1.
What do you call the system that organizes the production, distribution, and
consumption of goods, wealth, and resources in a society?
Answer: Economic systems
2. -4 . what are the 3 causes of social change
Ans: invention, discovery,diffusion
5. What refers to variations or modifications in the patterns of social organization,
sub-groups within the society, or the entire society itself?
Answer: Social Change
6-7 What are the two examples or types of invention?
Answer: Material inventions and social inventions
8. What are the rules that guide behavior and relationships within a society?
Answer: Social norms
9. What do you call the innovations that affect communication, labor, and daily
life?
Answer: Technological advancements
10. What refers to wars, colonization, and revolutions that reshape social
structures in society?
Answer: Historical events
11.-14 What are the four causes of cultural change?
Answer:
1. 11.Population
2. 12.War or constant fighting
3. 13Random events or acts of man
4. 14Technology
15. What refers to changes in the social structure characterized by shifts in
human interrelations, interactions, culture, social organizations and systems, and
social behavior?
Answer: Social Change
16. What social science is also related to other disciplines like economics,
history, and social psychology?
Answer: Sociology
17. What term refers to the changes in the social structure that affect human
interrelations and interactions?
Answer: Social change
18. What is the systematic study of society and social behavior?
Answer: Sociology
19. What is the study of humans by considering both the past and the present?
Answer: Anthropology
20. What is the study of the system of government and political structures?
Answer: Political science
Ict.
1. What online threat involves an email from a criminal disguised as a
trustworthy source, aiming to trick you into revealing sensitive or
confidential information?
Answer: Phishing
2. What type of online threat misleads users in various ways with the intent to
take advantage of them?
Answer: Internet scam
3. What online threat involves a malicious website that looks like a legitimate
one to steal usernames and passwords?
Answer: Pharming
What are the four commonly used authentication methods?
Answer:
4. User Identification
5. Possessed Objects
6. Biometric Device
7. Callback System
8-9 What are two common examples of computer viruses and worms?
Answer:
8. Trojan Horse
9. ILOVEYOU Virus
10. What do you call a network of zombie computers controlled by a bot to
perform large-scale malicious activities?
Answer: Internet Bots
11-12 What are two common types of malware that secretly monitor or display unwanted ads on
a user's device?
Answer:
11. Adware
12. Spyware
13-14 Who are the two Filipino students who created the ILOVEYOU virus?
Answer: Onel de Guzman and Reonel Ramones
15. What do you call the use of the internet or electronic devices to harass or stalk an
individual, group, or organization?
Answer: Cyberstalking
16. What is the set of rules and norms for acceptable conduct or behavior online?
Answer: Netiquette
17. What online threat involves a criminal impersonating another individual or organization
to gather personal or business information?
Answer: Spoofing
18. What do you call unsolicited emails, instant messages, or social media messages that
can be harmful if opened or responded to?
Answer: Spam
19. What is the act of tormenting, threatening, harassing, or embarrassing someone
using the internet or other digital technologies?
Answer: Cyberbullying
20. What refers to the principles that guide computing professionals in making decisions
about professional and social conduct?
Answer: Computer Ethics