E_TECH
Learning Activity 2
________ is your alias, which is used by websites to represent your online presence.
Username
________ is a browser add-on that prevents ads from being displayed in your browser.
Ad blocker
Which of the following is safe practice?
Use a combination of letters, numbers, and symbols as a password.
Which of the following is NOT a safe practice?
Submitting your phone number every time you are asked.
________ is a secret group of characters used to unlock your account
Password
Short Quiz 1
Which of the following can contain malware?
Emails
Downloads
All #
Installers
You receive an email saying you won an iPhone. When you click the link in the email, you were asked to
enter your credit card number. This is called _____
Phishing #
Bootlegging
Pharming
Spamming
Which of the following is NOT true?
Adware programs can cause your system to slow down
A worm will automatically spread and copy itself
Some types of malware can spread through offline means such as flash drives and local area network
A spam is a type of virus #
_____ is a type of malware that is disguised as a harmless or useful program or file
Trojan #
Spam
Adware
Worm
You had to enter your email address in order to play a free game. A few days later, you started receiving
multiple emails with links to other free games and downloads. You have been a victim of _____
Adware
Trojan
Phishing
Spam #
Which of the following should not be shared with anyone?
Username
Password #
Phone number
Email address
_____ is a program that is designed to cause harm to your computer or device
Virus #
Bacteria
Phishing
Spam
Your computer became slow and unresponsive after you opened a file named 100freemp3s.exe. this fie
is probably a _____
Trojan
Spam
Worm #
Adware
Which of the following in not a malware?
Worm
Trojan
Adware
Ad blocker #
Random pop-ups and advertisements started appearing in your screen after you installed a free
program. This is caused by _____ attached to the program.
Hardware
Software
Firmware
Adware #
Which of the following CANNOT infect your computer?
Spam #
Worm
Virus
Trojan
Malware is short for _____
Malicious software #
Malicious hardware
Malignant software
Malignant hardware
Which of the following does not need human action to spread?
Trojan
Worm #
Phishing
Spam
Tricking people to submit their personal details is called _____
Phishing #
Worm
Trojan
Spam
Which of the following statement is true?
No one can steal your personal information without asking for permission
Usernames are used to determine if you are old enough to access certain contents and features in the
internet
A computer virus can spread whenever a computer makes contact with another computer #
Like a virus, spam can make copies of itself in computers that it comes in contact with