nd 2 Quiz in ICT Lesson 2 Rules
- Slides: 26
nd 2 Quiz in ICT Lesson 2: Rules of Nettiquette
Instructions • The quiz is just a “Multiple Choice” type. • 10 questions will be given. • 30 seconds each problem. • Write the letter that corresponds to the correct answer.
Are You Ready?
Let’s Start!
1. A crime committed or assisted through the use of internet. a. b. c. d. Cybercrime Identity theft Malwares Copyright Infringement
2. Stands for malicious software. a. b. c. d. Malware Malisoft Malicioftware
3. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. a. b. c. d. Virus Worm Trojan Spyware
4. A program designed to send you advertisements, mostly pop-ups. a. b. c. d. Spyware Adware Malware Popware
5. A malicious program designed to replicate itself and transfer from one computer to another. a. b. c. d. Virus Worm Trojan Spyware
6. A malicious program that transfer from one computer to another by any type of means. a. b. c. d. Virus Worm Trojan Spyware
7. A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging a. b. c. d. Virus Worm Trojan Spyware
8. Its goal is to acquire sensitive information like passwords and credit card details. It usually gives a fake website that ask you to update your username, password, credit card, or any personal information. a. b. c. d. Spam Infringement Phishing Keylogger
9. A part of the law, wherein you have the rights to your work, and anyone who uses it without consent is punishable by law. a. b. c. d. Copyright Fair Use Cybercrime Accessibility
10. Shortcut key in Windows to directly open the Task Manager. a. b. c. d. Ctrl + Alt + Del Windows key + X + T Ctrl + Shift + Esc Windows key + R
--END--
Let’s Answer
1. A crime committed or assisted through the use of internet. a. b. c. d. Cybercrime Identity theft Malwares Copyright Infringement
2. Stands for malicious software. a. b. c. d. Malware Malisoft Malicioftware
3. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. a. b. c. d. Virus Worm Trojan Spyware
4. A program designed to send you advertisements, mostly pop-ups. a. b. c. d. Spyware Adware Malware Popware
5. A malicious program designed to replicate itself and transfer from one computer to another. a. b. c. d. Virus Worm Trojan Spyware
6. A malicious program that transfer from one computer to another by any type of means. a. b. c. d. Virus Worm Trojan Spyware
7. A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging a. b. c. d. Virus Worm Trojan Spyware
8. Its goal is to acquire sensitive information like passwords and credit card details. It usually gives a fake website that ask you to update your username, password, credit card, or any personal information. a. b. c. d. Spam Infringement Phishing Keylogger
9. A part of the law, wherein you have the rights to your work, and anyone who uses it without consent is punishable by law. a. b. c. d. Copyright Fair Use Cybercrime Accessibility
10. Shortcut key in Windows to directly open the Task Manager. a. b. c. d. Ctrl + Alt + Del Windows key + X + T Ctrl + Shift + Esc Windows key + R
- Chapter 1 lesson 1 your total health
- Welcome to ict
- Rules of netiquette in ict
- Ict lesson 1
- Ict based lesson plan in commerce
- Inductive and deductive reasoning geometry examples
- Every quiz has been easy. therefore the quiz will be easy
- Solubility rules quiz
- Baseball knowledge test
- Short truth table
- Unlike traditional production rules, association rules
- Quiz 4-3 triangle congruence proofs
- Lesson quiz 16-1 monetary policy
- Lesson 1 the cold war begins
- 4-5 lesson quiz systems of linear inequalities
- Deviance avowal
- Lesson 4-5 proving triangles congruent
- Guided reading activity industrialization and nationalism
- Lesson quiz 12-1
- Quadratic function examples with answers
- Lesson quiz 12-1
- Civilizations of east asia chapter 11
- Lesson quiz 9-2 labor and wages
- The federalist era lesson 1 the first president
- Chapter 8 lesson 2 the greek mind answer key
- Magnetic fields quick
- Lesson quiz 15-1 the renaissance in europe