You are on page 1of 2

Carthel Science Educational Foundation Inc.

San Vicente, San Manuel Tarlac


Tel No. (045) 606-0807 / Cel. No. 09369742204
Email: Csef2013@yahoo.com

Name: Strand/Section: CSS-12


Final Test (E.T)
I. Identify the following questions and write your answer in the space provided.

_______________ 1. refers to the practices and precautions that should be observed when using the
internet to ensure that the users as well as their computers and personal information are safe from
crimes

_______________ 2. is a combination of the words network and etiquette. It is a set of rules for
behaving properly online.

_______________ 3. is a series of flame posts or messages in a thread that are considered derogatory in
nature or are completely off-topic.

_______________ 4. is deemed any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners.

_______________ 5. The message is meant to lure you into revealing sensitive or confidential
information.

_______________ 6. These “spoofed” sites can capture a victim’s confidential information, including
usernames, passwords, and credit card data, or install malware on their computer.

_______________ 7. generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain.

_______________ 8. It is a software application that is programmed to do certain tasks.

_______________ 9. Also known as Malicious Software.

_______________ 10. is unwanted software designed to throw advertisements up on your screen

_______________ 11. is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author.

_______________ 12. are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and infecting them
with its own bits of code.

_______________ 13. is one of the most dangerous malware types.

_______________ 14. is a form of malware that locks you out of your device and/or encrypts your files,
then forces you to pay a ransom to get them back.

_______________ 15. are unsolicited emails, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent. Spam messages can be damaging if you open
or respond to it.

_______________ 16. refers to the use of the internet or other electronic device to harass or stalk
individuals or organizations.

_______________ 17. refers to the act of tormenting, harassing, or embarrassing another person using
the internet.
_______________ 18. happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.

_______________ 19. are websites used for retrieval of data, files, or documents from data bases.

_______________ 20. It is a generic term for all types of names and addresses that refer to objects on
the world wide web.

_______________ 21. This operator will find pages that include either of the search terms.

_______________ 22. This operator will retrieve only pages containing both terms.

_______________ 23. This operator will find pages that do not include search term immediately
following it.

_______________ 24. is used to search for famous quotes, proper names, recommendations, etc. It
encloses the phrase in quotation marks.

_______________ 25. indicates that the word after the sign is a required word must be found in search

_______________ 26. indicates to exclude a word from your search that is not required on the result

_______________ 27. is used to find social tags.

_______________ 28. using the filetype refines the search for documents on the web.

_______________ 29. the sites find webpage from a website.

_______________ 30. It reveals that the person, institution or agency responsible for a site has the
qualifications and knowledge to do so.

_______________ 31. The purpose of the information presented in the site should be clear. Some sites
are meant to inform, persuade, state an opinion, entertain, or parody something or someone.

_______________ 32. This refers to how comprehensive the website is in their discussion of certain
topics.

_______________ 33. It refers to: how current the information presented is, and how often the site is
updated or maintained.

_______________ 34. Objective sites present information with a minimum of bias.

_______________ 35. It refers to the credibility of the website.

II. Enumeration
A. The most common offenders in the rogues’ gallery of malware: (5)
B. Five (5) examples of search engines.
C. Popular Domains (5)

III. Explain the quotation below. Write your answer at the back of your test paper.

You might also like