Game Preview

COMPUTER ETHICS

  •  English    21     Public
    ETHICS - It is the accepted right and wrong behaviour (in certain cultures).
  •   Study   Slideshow
  • True or False: Always check the validity and reliability of any information you obtain from the Internet
    TRUE
  •  10
  • I_______ P _______ The right of individuals and companies to deny or restrict the collection and use of information about them.
    INFORMATION PRIVACY
  •  20
  • A cyber attack that redirects users to a fake website is known as: P___________
    PHARMING
  •  15
  • _______ is an example of intellectual property? A. Ideas B. Inventions C. Artwork D. All of them
    D. All of them
  •  15
  • Identify this trademark slogan with its appropriate company: "I'm Lovin' It"
    McDonald's
  •  15
  • A right granted for an invention is known as a ________. A. COPYRIGHT B. PATENT C. WATERMARK D. TRADEMARK
    B. PATENT
  •  15
  • An Antivirus protects you from all attacks. TRUE or FALSE
    FALSE
  •  10
  • A type of malware that wants Money. R___NS__M___A__E
    Ransomware
  •  20
  • Accessing the DarkWeb is a Cybercrime. TRUE OR FALSE?
    FALSE
  •  10
  • Passing text thorough a maths algorithm to scramble text is called E___C___Y___T___ ___ N
    ENCRYPTION
  •  20
  • A combination capital letter, number and symbols/special characters makes your login secure. YES or NO
    YES
  •  10
  • TR___J___N H___R___ E What is the name of an application that appears to look like a helpful application but instead does harm to your computer?
    Trojan Horse
  •  20
  • Teacher John just installed a new search engine on his laptop. Now whenever he searches the internet, he gets several pop-up windows directing him to buy products. What does T. John have? A___W___R___
    ADWARE
  •  20
  • You were browsing the web on a questionable website, and now you get a pop-up window stating that if you do not pay $100 within one hour, all files on your computer will be destroyed.what is this an example of? R__N__O__W__R__
    Ransomware
  •  15
  • These are unsolicited emails. S___ ____M
    SPAM
  •  15
  • Who is in the picture?
    A HACKER
  •  20