RGBย refers to the three-channel color mode suitable for images to be viewed on the web
Oops!
Check
Okay!
Check
15
When was the Philnet project or also known as PHNET launched?
1993
Oops!
Check
Okay!
Check
eraser
Reset score!
Oops!
fairy
Take points!
5
10
15
20
25
fairy
Take points!
5
10
15
20
25
baam
Lose 20 points!
Oops!
15
What are the three questions that must be answered before building a plan for advocacy?
WHAT DO WE WANT? WHAT DO THEY NEED TO HEAR? WHO DO THEY NEED TO HEAR IT FROM?
Oops!
Check
Okay!
Check
15
A criminal crime in which people or groups are stalked or harassed through internet communication.
CYBER STALKING
Oops!
Check
Okay!
Check
15
This was the first time the Philippines had access to the Internet via SprintLink.
MARCH 29, 1994
Oops!
Check
Okay!
Check
15
What are the two types of SPACE principle?
POSITIVE AND NEGATIVE SPACE
Oops!
Check
Okay!
Check
15
This is the golden rule of photography that divides the image into thirds, horizontally and vertically, and then aligns the subject with one of the intersecting lines.
RULE OF THIRDS
Oops!
Check
Okay!
Check
15
The unlawful or prohibited acts defined and punishable by the Anti-Child Pornography Act of 2009 or also known as _____________.
R.A 9775
Oops!
Check
Okay!
Check
lifesaver
Give 20 points!
Oops!
magnet
Take 10 points!
Okay!
fairy
Take points!
5
10
15
20
25
lifesaver
Give 25 points!
Oops!
15
It refers to the act of providing support, with the goal of promoting certain issues and making a change in oneโs life.
ADVOCACY
Oops!
Check
Okay!
Check
baam
Lose 25 points!
Oops!
rocket
Go to first place!
Okay!
fairy
Take points!
5
10
15
20
25
banana
Go to last place!
Oops!
15
In what year PLDT launched its first mobile cellular network?
1987
Oops!
Check
Okay!
Check
15
What are the three questions that must be answered before building a plan for advocacy?
WHAT DO WE WANT?
Oops!
Check
Okay!
Check
15
A method of obtaining sensitive personal information through the use of misleading emails and websites.
PHISHING
Oops!
Check
Okay!
Check
15
A group of infected internet-connected devices, such as computers and mobile phones, that are all controlled by the same sort of malware.