Which website is located in Thailand for sure?
From the screen below, how to solve the error?
From the screen below, which button is for attaching a file to the...
What is Internet?
From the picture below, judging by the intension of the website, what...
Identify the site that provides cloud storage service.
From the question above, identify the date that the email is sent...
"Firewall is the wall between you and online threats", what can you...
What are the most essential things for a trustworthy website?
Which statement describe a website with ".ac.th" as extension (e.g....
If you want to send a very small document file to your supervisor,...
From the screen below, identify which button you should click to...
If you want to share a file with your friends, which service provider...
From the previous question, which button is used for copying the email...
What is Email Address?
If you are to write an email to postpone a meeting, what should NOT be...
Identify the site that provide audio streaming service.
From the screen below, why does this website is trustworthy?
From the screen below identify the email address of the sender of this...
What is the best way to protect yourself from an online threat?
What is Big data?
If you want to send a 1 GB file to your friend, is email suitable for...
What is a spyware?
What is the URL?
If you are to schedule a formal meeting with high-rank managers of...
What is a Trojan virus?
From the screen below, identify which button you should click to...
From the picture below, identify the purpose of the email.
From the screen below, if you want to allow all incoming connections...
From the picture below, what factor is NOT indicate that the site is...
What is audio steaming?
What is the best way to prevent social media addiction?
From the screen below, if you what to set your privacy so that the...
If you would like to upload an mp3 file to share with your friend to...
If you want to automate an industrial factory in order to let the...
Which statement is true about the DoS attack?
From the screen below, if the person receiving those messages was you...
From the picture below, identify the purpose of the email.
From the previous question, if you want to Block all incoming...
Choose the best match between threat and countermeasure.
What is the best response to an online mean comment?
What is Email?
From the picture below, should you do what the email suggests you to...
What is the best way to avoid password hacking?
From the screen below, identify where you could enter your URL.
What is NOT the essential topic that should be included on an...
In order to achieve a highly secured home Wi-Fi, what should you do...
"Your information been leak to unwanted hand", what kind of...
From the picture below, should you perform the payment? Why?
If you are to write an email to compliant about your purchased...