Sie sind auf Seite 1von 2

EMPOWERMENT TECHNOLOGIES

Second Semester – Summative #2


Academic Year 2019 - 2020

NAME: ____________________________ SCORE:


GRADE/ YR.: ______________________

MATCHING TYPE: Match Column A with Column B. Write the letter of the correct answer on the
space
before each number.

A B
___________ 1. Virus a. Designed to send you advertisements
___________ 2. Rogue b. Sends an official – looking email and is
designed to steal sensitive personal
information
___________ 3. Keylogger c. A provision that allows you to use
copyrighted work without consent with
certain limitations
___________ 4. Adware d. A browser feature that is synonymous
to “private” browsing
___________ 5. Spam e. Replicates and can transfer from one
computer to another
___________ 6. Phishing f. Exploits the DNA system
___________ 7. Fair use g. States that anyone who uses your work
without your consent is punishable by
law
___________ 8. Spyware h. Runs in the background and monitors
what you are doing
___________ 9. Private i. Unwanted email mostly from bots
___________ 10. Malware j. Disguised as a useful program but is not
___________ 11. Incognito k. The information superhighway
___________ 12. Internet l. Tricks the user into posing that it is a
security software
___________ 13. Trojan m. A malicious software
___________ 14. Copyright n. An option to hide a post so that search
engines could not scan it
___________ 15. Pharming o. Used to record the keystrokes done by
the user

Answer the following: (5 points each)

1. Do you agree with the provisions of the copyright law? Defend your answer.
2. How would you feel if someone posted something embarrassing about you? What would
you do?

3. Enumerate the 3 internet threats and explain each.

4. Give tips in conducting online research.

5. How to avoid copyright infringement?

Das könnte Ihnen auch gefallen