What is a cloud computing model that provides complete software solutions over the internet?
Which learning platform allows students and educators to collaborate online?
Learning Management System (LMS)
Which technology is used to simulate real-world systems for analysis and optimization?
DIGITAL TWINS
What cybersecurity principle ensures that data remains accurate and unaltered?
INTEGRITY
What is the term for a technique that encourages participants to build upon others' ideas in a brainstorming session?
BRAINSTORMING
What advantage does 5G offer for applications like remote healthcare and autonomous vehicles?
Ultra-low latency
What technology uses simulations to create immersive learning experiences?
Virtual Reality (VR)
What concept refers to interconnected smart devices in manufacturing?
IIoT
What form of attack involves encrypting a victim's data and demanding payment for its release?
Ransomware Attack
What is a visual technique used to map out ideas and their connections?
MIND MAPPING
Which cloud computing service is primarily used for scalable storage and database management?
Infrastructure as a Service (IaaS)
What term describes learning environments that use technologies like AI, IoT, and cloud systems?
SMART CLASSROOM
What is a major benefit of using AI-powered predictive maintenance in factories?
Reduced Downtime and Maintenance Costs
A legal measure in the Philippines designed to protect personal data.
Data Privacy Act of 2012 (Republic Act No. 10173)
Which technique involves making the strange familiar through analogies?
Synectics
What is the primary benefit of serverless computing for developers?
Reduced operational complexity
What skill involves evaluating information critically in a digital environment?
Digital Literacy
Which advanced manufacturing technology involves creating products layer by layer?
Additive Manufacturing / 3D Printing
What type of cyberattack manipulates people into revealing confidential information?
Social Engineering
What technique involves writing down three ideas every five minutes in a structured brainstorming session?
6-3-5 Brainwriting
Name a major security concern associated with 5G technology.
Network Vulnerabilities
How can AI personalize learning for students in Education 4.0?
Adaptive Learning Systems
What is the term for the fusion of digital, physical, and biological systems in modern industry?
INDUSTRY 4.0
Which cybersecurity measure requires multiple forms of authentication before granting access?
Multi-Factor Authentication (MFA)
What leadership strategy helps foster a creative workplace culture?
Encouraging Open Communication and Risk-Taking