Você está na página 1de 3

Santiago Delmo Memorial High School

Maluay, Zamboanguita, Negros Oriental

Name: ___________________________________ Date: ________________

* Instruction: Read each statement or question below carefully and fill in the blank with the correct
answer.

______________________ 1. uses the internet web technologies to deliver information and services to
users or other information systems / application.
______________________ 2. creates a foundation that ensures object code will execute successfully.

______________________ 3. a platform for all the users which are connected to it.

______________________ 4. you can send and receive messages, emails and you can also chat and
make online calls.
______________________ 5. you can send and receive money online.

______________________ 6. you can get update of news and latest events without purchasing
newspapers.
______________________ 7. you can start your online business and can also perform online marketing
of your product
______________________ 8. you can learn online by searching on your required material or learn
through distance learning.
______________________ 9. consists of hardware, an operating system and coordinating programs that
use the instruction set for a particular processor or microprocessor.
______________________ 10. a big network which is formed by connecting multiple small networks.

______________________ 11. current action that could cause a loss of/damage to computer hardware,
software, data, information or processing capability.
______________________ 12. Vulnerable computer that is set up to entice an intruder to break into it.

______________________ 13. Is an online/internet-based illegal act.

______________________ 14. Are the brain of the cybercrime.

______________________ 15. The ones who intrude the system.

______________________ 16. Use existing and easy-to-find programs.

______________________ 17. Spies that spy on another company.

______________________ 18. Go against the company they work for.

______________________ 19. Disrupts computer access to internet services.

______________________ 20. Program/set of instructions in a program that allows users to bypass


security controls.
______________________ 21. Technique intruders use to make their network or Internet transmission
appear legitimate.
______________________ 22. Hardware/and or software that protects a networks resources from
intrusion.
______________________ 23. Using a computer/network without permission.

______________________ 24. Using a computer or it's data for unapproved/possibly illegal activities.

______________________ 25. Authenticates a person’s identity by translating a personal characteristic


into a digital code that's compared with a digital code in the computer.
______________________ 26. Discovery, collection & analysis of evidence found on computers and
networks.
______________________ 27. Act of stealing computer equipment.
Santiago Delmo Memorial High School
Maluay, Zamboanguita, Negros Oriental

______________________ 28. Defacing/destroying computer equipment.

______________________ 29. When someone steals personal or confidential information.

______________________ 30. Converting readable data into unreadable characters to prevent


unauthorized access.

* Instruction: Read each statement or question below carefully and encircle the correct answer.

1. A software system used to gather information in the World Wide Web.


A. Search Engine B. Currency
C. Security D. Scope

2. Uses the internet web technologies to deliver information and services to users or other information
systems / application.
A. online system B. platform
C. internet D. collaboration platform

3. Creates a foundation that ensures object code will execute successfully.


A. online system B. platform
C. internet D. collaboration platform

4. A platform for all the users which are connected to it.


A. online system B. platform
C. internet D. collaboration platform

5. Current action that could cause a loss of/damage to computer hardware, software, data, information
or processing capability.
A. COMPUTER SECURITY RISK B. Honeypot
C. CYBERCRIME D. Hackers

6. Vulnerable computer that is set up to entice an intruder to break into it.


A. COMPUTER SECURITY RISK B. Honeypot
C. CYBERCRIME D. Hackers

7. You can send and receive messages, emails and you can also chat and make online calls.
A. online system B. platform
C. internet D. collaboration platform

8. Is an online/internet-based illegal act.


A. COMPUTER SECURITY RISK B. Honeypot
C. CYBERCRIME D. Hackers

9. Are the brain of the cybercrime.


A. COMPUTER SECURITY RISK B. Honeypot
C. CYBERCRIME D. Hackers

10. Spies that spy on another company.


A. Corporate Spies B. Unethical Employees
C. Cyberterrorists D. Denial of service attack

11. Go against the company they work for.


A. Corporate Spies B. Unethical Employees
C. Cyberterrorists D. Denial of service attack
Santiago Delmo Memorial High School
Maluay, Zamboanguita, Negros Oriental

12. Blackmails involved with politics.


A. Corporate Spies B. Unethical Employees
C. Cyberterrorists D. Denial of service attack

13. Disrupts computer access to internet services.


A. Corporate Spies B. Unethical Employees
C. Cyberterrorists D. Denial of service attack

14. Program/set of instructions in a program that allows users to bypass security controls.
A. Backdoor B. Spoofing
C. Firewall D. Unauthorized access

15. Technique intruders use to make their network or Internet transmission appear legitimate.
A. Backdoor B. Spoofing
C. Firewall D. Unauthorized access

16. Hardware/and or software that protects a networks resources from intrusion.


A. Backdoor B. Spoofing
C. Firewall D. Unauthorized access

17. Using a computer/network without permission.


A. Backdoor B. Spoofing
C. Firewall D. Unauthorized access

18. Using a computer or it's data for unapproved/possibly illegal activities.


A. Unauthorized use B. Biometric device
C. Hardware theft D. Hardware vandalism

19. Authenticates a person’s identity by translating a personal characteristic into a digital code that's
compared with a digital code in the computer.
A. Unauthorized use B. Biometric device
C. Hardware theft D. Hardware vandalism

20. Act of stealing computer equipment.


A. Unauthorized use B. Biometric device
C. Hardware theft D. Hardware vandalism

Você também pode gostar