Study

COMPUTER ETHICS

  •   0%
  •  0     0     0

  • What is the last name of your Computer Science teacher? MR. JOHN PAUL T. R______
    ROCABO
  • You were browsing the web on a questionable website, and now you get a pop-up window stating that if you do not pay $100 within one hour, all files on your computer will be destroyed.what is this an example of? R__N__O__W__R__
    Ransomware
  • What type of malware is best known for carrying other malware as a payload? W__ __ __
    WORM
  • _______ is an example of intellectual property? A. Ideas B. Inventions C. Artwork D. All of them
    D. All of them
  • B__ C___D__ __R What type of software is used to circumvent normal security processes on a computer?
    Backdoor
  • These are unsolicited emails. S___ ____M
    SPAM
  • Accessing the DarkWeb is a Cybercrime. TRUE OR FALSE?
    FALSE
  • A cyber attack that redirects users to a fake website is known as: P___________
    PHARMING
  • A right granted for an invention is known as a ________. A. COPYRIGHT B. PATENT C. WATERMARK D. TRADEMARK
    B. PATENT
  • I_______ P _______ The right of individuals and companies to deny or restrict the collection and use of information about them.
    INFORMATION PRIVACY
  • Teacher John just installed a new search engine on his laptop. Now whenever he searches the internet, he gets several pop-up windows directing him to buy products. What does T. John have? A___W___R___
    ADWARE
  • Passing text thorough a maths algorithm to scramble text is called E___C___Y___T___ ___ N
    ENCRYPTION
  • An Antivirus protects you from all attacks. TRUE or FALSE
    FALSE
  • Who is in the picture?
    A HACKER
  • A type of malware that wants Money. R___NS__M___A__E
    Ransomware
  • A combination capital letter, number and symbols/special characters makes your login secure. YES or NO
    YES
  • TR___J___N H___R___ E What is the name of an application that appears to look like a helpful application but instead does harm to your computer?
    Trojan Horse
  • True or False: Always check the validity and reliability of any information you obtain from the Internet
    TRUE
  • ________includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
    CYBERBULLYING
  • You receive an email from your bank,telling you that your account has been compromised and you need to validate your account details or else your account will be closed. You are supposed to click a link to validate your information.
    PHISHING
  • Identify this trademark slogan with its appropriate company: "I'm Lovin' It"
    McDonald's