Professional Documents
Culture Documents
MATCHING TYPE: Match Column A with Column B. Write the letter of the correct answer on the space before each number.
A B
_____ 2. Rouge b. sends an official-looking email and is designed to steal sensitive personal information
_____ 3. Key logger c. a provision that allows you to use copyrighted work without consent
_____ 5. Spam e. replicates and can transfer from one computer to another
_____ 7. Fair use g. states that anyone who uses you work without your consent is punishable by law
_____ 8. Spyware h. runs in the background and monitors what you are doing
_____ 10. Malware j. disguised as a useful program but once downloaded, leaves your PC
_____ 13. Trojan l. tricks the user into posing that it is a security software
_____15. pharming n. an option to hide post so that search engines could not scan it
MATCHING TYPE: Match Column A with Column B. Write the letter of the correct answer on the space before each number.
A B
_____ 2. Rouge b. sends an official-looking email and is designed to steal sensitive personal information
_____ 3. Key logger c. a provision that allows you to use copyrighted work without consent
_____ 5. Spam e. replicates and can transfer from one computer to another
_____ 7. Fair use g. states that anyone who uses you work without your consent is punishable by law
_____ 8. Spyware h. runs in the background and monitors what you are doing
_____ 10. Malware j. disguised as a useful program but once downloaded, leaves your PC
_____ 13. Trojan l. tricks the user into posing that it is a security software
_____15. pharming n. an option to hide post so that search engines could not scan it