We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
1.
Which of the following is a primary goal of the DICT Roadmap in
addressing the digital divide in the Philippines? a) Promote the use of traditional communication methods in rural areas. b) Expand internet access and infrastructure in underserved communities. c) Encourage the migration of rural populations to urban areas with better connectivity. d) Focus solely on developing digital literacy programs in urban centers 2. Which of the following is a key performance indicator (KPI) used to track the progress of the DICT Roadmap? a) The number of government websites launched. b) The percentage of Filipinos with access to the internet . c) The number of complaints received about the DICT. d) The amount of money spent on ICT projects 3. How does the DICT Roadmap adapt to the evolving global landscape of technology and digital transformation? a) By resisting change and clinging to outdated technologies. b) By staying informed about emerging trends and incorporating them into its strategies. c) By relying solely on foreign expertise in technology development. d) By ignoring the impact of global technological advancements on the Philippines 4. Using a password manager that stores all your passwords in a single encrypted vault is a highly secure way to manage your online accounts. False. While password managers are generally a good security practice, storing all your passwords in a single vault creates a single point of failure. If the vault is compromised, all your passwords are at risk. It's better to use a password manager with multi-factor authentication and to store sensitive passwords separately 5. Using a VPN on a public Wi-Fi network guarantees complete protection from hackers and surveillance. False. While a VPN encrypts your traffic, it doesn't guarantee complete protection. Hackers can still target your device with malware or exploit vulnerabilities in the VPN itself. It's still important to be cautious about the websites you visit and the information you share while using a VPN. 6. Clicking on a link in an email that appears to be from a legitimate source, but takes you to a different website than expected, is a clear sign of a phishing attempt. True. Phishing emails often use techniques like URL spoofing to redirect you to fake websites that look identical to the real ones. If the link doesn't match the expected website, it's a strong indicator of a phishing attempt 7. Using a strong password for your online banking account is sufficient to protect your finances from cyber attacks. False. Strong passwords are important, but they are not enough. You should also enable two-factor authentication for your banking account, be wary of phishing attempts, and monitor your account activity regularly for suspicious transactions. 8. Downloading software from a reputable third-party website is always safe, as long as you have a good antivirus program installed. False. Even reputable third-party websites can be compromised and host malicious software. Always verify the software's authenticity and download it from the official developer's website whenever possible. 9. Safety rules that can reduce risk of accidents in the working stations should include except: A. Electrical sockets should not be overloaded. B. Food and drinks should not be placed near machines. C. Fire exits should be clearly marked and free from clutter D. Heating and ventilation should not be suitable for the working environment. 10. Technology is a phenomenon that seems to be uncontrollable. Despite the so many benefits for teaching and learning, there are also negative effects or influence on learners except? A. Privacy issues including disclosure of personal information B. Proper Health and good well-being C. Prolonged exposure to online technologies, particularly at an early age; D. Addiction to gambling and gaming 11. It’s acceptable to meet someone in person whom you only know online, as long as you tell a parent or guardian. FALSE 12. A government agency wants to implement a new policy requiring all internet service providers to log and retain user data for a year. This is justified as a measure to combat terrorism and cybercrime. However, privacy advocates argue that this policy infringes on individuals' right to privacy. What is the primary ethical concern raised by this policy? A. Freedom of speech B. Right to privacy C. Intellectual property rights D. Access to information 13. A social media platform has been accused of spreading misinformation and hate speech. The government is considering regulating the platform to curb the spread of harmful content. However, some argue that this would stifle free speech and innovation. What is the potential negative consequence of government regulation on social media platforms? A. Increase Censorship B. Improved data privacy C. Reduced access to information D. Enhance user privacy 14. A new technology has been developed that allows governments to track the movements and activities of individuals in real time. While this technology could be used to prevent crime and terrorism, it also raises concerns about mass surveillance and abuse of power. Which ethical principle is most likely to be violated by the use of this technology? A. Autonomy B. Beneficence C. Non-maleficence D. Justice 15. A new piece of software has been developed that can be used to deepfake videos and create convincing but false content. This raises concerns about the potential for misinformation and manipulation. What is the primary ethical concern associated with the use of deepfake technology? A. Data privacy B. Intellectual property C. Truthfulness D. Access to information 16. A company has been accused of collecting and selling personal data without users' consent. This has led to concerns about the commercialization of personal information and the potential for identity theft. What is the primary legal concern raised by this practice? A. Intellectual property infringement B. Defamation C. Data privacy violation D. Freedom of speech violation 17. Teachers should be solely responsible for determining the curriculum and teaching methods in a technology-integrated classroom. False: Teachers should be guided by curriculum standards and guidelines, but they also have flexibility in incorporating technology to enhance learning 18. Technology can be used to replace traditional teaching methods in all aspects of education. False: Technology should be used as a tool to support teaching and learning, not replace it entirely. 19. There are no legal or ethical considerations when using technology in education. False: There are legal and ethical considerations, such as copyright laws, data privacy, and responsible online behavior, that apply to the use of technology in education. 20. Teachers need to be trained to use technology effectively to leverage its potential for improving teaching and learning. True: Teachers need to be trained to use technology effectively to leverage its potential for improving teaching and learning. 21. Students should be encouraged to use technology for personal purposes only in the classroom. False: Students can use technology for personal purposes in the classroom, but they should also be guided on how to use it responsibly and productively. 22. Technology can help students develop higher-order thinking skills. True: Technology can provide opportunities for students to engage in higher-order thinking activities, such as critical thinking, problem-solving, and creativity. 23. Collaboration and communication skills are not important in a technology-enhanced learning environment. False: Collaboration and communication skills are essential in a technology-enhanced learning environment, as students often work together on projects and share information online.