0% found this document useful (0 votes)
1K views4 pages

E Tech

This document provides information about online safety and security topics like usernames, passwords, malware types (e.g. viruses, worms, trojans), and phishing. It contains definitions of terms and questions to test understanding. Key points covered include how usernames represent your online presence, the importance of strong passwords, common types of malware like viruses and worms that can spread automatically between computers, and how phishing tricks people into providing private details.

Uploaded by

Rochie Roasa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views4 pages

E Tech

This document provides information about online safety and security topics like usernames, passwords, malware types (e.g. viruses, worms, trojans), and phishing. It contains definitions of terms and questions to test understanding. Key points covered include how usernames represent your online presence, the importance of strong passwords, common types of malware like viruses and worms that can spread automatically between computers, and how phishing tricks people into providing private details.

Uploaded by

Rochie Roasa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

E_TECH

Learning Activity 2

________ is your alias, which is used by websites to represent your online presence.

Username

________ is a browser add-on that prevents ads from being displayed in your browser.

Ad blocker

Which of the following is safe practice?

Use a combination of letters, numbers, and symbols as a password.

Which of the following is NOT a safe practice?

Submitting your phone number every time you are asked.

________ is a secret group of characters used to unlock your account

Password

Short Quiz 1

Which of the following can contain malware?

Emails

Downloads

All #

Installers

You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called _____

Phishing #

Bootlegging

Pharming

Spamming

Which of the following is NOT true?

Adware programs can cause your system to slow down


A worm will automatically spread and copy itself

Some types of malware can spread through offline means such as flash drives and local area network

A spam is a type of virus #

_____ is a type of malware that is disguised as a harmless or useful program or file

Trojan #

Spam

Adware

Worm

You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of _____

Adware

Trojan

Phishing

Spam #

Which of the following should not be shared with anyone?

Username

Password #

Phone number

Email address

_____ is a program that is designed to cause harm to your computer or device

Virus #

Bacteria

Phishing

Spam

Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. this fie
is probably a _____
Trojan

Spam

Worm #

Adware

Which of the following in not a malware?

Worm

Trojan

Adware

Ad blocker #

Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program.

Hardware

Software

Firmware

Adware #

Which of the following CANNOT infect your computer?

Spam #

Worm

Virus

Trojan

Malware is short for _____

Malicious software #

Malicious hardware

Malignant software

Malignant hardware

Which of the following does not need human action to spread?


Trojan

Worm #

Phishing

Spam

Tricking people to submit their personal details is called _____

Phishing #

Worm

Trojan

Spam

Which of the following statement is true?

No one can steal your personal information without asking for permission

Usernames are used to determine if you are old enough to access certain contents and features in the
internet

A computer virus can spread whenever a computer makes contact with another computer #

Like a virus, spam can make copies of itself in computers that it comes in contact with

You might also like