Anda di halaman 1dari 1

Name:_________________________________ Score:________ Name:_________________________________ Score:________

Section:_______________ Date:_______________ Section:_______________ Date:_______________

Post-Test Post-Test
Matching Type: Match Colum A with Column B. Write the letter of Matching Type: Match Colum A with Column B. Write the letter of
the correct answer on the space before each number. the correct answer on the space before each number.

A B A B
____1. virus a. Designed to send you advertisements ____1. virus a. Designed to send you advertisements
____2. rogue b. Sends an official-looking email and is ____2. rogue b. Sends an official-looking email and is
designed to steal sensitive personal designed to steal sensitive personal
information information
____3. keylogger c. A provision that allows you to use ____3. keylogger c. A provision that allows you to use
copyrighted work without consent with copyrighted work without consent with
certain limitations certain limitations
____4. adware d. a browser feature that is synonymous to ____4. adware d. a browser feature that is synonymous to
“private” browsing “private” browsing
____5. spam e. Replicates and can transfer from one ____5. spam e. Replicates and can transfer from one
computer to another computer to another
____6. phishing f. Exploits the DNS system ____6. phishing f. Exploits the DNS system
____7. fair use g. States that anyone who uses your work ____7. fair use g. States that anyone who uses your work
without your consent is punishable by law without your consent is punishable by law
____8. spyware h. Runs in the background and monitors what ____8. spyware h. Runs in the background and monitors what
you are doing you are doing
____9. private i. Unwanted email mostly from bots ____9. private i. Unwanted email mostly from bots
____10. malware j. Disguise as a useful program but is not ____10. malware j. Disguise as a useful program but is not
____11. incognito k. The information superhighway ____11. incognito k. The information superhighway
____12. internet l. Tricks the user into posing that it is a ____12. internet l. Tricks the user into posing that it is a
security software security software
____13. trojan m. A malicious software ____13. trojan m. A malicious software
____14. copyright n. An option to hide post so that search ____14. copyright n. An option to hide post so that search
engines could not scan it engines could not scan it
____15. pharming o. Used to record the keystrokes done by the ____15. pharming o. Used to record the keystrokes done by the
user user

Anda mungkin juga menyukai