記憶度
4問
11問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. .
Cyberbullying
2
It is a crime of stealing personal information for the purpose of assuming that person’s nameor identity to make any form of transactions.
Identity Theft
3
A criminal practice where electronic communication is used to stalk or harassindividual or group.
Cyber Stalking
4
The act of sending sexually explicit text messages, images, and videos.
Sexting
5
– also known as Malicious Software.
Malware
6
Types of Malware
VTW - SAK - BRR Virus Trojan Horse Worm Spyware Adware Keylogger Botnet Rootkit Ransomware
7
a malicious program that REPLICATE ITSELF by copying itself to another program.
1. Virus –
8
a malicious program that DISGUISED AS LEGITIMATE PROGRAM that user willaccept and use but take control of your computer.
2. Trojan Horse –
9
malicious program that COPY’S ITSELF and SPREADS to other computers.
3.Worm –
10
A malicious program that gathers information from victim’s computer and SEND IT BACK TO THE HACKER.
4.Spyware –
11
An UNWANTED ADVERTISEMENT that will pop-up several times on victim’s computerthen behave abnormally and tedious to close them.
5. Adware –
12
A program that RUNS IN THE BACKGROUND and steals user credentials and confidential information and send back to hackby recording every keystroke that a user makes on their computer or device.
6. Keylogger –
13
A collection of INFECTED INTERNET–connected devices such as PC and mobile phone that are controlled by a commontype of malware.
7. Botnet –
14
A software tools used by hackers to GAIN CONTROL OVER A COMPUTER on a networkwithout being exposed.
8. Rootkit
15
A RANSOM VIRUS that BLOCK the user from accessing the programs or files anddemands to pay the ransom through online method for the removal of the virus.
9. Ransomware –
16
Also known as junk email or unwanted emailsend by advertiser or bot. It can be used to send malware.
Spam
17
A cyberattack method using DECEPTIVE EMAILS AND WEBSITES to acquiring sensitive personal information.
Phishing
18
A crime in which computer is used as object and tool in committing a crime such hacking,phishing, spamming, child pornography, libel,hate crimes, identity thief and others.
Cybercrime
19
A law that deals with all forms of cybercrime.
Cybercrime Law
20
It is a word that came from the two words “net” and“etiquette”.
Netiquette
21
It is an etiquette applied online that shows proper manner and behavior.
Netiquette
22
If you are a member of an onlinesociety through social media you are called —.
netizen
23
is a research method incollecting and gathering information via internet by using search engine such as google.
Internet Research
24
is a program that allows users tosearch for content on internet.
Search Engine
25
There are techniques in searching information that can beapplied in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of —
AND, OR, and NOT.
26
is a protection given to the owner of the rights in an original work such as books, musicalworks, films, paintings, and other works, and computer programs.
Copyright
27
This original work is called — which is protected under — known as the “—”.
intellectual property RA 8293 Intellectual Property Code of the Philippines
28
This happens when the copyrighted work is useby other person without permission of the author or copyright holder
Copyright Infringement