You are on page 1of 3

GENERAL CLIMACO NATIONAL HIGH SCHOOL

Senior High School


Empowerment Technologies 12

SHORT QUIZZ
I. TRUE OR FALSE. Write TRUE if the statement is true and write FALSE if the statement is false.
1. My computer has antivirus. It is okay to open most email attachments like e- cards and video files?
A. True B. False
2. It is possible for a video you posted on social media to be tracked and saved by other people even if
you deleted it right away?
A. True B. False
3. It is okay to share your password to your friend.
A. True B. False
4. It is necessary to reply if you received an email stating your mom’s bank account need to be verified
so it won’t be forfeited?
A. True B. False
5. You found an essay online you can copy and paste it for your essay assignment?
A. True B. False
6. Viruses are malwares that may destroy your computer.
A. True B. False
7. It is good to post your family vacation on social media especially if the whole family are on that
vacation?
A. True B. False
8. It is safe to enter your personal information on an unknown site?
A. True B. False
9. It is nice for people to know your birthday so you can get as many gifts as possible, but doing so can
make you vulnerable to identify theft other threats.
A. True B. False
10. Flashdrives can infect your computer with virus.
A. True B. False
11. Your password should be made up using personal information so it is easier for you to remember?
A. True B. False
II. Multiple choice. Write the correct letter of your choice.
12. Which of the following terms refers to a program that runs in the background without you knowing
it?
A. Adware B. Spam C. Spyware D. Virus
13. Which program is designed to send advertisements, mostly as pop- ups?
A. Adware B. Keyloggers C. Spam D. Spyware
14. Which is used to record keystrokes done by users to steal passwords?
A. Keyloggers B. Pharming C. Phishing D. Spyware
15. How are unwanted emails, from bots and advertisers called?
A. Spam B. Trojan C. Virus D. Worm
16. How is phishing done?
A. Advertisements are sent to a user
B. Keystrokes done by a user are recorded
C. The domain name service system is exploited
D. An email is sent that directs a user to visit a website and asked to update personal information.
17. What information is okay to give out on the internet?
A. Name B. Address C. Phone Number D. None of them
18. Is it okay to share personal information with ?
A. Parents only B. Teachers only C. Adults I Trust D. No one
19. Who you should talk to if you feel uncomfortable about something you see or hear on the internet?
A. A friend I trust B. An Adult I trust C. My dog D.Someone else onlinewho I don’t know
20. Why do you need to be more cautious with friends you meet online than friends you meet in school?
A. Most people on the internet are not trustworthy as to the people in the real world.
B. Friendships that begin online are not real
C. Online, it is more difficult to tell if a person is who he/ she says
D. Website have a very strict rules about online friends
21. What is computer security?
A. Creating passwords and keeping your computer private
B. Safely logging off and locking your computer when you are not using it
C. Taking care of hardware, software and data contained
D. Updating software to have anti- virus threat walls
22. How can you pick up viruses in your computer?
A. When passing files through USB sticks
B. Through documents such as Word and Access
C. Through email attachments and websites
D. By visiting unsafe websites
23. What is a virus?
A. A program that looks harmless and tricks you into running it on your computer
B. A program that makes copies of itself and then spreads through a network damaging systems as
it goes along
C. An attempt to get your personal information such as bank account details by pretending to be
for example a charity or claiming you have won a cash prize
D. Accessing a computer system by breaking
24. What is a trojan?
A. A program that looks harmless and tricks you into running it on your computer
B. An attempt to get your personal information such as bank account details by pretending to be
for example a charity or claiming you have won a cash prize
C. Accessing a computer system by breaking through the security system of that computer
D. A program that makes copies of itself and then spreads through a network damaging systems as
it goes along.
25. What is Phishing?
A. Catching fish in a lake/ pond
B. An attempt to get your personal information such as bank account details
C. Accessing computer system by breaking through the security system of that computer
D. A program that makes copies of itself and then spreads through a network damaging systems as
it goes along
26. What is a worm?
A. A program that makes copies of itself and then spreads through a network damaging systems as
it goes along
B. Something that can be picked up through emails and attachments
C. A program that looks harmless and tricks you into running it on your computer
D. An attempt to get your personal information such as bank accounts details
27. What can you do to prevent internet threats?
A. Do not visit any dodgy websites
B. Encrypt all emails sent to be safe
C. Install anti-virus software on computer
D. Be wary of emails and only open ones that you know the sender
28. This techniques tries to take information from the user, like credit cards, usernames and passwords.
a. Phishing B. Spyware C. Scam D. Fishing
29. Which one of the choices below is a sign that spyware is infected on your computer.
A. Random error messeges
B. Your computer is a little slow when playing
C. Your computer works just fine
D. You get many email scams in your spam box
30. How does spyware infect a computer?
A. Pop ups B. Theft of Personal Info C. Recording Web Info D. All the above
III. Essay. Write or explain your answer at least five sentences. 20 points
Question:

A. How do you manage your online transactions or social media accounts for it to be safe?

B. What are the negative effects of cyberbullying to the individual or person?

Prepared by:
Richie Y. Mepieza
SHS Teacher HUMSS
Answer Key
I. False
II. True
III. False
IV. False
V. False
VI. True
VII. False
VIII. False
IX. True
X. True
XI. True
XII. C
XIII. A
XIV. A
XV. A
XVI. D
XVII. D
XVIII. C
XIX. B
XX. C
XXI. C
XXII. C
XXIII. C
XXIV. A
XXV. B
XXVI. A
XXVII. C
XXVIII. A
XXIX. A
XXX. d

You might also like