You are on page 1of 26

2 Quiz in ICT

nd
Lesson 2: Rules of Nettiquette
Instructions
• The quiz is just a “Multiple Choice” type.

• 10 questions will be given.

• 30 seconds each problem.

• Write the letter that corresponds to the correct answer.


Are You Ready?
Let’s Start!
1. A crime committed or assisted through the use of internet.

a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
2. Stands for malicious software.

a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
3. A malicious program that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.

a. Virus
b. Worm
c. Trojan
d. Spyware
4. A program designed to send you advertisements, mostly pop-
ups.

a. Spyware
b. Adware
c. Malware
d. Popware
5. A malicious program designed to replicate itself and transfer
from one computer to another.

a. Virus
b. Worm
c. Trojan
d. Spyware
6. A malicious program that transfer from one computer to
another by any type of means.

a. Virus
b. Worm
c. Trojan
d. Spyware
7. A program that runs in the background without you knowing it.
It has the ability to monitor what you are currently doing and
typing through keylogging

a. Virus
b. Worm
c. Trojan
d. Spyware
8. Its goal is to acquire sensitive information like passwords and
credit card details. It usually gives a fake website that ask you to
update your username, password, credit card, or any personal
information.

a. Spam
b. Infringement
c. Phishing
d. Keylogger
9. A part of the law, wherein you have the rights to your work,
and anyone who uses it without consent is punishable by law.

a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
10. Shortcut key in Windows to directly open the Task Manager.

a. Ctrl + Alt + Del


b. Windows key + X + T
c. Ctrl + Shift + Esc
d. Windows key + R
--END--
Let’s Answer
1. A crime committed or assisted through the use of internet.

a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
2. Stands for malicious software.

a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
3. A malicious program that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.

a. Virus
b. Worm
c. Trojan
d. Spyware
4. A program designed to send you advertisements, mostly pop-
ups.

a. Spyware
b. Adware
c. Malware
d. Popware
5. A malicious program designed to replicate itself and transfer
from one computer to another.

a. Virus
b. Worm
c. Trojan
d. Spyware
6. A malicious program that transfer from one computer to
another by any type of means.

a. Virus
b. Worm
c. Trojan
d. Spyware
7. A program that runs in the background without you knowing it.
It has the ability to monitor what you are currently doing and
typing through keylogging

a. Virus
b. Worm
c. Trojan
d. Spyware
8. Its goal is to acquire sensitive information like passwords and
credit card details. It usually gives a fake website that ask you to
update your username, password, credit card, or any personal
information.

a. Spam
b. Infringement
c. Phishing
d. Keylogger
9. A part of the law, wherein you have the rights to your work,
and anyone who uses it without consent is punishable by law.

a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
10. Shortcut key in Windows to directly open the Task Manager.

a. Ctrl + Alt + Del


b. Windows key + X + T
c. Ctrl + Shift + Esc
d. Windows key + R

You might also like