worries
number
someone
Cyber
friends'
sender'
help
isolates
'secret
see
explore
don't
added
address
content
address
variety
trojan
don't
should
wouldn't
person
sending
it
launch
addressed
check
computer
computer
conversation
download
programmes
reduplicates
sent
mailing
functionalities
misleading
parts
horse
free
'To
hard
software
don't
intent
attached
Don't
attacks
'Malware'
else
infecting
amend
executable
contact
viruses
manners
meet
open
see
computer
proofread
whole
hosting
longer
online
threatening
write
explain
field
person
Quarantine
hack
specify
files
become
attachments
earlier
fill
system
infecting
ICT
needs
quarantine
antivirus
intrusive
Never
external
about
used
Open
personal
Don't
skills
electronic
destroying
email
make
see
Part
1
:
Internet
Safety
and
Security
.
____________________
give
out
____________________
information
such
as
your
____________________
or
phone
____________________
.
Don't
____________________
emails
or
____________________
from
people
you
____________________
know
.
Don't
____________________
online
?
____________________
with
people
you
____________________
know
.
____________________
arrange
to
____________________
someone
in
____________________
who
you've
met
____________________
.
If
anything
you
____________________
or
read
online
____________________
you
,
tell
someone
about
____________________
.
____________________
is
an
umbrella
term
used
to
refer
to
a
____________________
of
forms
of
hostile
or
____________________
software
,
including
computer
____________________
,
worms
,
____________________
horses
and
other
malicious
____________________
.
It
can
take
the
form
of
____________________
code
,
scripts
,
active
____________________
,
and
other
software
.
In
computing
,
Trojan
____________________
,
or
Trojan
,
is
any
malicious
____________________
programme
which
is
used
to
____________________
into
a
____________________
by
____________________
users
of
its
true
____________________
.
A
____________________
virus
is
a
piece
of
malware
that
,
once
executed
,
____________________
itself
and
then
____________________
your
computer
by
____________________
programmes
,
corrupting
the
____________________
or
____________________
data
.
____________________
is
a
function
of
____________________
software
that
____________________
infected
____________________
on
a
computer's
____________________
disk
.
Files
put
in
____________________
are
no
____________________
capable
of
____________________
their
____________________
system
.
____________________
bullying
the
use
of
____________________
communication
to
bully
a
____________________
,
typically
by
____________________
messages
of
an
intimidating
or
____________________
nature
.
Part
2
:
Emails
.
The
____________________
.
.
.
'
field
allows
you
to
____________________
where
the
email
is
going
to
be
____________________
to
.
Here
you
put
someone's
____________________
address
.
The
'Cc
.
.
.
'
field
you
will
have
to
fill
in
whenever
there
is
somebody
____________________
(
apart
from
you
and
the
person
you
put
in
the
first
field
)
that
the
____________________
relates
to
and
so
,
they
____________________
be
included
in
the
____________________
list
.
'Bcc
.
.
.
'
stands
for
a
____________________
____________________
and
will
be
____________________
if
there
is
____________________
else
,
who
you
____________________
like
others
to
____________________
,
and
who
____________________
to
get
this
message
,
e
.
g
.
you
might
need
to
send
an
____________________
email
and
include
an
internal
email
____________________
that
you
don't
want
the
receiver
to
____________________
.
And
don't
forget
to
____________________
in
the
'Subject'
____________________
.
Here
you
should
briefly
____________________
what
the
email
is
____________________
.
Not
only
is
it
good
____________________
of
emailing
but
also
may
____________________
you
to
get
a
reply
____________________
.
____________________
rush
through
this
section
and
____________________
sure
you
have
____________________
all
its
____________________
,
e
.
g
.
double
____________________
whether
you
have
____________________
files
where
necessary
or
____________________
people
to
the
mailing
____________________
list
.
Part
3
:
Word
processing
.
Word
processing
____________________
apply
to
the
____________________
of
the
____________________
exam
.
You
are
expected
to
be
able
to
____________________
all
the
documents
and
____________________
them
accordingly
.
Hence
it
may
be
really
useful
to
____________________
your
Word
,
____________________
a
short
document
and
____________________
all
the
____________________
of
this
programme
.
Remember
that
if
you
____________________
have
Microsoft
Office
,
you
should
____________________
____________________
Office
package
that
offers
all
the
____________________
you
need
to
use
during
your
exam
and
is
____________________
of
charge
.