2. Instructions
• The quiz is just a “Multiple Choice” type.
• 10 questions will be given.
• 30 seconds each problem.
• Write the letter that corresponds to the correct answer.
5. 1. A crime committed or assisted through the use of
internet.
a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
6. 2. Stands for malicious software.
a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
7. 3. A malicious program that is disguised as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
a. Virus
b. Worm
c. Trojan
d. Spyware
8. 4. A program designed to send you advertisements, mostly
pop-ups.
a. Spyware
b. Adware
c. Malware
d. Popware
9. 5. A malicious program designed to replicate itself and
transfer from one computer to another.
a. Virus
b. Worm
c. Trojan
d. Spyware
10. 6. A malicious program that transfer from one computer to
another by any type of means.
a. Virus
b. Worm
c. Trojan
d. Spyware
11. 7. A program that runs in the background without you
knowing it. It has the ability to monitor what you are
currently doing and typing through keylogging
a. Virus
b. Worm
c. Trojan
d. Spyware
12. 8. Its goal is to acquire sensitive information like passwords
and credit card details. It usually gives a fake website that
ask you to update your username, password, credit card, or
any personal information.
a. Spam
b. Infringement
c. Phishing
d. Keylogger
13. 9. A part of the law, wherein you have the rights to your
work, and anyone who uses it without consent is
punishable by law.
a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
14. 10. Shortcut key in Windows to directly open the Task
Manager.
a. Ctrl + Alt + Del
b. Windows key + X + T
c. Ctrl + Shift + Esc
d. Windows key + R
17. 1. A crime committed or assisted through the use of
internet.
a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
18. 2. Stands for malicious software.
a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
19. 3. A malicious program that is disguised as a useful
program but once downloaded or installed, leaves your PC
unprotected and allows hackers to get your information.
a. Virus
b. Worm
c. Trojan
d. Spyware
20. 4. A program designed to send you advertisements, mostly
pop-ups.
a. Spyware
b. Adware
c. Malware
d. Popware
21. 5. A malicious program designed to replicate itself and
transfer from one computer to another.
a. Virus
b. Worm
c. Trojan
d. Spyware
22. 6. A malicious program that transfer from one computer to
another by any type of means.
a. Virus
b. Worm
c. Trojan
d. Spyware
23. 7. A program that runs in the background without you
knowing it. It has the ability to monitor what you are
currently doing and typing through keylogging
a. Virus
b. Worm
c. Trojan
d. Spyware
24. 8. Its goal is to acquire sensitive information like passwords
and credit card details. It usually gives a fake website that
ask you to update your username, password, credit card, or
any personal information.
a. Spam
b. Infringement
c. Phishing
d. Keylogger
25. 9. A part of the law, wherein you have the rights to your
work, and anyone who uses it without consent is
punishable by law.
a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
26. 10. Shortcut key in Windows to directly open the Task
Manager.
a. Ctrl + Alt + Del
b. Windows key + X + T
c. Ctrl + Shift + Esc
d. Windows key + R