etech lesson2 Flashcards

1
Q

it refers to the online security or safety of people and their information when using the internet

A

internet safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

tips to stay safe online

A

Be mindful of what you share online and what site you share it to.

Do not just accept terms and conditions; read them.

Know the security features of the social networking site you use. By keeping your profile private, search engines will not be able to scan your profile.

Do not share your password with anyone

Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode will NOT protect you from hackers.

Do not talk to strangers whether online or face-to-face/

Never post anything about a future vacation. It is like posting, “Rob my house on this date

Add friends you know in real life.

Avoid visiting untrusted websites.

Install and update antivirus software on your computer. Use only one anti-virus software to avoid conflicts.

If you have Wi-Fi at home, make it a private network by adding a password.

Avoid downloading anything from untrusted websites.

But the software does not use pirated ones.

Do not reply or click links from suspicious emails.

Make Online Purchases from Secure Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

dangers that can be encountered when using the internet

A

cyberbullying
cyberstalking
identity theft
sexting
inappropriate content
online grooming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

internet threats

A

malware, phishing, spam, pharming, social media exploits, adware, spyware, keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is usually considered to be electronic junk as defined by many as unsolicited email

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information t be used for identity theft

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a more complicated way of phishing where it exploits the DNS (Domain Name Service) system by installing malicious code on a personal computer or server

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

short for malicious software, designed to specifically damage or disrupt a system such as virus or trojan horse

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a program or piece of code that is loaded onto the computer without the knowledge of the user and runs against it

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

similar to a virus this design is considered to be a sub-class of a virus, it has the capability to travel without any human action, and takes advantage of files or information transport features on the system

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this malware will appear to be useful software but will actually do damage once installed or run on the computer

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the common name used to describe software that is given to the user with advertisements embedded in the application

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a program that runs in the background, it has the ability to monitor what you are currently doing and typing through keylogging

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sometimes called as keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a computer’s keyboard

A

keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the forms required by good breeding or prescribed by authority to be required in social or official life

A

etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

it’s network etiquette .
the etiquette of cyberspace

A

netiquette

17
Q

core rules of netiquette

A
  1. remember they’re human
  2. adhere to the same standards of behavior online that you follow in real life
  3. know where you are in cyberspace
  4. respect other people’s time and bandwidth
  5. make yourself look good online
  6. share expert knowledge
  7. help keep flame wars under control
  8. respect other people’s privacy
  9. don’t abuse your power
  10. be forgiving of other people’s mistakes
18
Q

is the information-carrying capacity of the wires and channels that connect everyone in cyberspace

A

bandwidth

19
Q

is what people do when they express a strongly held opinion without holding back any emotion

A

flaming

20
Q
A