0% found this document useful (0 votes)
11 views3 pages

Spyware Quiz Grade 11

This document appears to be a quiz about technology and media terms. It consists of 25 multiple choice questions testing knowledge on topics like: types of social media (e.g. Facebook, Twitter), operating systems (e.g. iOS), internet terminology (e.g. website, URL), and security threats (e.g. viruses, spam). For each question there are 4 possible answers to choose from. Students are to choose the correct answer and write it in the provided blank for each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views3 pages

Spyware Quiz Grade 11

This document appears to be a quiz about technology and media terms. It consists of 25 multiple choice questions testing knowledge on topics like: types of social media (e.g. Facebook, Twitter), operating systems (e.g. iOS), internet terminology (e.g. website, URL), and security threats (e.g. viruses, spam). For each question there are 4 possible answers to choose from. Students are to choose the correct answer and write it in the provided blank for each question.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: Score: Name: Score:

Grade & Section: Date: Grade & Section: Date:


Choose the letter of the correct answer and write it on the blank. Choose the letter of the correct answer and write it on the blank.
1. This media is designed to help people who have visual and 1. This media is designed to help people who have visual and
hearing impairments. hearing impairments.
a. Assistive media b. Long tail c. Facebook d. Blogger a. Assistive media b. Long tail c. Facebook d. Blogger
2. It is dubbed as the ICT hub of Asia. 2. It is dubbed as the ICT hub of Asia.
a. Hongkong b. Philippines c. Singapore d. Vietnam a. Hongkong b. Philippines c. Singapore d. Vietnam
3. An interconnected system of public webpages accessible 3. An interconnected system of public webpages accessible
through the internet. through the internet.
a. World Wide Web b. Browser c. Website d. URL a. World Wide Web b. Browser c. Website d. URL
4. This is a type of social media that allow users to post their 4. This is a type of social media that allow users to post their
own news items or links to other news sources. own news items or links to other news sources.
a. Social networks b. Social news c. Blogs d. Forums a. Social networks b. Social news c. Blogs d. Forums
5. This is the operating system used in iPhones. 5. This is the operating system used in iPhones.
a. Android b. Symbian c. Blackberry OS d. iOS a. Android b. Symbian c. Blackberry OS d. iOS
6. Twitter is a social media site that can be classified as 6. Twitter is a social media site that can be classified as
a. Media sharing b. Microblogging c. Blog d. Social news a. Media sharing b. Microblogging c. Blog d. Social news
7. A feature of Web 2.0 in which a user can give a feedback to a 7. A feature of Web 2.0 in which a user can give a feedback to a
certain product. certain product.
a. User participation c. Mass participation a. User participation c. Mass participation
b. Rich user experience d. Folksonomy b. Rich user experience d. Folksonomy
8. This type of social media allows user to download videos 8. This type of social media allows user to download videos
from a website. from a website.
a. Blogs and forums ` c. Social News a. Blogs and forums ` c. Social News
b. Bookmarking sites d. Media sharing b. Bookmarking sites d. Media sharing
9. Facebook is a type of social media website that can be 9. Facebook is a type of social media website that can be
classified as . classified as .
a. Microblogging b. Media sharing c. Social networks d. Social news a. Microblogging b. Media sharing c. Social networks d. Social news
10. This is a read-only webpage. 10. This is a read-only webpage.
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0 a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0
Parent’s Name & Signature: Parent’s Name & Signature:

Name: Score: Name: Score:


Grade & Section: Date: Grade & Section: Date:
Choose the letter of the correct answer and write it on the blank. Choose the letter of the correct answer and write it on the blank.
1. This media is designed to help people who have visual and 1. This media is designed to help people who have visual and
hearing impairments. hearing impairments.
a. Assistive media b. Long tail c. Facebook d. Blogger a. Assistive media b. Long tail c. Facebook d. Blogger
2. It is dubbed as the ICT hub of Asia. 2. It is dubbed as the ICT hub of Asia.
a. Hongkong b. Philippines c. Singapore d. Vietnam a. Hongkong b. Philippines c. Singapore d. Vietnam
3. An interconnected system of public webpages accessible 3. An interconnected system of public webpages accessible
through the internet. through the internet.
a. World Wide Web b. Browser c. Website d. URL a. World Wide Web b. Browser c. Website d. URL
4. This is a type of social media that allow users to post their 4. This is a type of social media that allow users to post their
own news items or links to other news sources. own news items or links to other news sources.
a. Social networks b. Social news c. Blogs d. Forums a. Social networks b. Social news c. Blogs d. Forums
5. This is the operating system used in iPhones. 5. This is the operating system used in iPhones.
a. Android b. Symbian c. Blackberry OS d. iOS a. Android b. Symbian c. Blackberry OS d. iOS
6. Twitter is a social media site that can be classified as 6. Twitter is a social media site that can be classified as
a. Media sharing b. Microblogging c. Blog d. Social news a. Media sharing b. Microblogging c. Blog d. Social news
7. A feature of Web 2.0 in which a user can give a feedback to a 7. A feature of Web 2.0 in which a user can give a feedback to a
certain product. certain product.
a. User participation c. Mass participation a. User participation c. Mass participation
b. Rich user experience d. Folksonomy b. Rich user experience d. Folksonomy
8. This type of social media allows user to download videos 8. This type of social media allows user to download videos
from a website. from a website.
a. Blogs and forums ` c. Social News a. Blogs and forums ` c. Social News
b. Bookmarking sites d. Media sharing b. Bookmarking sites d. Media sharing
9. Facebook is a type of social media website that can be 9. Facebook is a type of social media website that can be
classified as . classified as .
a. Microblogging b. Media sharing c. Social networks d. Social news a. Microblogging b. Media sharing c. Social networks d. Social news
10. This is a read-only webpage. 10. This is a read-only webpage.
a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0 a. Web 1.0 b. Web 2.0 c. Web 3.0 d. Web 4.0
Parent’s Name & Signature: Parent’s Name & Signature:
11 – 24. Choose your answer on the box below and write it on the blank. 25. Who invented world wide web.
Spyware Keylogging Internet Spam 11 – 24. Choose your answer on the box below and write it on the blank.
Rogue security Netiquette Worm Phishing Spyware Keylogging Internet Spam
software Rogue security Netiquette Worm Phishing
Adware Virus Trojans Pharmers software
11. It displays unwanted ads when a user is surfing Adware Virus Trojans Pharmers
the internet. 11. It displays unwanted ads when a user is surfing
12. This is a form of malicious software and internet the internet.
fraud that misleads users into believing there is a 12. This is a form of malicious software and internet
virus on their computer and convince them to pay fraud that misleads users into believing there is a
for a fake malware removal tool. virus on their computer and convince them to pay
13. They present themselves as harmless computer for a fake malware removal tool.
programs so that hackers can penetrate your 13. They present themselves as harmless computer
computer without being detected. programs so that hackers can penetrate your
14. It can monitor your keystrokes, read and delete computer without being detected.
your files, reformat your hard drive, and access 14. It can monitor your keystrokes, read and delete
your applications. your files, reformat your hard drive, and access
15. These are unwanted emails. your applications.
16. They usually make their way on to a computer 15. These are unwanted emails.
via a malicious email attachment or USB stick. 16. They usually make their way on to a computer
17. They are often attached to files for download, via a malicious email attachment or USB stick.
shared via CDs, DVDs, and USB sticks, or loaded 17. They are often attached to files for download,
on to computers by opening infected email shared via CDs, DVDs, and USB sticks, or loaded
attachments. on to computers by opening infected email
18. These are official-looking emails that are sent attachments.
impersonating a well-known provider, such as a 18. These are official-looking emails that are sent
bank. This is often linked to identity and intellectual impersonating a well-known provider, such as a
property theft. bank. This is often linked to identity and intellectual
19. A code of good behavior on the Internet. property theft.
20. This is defined as an information 19. A code of good behavior on the Internet.
superhighway. 20. This is defined as an information
21. They create web pages mimicking that of a superhighway.
trustworthy business, such as an online banking 21. They create web pages mimicking that of a
log-in page. trustworthy business, such as an online banking
22. This records a user’s keyboard input. log-in page.
23. This is not a direct threat but many can contain 22. This records a user’s keyboard input.
malware. 23. This is not a direct threat but many can contain
24. It leaves your computer completely malware.
unprotected. 24. It leaves your computer completely
25. Who invented world wide web. unprotected.
25. Who invented world wide web.

11 – 24. Choose your answer on the box below and write it on the blank.
Spyware Keylogging Internet Spam 11 – 24. Choose your answer on the box below and write it on the blank.
Rogue security Netiquette Worm Phishing Spyware Keylogging Internet Spam
software Rogue security Netiquette Worm Phishing
Adware Virus Trojans Pharmers software
11. It displays unwanted ads when a user is surfing Adware Virus Trojans Pharmers
the internet. 11. It displays unwanted ads when a user is surfing
12. This is a form of malicious software and internet the internet.
fraud that misleads users into believing there is a 12. This is a form of malicious software and internet
virus on their computer and convince them to pay fraud that misleads users into believing there is a
for a fake malware removal tool. virus on their computer and convince them to pay
13. They present themselves as harmless computer for a fake malware removal tool.
programs so that hackers can penetrate your 13. They present themselves as harmless computer
computer without being detected. programs so that hackers can penetrate your
14. It can monitor your keystrokes, read and delete computer without being detected.
your files, reformat your hard drive, and access 14. It can monitor your keystrokes, read and delete
your applications. your files, reformat your hard drive, and access
15. These are unwanted emails. your applications.
16. They usually make their way on to a computer 15. These are unwanted emails.
via a malicious email attachment or USB stick. 16. They usually make their way on to a computer
17. They are often attached to files for download, via a malicious email attachment or USB stick.
shared via CDs, DVDs, and USB sticks, or loaded 17. They are often attached to files for download,
on to computers by opening infected email shared via CDs, DVDs, and USB sticks, or loaded
attachments. on to computers by opening infected email
18. These are official-looking emails that are sent attachments.
impersonating a well-known provider, such as a 18. These are official-looking emails that are sent
bank. This is often linked to identity and intellectual impersonating a well-known provider, such as a
property theft. bank. This is often linked to identity and intellectual
19. A code of good behavior on the Internet. property theft.
20. This is defined as an information 19. A code of good behavior on the Internet.
superhighway. 20. This is defined as an information
21. They create web pages mimicking that of a superhighway.
trustworthy business, such as an online banking 21. They create web pages mimicking that of a
log-in page. trustworthy business, such as an online banking
22. This records a user’s keyboard input. log-in page.
23. This is not a direct threat but many can contain 22. This records a user’s keyboard input.
malware. 23. This is not a direct threat but many can contain
24. It leaves your computer completely malware.
unprotected.
24. It leaves your computer completely
unprotected.
25. Who invented world wide web.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy