ELIE Flashcards

(206 cards)

1
Q

defined ICT (Information & Communication Technology) in a study as related to technologies that facilitate the transfer of information and various types of electronically mediated communication.

A

Zuppo (2012)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It can also be defined as: all the technologies used to handle broadcast media, telecommunications, intelligent building management systems, network-based control and monitoring functions, audio-visual processing and transmission systems and others.

A

INFORMATION AND COMMUNICATION
TECHNOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APPLICATION OF ICT IN OUR DAILY LIVES

A

COMMUNICATION
JOB OPPORTUNITIES
ENTERTAINMENT
MEDICAL SCIENCE
FINANCE
HOME ELECTRONICS
EDUCATION
SOCIALIZING
AGRICULTURE
BUSINESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An act of transmitting messages; a process of exchange of information between individuals through verbal and non-verbal means.

A

COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Being able to use ICT systems effectively allows employees more time to concentrate on areas of their job role that require soft skills.

A

JOB OPPORTUNITIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(ICT) have impacted entertainment and leisure activities in different ways in which you spend your time.

A

ENTERTAINMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Medical devices and modern equipment have evolved considerably favoring information and communications technology.

A

MEDICAL SCIENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ICT is used daily by financial companies, to trade financial instruments, to report a business’s earnings, and to keep records of personal budgets

A

FINANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

increased access to services, and information that has accompanied in the progress of the Internet.

A

HOME ELECTRONICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Schools use a diverse set of ICT tools to communicate, create, disseminate, store, and manage information.

A

EDUCATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of the most significant changes in socializing due to technology is the rise of social media. Platforms like Facebook, Twitter, and Instagram have become ubiquitous in college culture.

A

SOCIALIZING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One of the most significant ICT applications in agriculture is precision farming.

A

AGRICULTURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The role of ICT in business is to provide tools and systems that enable efficient communication, data management, analysis, and decision-making processes, as well as to enhance productivity, customer engagement, and competitive advantage.

A

BUSINESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who said this “TECHNOLOGY
ISA USEFUL
SERVANT BUT
A DANGEROUS MASTER.”

A

Christian lous lange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three principal characteristics of computer

A
  1. It responds to a specific set of instructions in a well-defined manner.
  2. It can execute a pre-recorded list of instructions.
  3. It can quickly store and retrieve large amounts of data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FOUR KINDS OF COMPUTER

A

SUPERCOMPUTERS
MAINFRAME COMPUTERS
MINICOMPUTERS
MICROCOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

any of a class of extremely powerful computers. The term is commonly applied to the fastest high-performance systems available at any given time.

A

SUPERCOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk data processing for tasks such as censuses, industry and consumer statistics, enterprise resource planning, and large-scale transaction processing.

A

MAINFRAME COMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

computer that was smaller, less expensive, and less powerful than a mainframe or supercomputer but more expensive and more powerful than a personal computer.

A

MINICOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a complete computer on a small scale, designed for use by one person at a time.

A

MICROCOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Two Classification of Microcomputers

A

PERSONAL COMPUTERS
WORKSTATIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Three key concepts of how computer works

A
  1. Purpose of a computer is to process data into information.
  2. Hardware and Software are two different entities.
  3. There are five basic operations of a computer. All computers use the same five basic operations: input, processing, storage, output, and communications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

are raw facts and figures that are processed into information
– for example, examinees’ score during board exam.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is data that has been summarized or otherwise transformed for use in decision making. – for example, the average score is used to determine the performance of the examinees.
Information
26
is a collection of code that drives a computer to perform a related group of tasks.
Software, or simply called programs
27
two types of software:
System Software Application Software
28
are software run by the computer to manage or control the hardware. Examples: operating system (OS), Basic Input Output System (BIOS), device driver, and compilers and associated programs.
System Software
29
are software that are related to a specific real-life situation in accomplishing a specific task. We encounter this type of software a lot every day. The smartphone industry calls it “apps”. Examples: office software, database software, communication software, entertainment software
Application Software
30
five basic operations of a computer.
Input Operations. Processing Operations. Storage Operations. Output Operations Communication Operations
31
is whatever is put in (“input”) to a computer system.
Input Operations.
32
the set of activities and techniques used to manage and optimize the production of goods and services in an organization.
Processing Operations.
33
the set of activities and techniques used to manage and optimize the production of goods and services in an organization.
Storage Operations.
34
Two types of Storage Operations
Primary Storage and Secondary Storage
35
Primary storage is a key component of a computer system that enables it to function. Primary storage includes random access memory (RAM), read only memory (ROM), cache and flash memory.
Primary Storage
36
Secondary storage, sometimes called auxiliary storage, is non-volatile and is used to store data and programs for later retrieval. There are many kinds of secondary storage, each with advantages and disadvantages. Most storage devices use either magnetic or optical storage media.
Secondary Storage
37
Output Operations
38
Output has two types:
Softcopy and Hardcopy.
39
an electronic copy (or e-copy) of some type of data, such as a file viewed on a computer's display, one that doesn’t exist in physical form or on paper, but is instead or transmitted as an email attachment.
Softcopy
40
printed on the paper and sometimes it is referred as permanent copy. We can touch the hard copy. We can say it is a physical copy. For example- News Paper, Book, Notebook, printed document files, etc.
Hardcopy.
41
any processes that allow you to communicate which feature a computer or computer program. The computer does this by sending data to one or more other computers, who decode the message and allow the recipient to send a message back.
Communication Operations
42
The first use of the word "computer" was recorded in ____, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century.
1613,
43
was an ancient memory aid device to record and document numbers, quantities, or even messages.
TALLY STICKS
44
a mathematical device used to aid an individual in performing mathematical calculations. The abacus was invented in Babylonia in 2400 B.C.
ABACUS
45
Also known as Napier’s rod, are numbered rods which can be used to perform multiplication of any number by a 2 – 9, was invented by John Napier in 1614.
NAPIER’S BONE
46
A hand-operated mechanical calculator consisting of slidable ruler for evaluating mathematical operations and was invented by William Oughtred in 1622 based on Napier’s idea about logarithms.
SLIDE RULER
47
The first calculator or adding machine invented by Blaise Pascal to be produced in any quantity by manipulating its dials.
PASCALINE
48
A mechanical calculator invented by Gottfried Wilhelm Leibniz in 1672. The machine that can multiply repeated addition and shifting.
STEPPED RECKONER
49
is a mechanical loom, which was invented by Joseph Marie Jacquard in 1881. It is as automatic loom controlled by punched cards.
JACQUARD LOOM
50
a mechanical calculator invented by Thomas de Colmar in 1820. This was the first reliable, useful and commercially successful calculating machine.
ARITHMOMETER
51
were both automatic, mechanical calculator that is designed to tabulate polynomial functions, the first mechanical computer.
Difference Engine and Analytical Engine
52
Father of the Computer in 1822 and 1834 also invented Difference and Analytical Machine
CHARLES BABBAGE
53
Considered as the first computer programmer , chiefly known for her work on Charles Babbage’s proposed mechanical general purpose computer, the Analytical Engine.
AUGUSTA ADA BYRON
54
Known as the first printing calculator, by spinning the handle, it automatically calculates and prints out the numbers in logarithmic table
SCHEUTZIAN CACLCULATION ENGINE
55
An electromechanical machine designed to assist in summarizing information stored on punched cards, was invented by Herman Hollerith in 1890
TABULATING MACHINE
56
Also known as IBM Automatic Sequence Controlled Calculator (ASCC), was one of the earliest general-purpose electromechanical computers used in the war effort during the last part of World War II.
HARVARD MARK I
57
was a motor-driven mechanical computer designed by Konrad Zuse . It was a binary electrically driven mechanical calculator with limited programmability, reading instructions from punched celluloid film.
Z1 COMPUTER
58
(ABC) was the first automatic electronic digital computer. Conventionally, the ABC would be considered the first electronic ALU (arithmetic logic unit) – which is integrated into every modern processor's design.
ATANASOFF BERRY COMPUTER
59
is the first commercially successful portable computer, released on April 3, 1981 by Osborne Computer Corporation, a portable device since it can be hand-carried when the keyboard is closed.
OSBORNE 1
60
was the world's first general-purpose electronic computer. is also considered the world's first programmable computer, although programming the computer was a complex, manual process that could take days.
ENIAC
61
ENIAC
(Electronic Numerical Integrator And Computer)
62
was one of the earliest electronic computers. Functionally, was a binary serial computer with automatic addition, subtraction, multiplication, programmed division and automatic checking with an ultrasonic serial memory
EDVAC
63
EDVAC
(Electronic Discrete Variable Automatic Computer)
64
was an early British computer. It was the second electronic digital stored-program computer to go into regular service.
EDSAC
65
EDSAC
The Electronic Delay Storage Automatic Calculator
66
was the first general-purpose electronic digital computer design for business application produced in the United States. It was designed principally by J. Presper Eckert and John Mauchly, the inventors of the ENIAC.
UNIVAC 1
67
UNIVAC 1
Universal Automatic Computer I
68
The Eckert–Mauchly Computer Corporation (EMCC) was founded by J. Presper Eckert and John Mauchly. It was incorporated on 1947. After building the ENIAC at the University of Pennsylvania, Eckert and Mauchly formed EMCC to build new computer designs for commercial and military applications.
EMCC
69
EMCC
The Eckert–Mauchly Computer Corporation
70
is the earliest age of information technology. It can be defined as the time between 3000B.C. and 1450A.D.
PREMECHANICAL
71
is when we first start to see connections between our current technology and its ancestors. The mechanical age can be defined as the time between 1450 and 1840.
MECHANICAL
72
can be defined as the time between 1840 and 1940. These are the beginnings of telecommunication.
ELECTROMECHANICAL
73
is what we currently live in. It can be defined as the time between 1940 and right now.
ELECTRONIC
74
FIVE GENERATION OF COMPUTER
First Generation 1946 to 1958 Second Generation 1959 to 1964 Third Generation 1965 to 1970 Fourth Generation 1971 to Today Fifth Generation Today to Future
75
The technology behind the primary generation computers was a fragile glass device, which was called a vacuum tube. These computers were very heavy and really large. First-generation computers were used for calculation, storage, and control purpose.
First Generation 1946 to 1958
76
used the technology of transistors rather than bulky vacuum tubes. Another feature was the core storage. A transistor may be a device composed of semiconductor material that amplifies a sign or opens or closes a circuit.
Second Generation 1959 to 1964
77
technology envisaged a shift from huge transistors to integrated circuits, also referred to as IC. Here a variety of transistors were placed on silicon chips, called semiconductors. The most feature of this era’s computer was speed and reliability. IC was made from silicon and also called silicon chips
Third Generation 1965 to 1970
78
First microprocessors were used, the large-scale of integration LSI circuits built on one chip called microprocessors. The computers using microchips were called microcomputers. This generation provided even smaller size of computers, with larger capacities
Fourth Generation 1971 to Today
79
It allows computers to behave like humans. It is often seen in programs like voice recognition, area of medicine, and entertainment. Within the field of game playing also it’s shown remarkable performance where computers are capable of beating human competitors.
Fifth Generation Today to Future
80
Categories of Software
System Software Application Software
81
a computer program that is designed to manage computer hardware and application programs. manage your computers
System Software
82
Manages the entire computer system. It provides different types of resource management services such as booting, CPU management, file management, task management, and security management. simply called for smartphone industry as “apps”.
Application Software
83
is the term coined for the particular processor model and operating system on which a computer system is based
Platforms
84
is a software that manages smartphones, tablets, and other devices that can be used while on the move. It is responsible for the way users interact with a device
mobile operating system
85
is the program a computer’s microprocessor uses to start a computer system after it is power on.
BIOS
86
BIOS
Basic Input Output Operation
87
the process of starting a computer as initiated via hardware such as a button or by a software command
Boot Program
88
A computer program that operates or controls a particular type of device that is attached to a computer or automation
Device Driver
89
a software component that lets the operating system and a device communicate
Driver Program
90
a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users.
Application Software
91
Source of Application Software
Custom software Custom software Freeware Shareware Public Domain Software Rental ware Web application
92
tailor-made software crafted by an individual or team of programmers for a particular function or business purpose
Custom software
93
typically contains related programs that can perform different functions. Packaged software comes with a software license.
Custom software
94
typically contains related programs that can perform different functions.
Packaged Software
95
is a contract in which you agree not to make copies of the software to give away or resell.
software license
96
Allows the software to be used on all computers at a specific location
Site license
97
Allows a certain number of copies of the software to be used at the same time
Concurrent-use license
98
Specifies the number of people who may use the software
Multiple-user license
99
Limits software use to one user at a time
Single-user license
100
software that is typically proprietary and is offered at no cost to users.
Freeware
101
commercial software that is distributed free to users, eventually either requiring or encouraging users to pay for the continued support of the software.
Shareware
102
a type of malicious software that secretly installs itself on your device and displays unwanted advertisements and pop-ups.
Adware
103
a licensing model that supplies fully operational unrestricted software to the user and requests an optional donation be paid to the programmer or a third-party beneficiary.
Donation ware
104
computer software that can be used free of charge for a limited evaluation period.
Trial ware
105
computer software that is free for a trial period during which the user is frequently reminded on screen to register and pay for the program in order to continue using it when the trial period is over.
Nagware
106
software distributed with reduced functionality with a view to attracting payment for a fully functional version.
Cripple ware
107
any software that has no legal, copyright or editing restrictions associated with it.
Public Domain Software
108
online software that users lease for a fee and download whenever they want it.
Rental ware
109
a software that runs on a remote Internet server rather than on a person’s own personal computer. A web app is typically accessed using a web browser.
Web application
110
a flaw, weakness, or error of software. It is usually discovered after the software has been released to the public or the user. May cause a system failure. It can also be a playground for someone who can launch an attack which may lead to unpredictable damages and costs.
Software vulnerability
111
is larger collection of interconnected documents or content. It contains hypertext links or highlighted keywords and images that lead to related information
World Wide Web
112
A collection of linked Web pages that has a common theme or focus. The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s home page.
Website
113
known as ____, is an English engineer and computer scientist best known as the inventor of the World Wide Web.
Timothy John Berners-Lee TimBL
114
THE EVOLUTION OF THE WEB
1. Read Only Static Web or the Web 1.0 2. Read/Write Interactive Web or Web 2.0 3. Read-write intelligent web or Web 3.0
115
old internet that only allows people to read from the internet. Web is use as “information portal”. It uses table to positions and align elements on page.
1. Read Only Static Web or the Web 1.0
116
A reader of a blog or a wiki is provided with tools to add a comment or even, in the case of the wiki, to edit the content. 
2. Read/Write Interactive Web or Web 2.0
117
Example of Web 2.0 are the following:
Social Networking Video Sharing Sites Blogs Wikis
118
refers to using internet-based social media sites to stay connected with friends, family, colleagues, or customers.
Social Networking
119
A website that lets people upload and share their video clips with the public at large or to invited guests.
Video Sharing Sites
120
(a truncation of "weblog") is an informational website consisting of discrete, often informal diary-style text entries (posts).
Blogs
121
a website or online resource that can be edited by multiple users. Some wikis, such as Wikipedia , are publicly accessible.
Wikis
122
Key Features of Web 2.0
Folksonomy Rich user experience  User Participation  Software as a service  Mass Participation
123
free classification of information; allows users to collectively classify and find information (e.g. "tagging" of websites, images, videos or links)
Folksonomy 
124
dynamic content that is responsive to user input (e.g., a user can "click" on an image to enlarge it or find out more information)
Rich user experience 
125
information flows two ways between the site owner and site users by means of evaluation, review, and online commenting.
User Participation 
126
Web 2.0 sites developed APIs to allow automated usage, such as by a Web "app" (software application) or a mashup
Software as a service 
127
near-universal web access leads to differentiation of concerns, from the traditional Internet user base (who tended to be hackers and computer hobbyists) to a wider variety of users, drastically changing the audience of internet users.
Mass Participation
128
is a read-write-interact web (powered by artificial intelligence) where people can read, write and interact with content, including 3D graphics, on websites and apps.
Read-write intelligent web or Web 3.0
129
TYPES OF WEBSITE
E-Commerce Business Entertainment Portfolio Social Media Brochure Non Profit Educational Infopreneur Personal
130
your digital storefront on the internet. It is the virtual space where you showcase products, and online customers make selections. Your website acts as the product shelves, sales staff, and cash register of your online business channel..
E-Commerce
131
a page with your business's brand and contact details to a complete online store. Some benefits of having a website for your business include: having a digital shop front for your business. reaching a global audience.
Business
132
a website that focuses on creating high quality content that is entertaining for the target audience. It could be anything from information pieces and news to videos, films to blog posts, or even films.
Entertainment
133
an online representation of work you have created, as well as your skills and experiences. It could be a website, blog, or even a video channel.
Portfolio
134
collective term for websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.
Social Media
135
an informational website that is designed to look and feel like a printed brochure. It contains compelling text and images that advertise a company's products or services, and typically ranges from one to five pages.
Brochure
136
don't aim to sell products or services to their visitors, but they still need to convince people to support their cause
Non Profit
137
a huge interactive platform to present various information for different types of people: future students, current students, teachers, parents, those who want to get a new profession, etc.
Educational
138
a hybrid between an informational website and an e-commerce website, and may also have some features of an educational website. It provides free content to attract clients to paid content.
Infopreneur
139
A personal website showcases an individual's personal information, achievements, skills, portfolio, and interests online, allowing you to present yourself professionally, share your work, and connect with others.
Personal
140
is the largest computer network in the world that connects billions of computer user. The word internet comes from combination between “interconnection” and “network”.
Internet
141
Consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.
Network
142
Types of Network
Local Area Network Wide Area Network
143
a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building.
Local Area Network
144
connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network.
Wide Area Network
145
often referred to as the "Father of the Internet," played a pivotal role in designing the foundational protocols and architecture that underpin the global network. Sharing this title with TCP/IP co-developer Bob Kahn.
Vinton Gray Cerf
146
Major Components of Internet
Server IP Address (Internet Protocol) Internet Service Provider (ISP) Browser Domain Name System (DNS)
147
a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
Server
148
Types of Server
Application Server Web Server Proxy Server Mail Server File Server Policy Server
149
a server that hosts applications or software that delivers a business application through a communication protocol. For a typical web application, the application server sits behind the web servers
Application Server
150
computer software and underlying hardware that accepts requests via HTTP or its secure variant HTTPS.
Web Server
151
a system or router that provides a gateway between users and the internet. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.
Proxy Server
152
an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery
Mail Server
153
a security component of a policy-based network that provides authorization services and facilitates tracking and control of files.
Policy Server
154
computer responsible for the storage and management of data files so that other computers on the same network can access the files.
File Server
155
a unique numerical identifier for every device or network that connects to the internet.
IP Address(Internet Protocol Address)
156
is the phonebook of internet. We access information online through domain names.
Domain Name System (DNS)
156
is an application program that provides a way to look information on the web.
Browser
157
is an organization that provides services for accessing, using or participating in the internet.
Internet Service Provider (ISP)
157
uses wire line transmission technology to transmit data over traditional copper telephone lines already installed to homes and businesses.
DSL (Digital Subscriber Line)
158
this type of connection uses fiber optics to convert electrical signals that carry data into light and then sends it through transparent glass fibers about the diameter of a human hair
Fiber Optic
159
This connection provides the Internet through a radio link between the customer's location and the service provider's facility. It can be mobile or fixed.
Wireless Broadband
160
Internet in the Philippines first became available on
March 29, 1994
161
Internet in the Philippines first became available on March 29, 1994, with the
Philippine Network Foundation (PHNet)
162
The early history of the Internet in the Philippines started with the establishment of (BBS) by computer hobbyist and enthusiast.
Bulletin Board Systems
163
The Philippine FidoNet Exchange, a local network for communication between several BBSes in Metro Manila, was formed.
1987
164
A committee helmed by Arnie del Rosario of the Ateneo Computer Technology Center was tasked with exploring the possibility of creating an academic network of universities and government institutions by the National Computer Center under Dr. William Torres. Recommendations were made but not implemented
1990
165
Emergence of email gateways and services in the Philippines, including some from multinational companies like Intel, Motorola, and Texas Instruments, which used a direct Internet connection, X.25, or UUCP protocol. Local firms ETPI, Philcom, and PLDT (Philippine Long Distance Telephone Company) also operated commercial X.25 networks. Another milestone: Local and international email to FidoNet users was introduced.
1991-1993
166
With the support of the Department of Science and Technology and the Industrial Research Foundation, the Philnet project (now PHNET) was born that would eventually play a significant role in connecting the Philippines to the global Internet.
June 1993
167
Phase one of the Philnet project shifted into full gear after receiving funding from the DOST.
June 1993
168
Phase one of the Philnet project shifted into full gear after receiving funding from the DOST.
July 1993
169
Kickstart the second phase of Philnet, now led by Dr. Rudy Villarica.
November 1993
170
Benjie Tan, who was working for ComNet, a company that supplied Cisco routers to the Philnet project, established the Philippine's first connection to the Internet at a PLDT network center in Makati City.
March 29, 1994
171
As the number of subscribers grew, both PLDT and Globe Telecom rapidly expanded their (TD-LTE) services for Fixed Wireless Broadband.
Time-Division Duplex-Long Term Evolution
172
that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life.
NETIQUETTE
173
Risks while using Online Services
Cybercrime Cybercriminals
173
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.
THE GOLDEN RULE
174
Ten (10) Commandments of Computer Ethics
RULE 1: REMEMBER THE HUMAN RULE 2: ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE RULE 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH RULE 5: MAKE YOURSELF LOOK GOOD ONLINE RULE 6: SHARE EXPERT KNOWLEDGE RULE 7: HELP KEEP FLAME WARS UNDER CONTROL RULE 8: RESPECT OTHER PEOPLE’S PRIVACY RULE 9: DON’T ABUSE YOUR POWER RULE 10: BE FORGIVING OF OTHER PEOPLE’S MISTAKES.
175
is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
Cybercrime
176
use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
Cybercriminals
177
Common forms of Cybercrimes
Copyright Infringement Plagiarism Computer addiction
178
the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.
Copyright Infringement
179
an act or instance of using or closely imitating the language and thoughts of another author without authorization.
Plagiarism
180
Criminal Activities
Hacking Identity Theft Electronic Theft Cyberbullying Cybersex Child Pornography Cyber Defamation
181
Unauthorized access of or interference with computer systems, servers, or other information and communication systems.
Hacking
182
An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
Identity Theft
183
Illegal downloading, Obtaining files that you do not have the right to use from the internet.
Electronic Theft
184
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
Cyberbullying
185
Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
Cybersex
186
Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti Child Pornography Act of 2009, committed through a computer system.
Child Pornography
187
Is an unprivileged false statement of fact, which tends to harm the reputation of a person or company.
Cyber Defamation
188
Internet Threats
Malware
189
one of the more common ways to infiltrate or damage your computer.
Malware Pharming Phishing
190
used most often by cyber criminals because it is easy to execute and can produce the results they are looking for with very little effort.
Phishing
191
a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.
Pharming
192
a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransom ware
193
Common Types Ransom ware
Lock Screen Ransom ware Encryption Ransom ware Spam Spyware (Spyware & Adware) Viruses Wi-Fi Eavesdropping Worms
194
displays an image that prevents you from accessing your computer
Lock Screen Ransom ware
195
encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them
Encryption Ransom ware
196
one of the more common methods of both sending information out and collecting it from unsuspecting people.
Spam
197
Third parties to infiltrate your computer often use Spyware and adware. Software that collects personal information about you without you knowing.
Spyware (Spyware & Adware)
198
It may not be a term you are familiar with, but there is a good chance you or someone you know has been affected by one. A malicious program that is disguised as, or embedded within, legitimate software
Trojan Horse
199
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.
Viruses
200
is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that is shared over an unsecure (not encrypted) Wi-Fi network.
Wi-Fi Eavesdropping
201
unlike a virus, goes to work on its own without attaching itself to files or Programs. It lives in your computer memory, does not damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself.
Worms
202
203