You are on page 1of 11

Question 1

A hash code is created by math function that takes analog information and generates a
string of letters and numbers from it.

Response: False, digital

​ Edit

Question 2
Threat is a weakness that makes targets susceptible to an attack.

Response: False, vulnerability

​ Edit

Question 3
Match each item to their appropriate description:

Response: Message => The information (data) to be communicated.

Response: Sender => The device that sends the data message.

Response: Receiver => The device that receives the message.

Response: Transmission medium => The physical path by which a message travels
from sender to receiver.

Response: Protocol => A set of rules that govern data communications.

​ Edit

Question 4
In the video from the lesson "Netiquette and Digital Ethics", Rule # 3 of Netiquette is
described as what?

Response: Know where you are in cyberspace

​ Edit

Question 5
78% of Filipino internet users are identified as victims of crimes and malicious activities
committed online.
Response: False, 87%

​ Edit

Question 6
What are the possible uses of Blockchain technology?

Response: Cryptocurrency

Response: Voting

Response: Property Records

​ Edit

Question 7
A networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device.

Response: Switch

​ Edit

Question 8
_____ _____ is how the network of devices/computers is arranged through the
connection of various nodes through lines of connections.

Response: network

Response: topology

​ Edit

Question 9
In the video from the lesson "Netiquette and Digital Ethics", Rule # 8 of Netiquette is
described as what?

Response: Respect Other People's Privacy

​ Edit

Question 10
Match each item to their appropriate description:
Response: protecting information from being disclosed to unauthorized parties. =>
confidentiality

Response: protecting information from being disclosed to unauthorized parties. =>


Integrity

Response: protecting information from being disclosed to unauthorized parties. =>


availability

​ Edit

Question 11
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", there are five lawful basis for collecting information, but
they all rely on the concept of _____ .

Response: Consent

​ Edit

Question 12
In the video from the lesson "Computer Networks, the world wide web and the
Internet", what was mentioned as the first web browser that allowed graphics to be
embedded alongside text?

Response: Mosaic

​ Edit

Question 13
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", Hardware in IoT can be divided it two categories, namely:

Response: General Devices

Response: Sensing Devices

​ Edit

Question 14
Intellectual property is applicable to both intangible and tangible products.
Response: False

​ Edit

Question 15
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", what specific interagency body is tasked for the
enforcement of RA 10175?

Response: Cybercrime Investigation and Coordinating Center

​ Edit

Question 16
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the elements of Internet of Things are namely as:

Response: Data to Machine

Response: Machine to Data

Response: People to Machine

Response: People to Data

​ Edit

Question 17
A device used to connect media that would otherwise be incompatible.

Response: Media Converter

​ Edit

Question 18
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the value of hyperlinked information was conceptualized in 1945 by
whom?

Response: Vannevar Bush

​ Edit
Question 19
Match each item to their appropriate description:

Response: They believe people should act in ways that are consistent with moral rules.
=> Absolutist

Response: They favor securing the best possible consequences for all concerned. =>
Situationist

Response: They endorsed moral rules as guides for action, but admit following rules will
not always generate the best consequences. => Exceptionist

Response: They base their ethical choices on personal considerations. => Relativist

​ Edit

Question 20
In 1930, Libel is define under the Revised Penal Code Section 535.

Response: False, 353

​ Edit

Question 21
A Point to point is a communication which is accomplished via a distinct type of
one-to-many connection

Response: False, multipoint

​ Edit

Question 22
In the video from the lesson "ICT Trends , Issues , and its Role in different Industry
Sectors", what technology was described as the ability to edit ourselves to cancel out
things like cancer potentially create new beings?

Response: Nano Technology

​ Edit

Question 23
Match each item to their appropriate description:
Response: The communication is unidirectional, as on a one –way street. => Simplex

Response: Each station can both transmit and receive, but not at the same time. =>
Half-duplex

Response: Both stations can transmit and receive simultaneously. => Full- Duplex

​ Edit

Question 24
The word telecommunication is a compound of the Greek prefix _____ , meaning
distant, far off, or afar, and the Latin _____ , meaning to share.

Response: tele

Response: afar

​ Edit

Question 1
A hash code is created by math function that takes analog information and generates a
string of letters and numbers from it.

Score: 2 out of 2

Yes

Question 2
Threat is a weakness that makes targets susceptible to an attack.

Score: 2 out of 2

Yes

Question 3
Match each item to their appropriate description:

Score: 5 out of 5

Yes
Question 4
In the video from the lesson "Netiquette and Digital Ethics", Rule # 3 of Netiquette is
described as what?

Score: 2 out of 2

Yes

Question 5
78% of Filipino internet users are identified as victims of crimes and malicious activities
committed online.

Score: 2 out of 2

Yes

Question 6
What are the possible uses of Blockchain technology?

Score: 3 out of 3

Yes

Question 7
A networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device.

Score: 1 out of 1

Yes

Question 8
_____ _____ is how the network of devices/computers is arranged through the
connection of various nodes through lines of connections.

Score: 2 out of 2

Yes

Question 9
In the video from the lesson "Netiquette and Digital Ethics", Rule # 8 of Netiquette is
described as what?

Score: 2 out of 2

Yes

Question 10
Match each item to their appropriate description:

Score: 3 out of 3

Yes

Question 11
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", there are five lawful basis for collecting information, but
they all rely on the concept of _____ .

Score: 2 out of 2

Yes

Question 12
In the video from the lesson "Computer Networks, the world wide web and the
Internet", what was mentioned as the first web browser that allowed graphics to be
embedded alongside text?

Score: 2 out of 2

Yes

Question 13
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", Hardware in IoT can be divided it two categories, namely:

Score: 2 out of 2

Yes
Question 14
Intellectual property is applicable to both intangible and tangible products.

Score: 0 out of 1

No

Question 15
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", what specific interagency body is tasked for the
enforcement of RA 10175?

Score: 2 out of 2

Yes

Question 16
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the elements of Internet of Things are namely as:

Score: 1 out of 4

Question 17
A device used to connect media that would otherwise be incompatible.

Score: 1 out of 1

Yes

Question 18
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the value of hyperlinked information was conceptualized in 1945 by
whom?

Score: 2 out of 2

Yes

Question 19
Match each item to their appropriate description:

Score: 3 out of 4

Question 20
In 1930, Libel is define under the Revised Penal Code Section 535.

Score: 1 out of 2

Question 21
A Point to point is a communication which is accomplished via a distinct type of
one-to-many connection

Score: 2 out of 2

Yes

Question 22
In the video from the lesson "ICT Trends , Issues , and its Role in different Industry
Sectors", what technology was described as the ability to edit ourselves to cancel out
things like cancer potentially create new beings?

Score: 0 out of 2

No

Question 23
Match each item to their appropriate description:

Score: 3 out of 3

Yes

Question 24
The word telecommunication is a compound of the Greek prefix _____ , meaning
distant, far off, or afar, and the Latin _____ , meaning to share.

Score: 1 out of 2

You might also like