Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Name:

ACTIVITY 1. Show Me How You Hashtag


Directions: Look at the following images and create a hashtag based on
the type of online threat represented by each image. Write your answers
in your activity notebook.

Image source: https://www.avg.com/en/signal/what-is-spyware Image source: https://itigic.com/tag/adware/

1. _______________________ 2. ________________________

https://dlpng.com/png/6702600 Image source: https//:www.gtmaritime.com/free-phising-penetration-test

3. ______________________ 4. ________________________

5. ________________________

ACTIVITY 2.
Directions. Reflect on this and write your answers in your answer sheet.

From all you have learned in Lesson 2, why is there a need to “think
before you click?”

1
Image source: https://shieldguide.wordpress.com/2017/03/12/think-
before-you-click/

ASSESSMEN
T Read each item carefully and choose the letter of the correct
Directions:
answer. Write your answers in your notebook.

1. What type of malicious program is designed to replicate itself and


transfer from one computer to another either through the internet or
local networks or data storage like flash drives and CDs?
a. Adware c. Worms and Virus
b. Spyware d. Ransomware

2. What harmful online programs are designed to send you


advertisements, mostly pop-up ads?
a. Adware c. Worms and Virus
b. Spyware d. Ransomware

3. What harmful online program is used to record keystrokes done by


users to steal passwords?
a. Adware c. Worms and Virus
b. Spyware d. Ransomware

4. What is ransomware based on?


a. Fear of hackers c. Fear of spyware
b. Fear of the Internet d. Fear of losing important files

5. Which of the following is an example of a “phishing” attack?


a. Sending someone an email that contains a malicious link that is
disguised to look like an email from someone reliable.
2
b. Creating a fake website that looks nearly identical to a real website
in order to trick users into entering their login information.
c. Sending someone a text message looks like a notification that the
person has won a contest.
d. Sending someone an email that records their keystroke activities
while using their computers.

6. Which of the following must NOT be done if you received an


embarrassing picture from your friend?
a. Tell your parents or teachers
b. Send the picture on to other friends
c. Talk to your friend about its negative outcomes.
d. Discourage your friend from sending pictures like that.

7. What is a flame in cyberspace?


a. A person who follows the rules of Netiquette.
b. An expert programmer.
c. An online chain letters.
d. A post or email message that expresses a strong opinion or
criticism.

8. What is considered shouting over the Internet?


a. Screaming at your computer.
b. Writing in all CAPS.
c. Putting a lot of exclamation marks at the end of a sentence.
d. Not answering a friend request on Facebook.

9. To avoid being cyber-bullied you should always...


a. Give out personal information to anyone who asks.
b. Strike first - post mean things about other people on your Wall on
Facebook.
c. Observe proper netiquette rules.
d. Ignore any requests from people to be your friend online.

10. How are you judged in cyberspace?


a. No one can see you, so no one can judge you.
b. You are judged by what you do on the Internet and how it looks - by
your spelling, grammar, and netiquette.
c. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it's okay.
d. You judged by how you look - your profile picture is important.

You might also like