Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
14 views

Module 4

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Module 4

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ILOCOS SUR

POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE II

INTENDED LEARNING ACTIVITY – MODULE 4


NAME: Edralin B. Dalgo Jr. DATE:

COURSE AND YEAR: BSHM 1-D SCORE: ________

Direction: Look at the following images and create a hashtag based on the type of online
threat represented by each image (10 points).

1. #ICanSeeYou 2. #ClickBait

3. #AntiVirus 4. #NowhereToHide

5. #GiveMeYourMoney

Course Code: GEN ED ELECT 101


Descriptive Title: LIVING IN THE IT ERA
Instructor: CLARIZA G. VALDEZ, MIT
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE II

ASSESSMENT – MODULE 4

NAME: Edralin B. Dalgo Jr. DATE:

COURSE AND YEAR: BSHM 1-D SCORE: ________

IDENTIFICATION: Read the questions carefully. Write your answer before the
number.

Malicious Software 1. Malware is a short term used for .

Lock screen Ransomware 2. It displays an image that prevents you from


accessing your computer.

Pharming 3. is a common type of online fraud.

Internet Etiquette. 4. Netiquette is a short term used for .

Spam. 5.The mass distribution of unsolicited messages, advertising or


pornography to addresses which can be easily found on the internet.

Spyware and Adware 6. and are often used by third parties


to infiltrate your computer.

Trojan Horses 7. It is an executable file that will install itself and run
automatically once it’s downloaded.

Viruses 8. Malicious computer programs that are often sent as an email


attachment or a download with the intent of infecting your computer.

Spam 9. It is one of the more common methods of both sending information


out and collecting it from unsuspecting people.

Netiquette 10. It is a set of rules for behaving properly online.

Ransomware 11. A type of malware that restricts access to your computer or


your files and displays a message that demands payment for the restriction to
be removed.

Pharming 12. A means to point you to a malicious and illegitimate


website by redirecting the legitimate URL.

Worms 13. are common threat to computer and the internet as a


whole.

Course Code: GEN ED ELECT 101


Descriptive Title: LIVING IN THE IT ERA
Instructor: CLARIZA G. VALDEZ, MIT
ILOCOS SUR
POLYTECHNIC STATE
Candon Campus
COLLEGE

MODULE II

Hacking 14. Action taken by someone to gain unauthorized access to a


computer.

Encryption Ransomware 15. It encrypts files on your system’s hard drive


and sometimes on shared network, drives, USB drives, and external hard
drives and even some cloud storage drives preventing you from opening them.

Spyware and Adware 16. They often come in the form of a free download
and are installed automatically with or without your consent.

Trojan Horses 17. A malicious program that is disguised as or embedded


within legitimate software.

Wi-Fi Eavesdropping 18. Virtual listening in on your information that’s


shared over an unsecured or not encrypted network.

Netiquette 19. It is the proper way to communicate in an online environment.

Spyware and Adware 20. Software that collects personal information about
you without you knowing it.

Course Code: GEN ED ELECT 101


Descriptive Title: LIVING IN THE IT ERA
Instructor: CLARIZA G. VALDEZ, MIT

You might also like