ICT PART 2 Flashcards

1
Q

is a place on the Internet where users with
common interests interact with each other to find

A

fORUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a word or group of words that a person may use to search for in a search engine

A

Keyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are software systems that people got to search for things on the Internet.
Examples of popular search engines are Yahoo!, Google, or Bing.

A

Search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a seminar conducted over the Internet making
it possible to “virtually attend” through an Internet connection.

A

webinar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a site written, controlled, and edited by the users themselves.

A

wiki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is the page seen by the user when browsing the Internet. The webpage can be
compared to a page in a magazine.

A

webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are specific addresses of the Internet pages and files.

A

UNIFORM RESOURCE LOCATORS (URLs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a term generally applies to the transfer of data from the Internet to the
computer or mobile device.

A

downloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a broad term used to describe a protective barrier against computer bugs or viruses

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is also called cyber safety or digital safety which refers to practices and
precautions one should observe when using the Internet.

A

Online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a very broad issue covering security in relation to transactions made
over the Internet.

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It compasses the security of data entered through a web form, browser
security, and overall authentication and protection of data sent via Internet protocol.

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to a set of moral principles that govern an individual or a group on what is
considered as acceptable behavior while using a computer.

A

ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

means acceptable rules for online behavior.

A

netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

by means of a hand-held device, such as mobile phone or a tablet. This
takes place anytime and anywhere.

A

mobile learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

may also be referred to as a digital classroom where learning takes
place over the Internet and not in a physical classroom.

A

virtual classroom

17
Q

what are viruses capable of?

A

Deleting and altering files
§ Redirecting web links to web sites you don’t intend to visit
§ Copying themselves and using up resources on your computer
system

18
Q

-Standalone malware computer program that replicates
itself in order to spread to other computers.

A

worm

19
Q

It is a destructive program that pretends as a desirable application that
tricks the user to allow access to their computers through downloads or
email attachments.

A

trojan horse

20
Q

what are the types of virus

A

trojan horse
worm
virus

21
Q

It collects information about your browsing history, personal information and others.
Spyware are usually bundled with other software.

A

Spyware

22
Q

It often uses the Internet to pass this

information along to third parties without you knowing.

A

Spyware

23
Q

Frequent sources of spyware are?

A

file-sharing sites

24
Q

It uses a software to record everything you type on your keyboard. The program then
sends the log file to a specified server, where thieves can read any information you
type, including passwords, credit card numbers, etc.

A

keylogger

25
Q

What are frequent sources of keylogger

A

phishing sites

26
Q

It shows you unwanted ads. It

A

adware

27
Q

It could be also a type of free software supported by
advertisements that show up in pop-up windows or on a toolbar on your computer
or browser.

A

adware

28
Q

annoying, but safe. It is often built into free software.

A

adware

29
Q

is a devious approach that cybercrooks use to trick you into revealing
personal information, such as passwords or credit card, social security, and bank
account numbers.

A

phishing

30
Q

It is also an email or instant message scam which looks like an
official message from a legitimate organization like a bank and credit card details.

A

phishing

31
Q

(criminals who pretend to be a legitimate organization) are responsible for phishing

A

phishers

32
Q

It is an irrelevant, inappropriate, unwanted, or junk email that comes from legitimate
companies which, in the long run may be used for phishing, scams, and malware.

A

spam

33
Q

It is a fraudulent practice similar to phishing, except with pharming, a legitimate
website’s traffic is manipulated to direct users to fake lookalikes that will either install
malicious software on visitors’ computers, or harvest (pharm) users’ personal data,
such as passwords or financial details. Even users with fully protected, malware-free devices can become victims

A

Pharming

34
Q

A malicious software that is intended to damage or disable computer’s systems
which has codes to collect information without one’s knowledge.

A

malware

35
Q

Viruses, Trojan
horse, worms and the like are considered as

A

malware

36
Q

It happens when a criminal impersonates a user by stealing his or her personal
information to withdraw money or pay goods online.

A

Identity theft

37
Q

What are the different internet threats

A

spyware
keylogger
adware
phishing
spam
pharming
malware
identity theft

38
Q

How do you make a strong password?

A

You can make a smart
password by combining letters, numbers, special characters, and uppercase letter.

39
Q

how would you know if an site is safe?

A

Make sure that the website uses a secure technology feature. Verify if it begins
with https web address.