SlideShare a Scribd company logo
1 of 5
EMPOWERMENT
TECHNOLOGIES
2ND QUIZ
1. ________ are online versions of information systems, which is “the process of
and tools for storing, managing, using, and gathering of data and communications
in an organization.
2. ________ is a document commonly written in Hyper Text Markup Language
(HTML) that is accessible through the Internet or other network using an Internet
browser.
3. ________ It makes it easier for users to interact, to collect, and use the data from
the user’s interactions for their own particular needs.
4. ________ considered to be electronic junk mail or junk newsgroup postings.
5. ________ The act of sending an email to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into surrendering
private information that will be used for identity theft.
6. _________ is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes.
7. _________ is similar to a virus by design and is considered to be a sub-class of a
virus.
8. _________ at first glance will appear to be useful software but will actually do
damage once installed or run on your computer.
9. _________ Adware is the common name used to describe software that is given to
the user with advertisements embedded in the application.
10. _________ refers to software designed specifically to damage or disrupt a system,
such as a virus or a Trojan horse.
11. _________ is the process of interactively searching for and retrieving requested
information via a computer from databases that are online.
12. _________ means finding out information about a topic.
13. _________ a computer program that searches documents especially in the world
wide web for a specified word or words and provides a list of documents which
they are found.
14. . . Give at least two (2) example of search engine.
15. .
ESSAY
16 – 20 -
Why is it important to stay safe online?
How can we avoid the different malicious software?
21 – 25
What are the advantages of online search?
25-30
What are the functions of Online system?

More Related Content

Similar to 2nd Quiz.midterm in empowerment technologies.pptx

Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Suman Mia
 
Web virus activity
Web virus activityWeb virus activity
Web virus activitySim_Dhillon
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center- Mark - Fullbright
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3IJERA Editor
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Security concepts to consider when using a computer
Security concepts to consider when using a computerSecurity concepts to consider when using a computer
Security concepts to consider when using a computerMiguel Angel Romero Ochoa
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docxHabeebUllah10
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 

Similar to 2nd Quiz.midterm in empowerment technologies.pptx (20)

Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)Basics of Computer(Malware,CPU,Virus,Software,DNS)
Basics of Computer(Malware,CPU,Virus,Software,DNS)
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Integrated honeypot
Integrated honeypotIntegrated honeypot
Integrated honeypot
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Security concepts to consider when using a computer
Security concepts to consider when using a computerSecurity concepts to consider when using a computer
Security concepts to consider when using a computer
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 

More from AnamaeIcaranomFlores

ChapterTest-Midterm in Empowerment Technologies.pptx
ChapterTest-Midterm in Empowerment Technologies.pptxChapterTest-Midterm in Empowerment Technologies.pptx
ChapterTest-Midterm in Empowerment Technologies.pptxAnamaeIcaranomFlores
 
2nd Quiz.FINAL.MUltimedia&SocialChange.pptx
2nd Quiz.FINAL.MUltimedia&SocialChange.pptx2nd Quiz.FINAL.MUltimedia&SocialChange.pptx
2nd Quiz.FINAL.MUltimedia&SocialChange.pptxAnamaeIcaranomFlores
 
1st Quiz.FINAL.ICT as platform for change.pptx
1st Quiz.FINAL.ICT as platform for change.pptx1st Quiz.FINAL.ICT as platform for change.pptx
1st Quiz.FINAL.ICT as platform for change.pptxAnamaeIcaranomFlores
 
inset-certificate_compress for teachers.pdf
inset-certificate_compress for teachers.pdfinset-certificate_compress for teachers.pdf
inset-certificate_compress for teachers.pdfAnamaeIcaranomFlores
 
JS PROM CERTIFICATE FOR WORJING COMMITTEE..pptx
JS PROM CERTIFICATE FOR WORJING COMMITTEE..pptxJS PROM CERTIFICATE FOR WORJING COMMITTEE..pptx
JS PROM CERTIFICATE FOR WORJING COMMITTEE..pptxAnamaeIcaranomFlores
 
Kautusang Pangkagawaran Blg.11 filipinopptx
Kautusang Pangkagawaran Blg.11 filipinopptxKautusang Pangkagawaran Blg.11 filipinopptx
Kautusang Pangkagawaran Blg.11 filipinopptxAnamaeIcaranomFlores
 
collaborative publishing for presscon.pptx
collaborative publishing for presscon.pptxcollaborative publishing for presscon.pptx
collaborative publishing for presscon.pptxAnamaeIcaranomFlores
 
Chapter9-ICT PROJECT.ONLINE PUBLISHING.pptx
Chapter9-ICT PROJECT.ONLINE PUBLISHING.pptxChapter9-ICT PROJECT.ONLINE PUBLISHING.pptx
Chapter9-ICT PROJECT.ONLINE PUBLISHING.pptxAnamaeIcaranomFlores
 
Chapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptxChapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptxAnamaeIcaranomFlores
 
PPT1-Lesson1&2FoodandBeverageServices.pptx
PPT1-Lesson1&2FoodandBeverageServices.pptxPPT1-Lesson1&2FoodandBeverageServices.pptx
PPT1-Lesson1&2FoodandBeverageServices.pptxAnamaeIcaranomFlores
 
1.BPP-program overview bread and pastry production.pptx
1.BPP-program overview bread and pastry production.pptx1.BPP-program overview bread and pastry production.pptx
1.BPP-program overview bread and pastry production.pptxAnamaeIcaranomFlores
 
certificate Template for school uses.pptx
certificate Template for school uses.pptxcertificate Template for school uses.pptx
certificate Template for school uses.pptxAnamaeIcaranomFlores
 
FBS (food and beverage servisec) grade 11.pptx
FBS (food and beverage servisec) grade 11.pptxFBS (food and beverage servisec) grade 11.pptx
FBS (food and beverage servisec) grade 11.pptxAnamaeIcaranomFlores
 
CAREER GUIDANCE COOKERY for grade 10.pptx
CAREER GUIDANCE COOKERY for grade 10.pptxCAREER GUIDANCE COOKERY for grade 10.pptx
CAREER GUIDANCE COOKERY for grade 10.pptxAnamaeIcaranomFlores
 
KAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptx
KAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptxKAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptx
KAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptxAnamaeIcaranomFlores
 

More from AnamaeIcaranomFlores (15)

ChapterTest-Midterm in Empowerment Technologies.pptx
ChapterTest-Midterm in Empowerment Technologies.pptxChapterTest-Midterm in Empowerment Technologies.pptx
ChapterTest-Midterm in Empowerment Technologies.pptx
 
2nd Quiz.FINAL.MUltimedia&SocialChange.pptx
2nd Quiz.FINAL.MUltimedia&SocialChange.pptx2nd Quiz.FINAL.MUltimedia&SocialChange.pptx
2nd Quiz.FINAL.MUltimedia&SocialChange.pptx
 
1st Quiz.FINAL.ICT as platform for change.pptx
1st Quiz.FINAL.ICT as platform for change.pptx1st Quiz.FINAL.ICT as platform for change.pptx
1st Quiz.FINAL.ICT as platform for change.pptx
 
inset-certificate_compress for teachers.pdf
inset-certificate_compress for teachers.pdfinset-certificate_compress for teachers.pdf
inset-certificate_compress for teachers.pdf
 
JS PROM CERTIFICATE FOR WORJING COMMITTEE..pptx
JS PROM CERTIFICATE FOR WORJING COMMITTEE..pptxJS PROM CERTIFICATE FOR WORJING COMMITTEE..pptx
JS PROM CERTIFICATE FOR WORJING COMMITTEE..pptx
 
Kautusang Pangkagawaran Blg.11 filipinopptx
Kautusang Pangkagawaran Blg.11 filipinopptxKautusang Pangkagawaran Blg.11 filipinopptx
Kautusang Pangkagawaran Blg.11 filipinopptx
 
collaborative publishing for presscon.pptx
collaborative publishing for presscon.pptxcollaborative publishing for presscon.pptx
collaborative publishing for presscon.pptx
 
Chapter9-ICT PROJECT.ONLINE PUBLISHING.pptx
Chapter9-ICT PROJECT.ONLINE PUBLISHING.pptxChapter9-ICT PROJECT.ONLINE PUBLISHING.pptx
Chapter9-ICT PROJECT.ONLINE PUBLISHING.pptx
 
Chapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptxChapter7-ICT as Platform for Change.pptx
Chapter7-ICT as Platform for Change.pptx
 
PPT1-Lesson1&2FoodandBeverageServices.pptx
PPT1-Lesson1&2FoodandBeverageServices.pptxPPT1-Lesson1&2FoodandBeverageServices.pptx
PPT1-Lesson1&2FoodandBeverageServices.pptx
 
1.BPP-program overview bread and pastry production.pptx
1.BPP-program overview bread and pastry production.pptx1.BPP-program overview bread and pastry production.pptx
1.BPP-program overview bread and pastry production.pptx
 
certificate Template for school uses.pptx
certificate Template for school uses.pptxcertificate Template for school uses.pptx
certificate Template for school uses.pptx
 
FBS (food and beverage servisec) grade 11.pptx
FBS (food and beverage servisec) grade 11.pptxFBS (food and beverage servisec) grade 11.pptx
FBS (food and beverage servisec) grade 11.pptx
 
CAREER GUIDANCE COOKERY for grade 10.pptx
CAREER GUIDANCE COOKERY for grade 10.pptxCAREER GUIDANCE COOKERY for grade 10.pptx
CAREER GUIDANCE COOKERY for grade 10.pptx
 
KAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptx
KAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptxKAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptx
KAUTUSANG TAGAPAGPAGANAP BLG.komunikasyonpptx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

2nd Quiz.midterm in empowerment technologies.pptx

  • 2. 1. ________ are online versions of information systems, which is “the process of and tools for storing, managing, using, and gathering of data and communications in an organization. 2. ________ is a document commonly written in Hyper Text Markup Language (HTML) that is accessible through the Internet or other network using an Internet browser. 3. ________ It makes it easier for users to interact, to collect, and use the data from the user’s interactions for their own particular needs. 4. ________ considered to be electronic junk mail or junk newsgroup postings. 5. ________ The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • 3. 6. _________ is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. 7. _________ is similar to a virus by design and is considered to be a sub-class of a virus. 8. _________ at first glance will appear to be useful software but will actually do damage once installed or run on your computer. 9. _________ Adware is the common name used to describe software that is given to the user with advertisements embedded in the application. 10. _________ refers to software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.
  • 4. 11. _________ is the process of interactively searching for and retrieving requested information via a computer from databases that are online. 12. _________ means finding out information about a topic. 13. _________ a computer program that searches documents especially in the world wide web for a specified word or words and provides a list of documents which they are found. 14. . . Give at least two (2) example of search engine. 15. .
  • 5. ESSAY 16 – 20 - Why is it important to stay safe online? How can we avoid the different malicious software? 21 – 25 What are the advantages of online search? 25-30 What are the functions of Online system?