Professional Documents
Culture Documents
Part I Direction: Find the answer of every items on the box below and write your answer on the space
provided of each item.
*Phishing * Spyware *Computer Virus
*F-Secure
_______1. It can disable the computer’s defenses opening it to unauthorized entry. It can erase data,
can corrupt files, allow access to computers.
_______2. It is usually done through email or using popular entity such as Microsoft, Yahoo, Google,
Amazon, and financial institutions.
_______4. This is a person who is able to enter and control other people’s computer without
authorization.
_______5. It can monitor and collect information about the users interact habits and practices.
_______6. It is a major concern of many online banking and electronic commerce transactions.
_______8. It is a deceitful email practice in which the sender address is change, so that it would
appear to have come from a different source which is usually someone you know.
_______10. Usually unsolicited commercial email sent from an unknown source with identical
message sent to multiple recipients.
Part II Direction: Explain. Choose two (2) out of eight (8) different trends in Information and
Communication Technology and (10 points) and explain their effect in the community.
Part III Direction: Create an essay. Provide one (1) example of an online platform that you commonly use.
Share your experienced in using this online platform. (5 points
Part IV Direction: Create an essay. How important to you as a student securing your own account. (10 points)
NOTRE DAME OF JARO, INC.
Msgr. Lino Gonzaga St., Jaro, Leyte
notredame.jaro@yahoo.com.ph
Part V Direction: Create an essay. What skill in computer do you need to possess for easy access to internet?
(5 points)
Part IV Direction: Explain. Choose one (1) among the three (3) types of information resources that you truly
believe to use every day. Expound your answer. (10 points)
Good Luck!
Prepared by:
ICT Teacher