Sunteți pe pagina 1din 7

Kung gusto mo na perfect, I suggest you na umabot up to 3rd Attempt

sa OED Account mo. There’s no guarantee na pareparehas tayo ng


questions, kaya seryosohin mo pa rin 1st and 2nd attempt tulad ng
pagseseryoso mo sa jowa mo. E kung playboy/playgirl ka pakyu toxic ka
sa lipunan. O kung walang jowa pero may kaMU ulol duwag ka. Pero
kung single ka, parehas lang tayo kaya seryosohin natin pag-aaral natin.

MAG-ARAL NG MABUTI.

SUBSCRIBE TO PAOLUL, PEWDIEPIE AND MARKIPLIER.

STAN BTS, TWICE, MAMAMOO, ASTRO, DAY6, TXT.

PAG GINANAHAN AKO POST KO LONG QUIZ 001, LEARNING ACT 002, LONG QUIZ 002.

1st Attempt: 9/10


2nd Attempt: 9/10
3rd Attempt: 10/10 (Page 6 and 7)

OSIYA, MAGSAGOT KA NA.


Grade 11 : TVL – ICT
ICT 112 / Week 3: Learning Activity 001
[ 1st Attempt ]
Score: 9/10

At home, Dad's laptop is the only device with direct Internet connection. He shares it to other members
of the family via Wi-Fi, which you connect to using your phone. In this scenario, Dad's laptop is a _____.

- B. Server

Which of the following is NOT true?

- C. A spam is a type of virus

Which of the following does not need human action to spread?

- A. Worm

You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called _____

- D. Phishing

Servers are housed in centralized locations called _____

- A. Data Centers

Which of the following is NOT true about worms?

- D. A worm is a type of spam

Which of the following is NOT true about passwords?

- D. Passwords should not be memorized

_____ is a secret group of characters used to unlock your account


- B. Passwords

People who send unwanted and unsolicited emails are called _____

- Spammers

Which of the following is not a malware?

- C. Ad blocker
[ 2nd Attempt ]
Score: 9/10

The name Trojan is derived from a fictional wooden _____

- A. Horse

Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program.

- A. Adware

Which of the following is safe practice?

- B. Use a combination of letters, numbers, and symbols as a password

A computer that does a task for other computers is called a _____

- A. Service

Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. This file
is probably a _____

- A. Trojan

_____ websites change appearance and behavior based on users' action

- A. Dynamic

_____ is a program that is designed to cause harm to your computer or device

- D. Virus
The following are benefits of cloud computing except _____

- C. Proficiency

Which of the following statements is NOT true?

- B. Only your full name can be used as a username

Which of the following CANNOT infect your computer?

- C. Spam
[ 3rd Attempt ]
Score: 10/10

Real-time, ubiquitous, and machine learning are the defining elements of _____

- A. Web 3.0

Which of the following information is ok to share with other people?

- D. Email Address

Which of the following does not help you avoid getting a virus?

- D. Downloading pirated programs

A Web 3.0 characteristic in which events and information are made available to users as they happen.

- D. Real-Time

Which of the following statements is true?

- D. A computer virus can spread whenever a computer makes contact with another
computer.

The URL and design of a website's homepage changes depending on the preferences of the current user.
This website is _____

- C. Dynamic

In our lesson, we visited the website of which movie?


- D. Space Jam

Which of the following mobile apps is not a native application?

- C. None of these

_____ is a browser add-on that prevents ads from being displayed in your browser.

- A. Ad blocker

Which of the following is NOT true about Cloud-based services?

- D. Subscribing to cloud-based services is more expensive than building your own


programs and buying your own servers.

Proven and tested yeeet

S-ar putea să vă placă și