0% found this document useful (0 votes)
5 views3 pages

1st summative test in 2nd quarter etech

The document is a Periodical Exam for Empowerment Technologies from the Department of Education in the Philippines, featuring multiple-choice questions on topics related to cybercrime, malware, and copyright law. It includes questions about definitions and characteristics of various cyber threats and legal concepts. Additionally, there are essay questions asking for the disadvantages of ICT and a list of common internet cybercrimes.

Uploaded by

Foreign Mar Po
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views3 pages

1st summative test in 2nd quarter etech

The document is a Periodical Exam for Empowerment Technologies from the Department of Education in the Philippines, featuring multiple-choice questions on topics related to cybercrime, malware, and copyright law. It includes questions about definitions and characteristics of various cyber threats and legal concepts. Additionally, there are essay questions asking for the disadvantages of ICT and a list of common internet cybercrimes.

Uploaded by

Foreign Mar Po
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Republic of the Philippines

Department of Education
Region VI-Western Visayas
DIVISION OF SAN CARLOS CITY
San Carlos City, Negros Occidental

PERIODICAL EXAM IN SECOND QUARTER


Empowerment Technologies

I. DIRECTION: Multiple Choice; Answer Directly.


1. A Crime committed through the use of internet an act of harassment using electronic means.
A. Cyber Crime B. Cyber Sex C. Cyber Libel D. Cyber Bullying
2. Tells the user how the website will handle its data
A. Private Policy B. Privacy Policy C. Public Policy D. Policy Privacy
3. Stand for malicious software
A. Malware B. Moleware C. Malwire D. Malwares
4. A malicious program designed to replicate itself and transfer from one computer to another
A. Trojan B. Worm C. Virus D. Rogue
5. A malicious program that transfers from one computer to another by any type of means
A. Worm B. Trojan C. Virus D. Malware
6. A malicious program that is disguised as a useful program, leaves PC unprotected and allows hackers to get your
information.
A. Trojan B. Spyware C. Adware D. worm
7. A program that runs in the background without you knowing it, it has the abilty to monitor and typing through keylogging.
A. Spyware B. Malware C. Aware D. Keylogger
8. A program designed to send you advertisements, mostly pop-ups
A. Adware B. Advertisement C. TVC D. Malware
9. Unwanted email mostly from bots or advertisers
A. Spam B. Adware C. fair use D. Pharming
10. Acquires sensitive personal information like passwords and credit card details
A. Pharming B. Pharmer C. Copyright D. Phishing
11. A more Complicated way of phishing that exploits DNS ( Domain Name Service) system
A. Phishing B. Fishing C. Pharming D. NBI
12. A Part of the law wherein you have the rights to your work and anyone who uses it without your consent is punishable by
law.
A. Copyright Domain B. Copyright C. Fair Use D. Copyright Law
13. Intellectual property may be used without a consent as long as it is used in commentaries, criticisms, search engines,
parodies, news, reports, research, library archiving, teaching and education.
A. Copyright Law B. Copy Right C. Fair Use D. Use Fair
14. Used to Record the keystrokes done by the user.
A. Keylogg B. Keylogger B. Rogue D. Keylog
15. Tricks the user into posing tat is a security software
A. Rogue Security Software B. Rogue C. Software D. User

III. ESSAY 30 points each

1. What is the disadvantages of ict?


2. What is Cybercrime? Give a list 10 most common Internet cybercrime.
MOVS LEARNING ACTION CELL
AND SLAC
CLASS OBSERVATION 2

You might also like