EXAM Q2 Flashcards

1
Q

practices and precautions that should be observed while using the internet to ensure that the users as well as their computers and personal information are safe from some associated with using the internet

A

ONLINE SAFETY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Numerous delinquencies that can be committed on the internet

A
  1. STALKING
  2. IDENTITY THEFT
  3. PRIVACY VIOLATIONS
  4. HARASSMENT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Online Safety Measures

A
  1. Never give any personal information out about yourself over the internet
  2. Never open messages or attachments from someone you do not know
  3. Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service
  4. Do not ever access your accounts by following an email link, instead type of URL by yourself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone’s information

A

ONLINE THREATS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Threats

A
  1. PHISHING
  2. PHARMING
  3. INTERNET SCAM
  4. INTERNET BOTS
  5. MALWARE
  6. ADWARE
  7. SPYWARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an email sent from an internet criminal disguised as an email from a legitimate, trustworthy source

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the message is meant to like your into revealing sensitive or confidential information

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a malicious website that resembles a legitimate website

A

PHARMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

use to gather usernames and passwords

A

PHARMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a type of scam that misleads the user into many ways attempting to take lead of them

A

INTERNET SCAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a network of zombie computers that have been taken over by a robot or bot that performs large scale malicious acts

A

INTERNET BOTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

generic term for spyware and adware

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it is the malicious software disguised as real software often secretly installed, intended to transfer and gather private information

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

advertising, automatically delivers advertisement

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

that function by spying on user activity without their knowledge

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a program design to replicate by attaching itself into other computer problems

A

VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

can be injected into a network by any type of means like USB

A

WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EXAMPLES OF THREATS

A
  1. TROJAN HORSE
  2. ILOVEYOU VIRUS
  3. COMPUTER BUG
  4. CYBER STALKING
  5. CYBER BULLYING
  6. SPOOFING
  7. BROWSING HIJACKING
  8. IDENTITY THEFT
  9. SPYWARE
  10. COMPUTER ETHICS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a type of malware that disguises itself as a normal file or program to think users into downloading and installing malwares

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

also known as love bug or love letter

A

ILOVEYOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a computer worm attached or email that have infected

A

ILOVEYOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a malfunction on a computer system through its runtime

A

COMPUTER BUG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the use of the internet or other electronic device to harass or stalk individual, group or organization

A

CYBER STALKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the act or tormenting, threatening, harassing or embarrassing another person using the internet or other technologies

A

CYBER BULLYING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information

A

SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

happens when malware or spyware replaces a web users browser homepage that redirects the use to unwanted

A

BROWSING HIJACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

happens when criminal impersonates a user by stealing his/her personal information to withdraw money or pay goods online

A

IDENTITY THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

enables a user to obtain information about another computer activities by transmitting data correctly to ones hard drive

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

is a destructive program that pretends as a desirable application that tricks user to allow access to computers through download or e-mail attachments

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

concerned with how computing professional should make decisions regarding professional and social conduct

A

COMPUTER ETHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

10 CORE RULES OF NETIQUETTE

A
  1. REMEBER THE HUMAN
  2. ADHERE TO THE SAME STAND OF BEHAVIOR ONLINE THAT YOU WOULD FOLLOW IN REAL LIFE
  3. KNOW WHERE YOU ARE IN CYBER SPACE
  4. RESPECT OTHER PEOPLE TIME AND BANDWIDTH
  5. MAKE YOURSELF LOOK GOOD
  6. SHARE EXPERT KNOWLEDGE
  7. HELP KEEP FLAMES WARE UNDER CONTROL
  8. RESPECT OTHER PEOPLE’S PRIVACY
  9. DON’T ABUSE YOUR POWER
  10. BE FORGIVING OF OTHERS PEOPLE’S MISTAKE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Safebook Parts

A

THINK (Head)

FRIENDS (Shoulder)

KIND (Chest)

PASSWORD (Stomach)

PRIVACY (Waist)

HURT (Knees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SAFEBOOK description for THINK

A

think before you post

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

SAFEBOOK description for FRIENDS

A

only connect with friends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

SAFEBOOK description for KIND

A

be kind to others

36
Q

SAFEBOOK description for PASSWORD

A

don’t share your password

37
Q

SAFEBOOK description for PRIVACY

A

keep your settings private

38
Q

SAFEBOOK description for HURT

A

don’t be hurtful towards others

39
Q

useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored on a list database, or spreadsheet

A

MAIL MERGING

40
Q

two main parts in mail merge

A

DOCUMENT
DATA

41
Q

helps convey the meaning of the text being accompanied by it

A

IMAGE

42
Q

are protected by copyright

A

PHOTOS & IMAGE

43
Q

was originally designed for Macintosh computers

A

POWERPOINT

44
Q

was the old first name of POWERPOINT

A

PRESENTER

45
Q

Four types of animation

A
  1. ENTRANCE
  2. EMPHASIS
  3. EXIT
  4. MOTION PATHS
46
Q

is a connection to another document or to a location such as the internet

A

HYPERLINK

47
Q

the document containing the hyperlink is called:

A

SOURCE DOCUMENT

48
Q

is a powerful spreadsheet application software that integrates graphic and data management

A

MS EXCEL

49
Q

an interactive computer application for organization, analysis, and storage of data in tabular for is called:

A

SPREADSHEET

50
Q

Elements of FORMULA

A
  1. ARITHMETIC
  2. TEXT OPERATOR
  3. COMPARATIVE OPERATORS
  4. REFERENCE OF OPERATORS
51
Q

each box a spreadsheet is called

A

CELL

52
Q

the order of precedence used in excel

A

PEMDAS

53
Q

Arithmetic Symbols

A

^ Exponentiation
+ Addition
- Subtraction
* Multiplication
/ Division Combination

54
Q

connects two values to produce one continuous

A

TEXT OPERATOR

55
Q

Comparative Operators SYMBOLS

A

= Equal to
> Greater than
< Less than
>= Greater than equal
<= Less than equal
<> Not equal

56
Q

range, which produces one reference to all the cells between two references, including two references

A

REFERENCE OF OPERATORS

57
Q

which combines multiple references into one

A

UNION OPERATOR

58
Q

which returns a reference to the cells common to the ranges in the formula

A

INTERSECT OPERATOR

59
Q

is one of the key features of the internet

A

VAST SEA

60
Q

is a software system designed to search the internet for documents related to the keyword

A

SEARCH ENGINE

61
Q

Different kinds of SEARCH ENGINES

A

Google Search
Yahoo
Bing
Aoi
DuckDuckGo
Aoi
Yandex

62
Q

it uses a spider or a crawler to search the internet

A

CRAWLER BASED SEARCH ENGINE

63
Q

digs through individual web pages, pull out keywords, and then adds the pages

A

CRAWLER BASE SEARCH ENGINE

64
Q

Sample of CRAWLER BASED ENGINE

A

GOOGLE
YAHOO

65
Q

depends on human editors to create their listings or database

A

DIRECTORIES

66
Q

two types of DIRECTORIES

A

ACADEMIC & PROFESSIONAL DIRECTORIES

COMMERCIAL & PORTAL DIRECTORIES

67
Q

which are often created and maintained by subjects experts

A

ACADEMIC & PROFESSIONAL DIRECTORIES

68
Q

cater to the general public and are competing for internet traffic

A

COMMERCIAL & PORTAL DIRECTORIES

69
Q

uses both crawler based searches and directory searches to obtain results

A

HYBRID SEARCH ENGINE

70
Q

transmit user supplied keywords simultaneously to several individual search engines to carry out the serach

A

META SEARCH ENGINE

71
Q

duplicate can be eliminated and clustering by subjects within search is implemented

A

META SEARCH ENGINE

72
Q

How to search the INTERNET effectively

A
  1. Use of keywords
  2. Use of Phrase
  3. Capitalization
  4. Boolean Logic
  5. Wildcards and Truncation
73
Q

recommended maximum is six to eight carefully chosen, words preferably nouns and objects

A

USE OF KEYWORDS

74
Q

it is a combination of two or more words that must be found in the documents being searched

A

USE OF PHRASE

75
Q

searching for proper names, use capital or uppercase to narrow the search

A

CAPITALIZATION

76
Q

it is a powerful search to a reasonable number of result and increase the chance of a useful outcome

A

BOOLEAN LOGIC

77
Q

BOOLEAN LOGIC has three most commonly used commands

A

AND
OR
NOT

78
Q

these are used to search for items containing both terms, either term, or a term only

A

AND
OR
NOT

79
Q

this involves substituting symbols for certain letters of a word so that the search engine will retrieve items with any letter in that spot in the word

A

WILDCARDS AND TRUNCATION

80
Q

is very important measure for productivity

A

TIME

81
Q

one feature of ICT

A

PRODUCTIVITY TOOLS

82
Q

productivity tools:

A

WORD PROCESSORS
DATABASES
SPREADSHEETS
PRESENTATIONS
MULTIMEDIA

83
Q

are used to organize, manipulate, shape, and ultimately, present ideas in creative new ways

A

PRODUCTIVITY TOOLS

84
Q

which is a word processing application software

A

MICROSOFT WORD

85
Q

offers a wide variety of features and tools that can be used in everyday school and office work

A

MICROSOFT WORD

86
Q

one of advance tools of MICROSOFT WORD

A

MAIL MERGE

87
Q

How to use MAIL MERGE

A
  1. Create the Main Document
  2. Identify the Data Source
  3. Define the merge fields
  4. Merge the data and save from the mailings tab