
ONLINE SECURITY, SAFETY, AND ETHICS IN ICT
Authored by EDGAR DAQUIOAG
Computers
9th - 12th Grade
Used 29+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
It is a crime committed or assisted through the use of the internet.
CYRIMCREBE
(a)
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
It tells the user how the website will handle its data.
PACIVRY POLYCI
(a)
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
It stands for malicious software.
WALRAMES
(a)
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
It is a malicious program designed to replicate itself and transfer from one computer to another.
RIVSU
(a)
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
This refers to a malicious program that disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
JORTAN
(a)
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
It is a program that runs in the background without you knowing it and has the ability to monitor what you are currently doing and typing through keylogging.
SYRAPWE
(a)
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
This acquires sensitive personal information like passwords and credit card details.
PHIGSHIN
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?