The Kind of Online Threats
The Kind of Online Threats
WHAT CAN I DO
ACTIVITY 2.3: Show Me How You Hashtag
Direction: Look at the following images and create a hashtag based on the type of
online threat represented by each image. Write your answers in your activity notebook.
1. #_______________________
2. # _____________________
3. # ________________________ 4. # _____________________
Image source: http://www.upgrademag.com/web/2018/07/18/entry-of-3rd-
telco-player-to-benefit-consumers-says-globe-telecom/
5. # ___________________________
______________________________________________________________________
______________________________________________________________________
____________________________________________________________
ASSESSMENT
Directions: Read each item carefully and choose the letter of the correct answer.
Write your answers on a separate sheet of paper or in your notebook.
1. What type of malicious program is designed to replicate itself and transfer from
one computer to another either through the internet or local networks or data
storage like flash drives and CDs?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
2. What harmful online programs are designed to send you advertisements, mostly
pop-up ads?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware
3. What harmful online program is used to record keystrokes done by users to steal
passwords?
A. Adware C. Worms and Virus
B. Spyware D. Ransomeware