1. Always post your future vacation. A. TRUE B . Maybe C. FALSE D. Not sure
2. Arthur shared to his timeline the proper way on how use ChatGPT that he recently learned from his seminar. What Core Rules of Netiquette he considered? A. Rule 6: Share expert knowledge B. Rule 4: Respect other people's time and bandwidth C. Rule 8: Respect other people's privacy D. Rule 5: Make yourself look good online
3. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. What Core Rules of Netiquette is considered? A. Rule 4: Respect other people's time and bandwid B. Rule 5: Make yourself look good online C. Rule 9: Don't abuse your power D. Rule 8: Respect other people's privacy
4. Ashley always check for spelling and grammar errors before posting it in her timeline. What Core Rules of Netiquette she considered? A. Rule 5: Make yourself look good online B. Rule 3: Know where you are in cyberspace C. Rule 9: Don't abuse your power D. Rule 8: Respect other people's privacy
5. Sonny always make it to the point that he will not behave rudely to someone face-to-face and in the virtual world. What Core Rules of Netiquette he considered? A. Rule 6: Share expert knowledge B. Rule 2: Adhere to the same standards of behavior online that you follow in real life C. Rule 4: Respect other people's time and bandwidth D. Rule 1: Remember the Human
6. When Ben communicate electronically, whether through email, instant message, discussion post, text, or another method, he always practice the Golden Rule: Do unto others as you would have others do unto you. What Core Rules of Netiquette he considered? A. Rule 6: Share expert knowledge B. Rule 4: Respect other people's time and bandwidth C. Rule 5: Make yourself look good online D. Rule 1: Remember the Human
7. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? A. TRUE B. FALSE C. Maybe D. Not sure
8. Berlyn overheard that Dian has a Cancer. She immediately posted it in his timeline. What Core Rules of Netiquette she should considered? A. Rule 8: Respect other people's privacy B. Rule 3: Know where you are in cyberspace C. Rule 7: Help keep flame wars under control D. Rule 9: Don't abuse your power
9. Buy the software; do not use pirated ones. A. TRUE B. FALSE C. Maybe D. Not sure
10. Stands for malicious software. A. Malware B. None of these C. Spam D. Phishing
11. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information. A. None of these B. Phishing C. Malware D. Spam
12. If you create something - an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others. A. Maybe B. FALSE C. TRUE D. Not sure
13. If you create something - an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others. This is called _________? A. Intellect Property B. None of these C. Intellectual Property D. Intellectual Proper
14. It can record email, messages, or any information you type using your keyboard. A. Keylaggers B. None of these C. Keylogging D. Keyloggers
15. It expose people and computer systems to harm online. A. Internet-based treats B. Internet-based threets C. Internet-based threats D. None of these
16. It is a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs. A. Spyware B. Adware C. Worm D. Virus
17. It is a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. A. Trojan B. Worm C. Adware D. Spyware
18. It is a malicious program that transfers from one computer to another by any type of means. A. Trojan B. Worm C. Spyware D. Adware
19. It is a more complicated way of phishing where it exploits the DNS (Domain Name Service) system. A. Spam B. Pharming C. Malware D. None of these
20. It is a program designed to send you advertisements, mostly as pop-ups. A. Worm B. Trojan C. Spyware D. Adware
21. It is a program that runs in the background without you knowing it. A. Adware B. Trojan C. Worm D. Spyware
22. It is a worm created by a Filipino. A. ILOVEYOU VIRUS B. ILIKEYOU VIRUS C. None of these D. IMISSYOU VIRUS
23. It is an unwanted email mostly from bots or advertisers. A. Malware B. Phishing C. None of these D. Spam
24. It is concerned with the "proper" manner of communication in the online environment. A. Netiquette B. Netiquete C. Nettiquete D. Netiqueete
25. It is defined as the information highway. A. Internet B. Web C. None of these D. Gateway
26. It is what people do when they express a strongly held opinion without holding back any emotion. A. Flame of Recca B. Flames C. Flaming D. Flame wars
27. It is when two or three people exchange angry posts between one another, must be controlled, or the camaraderie of the group could be compromised. A. Flaming B. Flame wars C. Flame of Recca D. Flames
28. Michael is a great IT expert, but he used his talent to hacked other social media accounts to use for his criminal acts. What Core Rules of Netiquette he should considered? A. Rule 9: Don't abuse your power B. Rule 10: Be forgiving of other people's mistakes C. Rule 7: Help keep flame wars under control D. Rule 3: Know where you are in cyberspace
29. Netiquette varies from domain to domain depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What Core Rules of Netiquette is considered? A. Rule 7: Help keep flame wars under control B. Rule 2: Adhere to the same standards of behavior online that you follow in real life C. Rule 10: Be forgiving of other people's mistakes D. Rule 3: Know where you are in cyberspace
30. Pepito read an unwanted comment on his recently shared post, instead of exchanging angry post he decided to make h9is shared post change its privacy from public to private. What Core Rules of Netiquette he considered? A. Rule 2: Adhere to the same standards of behavior online that you follow in real life B. Rule 7: Help keep flame wars under control C. Rule 10: Be forgiving of other people's mistakes D. Rule 1: Remember the Human