Professional Documents
Culture Documents
_______________ 1. refers to the practices and precautions that should be observed when using the
internet to ensure that the users as well as their computers and personal information are safe from
crimes
_______________ 2. is a combination of the words network and etiquette. It is a set of rules for
behaving properly online.
_______________ 3. is a series of flame posts or messages in a thread that are considered derogatory in
nature or are completely off-topic.
_______________ 4. is deemed any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners.
_______________ 5. The message is meant to lure you into revealing sensitive or confidential
information.
_______________ 6. These “spoofed” sites can capture a victim’s confidential information, including
usernames, passwords, and credit card data, or install malware on their computer.
_______________ 7. generally refers to someone using internet services or software to defraud or take
advantage of victims, typically for financial gain.
_______________ 11. is malware that secretly observes the computer user’s activities without
permission and reports it to the software’s author.
_______________ 12. are malwares that attach to another program and, when executed—
unintentionally by the user—replicates itself by modifying other computer programs and infecting them
with its own bits of code.
_______________ 14. is a form of malware that locks you out of your device and/or encrypts your files,
then forces you to pay a ransom to get them back.
_______________ 15. are unsolicited emails, instant messages coming from recipients that are not
granted verifiable permission for the message to be sent. Spam messages can be damaging if you open
or respond to it.
_______________ 16. refers to the use of the internet or other electronic device to harass or stalk
individuals or organizations.
_______________ 17. refers to the act of tormenting, harassing, or embarrassing another person using
the internet.
_______________ 18. happens when someone or something pretends to be something else to gain our
confidence, get access to our systems, steal data, steal money, or spread malware.
_______________ 19. are websites used for retrieval of data, files, or documents from data bases.
_______________ 20. It is a generic term for all types of names and addresses that refer to objects on
the world wide web.
_______________ 21. This operator will find pages that include either of the search terms.
_______________ 22. This operator will retrieve only pages containing both terms.
_______________ 23. This operator will find pages that do not include search term immediately
following it.
_______________ 24. is used to search for famous quotes, proper names, recommendations, etc. It
encloses the phrase in quotation marks.
_______________ 25. indicates that the word after the sign is a required word must be found in search
_______________ 26. indicates to exclude a word from your search that is not required on the result
_______________ 28. using the filetype refines the search for documents on the web.
_______________ 30. It reveals that the person, institution or agency responsible for a site has the
qualifications and knowledge to do so.
_______________ 31. The purpose of the information presented in the site should be clear. Some sites
are meant to inform, persuade, state an opinion, entertain, or parody something or someone.
_______________ 32. This refers to how comprehensive the website is in their discussion of certain
topics.
_______________ 33. It refers to: how current the information presented is, and how often the site is
updated or maintained.
II. Enumeration
A. The most common offenders in the rogues’ gallery of malware: (5)
B. Five (5) examples of search engines.
C. Popular Domains (5)
III. Explain the quotation below. Write your answer at the back of your test paper.