I. MATCH THE TERMS WITH THEIR DEFINITIONS
1) Pharming …
2) Malware …
3) Clickjacking …
4) Spam …
5) Phishing …
6) Virus …
7) Spyware …
8) Trojan Horse …
9) Browser Hijacking …
10) Hoax …
11) Mousetrapping …
a) A self-replicating software program that is designed to infect a computer by rapidly spreading from one file to another sometimes causing great harm. It is spread by humans when they copy or add email attachments to infected files. *Worms are similar, except they are usually spread over the network without human help.
b) A technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web page. Users think they are clicking on buttons or links on a legitimate page, when in reality they are clicking on the concealed links in the hidden page and often providing access to confidential information in the process.
c) A technique used to redirect a legitimate website’s traffic to another illegitimate website in order to gain access to a user’s personal information.
d) A type of malware that collects information about users without their knowledge, often to track browsing habits and to create pop-up advertisements. It can also sometimes interfere with your computer’s functions. It can be attached to malicious adware or freeware that is privacy-invasive.
e) An email chain letter that warns of impending viruses and tries to scare users into forwarding it.
f) An intentionally malicious software or code that is designed to damage your computer or collect information without your knowledge. It includes viruses, trojan horses, worms, spyware and keystroke logging snoopware, and sometimes adware and freeware.
g) It occurs when malware or spyware replaces your browser’s home page with its own in order to force more hits to a particular website.
h) It’s a technique, commonly used by pornographic sites, that keeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop or re-launching their website in a window that can’t be closed.
i) Mail or instant message scams that are disguised to look like official communications from a legitimate website. They fool users into providing sensitive information like passwords, credit card details, etc.
j) Malware that appears to be benign o desirable and thus tricks the user into allowing the program access to their computer, usually through a download or email attachment.
k) Unsolicited email or junk mail.
" Life is not a problem to be solved but a reality to be experienced! "
© Copyright 2013 - 2024 KUDO.TIPS - All rights reserved.
1 G
2 C
3 B
4 K
5 I
6 A
7 D
8 F
9 J
10 E
11 H
1.G
2.C
3.B
4.K
5.I
6.A
7.D
8.F
9.J
10.E
11.H