1. A byte is a collection of eight bits, so
called because of the pun with bit and bite. Similarly a collection of four
bits – half a byte – is sometimes called a _______.
A.
octet
B.
gigabyte
C. megabyte
D. nybble or nibble
2. It is a software or a device that allows
users to create, edit, format and output of documents.
A.
word processor
B.
spreadsheet
C. typewriter
D. printer
3. This small text file sent to your
computer by a web site you have visited can be used to track your activity
across different web sites in order to provide, for example, “targeted”
advertisements.
A.
spam
B.
cookie
C. virus
D. biskit
4. It is a string of letters and numbers that
have to be typed in on some web pages before something can be opened or saved.
A.
Passwords
B.
Email address
C. CAPTCHA
D. Username
5. Which of the following terms is NOT
correct?
A.
A firewall is a piece of computer software or hardware that restricts the data
that is allowed to flow through.
B.
A spam is an unsolicited email message sent out in bulk and generally
commercial in nature.
C.
Cybersecurity is the practice of protecting systems, networks, and programs
from digital attacks.
D.
A scam is the fraudulent attempt to obtain sensitive information such as
usernames, passwords and credit card details by disguising oneself as a
trustworthy entity in an electronic communication.
6. Also known as a web address, a URL is a
form of URI and a standardized naming convention for addressing documents
accessible over the Internet and Intranet. URL stands for ____________.
A.
Uninterrupted Resource Location
B.
Uniform Resource Locator
C. Universal Resource Locator
D. Uniform Resource Location
7. They are networks that allow public
internet connections to be used as private networks as a means of improving
security.
A.
LANs
B.
DSLs
C. VPNs
D. VMs
8. The following are ways to stop cyber bullying
EXCEPT _____________.
A.
Confront the person personally, respond to his/her accusations, and retaliate
as necessary.
B.
Save the evidence if things escalate.
C.
Reach out for help especially if the behavior is really getting to you
D.
Don’t share your passwords with anyone – even your closest friends, who may not
be close forever.
9. To protect your online identity, one of
the following ways is NOT helpful.
A.
Use strong password.
B.
Update security software.
C. Shred sensitive materials.
D. Read phishing emails.
10. Which of the following is NOT a mobile
device?
A.
calculator
B.
desktop computer
C. tablet
D. smartphone
11. It pertains to the practice of
self-regulation and empathy, and to build positive relationships through the
use of digital media.
A.
digital citizen identity
B.
digital communication
C. digital emotional intelligence
D. digital safety
12. Who created the world wide web?
A.
Robert E. Kahn
B.
Tim Berners-Lee
C. Vint Cerf
D. Mark Zuckerberg
13. It is any type of illegal activity that
is undertaken (or relies heavily) on a computer, which includes network
intrusions, identity theft and the spreading of computer viruses.
A.
Cyber bullying
B.
Cybercrime
C. Cyber security
D. Phishing
14. It is a set of symbols inserted into
files intended for display on the world wide web. The symbols tell web browsers
how to display words and images - e.g. which color, font and type size to use -
and they direct it to link to other pages on the world wide web via hyperlinks.
A.
Java Script
B.
Joint Photographic Experts Group (JPEG)
C.
Portable document format (PDF)
D.
Hyper-text markup language (HTML)
15. Which of the following can be considered
as a disadvantage of technology?
A.
Technology saves time, energy and money and provides many ways to accomplish a
task.
B.
Technology provides rapidly expanding knowledge, better access to it, and global
communications.
C.
Technology provides social distancing, less personal communications, and loss
of individual privacy.
D.
Technology can help treat more sick people and consequently save many lives and
combat very harmful viruses and bacteria.
ANSWERS