Professional Documents
Culture Documents
2nd Quiz in Ict
2nd Quiz in Ict
nd
Lesson 2: Rules of Nettiquette
Instructions
• The quiz is just a “Multiple Choice” type.
a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
2. Stands for malicious software.
a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
3. A malicious program that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
a. Virus
b. Worm
c. Trojan
d. Spyware
4. A program designed to send you advertisements, mostly pop-
ups.
a. Spyware
b. Adware
c. Malware
d. Popware
5. A malicious program designed to replicate itself and transfer
from one computer to another.
a. Virus
b. Worm
c. Trojan
d. Spyware
6. A malicious program that transfer from one computer to
another by any type of means.
a. Virus
b. Worm
c. Trojan
d. Spyware
7. A program that runs in the background without you knowing it.
It has the ability to monitor what you are currently doing and
typing through keylogging
a. Virus
b. Worm
c. Trojan
d. Spyware
8. Its goal is to acquire sensitive information like passwords and
credit card details. It usually gives a fake website that ask you to
update your username, password, credit card, or any personal
information.
a. Spam
b. Infringement
c. Phishing
d. Keylogger
9. A part of the law, wherein you have the rights to your work,
and anyone who uses it without consent is punishable by law.
a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
10. Shortcut key in Windows to directly open the Task Manager.
a. Cybercrime
b. Identity theft
c. Malwares
d. Copyright Infringement
2. Stands for malicious software.
a. Malware
b. Maliware
c. Malisoft
d. Malicioftware
3. A malicious program that is disguised as a useful program but
once downloaded or installed, leaves your PC unprotected and
allows hackers to get your information.
a. Virus
b. Worm
c. Trojan
d. Spyware
4. A program designed to send you advertisements, mostly pop-
ups.
a. Spyware
b. Adware
c. Malware
d. Popware
5. A malicious program designed to replicate itself and transfer
from one computer to another.
a. Virus
b. Worm
c. Trojan
d. Spyware
6. A malicious program that transfer from one computer to
another by any type of means.
a. Virus
b. Worm
c. Trojan
d. Spyware
7. A program that runs in the background without you knowing it.
It has the ability to monitor what you are currently doing and
typing through keylogging
a. Virus
b. Worm
c. Trojan
d. Spyware
8. Its goal is to acquire sensitive information like passwords and
credit card details. It usually gives a fake website that ask you to
update your username, password, credit card, or any personal
information.
a. Spam
b. Infringement
c. Phishing
d. Keylogger
9. A part of the law, wherein you have the rights to your work,
and anyone who uses it without consent is punishable by law.
a. Copyright
b. Fair Use
c. Cybercrime
d. Accessibility
10. Shortcut key in Windows to directly open the Task Manager.