0% found this document useful (0 votes)
23 views3 pages

Quiz

The document outlines key concepts in sociology, including economic systems, social change, and cultural change, as well as the study of human behavior through various social sciences. It also addresses online threats such as phishing, internet scams, and malware, along with authentication methods and the principles of netiquette and computer ethics. Additionally, it highlights notable events and figures in the context of cyber threats.

Uploaded by

Ronalyn Teleron
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Quiz

The document outlines key concepts in sociology, including economic systems, social change, and cultural change, as well as the study of human behavior through various social sciences. It also addresses online threats such as phishing, internet scams, and malware, along with authentication methods and the principles of netiquette and computer ethics. Additionally, it highlights notable events and figures in the context of cyber threats.

Uploaded by

Ronalyn Teleron
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1.

What do you call the system that organizes the production, distribution, and
consumption of goods, wealth, and resources in a society?
Answer: Economic systems
2. -4 . what are the 3 causes of social change
Ans: invention, discovery,diffusion

5. What refers to variations or modifications in the patterns of social organization,


sub-groups within the society, or the entire society itself?
Answer: Social Change

6-7 What are the two examples or types of invention?


Answer: Material inventions and social inventions

8. What are the rules that guide behavior and relationships within a society?
Answer: Social norms

9. What do you call the innovations that affect communication, labor, and daily
life?
Answer: Technological advancements

10. What refers to wars, colonization, and revolutions that reshape social
structures in society?
Answer: Historical events

11.-14 What are the four causes of cultural change?


Answer:
1. 11.Population
2. 12.War or constant fighting
3. 13Random events or acts of man
4. 14Technology

15. What refers to changes in the social structure characterized by shifts in


human interrelations, interactions, culture, social organizations and systems, and
social behavior?
Answer: Social Change

16. What social science is also related to other disciplines like economics,
history, and social psychology?
Answer: Sociology

17. What term refers to the changes in the social structure that affect human
interrelations and interactions?
Answer: Social change
18. What is the systematic study of society and social behavior?
Answer: Sociology
19. What is the study of humans by considering both the past and the present?
Answer: Anthropology
20. What is the study of the system of government and political structures?
Answer: Political science

Ict.

1. What online threat involves an email from a criminal disguised as a


trustworthy source, aiming to trick you into revealing sensitive or
confidential information?
Answer: Phishing
2. What type of online threat misleads users in various ways with the intent to
take advantage of them?
Answer: Internet scam

3. What online threat involves a malicious website that looks like a legitimate
one to steal usernames and passwords?
Answer: Pharming

What are the four commonly used authentication methods?

Answer:

4. User Identification
5. Possessed Objects
6. Biometric Device
7. Callback System

8-9 What are two common examples of computer viruses and worms?
Answer:
8. Trojan Horse
9. ILOVEYOU Virus

10. What do you call a network of zombie computers controlled by a bot to


perform large-scale malicious activities?
Answer: Internet Bots
11-12 What are two common types of malware that secretly monitor or display unwanted ads on
a user's device?
Answer:

11. Adware
12. Spyware

13-14 Who are the two Filipino students who created the ILOVEYOU virus?

Answer: Onel de Guzman and Reonel Ramones

15. What do you call the use of the internet or electronic devices to harass or stalk an
individual, group, or organization?

Answer: Cyberstalking

16. What is the set of rules and norms for acceptable conduct or behavior online?

Answer: Netiquette

17. What online threat involves a criminal impersonating another individual or organization
to gather personal or business information?
Answer: Spoofing

18. What do you call unsolicited emails, instant messages, or social media messages that
can be harmful if opened or responded to?

Answer: Spam

19. What is the act of tormenting, threatening, harassing, or embarrassing someone


using the internet or other digital technologies?
Answer: Cyberbullying

20. What refers to the principles that guide computing professionals in making decisions
about professional and social conduct?
Answer: Computer Ethics

You might also like