You are on page 1of 26

While typing a keyword in a search bar, _____ may appear below it.

= Suggestions

People who send unwanted and unsolicited emails are called _____
= Spammers

What is the name given to a program or a set of programs used to look for information in the internet.
= Web Search Engine

What is the name given to applications that allow people to interact with one another in online
communities
= Social Media

Which of the following TLD's is most likely to be owned by a university?


= .edu

What is the name of the LibreOffice version with the latest features?
= LibreOffice Fresh

What do you call an application used for sending, receiving, and organizing emails?
= Email Client

Information stolen via _____ such as credit card and bank account information can be used in identity
theft and stealing money.
= Phishing

A _____ is a computer that does tasks for other computers.


= Server

_____ is a type of malware that does not need human action to spread
= Worm

A _______ is an Internet-based application that can be accessed using browsers.


= Web Application

Web 1.0 websites are static


= True

A centralized location for numerous servers is called a _____


= Data Center

_____ is the most common TLD


= .com

Yahoo, Google, and Bing are examples of a _____.


= Web Search Engine

_____ is a type of malware that disguises itself as a harmless program or file.


= Trojan

REPUBLIC ACT NO. 8293 is also know as _____


= Intellectual Property Code of the Philippines

The Hawaiian word wikiwiki, means _____


= Quick

A _____ is a software that is used to create information like documents, spreadsheet, presentations, etc.
= Productivity tool

What is the name of word processor that we used in Chapter 5?


= LibreOffice Writter

When you sign up to an app or website, you normally have to set an alias. This alias is called a _____.
= Alias

Unwanted and unsolicited messages are called _____


= Spamming

Apps that you install on your phone such as Facebook, Instagram, and Clash of Clans are web apps.
= True

What is the name given to software used to create, store and collections of information?
= Database management system

Websites from the 2.0 or later generations of the internet that can change their appearance and
behavior depending on the user's action, location, preferences, etc. are called _____ websites.
= Dynamic Websites

A website that allows users to edit its contents and structure is called a _____.
= Wiki

A program used to create, store, and manage data in tables.


= Spreadsheet

_____ is a type of malware that causes unwanted advertisements to appear in your screen.
= Adware

Other than the search bar, you can also enter your search keywords in your browser's _____.
= Address Bar

In the First Chapter, we visited the website of what 90's movie?


= space Jam

LibreOffice is an open-source _____


= Office productivity suite
With Google Chrome and Mozilla Firefox, you can make an online search by typing the keywords in the
_____
= Address Bar

When you record a movie that was shown on TV and you sold copies of it, you are committing an act of
piracy called _____
= Streaming

_____ relies on users to contribute web contents.


= Social Media

Adware are browser add-ons that prevent advertisements from being displayed in your browser.
= False

The names of _____ are numbers


= Rows

A link will open in a new tab if you click on it with your _____
= Mouse Wheel

Data centers are centralized locations for _____


= Cloud

Web 1.0 websites are defined as read-only or _____


= Static

The most common acts of _____ include posting inappropriate or banned contents, posting off topic
messages
Select one:
= Trolling

_____ allows you to use multiple keywords and entire phrases and narrow down your search by
selecting language, region, date, etc.
= Advanced Search

Bcc Stands for


= Blind Carbon Copy

Web 2.0 websites are mostly dynamic


= True

Question 1
Answer saved
Marked out of 1.00
Flag question
Question text

You can use _____ to create multiple letters with the same body or message but are
addressed to different people.

Select one:
a. LibreOffice
b. Formula
c. Mail Merge
d. Data source
Clear my choice
Question 2
Answer saved
Marked out of 1.00

Flag question
Question text

What is the name of the LibreOffice version with the latest features?

Select one:
a. LibreOffice Word
b. LibreOffice Document
c. LibreOffice Writer
d. LibreOffice Fresh
Clear my choice
Question 3
Answer saved
Marked out of 1.00
Flag question
Question text

A computer virus can spread when the infected computer makes contact with another
computer.

Select one:
True
False
Question 4
Answer saved
Marked out of 1.00

Flag question
Question text

By default, Gmail will delete a message in the Trash after 30 days.

Select one:
True
False
Question 5
Answer saved
Marked out of 1.00

Flag question
Question text

The apps in your smart phone are web-based apps because they connect to the
Internet.
Select one:
True
False
Question 6
Answer saved
Marked out of 1.00

Flag question
Question text

A group of programs used to create, edit, view, and print computer graphics is called
Graphi
aAnswer .

Question 7
Answer saved
Marked out of 1.00

Flag question
Question text

The _____ of an email address is on the right.

Select one:
a. Local part
b. Client part
c. Domain part
d. Name part
Clear my choice
Question 8
Answer saved
Marked out of 1.00
Flag question
Question text

It is considered ok to use your phone in a movie theater as long as you use earphones

Select one:
True
False
Question 9
Answer saved
Marked out of 1.00

Flag question
Question text

Based on the spreadsheet above, give the answer to the following formula:
=B3*C1-A4
260
Answer:
Question 10
Answer saved
Marked out of 1.00
Flag question
Question text

_____ allows you to use multiple keywords and entire phrases and narrow down your
search by selecting language, region, date, etc.

Select one:
a. Search Bar
b. Advanced Search
c. Bing
d. Safari
Clear my choice
Question 11
Answer saved
Marked out of 1.00

Flag question
Question text

The names of _____ are numbers

Select one:
a. Formulas
b. Rows
c. Collumns
d. Cells
Clear my choice
Question 12
Answer saved
Marked out of 1.00
Flag question
Question text

Some search engines have _____ features that can be used to do complex web search.

Select one:
a. Integrated Search
b. Advanced Search
c. Assisted Search
d. Improved Search
Clear my choice
Question 13
Answer saved
Marked out of 1.00

Flag question
Question text

Other than the search bar, you can also enter your search keywords in your browser's
_____.

Select one:
a. Keyword bar
b. Space bar
c. Domain bar
d. Address bar
Clear my choice
Question 14
Answer saved
Marked out of 1.00
Flag question
Question text

It is ok to take pictures of strangers without asking for permission as long as you tag
them when you post the pictures.

Select one:
True
False
Question 15
Answer saved
Marked out of 1.00

Flag question
Question text

An office has one computer that is connected to a printer. It prints documents that are
sent to it by other computers via Local Area Network In this setup, the computer
connected to printer is the _____.

Select one:
a. Service
b. Server
c. Client
d. Network
Clear my choice
Question 16
Answer saved
Marked out of 1.00
Flag question
Question text

_____ is a TLD that was originally intended for non profit entities.

Select one:
a. .edu
b. .net
c. .com
d. .org
Clear my choice
Question 17
Answer saved
Marked out of 1.00

Flag question
Question text

__________is a term used to define applications and websites that people use to make
online social interactions.

Select one:
a. Podcast
b. Social Media
c. Search Engine
d. Wiki
Clear my choice
Question 18
Answer saved
Marked out of 1.00

Flag question
Question text

A program used to create, store, and manage data in tables.

Select one:
a. Spreadsheet
b. Graphics suite
c. DBMS
d. Word processor
Clear my choice
Question 19
Answer saved
Marked out of 1.00

Flag question
Question text

LibreOffice _____ is an example of a word processor

Select one:
a. Notepad
b. Writer
c. Docs
d. word
Clear my choice
Question 20
Answer saved
Marked out of 1.00
Flag question
Question text

A program designed to interfere with your computer, device or network's normal


virus
operation is called aAnswer .

Question 21
Answer saved
Marked out of 1.00

Flag question
Question text

Unwanted and unsolicited messages are called _____

Select one:
a. Spam
b. Phishing
c. Adware
d. Trojan
Clear my choice
Question 22
Answer saved
Marked out of 1.00

Flag question
Question text

Recording live performances or broadcasts without permission from the owner is called
_____.
Select one:
a. Counterfeiting
b. Trolling
c. Bootlegging
d. Streaming
Clear my choice
Question 23
Answer saved
Marked out of 1.00

Flag question
Question text

_____ is a type of malware that is named after a fictional horse.

Select one:
a. Trojan
b. Spam
c. Adware
d. Worm
Clear my choice
Question 24
Answer saved
Marked out of 1.00

Flag question
Question text

The vertical groupings in a spreadsheet are called _____.

Select one:
a. Rows
b. Collumns
c. Cells
d. Formulas
Clear my choice
Question 25
Answer saved
Marked out of 1.00

Flag question
Question text

People who try to cause trouble by posting inappropriate or banned contents and off-
topic messages are called _____

Select one:
a. Bullies
b. Trolls
c. Knolls
d. Spammers
Clear my choice
Question 26
Answer saved
Marked out of 1.00

Flag question
Question text

A website that allows users to edit its contents and structure is called a _____.

Select one:
a. Wiki
b. Cloud
c. Google
d. Web 3.0
Clear my choice
Question 27
Answer saved
Marked out of 1.00

Flag question
Question text

It is a list of detailed information provided by a website and displayed in a web browser


to a user.

Select one:
a. Websites
b. Web Browser
c. Web Page
d. Web Applications
Clear my choice
Question 28
Answer saved
Marked out of 1.00

Flag question
Question text

It is any piece of software which displays advertisements on a device, malicious or not.

Select one:
a. Spam
b. SPyware
c. Adware
d. Trojan
Clear my choice
Question 29
Answer saved
Marked out of 1.00

Flag question
Question text

What do you call an application that needs to be installed to a device or computer


before it can be used?
Native Application
Answer:
Question 30
Answer saved
Marked out of 1.00

Flag question
Question text

Which of the following TLD's is most likely to be owned by a university?

Select one:
a. .edu
b. .sch
c. .gov
d. .org
Clear my choice
Question 31
Answer saved
Marked out of 1.00
Flag question
Question text

blind ca
Bcc Stands forAnswer .

Question 32
Answer saved
Marked out of 1.00

Flag question
Question text

In a spreadsheet, a box in a table is called a _____.

Select one:
a. Cell
b. Row
c. Collumn
d. Formula
Clear my choice
Question 33
Answer saved
Marked out of 1.00

Flag question
Question text

A DBMS is a software tool for creating, editing, and managing collections of information
called _______.

Select one:
a. Presentation
b. Databases
c. Spread Sheets
d. Words
Clear my choice
Question 34
Answer saved
Marked out of 1.00

Flag question
Question text

Adware are browser add-ons that prevent advertisements from being displayed in your
browser.

Select one:
True
False
Question 35
Answer saved
Marked out of 1.00

Flag question
Question text

_____ is the act of claiming someone else's work as your own.

Select one:
a. Bootlegging
b. Piracy
c. Trolling
d. Plagiarism
Clear my choice
Question 36
Answer saved
Marked out of 1.00

Flag question
Question text

The Hawaiian word wikiwiki, means _____

Select one:
a. Super-free
b. Quick
c. Many
d. Free
Clear my choice
Question 37
Answer saved
Marked out of 1.00

Flag question
Question text

_____ relies on users to contribute web contents.

Select one:
a. Social Media
b. Cloud
c. Native app
d. Server
Clear my choice
Question 38
Answer saved
Marked out of 1.00

Flag question
Question text

Web 1.0 websites are static

Select one:
True
False
Question 39
Answer saved
Marked out of 1.00

Flag question
Question text

What is the name of word processor that we used in Chapter 5?

Select one:
a. LibreOffice Word
b. LibreOffice Document
c. LibreOffice Fresh
d. LibreOffice Writer
Clear my choice
Question 40
Answer saved
Marked out of 1.00

Flag question
Question text

In the First Chapter, we visited the website of what 90's movie?


space Jam
Answer:
Question 41
Answer saved
Marked out of 1.00

Flag question
Question text

A _____ is a software that is used to create information like documents, spreadsheet,


presentations, etc.

Select one:
a. DBMS
b. Productivity tool
c. Graphics suite
d. Word processor
Clear my choice
Question 42
Answer saved
Marked out of 1.00

Flag question
Question text

_____ can cause your system to slow down because they initialize automatically and
remain running in the background.

Select one:
a. Adware
b. Spam
c. Phishing
d. Adblocker
Clear my choice
Question 43
Answer saved
Marked out of 1.00

Flag question
Question text

What is the name given to applications that allow people to interact with one another in
online communities

Select one:
a. Wiki
b. Social Media
c. Cloud
d. Native app
Clear my choice
Question 44
Answer saved
Marked out of 1.00

Flag question
Question text

In Calc, what is the symbol used for multiplication?

Select one:
a. *
b. /
c. +
d. -
Clear my choice
Question 45
Answer saved
Marked out of 1.00

Flag question
Question text

The default name of a ____ is a letter and a number

Select one:
a. Cell
b. Row
c. Formula
d. Collumn
Clear my choice
Question 46
Answer saved
Marked out of 1.00

Flag question
Question text

Adding information from a database to a document is called _____.

Select one:
a. Data source
b. Formula
c. LibreOffice
d. Mail Merge
Clear my choice
Question 47
Answer saved
Marked out of 1.00

Flag question
Question text

Wiki is derived from the Hawiian work wikiwiki, which means _____

Select one:
a. Super-free
b. Many
c. Quick
d. Free
Clear my choice
Question 48
Answer saved
Marked out of 1.00

Flag question
Question text

_____ is a type of malware that does not need human action to spread

Select one:
a. Phishing
b. Trojan
c. Spam
d. Worm
Clear my choice
Question 49
Answer saved
Marked out of 1.00
Flag question
Question text

The practice of tricking people into submitting their personal details is called _____.

Select one:
a. Phishing
b. Trojan
c. Spam
d. Worm
Clear my choice
Question 50
Answer saved
Marked out of 1.00

Flag question
Question text

With Google Chrome and Mozilla Firefox, you can make an online search by typing the
keywords in the _____

Select one:
a. Keyword bar
b. Space bar
c. Address bar
d. Domain bar
Clear my choice

You might also like