QUIZ NUMBER 2 412568 for subject empowerment technologies.pptx

RobertCarreonBula 0 views 9 slides Oct 13, 2025
Slide 1
Slide 1 of 9
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9

About This Presentation

QUIZ NUMBER 2 412568 for subject.pptx


Slide Content

QUIZ NUMBER 2 Empowerment Technologies

True or False 1.Cyberbullying is the use of electronic communication to bully someone. 2. Sharing your birthday on the Internet poses no risk to your identity. 3. A Trojan is a malicious software disguised as a useful program. 4. The Cybercrime Prevention Act of 2012 is also known as Republic Act No. 10175. 5. Copyright infringement is allowed as long as you are not making money from it.

Identification 1.It refers to the act of illegally copying and selling digital content like music and videos. 2.This type of malware pretends to be a security software to trick users into paying for fake protection. 3.A law in the Philippines that addresses legal issues concerning online interactions and cybercrime. 4.This is the practice of registering a domain name in bad faith to sell it at an inflated price. 5..The acceptable way of communicating online, combining "network" and "etiquette."

Multiple choice 1. What does the term "Phishing" refer to? a. Playing games online b. Attempting to gain sensitive info by pretending to be trustworthy c. Sending spam messages d. Copying music files illegally

Multiple choice 2.Which of the following is considered cybercrime under RA 10175? a. Researching on Google b. Sending birthday greetings c. Identity theft d. Installing antivirus software

Multiple choice 3.What should you avoid sharing online to protect your identity? a. Favorite color b. Mother's maiden name c. Favorite movie d. School project

Multiple choice 4.Which of the following is NOT a type of malware? a. Worm b. Spyware c. Adware d. Firewall

Multiple choice 5.What is the best practice to avoid copyright infringement? a. Use any material if it doesn't have a copyright sign b. Rewrite someone else's work without citing c. Give credit to the original creator d. Avoid using any material found online

Enumeration Enumerate the 5 types of malware