Assessment: Internet Etiquette

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Assessment 

IDENTIFICATION: Read the questions carefully. Write your answer before the number. 
Malicious software       1. Malware is a short term used for _________. 
Ransomware          2. It displays an image that prevents you from accessing your computer.               
Pharming                     3. _______ is a common type of online fraud. 
Internet etiquette         4. Netiquette is a short term used for _______. 
Spam                     5. The mass distribution of unsolicited messages, advertising or pornography
to addresses which can be easily found on the internet.  
Spyware and adware 6. ______ and ______ are often used by third parties to infiltrate your
computer. 
Trojan Horses            7. It is an executable file that will install itself and run automatically once
it’s downloaded. 
Viruses                     8. Malicious computer programs that are often sent as an email attachment
or a download with the intent of infecting your computer. 
Spam                     9. It is one of the more common methods of both sending information out
and collecting it from unsuspecting people. 
Netiquette                 10. It is a set of rules for behaving properly online. 
Ransomware          11. A type of malware that restricts access to your computer or your files
and displays a message that demands payment for the restriction to be removed. 
Pharming              12. A means to point you to a malicious and illegitimate website by redirecting
the legitimate URL. 
Worms            13. _______ are common threat to computer and the internet as a whole. 
Hacking          14. Action taken by someone to gain unauthorized access to a computer.
_______________15. It encrypts files on your system’s hard drive and sometimes on shared
network, drives, USB drives, and external hard drives and even some cloud storage drives
preventing you from opening them. 
Spyware and adware16. They often come in the form of a free download and are installed
automatically with or without your consent. 
Trojan Horses       17. A malicious program that is disguised as or embedded within legitimate
software. 
Wi-Fi Eavesdropping 18. Virtual listening in on your information that’s shared over an unsecured
or not encrypted network.  
Netiquette               19. It is the proper way to communicate in an online environment.  
Spyware and adware 20. Software that collects personal information about you without you
knowing.

2. What are the top-level domains? 


Nam Entity
e

.com commercial
.org organization
.net network
.edu education
.gov National and State Government Agencies
.ph Philippines
.au Australia

You might also like