100% found this document useful (1 vote)
16 views3 pages

Questions and Answer

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
16 views3 pages

Questions and Answer

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Which of the following is a primary goal of the DICT Roadmap in


addressing the digital
divide in the Philippines?
a) Promote the use of traditional communication methods in rural
areas.
b) Expand internet access and infrastructure in underserved
communities.
c) Encourage the migration of rural populations to urban areas with
better connectivity.
d) Focus solely on developing digital literacy programs in urban centers
2. Which of the following is a key performance indicator (KPI) used to
track the progress of the DICT Roadmap?
a) The number of government websites launched.
b) The percentage of Filipinos with access to the internet .
c) The number of complaints received about the DICT.
d) The amount of money spent on ICT projects
3. How does the DICT Roadmap adapt to the evolving global landscape
of technology and digital transformation?
a) By resisting change and clinging to outdated technologies.
b) By staying informed about emerging trends and incorporating them
into its strategies.
c) By relying solely on foreign expertise in technology development.
d) By ignoring the impact of global technological advancements on the
Philippines
4. Using a password manager that stores all your passwords in a single
encrypted vault is a
highly secure way to manage your online accounts.
False. While password managers are generally a good security
practice, storing all your
passwords in a single vault creates a single point of failure. If the vault
is compromised, all your passwords are at risk. It's better to use a
password manager with multi-factor
authentication and to store sensitive passwords separately
5. Using a VPN on a public Wi-Fi network guarantees complete protection
from hackers
and surveillance.
False. While a VPN encrypts your traffic, it doesn't guarantee complete
protection. Hackers can still target your device with malware or exploit
vulnerabilities in the VPN itself. It's still important to be cautious about
the websites you visit and the information you share while using a VPN.
6. Clicking on a link in an email that appears to be from a legitimate
source, but takes you
to a different website than expected, is a clear sign of a phishing attempt.
True. Phishing emails often use techniques like URL spoofing to
redirect you to fake
websites that look identical to the real ones. If the link doesn't match
the expected website, it's a strong indicator of a phishing attempt
7. Using a strong password for your online banking account is sufficient to
protect your
finances from cyber attacks.
False. Strong passwords are important, but they are not enough. You
should also enable
two-factor authentication for your banking account, be wary of
phishing attempts, and
monitor your account activity regularly for suspicious transactions.
8. Downloading software from a reputable third-party website is always
safe, as long as
you have a good antivirus program installed.
False. Even reputable third-party websites can be compromised and
host malicious
software. Always verify the software's authenticity and download it
from the official
developer's website whenever possible.
9. Safety rules that can reduce risk of accidents in the working stations should
include except:
A. Electrical sockets should not be overloaded.
B. Food and drinks should not be placed near machines.
C. Fire exits should be clearly marked and free from clutter
D. Heating and ventilation should not be suitable for the working
environment.
10. Technology is a phenomenon that seems to be uncontrollable. Despite the so
many benefits
for teaching and learning, there are also negative effects or influence on
learners except?
A. Privacy issues including disclosure of personal information
B. Proper Health and good well-being
C. Prolonged exposure to online technologies, particularly at an early age;
D. Addiction to gambling and gaming
11. It’s acceptable to meet someone in person whom you only know online, as
long as you tell a
parent or guardian. FALSE
12. A government agency wants to implement a new policy requiring all internet service providers
to log and retain user data for a year. This is justified as a measure to combat terrorism and
cybercrime. However, privacy advocates argue that this policy infringes on individuals' right to
privacy. What is the primary ethical concern raised by this policy?
A. Freedom of speech
B. Right to privacy
C. Intellectual property rights
D. Access to information
13. A social media platform has been accused of spreading misinformation and hate speech. The
government is considering regulating the platform to curb the spread of harmful content.
However, some argue that this would stifle free speech and innovation. What is the potential
negative consequence of government regulation on social media platforms?
A. Increase Censorship
B. Improved data privacy
C. Reduced access to information
D. Enhance user privacy
14. A new technology has been developed that allows governments to track the movements and
activities of individuals in real time. While this technology could be used to prevent crime and
terrorism, it also raises concerns about mass surveillance and abuse of power. Which ethical
principle is most likely to be violated by the use of this technology?
A. Autonomy
B. Beneficence
C. Non-maleficence
D. Justice
15. A new piece of software has been developed that can be used to deepfake videos and create
convincing but false content. This raises concerns about the potential for misinformation and
manipulation. What is the primary ethical concern associated with the use of deepfake
technology?
A. Data privacy
B. Intellectual property
C. Truthfulness
D. Access to information
16. A company has been accused of collecting and selling personal data without users' consent. This
has led to concerns about the commercialization of personal information and the potential for
identity theft. What is the primary legal concern raised by this practice?
A. Intellectual property infringement
B. Defamation
C. Data privacy violation
D. Freedom of speech violation
17. Teachers should be solely responsible for determining the curriculum and teaching methods in a
technology-integrated classroom.
False: Teachers should be guided by curriculum standards and guidelines, but they also have
flexibility in incorporating technology to enhance learning
18. Technology can be used to replace traditional teaching methods in all aspects of education.
False: Technology should be used as a tool to support teaching and learning, not replace it
entirely.
19. There are no legal or ethical considerations when using technology in education.
False: There are legal and ethical considerations, such as copyright laws, data privacy, and
responsible online behavior, that apply to the use of technology in education.
20. Teachers need to be trained to use technology effectively to leverage its potential for improving
teaching and learning.
True: Teachers need to be trained to use technology effectively to leverage its potential for
improving teaching and learning.
21. Students should be encouraged to use technology for personal purposes only in the classroom.
False: Students can use technology for personal purposes in the classroom, but they should also
be guided on how to use it responsibly and productively.
22. Technology can help students develop higher-order thinking skills.
True: Technology can provide opportunities for students to engage in higher-order thinking
activities, such as critical thinking, problem-solving, and creativity.
23. Collaboration and communication skills are not important in a technology-enhanced learning
environment.
False: Collaboration and communication skills are essential in a technology-enhanced learning
environment, as students often work together on projects and share information online.

You might also like