You are on page 1of 2

POST- TEST IN EMPOWERNMENT TECHNOLOGIES

LESSON 2 RULES OF NETIQUETTE

Name: _____________________________________ Score: _______________________

MATCHING TYPE: Match Column A with Column B. Write the letter of the correct answer on the space before each number.

A B

_____ 1. Virus a. designed to send you advertisement

_____ 2. Rouge b. sends an official-looking email and is designed to steal sensitive personal information

_____ 3. Key logger c. a provision that allows you to use copyrighted work without consent

_____ 4. Adware d. a browser feature that is synonymous to “private”

_____ 5. Spam e. replicates and can transfer from one computer to another

_____ 6. Phishing f. exploits the DNS system

_____ 7. Fair use g. states that anyone who uses you work without your consent is punishable by law

_____ 8. Spyware h. runs in the background and monitors what you are doing

_____ 9. Private i. unwanted email mostly from bots

_____ 10. Malware j. disguised as a useful program but once downloaded, leaves your PC

unprotected that allows the hackers to get your information

_____12. Internet k. the information superhighway

_____ 13. Trojan l. tricks the user into posing that it is a security software

_____ 14. Copyright m. a malicious software

_____15. pharming n. an option to hide post so that search engines could not scan it

o. used to record the keystrokes done by the user

POST- TEST IN EMPOWERNMENT TECHNOLOGIES

LESSON 2 RULES OF NETIQUETTE

Name: _____________________________________ Score: _______________________

MATCHING TYPE: Match Column A with Column B. Write the letter of the correct answer on the space before each number.

A B

_____ 1. Virus a. designed to send you advertisement

_____ 2. Rouge b. sends an official-looking email and is designed to steal sensitive personal information

_____ 3. Key logger c. a provision that allows you to use copyrighted work without consent

_____ 4. Adware d. a browser feature that is synonymous to “private”

_____ 5. Spam e. replicates and can transfer from one computer to another

_____ 6. Phishing f. exploits the DNS system

_____ 7. Fair use g. states that anyone who uses you work without your consent is punishable by law

_____ 8. Spyware h. runs in the background and monitors what you are doing

_____ 9. Private i. unwanted email mostly from bots

_____ 10. Malware j. disguised as a useful program but once downloaded, leaves your PC

unprotected that allows the hackers to get your information

_____12. Internet k. the information superhighway

_____ 13. Trojan l. tricks the user into posing that it is a security software

_____ 14. Copyright m. a malicious software

_____15. pharming n. an option to hide post so that search engines could not scan it

o. used to record the keystrokes done by the user

You might also like