Uploaded by Luchavez, John Paul G.

ass 4.docx

advertisement
John Dominique S. Moguel
BS Entrepreneurship 2-9
Assignment #4
IDENTIFICATION: Read the questions carefully. Write your answer before the number.
Malicious software 1. Malware is a short term used for _________.
Malware 2. It displays an image that prevents you from accessing your computer.
Pharming 3. _______ is a common type of online fraud.
Etiquette 4. Netiquette is a short term used for _______.
Spam 5. The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the internet.
Spyware and Adware 6. ______ and ______ are often used by third parties to infiltrate your
computer.
Trojan Horses 7. It is an executable file that will install itself and run automatically once
it’s downloaded.
Viruses 8. Malicious computer programs that are often sent as an email
attachment or a download with the intent of infecting your computer.
Spam 9. It is one of the more common methods of both sending information out
and collecting it from unsuspecting people.
Ten Commandments of Computer Ethics 10. It is a set of rules for behaving properly online.
Ransomware 11. A type of malware that restricts access to your computer or your files
and displays a message that demands payment for the restriction to be removed.
Pharming 12. A means to point you to a malicious and illegitimate website by
redirecting the legitimate URL.
Worms 13. _______ are common threat to computer and the internet as a whole.
Hacking 14. Action taken by someone to gain unauthorized access to a computer.
Ransomware 15. It encrypts files on your system’s hard drive and sometimes on shared
network, drives, USB drives, and external hard drives and even some cloud storage drives
preventing you from opening them.
Spyware and Adware 16. They often come in the form of a free download and are installed
automatically with or without your consent.
Trojan Horses 17. A malicious program that is disguised as or embedded within
legitimate software.
Wi-Fi Eavesdropping 18. Virtual listening in on your information that’s shared over an unsecured
or not encrypted network.
Spam 19. It is the proper way to communicate in an online environment.
Spyware and Adware 20. Software that collects personal information about you without you
knowing.
This study source was downloaded by 100000790975532 from CourseHero.com on 10-09-2022 12:06:27 GMT -05:00
https://www.coursehero.com/file/103439202/ass-4docx/
Powered by TCPDF (www.tcpdf.org)
Download