Yllana Bay View College Balangasan District Pagadian City: "The Builder of Future Leaders"
Yllana Bay View College Balangasan District Pagadian City: "The Builder of Future Leaders"
Directions: Read and understand the test. Write your answer in your booklet. Any forms of alterations, erasures and
tearing of booklet will be considered as wrong. Use black pen in answering the questions.
1. It focuses on intercepting data such as passwords, user names, e-mail messages, and even secret data using
sniffing software.
2. An electronic machine, operating under the control of instructions stored in its own memory that can accept data
(input) manipulate the data according to specified rules (process, product results (output) and store the results for
future use.
3. This is a global array of computers connected by a high speed reliable network.
4. It attempts to cause harm to computer systems by explaining system faults and vulnerabilities.
5. It is one of the most lucrative business that are growing today in cyber space.
6. Means as deliberately destroying or damaging property of another.
7. An act of imputing any person with intent to lower the person in the estimation of the right-thinking members of
society generally or to cause him to be shunned or avoided or to expose him to hatred, contempt or ridicule.
8. It includes the hosting of web site containing these prohibited materials.
9. This is done by gaining access to the login ID and the password.
10. This term is derived from the term hi jacking.
11. Programs that attack themselves to a computer or a file and then circulate themselves to other files and to other
computers on a network.
12. This offense, the hacker gains access and control over the website of another.
13. It involves following a person’s movement across the internet by posting messages on the bulletin boards
frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victims
with emails.
14. Any lawful act by which the owner is deprived completely or partially of his rights.
15. Occurs when a person uses the internet to steal someone’s identity and/or impersonate them to open a new credit
card account or conduct some financial transactions.