記憶度
4問
11問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
Types of Malware
VTW - SAK - BRR Virus Trojan Horse Worm Spyware Adware Keylogger Botnet Rootkit Ransomware
2
If you are a member of an onlinesociety through social media you are called —.
netizen
3
This original work is called — which is protected under — known as the “—”.
intellectual property RA 8293 Intellectual Property Code of the Philippines
4
A crime in which computer is used as object and tool in committing a crime such hacking,phishing, spamming, child pornography, libel,hate crimes, identity thief and others.
Cybercrime
5
It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. .
Cyberbullying
6
It is a crime of stealing personal information for the purpose of assuming that person’s nameor identity to make any form of transactions.
Identity Theft
7
A cyberattack method using DECEPTIVE EMAILS AND WEBSITES to acquiring sensitive personal information.
Phishing
8
A law that deals with all forms of cybercrime.
Cybercrime Law
9
This happens when the copyrighted work is useby other person without permission of the author or copyright holder
Copyright Infringement
10
The act of sending sexually explicit text messages, images, and videos.
Sexting
11
a malicious program that DISGUISED AS LEGITIMATE PROGRAM that user willaccept and use but take control of your computer.
2. Trojan Horse –
12
a malicious program that REPLICATE ITSELF by copying itself to another program.
1. Virus –
13
A program that RUNS IN THE BACKGROUND and steals user credentials and confidential information and send back to hackby recording every keystroke that a user makes on their computer or device.
6. Keylogger –
14
is a program that allows users tosearch for content on internet.
Search Engine
15
– also known as Malicious Software.
Malware
16
malicious program that COPY’S ITSELF and SPREADS to other computers.
3.Worm –
17
It is an etiquette applied online that shows proper manner and behavior.
Netiquette
18
Also known as junk email or unwanted emailsend by advertiser or bot. It can be used to send malware.
Spam
19
A malicious program that gathers information from victim’s computer and SEND IT BACK TO THE HACKER.
4.Spyware –
20
A criminal practice where electronic communication is used to stalk or harassindividual or group.
Cyber Stalking
21
is a research method incollecting and gathering information via internet by using search engine such as google.
Internet Research
22
A RANSOM VIRUS that BLOCK the user from accessing the programs or files anddemands to pay the ransom through online method for the removal of the virus.
9. Ransomware –
23
A software tools used by hackers to GAIN CONTROL OVER A COMPUTER on a networkwithout being exposed.
8. Rootkit
24
is a protection given to the owner of the rights in an original work such as books, musicalworks, films, paintings, and other works, and computer programs.
Copyright
25
An UNWANTED ADVERTISEMENT that will pop-up several times on victim’s computerthen behave abnormally and tedious to close them.
5. Adware –
26
A collection of INFECTED INTERNET–connected devices such as PC and mobile phone that are controlled by a commontype of malware.
7. Botnet –
27
It is a word that came from the two words “net” and“etiquette”.
Netiquette
28
There are techniques in searching information that can beapplied in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of —
AND, OR, and NOT.