You are on page 1of 1

LEON GUINTO MEMORIAL COLLEGE, Inc

443 Mabini Street Atimonan, Quezon


(Recognized by the Government)
No. 010 s. 1986

…teaching minds …changing lives …moving forward

Name: RITCHARD DERELO Subject: Empowerment Technologies

Grade and Section/ Strand: 12HUMSS2

MATCHING TYPE
Match Column A with Column B. Write the letter of your answer in a sheet of paper.

COLUMN A COLUMN B
1. It is designed to send you advertisements 1. Adware
2. It sends an official-looking email and is
designed to steal sensitive personal information. 2. Copyright
3. A provision that allows you to use copyrighted
work without consent with certain limitation. 3. Fair Use
4. A browser feature that is synonymous to
“private” browsing. 4. Incognito
5. It replicates and can transfer from one
computer to another. 5. Keylogger
6. It states that anyone who uses your work
without your consent is punishable by law. 6. Malware
7. It runs in the background and monitors what
you are doing. 7. Phishing

8. It is disguised as useful program but is not. 8. Ransomware


9. A malicious software used to record the
keystrokes done by the user. 9. Spyware

10. It is any program or file that is harmful to a 10. Trojan


computer user.
11. Virus

Answers:

1. Adware 6. Copyright
2. Phishing 7. Spyware
3. Fair Use 8. Trojan
4. Incognito 9. Keylogger
5. Virus 10. Malware

You might also like