0% found this document useful (0 votes)
9 views

ICT Mod 4-To-5

sdadasdad

Uploaded by

Kian Bacoto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

ICT Mod 4-To-5

sdadasdad

Uploaded by

Kian Bacoto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

BACOTO KIAN BRYLE BSED ENGLISH 3-A

Module 4: Assessment

IDENTIFICATION: Read the questions carefully. Write your answer before the number.

To infiltrate or damage your computer 1. Malware is a short term used for.


Lock screen ransomware 2. It displays an image that prevents you
from accessing your computer.
Pharming 3. is a common type of online fraud.
Behaving properly online 4. Netiquette is a short term used for.
Spam 5. The mass distribution of unsolicited
messages, advertising, or pornography to addresses which can be easily found on
the internet.
Spyware and Adware 6. and are often used by third parties to
infiltrate your computer.
Trojan Horses 7. It is an executable file that will install
itself and run automatically once it’s downloaded.
Viruses 8. Malicious computer programs that are
often sent as an email attachment or a download with the intent of infecting your
computer.
Spam 9. It is one of the more common methods
of both sending information out and collecting it from unsuspecting people.
Netiquette 10. It is a set of rules for behaving properly
online.
Ransomware 11. A type of malware that restricts access
to your computer or your files and displays a message that demands payment for
the restriction to be removed.
Pharming 12. A means to point you to a malicious
and illegitimate website by redirecting the legitimate URL.
Worms 13. are common threat to computer and the
internet as a whole.
Hacking 14. Action taken by someone to gain
unauthorized access to a computer.
Encryption ransomware 15. It encrypts files on your system’s hard
drive and sometimes on shared network, drives, USB drives, and external hard drives
and even some cloud storage drives preventing you from opening them.
Spyware and Adware 16. They often come in the form of a free
download and are installed automatically with or without your consent.
Trojan Horses 17. A malicious program that is disguised
as or embedded within legitimate software.
Wi-fi Eavesdropping 18. Virtual listening in on your information that’s
shared over an unsecured or not encrypted network.
Netiquette 19. It is the proper way to communicate in
an online environment.
Spyware and Adware 20. Software that collects personal information
about you without you knowing.
Perez, Lyka Nicole M.
BSED ENGLISH 3B

Module 5: Activities/Assessment

Essay: Read the statement/s carefully. Answer the given statement/s

concisely. Discuss how digital technology change society in the area

of:

a. Business
b. Job
c. Health
d. Lifestyle
e. Entertainment
f. Education
Answer:

Sure, here’s a simplified version:

a. Business: Computers and the internet changed how businesses work, making them
faster and more efficient.

b. Job: Computers created new jobs but also changed existing ones. People can now
work from home using computers and the internet.

c. Health: Computers and devices help doctors take care of patients better. People can
also use apps and devices to track their health.

d. Lifestyle: Computers and smartphones changed how people live. We can now do
things like shopping and talking to friends online.

e. Entertainment: Computers and the internet made it easy to watch movies and play
games online.

f. Education: Computers and the internet changed how we learn. Now we can take
classes and study online.

2. Differentiate Technological Determinism and Social Constructivism.


- Technological determinism suggests that technology drives societal change, while social
constructivism argues that society shapes the development and use of technology.

You might also like