nd 2 Quiz in ICT Lesson 2 Rules

  • Slides: 26
Download presentation
nd 2 Quiz in ICT Lesson 2: Rules of Nettiquette

nd 2 Quiz in ICT Lesson 2: Rules of Nettiquette

Instructions • The quiz is just a “Multiple Choice” type. • 10 questions will

Instructions • The quiz is just a “Multiple Choice” type. • 10 questions will be given. • 30 seconds each problem. • Write the letter that corresponds to the correct answer.

Are You Ready?

Are You Ready?

Let’s Start!

Let’s Start!

1. A crime committed or assisted through the use of internet. a. b. c.

1. A crime committed or assisted through the use of internet. a. b. c. d. Cybercrime Identity theft Malwares Copyright Infringement

2. Stands for malicious software. a. b. c. d. Malware Malisoft Malicioftware

2. Stands for malicious software. a. b. c. d. Malware Malisoft Malicioftware

3. A malicious program that is disguised as a useful program but once downloaded

3. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. a. b. c. d. Virus Worm Trojan Spyware

4. A program designed to send you advertisements, mostly pop-ups. a. b. c. d.

4. A program designed to send you advertisements, mostly pop-ups. a. b. c. d. Spyware Adware Malware Popware

5. A malicious program designed to replicate itself and transfer from one computer to

5. A malicious program designed to replicate itself and transfer from one computer to another. a. b. c. d. Virus Worm Trojan Spyware

6. A malicious program that transfer from one computer to another by any type

6. A malicious program that transfer from one computer to another by any type of means. a. b. c. d. Virus Worm Trojan Spyware

7. A program that runs in the background without you knowing it. It has

7. A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging a. b. c. d. Virus Worm Trojan Spyware

8. Its goal is to acquire sensitive information like passwords and credit card details.

8. Its goal is to acquire sensitive information like passwords and credit card details. It usually gives a fake website that ask you to update your username, password, credit card, or any personal information. a. b. c. d. Spam Infringement Phishing Keylogger

9. A part of the law, wherein you have the rights to your work,

9. A part of the law, wherein you have the rights to your work, and anyone who uses it without consent is punishable by law. a. b. c. d. Copyright Fair Use Cybercrime Accessibility

10. Shortcut key in Windows to directly open the Task Manager. a. b. c.

10. Shortcut key in Windows to directly open the Task Manager. a. b. c. d. Ctrl + Alt + Del Windows key + X + T Ctrl + Shift + Esc Windows key + R

--END--

--END--

Let’s Answer

Let’s Answer

1. A crime committed or assisted through the use of internet. a. b. c.

1. A crime committed or assisted through the use of internet. a. b. c. d. Cybercrime Identity theft Malwares Copyright Infringement

2. Stands for malicious software. a. b. c. d. Malware Malisoft Malicioftware

2. Stands for malicious software. a. b. c. d. Malware Malisoft Malicioftware

3. A malicious program that is disguised as a useful program but once downloaded

3. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. a. b. c. d. Virus Worm Trojan Spyware

4. A program designed to send you advertisements, mostly pop-ups. a. b. c. d.

4. A program designed to send you advertisements, mostly pop-ups. a. b. c. d. Spyware Adware Malware Popware

5. A malicious program designed to replicate itself and transfer from one computer to

5. A malicious program designed to replicate itself and transfer from one computer to another. a. b. c. d. Virus Worm Trojan Spyware

6. A malicious program that transfer from one computer to another by any type

6. A malicious program that transfer from one computer to another by any type of means. a. b. c. d. Virus Worm Trojan Spyware

7. A program that runs in the background without you knowing it. It has

7. A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging a. b. c. d. Virus Worm Trojan Spyware

8. Its goal is to acquire sensitive information like passwords and credit card details.

8. Its goal is to acquire sensitive information like passwords and credit card details. It usually gives a fake website that ask you to update your username, password, credit card, or any personal information. a. b. c. d. Spam Infringement Phishing Keylogger

9. A part of the law, wherein you have the rights to your work,

9. A part of the law, wherein you have the rights to your work, and anyone who uses it without consent is punishable by law. a. b. c. d. Copyright Fair Use Cybercrime Accessibility

10. Shortcut key in Windows to directly open the Task Manager. a. b. c.

10. Shortcut key in Windows to directly open the Task Manager. a. b. c. d. Ctrl + Alt + Del Windows key + X + T Ctrl + Shift + Esc Windows key + R