SlideShare a Scribd company logo
1 of 26
2nd Quiz in ICT
Lesson 2: Rules of Nettiquette
Instructions
• The quiz is just a “Multiple Choice” type.
• 10 questions will be given.
• 30 seconds each problem.
• Write the letter that corresponds to the correct answer.
Are You Ready?
Let’s Start!
1. A crime committed or assisted through the use of
internet.
a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
2. Stands for malicious software.
a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
3. A malicious program that is disguised as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
a. Virus
b. Worm
c. Trojan
d. Spyware
4. A program designed to send you advertisements, mostly
pop-ups.
a. Spyware
b. Adware
c. Malware
d. Popware
5. A malicious program designed to replicate itself and
transfer from one computer to another.
a. Virus
b. Worm
c. Trojan
d. Spyware
6. A malicious program that transfer from one computer to
another by any type of means.
a. Virus
b. Worm
c. Trojan
d. Spyware
7. A program that runs in the background without you
knowing it. It has the ability to monitor what you are
currently doing and typing through keylogging
a. Virus
b. Worm
c. Trojan
d. Spyware
8. Its goal is to acquire sensitive information like passwords
and credit card details. It usually gives a fake website that
ask you to update your username, password, credit card, or
any personal information.
a. Spam
b. Infringement
c. Phishing
d. Keylogger
9. A part of the law, wherein you have the rights to your
work, and anyone who uses it without consent is
punishable by law.
a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
10. Shortcut key in Windows to directly open the Task
Manager.
a. Ctrl + Alt + Del
b. Windows key + X + T
c. Ctrl + Shift + Esc
d. Windows key + R
--END--
Let’s Answer
1. A crime committed or assisted through the use of
internet.
a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
2. Stands for malicious software.
a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
3. A malicious program that is disguised as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
a. Virus
b. Worm
c. Trojan
d. Spyware
4. A program designed to send you advertisements, mostly
pop-ups.
a. Spyware
b. Adware
c. Malware
d. Popware
5. A malicious program designed to replicate itself and
transfer from one computer to another.
a. Virus
b. Worm
c. Trojan
d. Spyware
6. A malicious program that transfer from one computer to
another by any type of means.
a. Virus
b. Worm
c. Trojan
d. Spyware
7. A program that runs in the background without you
knowing it. It has the ability to monitor what you are
currently doing and typing through keylogging
a. Virus
b. Worm
c. Trojan
d. Spyware
8. Its goal is to acquire sensitive information like passwords
and credit card details. It usually gives a fake website that
ask you to update your username, password, credit card, or
any personal information.
a. Spam
b. Infringement
c. Phishing
d. Keylogger
9. A part of the law, wherein you have the rights to your
work, and anyone who uses it without consent is
punishable by law.
a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
10. Shortcut key in Windows to directly open the Task
Manager.
a. Ctrl + Alt + Del
b. Windows key + X + T
c. Ctrl + Shift + Esc
d. Windows key + R

More Related Content

Similar to 2nd-quiz-in-ict.pptx

Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
 

Similar to 2nd-quiz-in-ict.pptx (20)

Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Malware
MalwareMalware
Malware
 
Web virus activity
Web virus activityWeb virus activity
Web virus activity
 
Anti virus
Anti virusAnti virus
Anti virus
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
The malware effects
The malware effectsThe malware effects
The malware effects
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer Based Crime
Computer Based CrimeComputer Based Crime
Computer Based Crime
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 

2nd-quiz-in-ict.pptx

  • 1. 2nd Quiz in ICT Lesson 2: Rules of Nettiquette
  • 2. Instructions • The quiz is just a “Multiple Choice” type. • 10 questions will be given. • 30 seconds each problem. • Write the letter that corresponds to the correct answer.
  • 5. 1. A crime committed or assisted through the use of internet. a. Cybercrime b. Identity theft c. Malwares d. Copyright Infringement
  • 6. 2. Stands for malicious software. a. Malware b. Maliware c. Malisoft d. Malicioftware
  • 7. 3. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. a. Virus b. Worm c. Trojan d. Spyware
  • 8. 4. A program designed to send you advertisements, mostly pop-ups. a. Spyware b. Adware c. Malware d. Popware
  • 9. 5. A malicious program designed to replicate itself and transfer from one computer to another. a. Virus b. Worm c. Trojan d. Spyware
  • 10. 6. A malicious program that transfer from one computer to another by any type of means. a. Virus b. Worm c. Trojan d. Spyware
  • 11. 7. A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging a. Virus b. Worm c. Trojan d. Spyware
  • 12. 8. Its goal is to acquire sensitive information like passwords and credit card details. It usually gives a fake website that ask you to update your username, password, credit card, or any personal information. a. Spam b. Infringement c. Phishing d. Keylogger
  • 13. 9. A part of the law, wherein you have the rights to your work, and anyone who uses it without consent is punishable by law. a. Copyright b. Fair Use c. Cybercrime d. Accessibility
  • 14. 10. Shortcut key in Windows to directly open the Task Manager. a. Ctrl + Alt + Del b. Windows key + X + T c. Ctrl + Shift + Esc d. Windows key + R
  • 17. 1. A crime committed or assisted through the use of internet. a. Cybercrime b. Identity theft c. Malwares d. Copyright Infringement
  • 18. 2. Stands for malicious software. a. Malware b. Maliware c. Malisoft d. Malicioftware
  • 19. 3. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information. a. Virus b. Worm c. Trojan d. Spyware
  • 20. 4. A program designed to send you advertisements, mostly pop-ups. a. Spyware b. Adware c. Malware d. Popware
  • 21. 5. A malicious program designed to replicate itself and transfer from one computer to another. a. Virus b. Worm c. Trojan d. Spyware
  • 22. 6. A malicious program that transfer from one computer to another by any type of means. a. Virus b. Worm c. Trojan d. Spyware
  • 23. 7. A program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging a. Virus b. Worm c. Trojan d. Spyware
  • 24. 8. Its goal is to acquire sensitive information like passwords and credit card details. It usually gives a fake website that ask you to update your username, password, credit card, or any personal information. a. Spam b. Infringement c. Phishing d. Keylogger
  • 25. 9. A part of the law, wherein you have the rights to your work, and anyone who uses it without consent is punishable by law. a. Copyright b. Fair Use c. Cybercrime d. Accessibility
  • 26. 10. Shortcut key in Windows to directly open the Task Manager. a. Ctrl + Alt + Del b. Windows key + X + T c. Ctrl + Shift + Esc d. Windows key + R