are browser add-ons that prevent advertisements from being displayed in your browser.
= False
= Rows
A link will open in a new tab if you click on it with your _____
= Mouse Wheel
= Cloud
= Static
The most common acts of _____ include posting inappropriate or banned contents, posting off topic
messages
Select one:
= Trolling
_____ allows you to use multiple keywords and entire phrases and narrow down your search by
selecting language, region, date, etc.
= Advanced Search
= True
While typing a keyword in a search bar, _____ may appear below it.
= Suggestions
What is the name given to a program or a set of programs used to look for information in the internet.
What is the name given to applications that allow people to interact with one another in online
communities
= Social Media
What is the name of the LibreOffice version with the latest features?
= LibreOffice Fresh
What do you call an application used for sending, receiving, and organizing emails?
= Email Client
Information stolen via _____ such as credit card and bank account information can be used in identity
theft and stealing money.
= Phishing
= Server
_____ is a type of malware that does not need human action to spread
= Worm
= Web Application
= True
= Data Center
= Trojan
= Quick
A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.
= Productivity tool
= LibreOffice Writter
When you sign up to an app or website, you normally have to set an alias. This alias is called a _____.
= Spamming
Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are web apps.
= True
What is the name given to software used to create, store and collections of information?
= Database management system
Websites from the 2.0 or later generations of the internet that can change their appearance and
behavior depending on the user's action, location, preferences, etc. are called _____ websites.
= Dynamic Websites
A website that allows users to edit its contents and structure is called a _____.
= Wiki
_____ is a type of malware that causes unwanted advertisements to appear in your screen.
= Adware
Other than the search bar, you can also enter your search keywords in your browser's _____.
= Address Bar
= space Jam
With Google Chrome and Mozilla Firefox, you can make an online search by typing the keywords in the
_____
= Address Bar
When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called _____
= Streaming
= Social Media
Adware are browser add-ons that prevent advertisements from being displayed in your browser.
= False
= Rows
A link will open in a new tab if you click on it with your _____
= Mouse Wheel
= Cloud
= Static
The most common acts of _____ include posting inappropriate or banned contents, posting off topic
messages
Select one:
= Trolling
_____ allows you to use multiple keywords and entire phrases and narrow down your search by
selecting language, region, date, etc.
= Advanced Search
= True
Short Quiz 7
In this chapter, what online document were you instructed to consult in order to learn more in-depth
details about GIMP?
In the exercise that we did, what tool did we use to add color to the entire background layer?
The correct answer is: Bucket Fill Tool
With _____, some of the data that makes up the image are discarded to make the make it smaller.
In this lesson, we learn about the unit of measurement for resolution. What is it called?
Which image format is ideal for images with few colors and sharp edges?
_____is the ratio between the size of the image in pixels and its physical size when printed on paper.
Short Quiz 8
The _____ is the series of steps or phases that web content has to go through before and after it is
published.
The correct answer is: Modern CMS's have collaborative environments, which allow multiple users to
work on a single project.
_____ is a software application or a set of software applications that is used to create, publish, and
manage online content.
The correct answer is: Content Management System
_____ is the process of planning, researching, creating, publishing, and maintaining information for
online publication.
A part of the Internet that is under the control of a particular person or group is called a _____.
Outdated web contents are unpublished moved to a different location for future use. This practice is
called _____.
A _____ is a set of design elements such as font, colors and icons that work together to your blog a
certain style.
Text, sounds, images, videos, and other media that are published in a website are called ______.
The correct answer is: Blogs can be hosted by a CMS for free.
A website can promote its content by sending emails to potential viewers. This is called _____.
You can give other websites permission to publish your content. This is called _____
The correct answer is: As of 2016, there are more than 1 billion websites in the Internet.
After the web content is finished and approved for publication, we are now ready for the _____ stage.
The correct answer is: Deployment
Long Quiz 4
What is the name given to text, sounds, images, videos, and other media that are published in a
website?
A part of the Internet that is under the control of a particular person or group is called a _____.
An app that is used to write, send and modify emails is called a/an _____.
What type of compression discards some of the data that makes up the image?
Giving other websites permission to publish your web content is called _____.
A set of matching design elements such as fonts and colors is called a _____.
What is the name of the spreadsheet app that comes with Libreoffice?
The part of the email address that is located on the right is called the _____.
The part of the email address that is located on the left is called the _____.
What do you call a program or group of programs that is created by a community of developers and is
made available to the public for free?
_____ is the name given to several techniques used to make web content more visible to search
engines.
Emails that were written but not sent are saved in _____.
When GIMP was first released back in 1996, the G stood for _____
Short Quiz 9
_____ are grouped into categories such as Business, Personal, and Online Store.
If you want to see information about the author or the owners of a website, the best place to look is in
the _____.
The correct answer is: About us
By using a/an _____, you can immediately fill your pages with matching elements.
The _____ is the interactive list that contains the names of the web pages in the website.
Software tools called _____ can be used to create websites without having to deal with computer code.
The website's office address and phone number is normally found in the _____.
In the activity at the end of this chapter, what's the name of the Weebly website that we made?
The _____ is a section that displays a message such as "Register now!""Click here for more
information."or "Donate now."
The correct answer is: call to action
The correct answer is: You can always change the theme of your website
The _____ usually contains links to Terms of Service and Copyright Information.
A _____ is important for websites that aim to get public response such as buying a product or
supporting an advocacy.
The _____ takes up the largest space in the web page. It may contain articles, images, videos, etc.
The correct answer is: content section
What will you find written below the header of a new blank page?
Weebly relies primarily on its _____feature to place and manipulate design elements.
The _____ is usually found on the top of the web page and contains the websites name and logo.
Short Quiz 10
The Undo and the Redo buttons are located in the _____
Where can you find the zoom in, zoom out, and home icon?
The correct answer is: middle-right part of the screen
In Prezi's home page, click the _____ to strt the signup process
What is the name of the presentation program that we learned about in this chapter?
What part of the Prezi editor can be used to change the frame's color?
After you have successfully signed up to Prezi, what will you see when you click Get Started?
The correct answer is: Use different colors, fonts, and animations for each slide.
In this lesson which of Prezi's pricing plans were you instructed to use?
The correct answer is: Plan your design from the beginning and stick to it throughout your presentation.
In Prezi, you can use _____ to set the theme of your presentation without having to design it yourself
The correct answer is: You zoom in and out of the canvas
What do you click if you don't want to use a template in creating a new prezi?
Unlike a slideshow that is made up of multiple slides, a prezi is just a single page or _____
The correct answer is: Everyone can view Prezis created using free accounts while those made using
paid accounts can be made private.
Long Quiz 5
ICT can be used to spread _____ by informing the public about important issues.
What is the name of the word processor that comes with Google Drive?
What is the name of the cloud-based file storage and sharing service owned and operated by Google?
What is the name of the spreadsheet app that comes with Google Drive?
A _____is a document that aims to persuade a person or a group to fund or sponsor a project.
What happens when you click the house icon on the right side of the screen?
Websites where people can post and reply to messages are called _____.
Instead of slides, the contants of a Prezi are all displayed in a single page or a _____.
_____ contains information that can be used to get in touch with the owners of the website.
What is the name of the presentation app that comes with Google Drive?
In Prezi, the pre-made designs that you can add to your presentation are called _____.
"Buy now!" "Click here download." And "Donate now." Are examples of _____.
_____ is a social media app feature that enables people from disaster-affected areas to mark themselves
as safe.
What is the name given to a program or a set of programs used by people to work together and achieve
a common goal?
The correct answer is: Groupware
What part of a website is usually found at the top of the page and contains the website's name and
logo?
The delivery of a topic to an audience using a combination of speaking and visual elements is called
_____.
Information shared using _____ are not instantly displayed to other members of the group.
Online applications have been developed for _____ during natural and man-made calamities.
_____is a cloud-based file storage and sharing service owned and operated by Google.
-Google Drive
Of all the applications that you have learned about in the previous chapters, which one looks a lot like
Google Sheets?
-LibreOfficeCalc
-Wiki
All the applications that we used in this chapter is owned by which company?
a. The only way to upload a file is by dragging and dropping it to the My Drive page
Short Quiz 11
_____is a cloud-based file storage and sharing service owned and operated by Google.
-Google Drive
-Google Sheets
-VoIP
-Collaborative software
All the applications that we used in this chapter is owned by which company?
-None of these
Google Docs, Sheets, and Slides are collaborative _____. -Productivity apps
Learning Activity 12
A _____is a document that aims to persuade a person or a group to sponsor your project.
-Sales Pitch
In what part of the concept paper do you give a brief but clear description of the issue that you wish to
address? -Introduction
In your concept paper, in which part do you ask for permission to use school facilities? -Support
In what part of the concept paper do you state how your project can make a difference and who will
benefit from it?
-Purpose
Short Quiz 12
ICT is used to inform the public about important issues with the goal of spreading _____.
-Social Awareness
Sending monetary donations via online money transfer is an example of how ICT can be used for _____.
-Charity
In this chapter, we learned about a team structure in which decision-making and leadership
responsibilities are distributed to every member of the team. What shape did we compare it to?
-Circle
In what part of the concept paper do you give a brief but clear description of the issue that you wish to
address? -Introduction
In what part of your concept paper do you include your email address?
-Contact Information
The Internet has proven to be an effective way to collect and share information during emergency
situations. Because of this, online applications have been developed for _____ during natural and man-
made calamities. -Disaster Response
-Triangle
_____ is a feature that is activated during and after natural and man-made disasters which enables users
in disaster stricken areas to let people know that they are safe.
In this chapter, we learned about a team structure where every member gets to leader at some point.
What's it called?
-Holacracy
In what part of the concept paper do you explain you plan to accomplish your goal? -Description
Long Quiz 6
A biography of the author or owner of the website can most likely be found in the _____.
-Header
-Inbox
Software tools called _____ can be used to create websites without having to deal with computer code.
-Website builders
A _____ is an alias that can be your name or a combination of your name, words and characters. -
Username
_____ is the act of illegally recording, copying, and/or distributing copyrighted works.
-Piracy
-Mail Merge
A/An _____ is a destination where emails can be sent from or delivered to.
-Email address
You used your laptop open your Facebook account. In this scenario, your laptop is called a _____. -Client
What is the name of the presentation program that we learned about in Chapter 10?
-Prezi
What movement was able to collect millions of dollars and raise awareness about Lou Gehrig's Disease?
-ALS Ice Bucket Challenge
The act of tricking people into submitting their personal information is called _____.
-Phishing
-Password
_____ are programs that can be accessed using an Internet browser. -Web applications
CAPTCHA stands for "Completely Automated Public Turing Test To Tell _____Apart"
In wordPress, you are askedto select a _____ that best describes your website.
-Category
What do you call groupware that allow the sharing of information in real-time?
-Synchronous groupware
-Spammers
Which image format is ideal for images with few colors and sharp edges?
-Gif
_____ is the name given to the task done by a computer for other computers.
-Service
ICT can be used for _____ by sending donations through online money-transfer.
-Charity
-True
Paid ads, email advertising and web syndication are strategies used in ( ), which is a step in Web Content
Lifecycle? -Promotion
-VoIP
( ) is Google Drive's main page where you can access your files and files that others have shared with
you. -My Drive
A GIMP file can have one or several ( ) which are stacked on top of each other.
-Layers
In a _____ each member can have the chance to lead at some point.
-Holacracy
In Weebly, the ( ) is first page that you will see after you log in.
-Dashboard or Homepage
Web syndication is used to measure the popularity of websites and web contents.
-False
In GIMP, the parts of the image that are isolated are called _____ -selection
A _____ is a collection of web pages that can be accessed through the Internet. -website
The ( ) is at the bottom of the web page and displays important information such as Terms of Service,
Copyright information, FAQ's, etc.
-Footer
-Compression
The ALS Ice Bucket Challenge was used to raise social awareness and gather donations for the research
about Lou Gehrig's Disease.
-True
In the first step of creating a Wordpress blog, you have to choose a ( ) that best describes the type of
contents that you will be creating.
-Category
In GIMP, the ( ) displays the image that the user is currently working on
-Image window
( ) is an image format that is ideal for images with sharp edges and few colors such as letters and logos.
-GIF
Text, sounds, images and videos that are published online are called
-web content
A ( ) is a message or instruction that urges the users to do something. Examples are "Click here" or
"Watch this video".
-Call to Action
Traffic signs, product logos, and posters are examples of -Graphics design
_____ is a file storage and sharing service that can be used by anyone with a Google account.
-Google Drive
Web contents are planned, created, and published using which process?
_____ is used instead of permanently deleting old and outdated web contents.
-Archiving
-True
At the bottom of GIMP's ( ), you will see the foreground and background colors. -Main Toolbox
-Single-Window Mode
Prezis created using free accounts can be viewed by pther people without the owner's permisiion -True
-True
-False
Files made using _____ can be downloaded in Microsoft Excel or PDF format -Google Sheets
-Change.org
-Weebly
-c. post
A _____ is composed of points, lines, and shapes.
-Vector Image
At the bottom of the ______, you will find the foreground and the background colors.
Web _____ is the number of visitors in a website and the number of web pages that they visit.
-web traffic
During the _____ stage, old web contents are either deleted or archived.
-retirement
-add frame
-c. Web traffic is used to measure the popularity of websites and web contents.
When creating a WordPress blog, the first step is to select a _____ that best describes your website.
-category
Once you're done creating or editing your Weebly website, what button do you click to make your
website available to the public?
- A.) PUBLISH
Groupware that allow the sharing of information in real-time are called _____.
- Synchronous groupware
-My drive
The website's articles, images, videos, and other media are normally located in the _____.
-navigation
You can use _____ to send short messages which will be instantly seen by the other party
-online chat
During which stage do you execute your planned tasks and activities?
- Development
-message boards
_____ allows 2 or more people to communicate through real-time audio and video.
-videoconferencing
What is the name of the web-based word processor that we learned about in Chapter 11?
-google docs
You cannot edit uploaded Microsoft Word files using Google Docs.
-true
-gimp
_____ is an open source web application created by volunteer engineers after the Haiti earthquake.
-google slides
You can sign up to Change.org using your Facebook account
_____ is the practice of moving outdated web content away from the main website.
-archiving
-panning
What do you call text, sounds, images, videos, and other media that are published online?
-web content
-true
_____ is the delivery of a topic to an audience using a combination of speaking and visual aids.
-presentation
What is the name of the online petition site that we learned about in Chapter 12?
-changes.org
To persuade a person or a group to sponsor your project, you have to write a _____.
-Concept Paper
Unlike a slideshow that is made up of multiple slides, a prezi is composed of a single page called a _____
-b. Frame
-groupware
-google slides
- Collaborative Software
-prezi
Prezis created using free accounts can be viewed by anyone while paying users can make their
presentations private.
-false
_____ is a social media feature that is activated during and after natural and man-made disasters which
enables users in disaster stricken areas to let people know that they are safe.
A team structure where leadership responsibilities can be given to different members of the team is
called a _____.
-Team environment
In GIMP, you can make a _____ by isolating an area of the image so that your actions will apply to that
area alone.
-selection
_____ is the practice of giving other websites the permission to publish your original contents.
-web marketing
-Google Docs
-false
What is the name of Google's cloud-based file storage and sharing service?
-google drive
_____ is a form of communication that uses visual elements like text and pictures to express an idea or
send a message.
-Graphics design
Software tools that are used to create websites without having to deal with computer code are called
_____.
-Website Builder
_____ is a technology that enables two or more people to send and receive short messages instantly.
- D. online chat
=lossless
You can give other websites permission to publish your content. This is called _____.
=web syndication When creating a WordPress blog, you have to select a ______ that best describes
what your blog is about. Select one:
=Layout
=Tool options
The _____ determines how the parts of your blog will be arranged.
=layout
=coloumn
_____ are vertical groups of cells.
=rows
=shared calendar
= Microsoft Powerpoint
What is the URL that you should use to directly access My Drive?
= drive.google.com
Visit the _____ if you want to know how to get in touch with the owner(s) of the website.
=contact section
Apps like Person Finder and Safety check are designed for _____.
= Disaster Response
In this chapter, we learned about a movement that was able to collect millions of dollars and raise
awareness about Lou Gehrig's Disease. What is this movement called?
=wordpress
The ALS Ice Bucket Challenge was used to raise social awareness and gather donations for the treatment
of the ZIKA Virus.
Select one:
True
=weebly
___ is the total number of visitors in a website and the number of web pages that they visit.
Select one:
a. Web traffic
Select one:
a. Triangle
False
REMEDIAL EXAM
It is a type of malware that launches unwanted advertisements in the internet browser of your desktop.
It is the fraudulent practice of stealing important information from users such as passwords, pin codes,
and credit card numbers.
The URL and design of a website's homepage changes depending on the preferences of the current user.
This website is _____
The correct answer is: Dynamic
You had to enter your email address in order to play a free game. A few dayslater, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of ______
A _____ is a type of malware that automatically spreads in a computer or a system even without human
interaction.
This refers to the feature where users can categorize and locate information through tagging.
A number format the puts a dollar symbol before each value by default.
A website that contains articles written by users and can be edited by other users is called a _____.
A network of servers that work together to provide a centralized service is called a _____.
A Web 3.0 characteristic in which users are always connected to the Internet.
Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a _____
A _____ is a computer that does a task for other computers.The correct answer is: Server
These websites allow user to post their content. Other users are able to comment on the said topic.
The correct answer is: BLOGS AND FORUMS / Blogs and Forums
PNG is a file extension for pictures which can be transported on the Internet at a faster rates. PNG
stands for Answer: Portable Network Graphics
Which of the following is not a factor that can be used to determine a source's credibility?
It is a type of malware that launches unwanted advertisements in your internet browser of your desktop
Clicking on a search result using the _____ will open the link in a new tab.
These are sites that allow you to upload and share media content like images,music and video.
It is the synergy of technological advancements to work on a similar goal or task. For example, besides
using your personal computer to create word documents, you can now use your smartphone.
It is considered as a type of virus. Like a virus, it can make copies of itself in computers that it comes in
contact with
_____ is a program that is designed to cause harm to your computer or device The correct answer is:
virus
This is a more complicated way of phishing where exploiting the DNS system happens.
These are sites that allow you to store and manage links to various website and resources. Most of these
sites allow you to create a tag and that will allow you to easily share them.
These are sites that allow users to post their own news items or links to other news sources. The users
can also comment on the post and comments may also be through commentaries. These are sites that
focus on short updates from the user. Those that subscribed to the user will be able to receive these
updates.
The correct answer is: Mobile phone apps are native apps because they are installed
You used your smartphone to access Yahoo mail and send an email. In this scenario, your smartphone is
a _____
_____ apps are used to connect with other people and make interactions such as messaging, writing
comments and sharing pictures and videos.
While you are typing your keyword in the address bar or the search bar, several _____ may appear
bellow it
These are sites that allows you to connect with other people with the same interests or background.
Once the user creates his / her account, he / she can set up a profile, add people, share content, etc.
What button allows you to see the result of your mail merge even before youprint or send it out?
According to this magazine, three Philippine cities are part of the top 10 in their research about "The
Selfiest Cities Around the World."
Wiki is derived from the Hawiian work wikiwiki, which means _____
Several of these devices are capable of using high – speed internet. Today the latest model devices use
4G Networking(LTE), which is currently the fastest mobile network.
The best approach to filter out unwanted information using search engines.
The correct answer is: Some cloud-based services can be used for free
_____ Internet-based networks that are used to store, manage, and share resources and information
The cloud enables people in different locations to work on the same project. This enables _____.
_____ websites encourage user participation by allowing them share videos, music, articles, etc.
It is an open source OS developed by Google. Being open source means this mobile phone companies
use this OS for free.
The correct answer is: ANDROID / Android
A program designed to create spreadsheets which can later be used to analyzestatistical data.
It is a type of malware that disguises itself as a useful and / or harmless program or file.
Computers can create data and make decisions based on the user's actions through _____
bookmarking site
bookmarking s
The correct answer is: Only your full name can be used as a username.
This media is designed to help people who have visual and reading impairments.
A provision that allows you to use copyrighted work without consent with certain limitations.
It provides a common framework to allow data to be shared and re-used across platform, enterprise,
and community boundaries.