EXAM Q2 Flashcards

(87 cards)

1
Q

practices and precautions that should be observed while using the internet to ensure that the users as well as their computers and personal information are safe from some associated with using the internet

A

ONLINE SAFETY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Numerous delinquencies that can be committed on the internet

A
  1. STALKING
  2. IDENTITY THEFT
  3. PRIVACY VIOLATIONS
  4. HARASSMENT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Online Safety Measures

A
  1. Never give any personal information out about yourself over the internet
  2. Never open messages or attachments from someone you do not know
  3. Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service
  4. Do not ever access your accounts by following an email link, instead type of URL by yourself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone’s information

A

ONLINE THREATS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Threats

A
  1. PHISHING
  2. PHARMING
  3. INTERNET SCAM
  4. INTERNET BOTS
  5. MALWARE
  6. ADWARE
  7. SPYWARE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an email sent from an internet criminal disguised as an email from a legitimate, trustworthy source

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the message is meant to like your into revealing sensitive or confidential information

A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a malicious website that resembles a legitimate website

A

PHARMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

use to gather usernames and passwords

A

PHARMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a type of scam that misleads the user into many ways attempting to take lead of them

A

INTERNET SCAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a network of zombie computers that have been taken over by a robot or bot that performs large scale malicious acts

A

INTERNET BOTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

generic term for spyware and adware

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it is the malicious software disguised as real software often secretly installed, intended to transfer and gather private information

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

advertising, automatically delivers advertisement

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

that function by spying on user activity without their knowledge

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a program design to replicate by attaching itself into other computer problems

A

VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

can be injected into a network by any type of means like USB

A

WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EXAMPLES OF THREATS

A
  1. TROJAN HORSE
  2. ILOVEYOU VIRUS
  3. COMPUTER BUG
  4. CYBER STALKING
  5. CYBER BULLYING
  6. SPOOFING
  7. BROWSING HIJACKING
  8. IDENTITY THEFT
  9. SPYWARE
  10. COMPUTER ETHICS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a type of malware that disguises itself as a normal file or program to think users into downloading and installing malwares

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

also known as love bug or love letter

A

ILOVEYOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a computer worm attached or email that have infected

A

ILOVEYOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a malfunction on a computer system through its runtime

A

COMPUTER BUG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the use of the internet or other electronic device to harass or stalk individual, group or organization

A

CYBER STALKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the act or tormenting, threatening, harassing or embarrassing another person using the internet or other technologies

A

CYBER BULLYING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information
SPOOFING
26
happens when malware or spyware replaces a web users browser homepage that redirects the use to unwanted
BROWSING HIJACKING
27
happens when criminal impersonates a user by stealing his/her personal information to withdraw money or pay goods online
IDENTITY THEFT
28
enables a user to obtain information about another computer activities by transmitting data correctly to ones hard drive
SPYWARE
29
is a destructive program that pretends as a desirable application that tricks user to allow access to computers through download or e-mail attachments
TROJAN HORSE
30
concerned with how computing professional should make decisions regarding professional and social conduct
COMPUTER ETHICS
31
10 CORE RULES OF NETIQUETTE
1. REMEBER THE HUMAN 2. ADHERE TO THE SAME STAND OF BEHAVIOR ONLINE THAT YOU WOULD FOLLOW IN REAL LIFE 3. KNOW WHERE YOU ARE IN CYBER SPACE 4. RESPECT OTHER PEOPLE TIME AND BANDWIDTH 5. MAKE YOURSELF LOOK GOOD 6. SHARE EXPERT KNOWLEDGE 7. HELP KEEP FLAMES WARE UNDER CONTROL 8. RESPECT OTHER PEOPLE'S PRIVACY 9. DON'T ABUSE YOUR POWER 10. BE FORGIVING OF OTHERS PEOPLE'S MISTAKE
32
Safebook Parts
THINK (Head) FRIENDS (Shoulder) KIND (Chest) PASSWORD (Stomach) PRIVACY (Waist) HURT (Knees)
33
SAFEBOOK description for THINK
think before you post
34
SAFEBOOK description for FRIENDS
only connect with friends
35
SAFEBOOK description for KIND
be kind to others
36
SAFEBOOK description for PASSWORD
don't share your password
37
SAFEBOOK description for PRIVACY
keep your settings private
38
SAFEBOOK description for HURT
don't be hurtful towards others
39
useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored on a list database, or spreadsheet
MAIL MERGING
40
two main parts in mail merge
DOCUMENT DATA
41
helps convey the meaning of the text being accompanied by it
IMAGE
42
are protected by copyright
PHOTOS & IMAGE
43
was originally designed for Macintosh computers
POWERPOINT
44
was the old first name of POWERPOINT
PRESENTER
45
Four types of animation
1. ENTRANCE 2. EMPHASIS 3. EXIT 4. MOTION PATHS
46
is a connection to another document or to a location such as the internet
HYPERLINK
47
the document containing the hyperlink is called:
SOURCE DOCUMENT
48
is a powerful spreadsheet application software that integrates graphic and data management
MS EXCEL
49
an interactive computer application for organization, analysis, and storage of data in tabular for is called:
SPREADSHEET
50
Elements of FORMULA
1. ARITHMETIC 2. TEXT OPERATOR 3. COMPARATIVE OPERATORS 4. REFERENCE OF OPERATORS
51
each box a spreadsheet is called
CELL
52
the order of precedence used in excel
PEMDAS
53
Arithmetic Symbols
^ Exponentiation + Addition - Subtraction * Multiplication / Division Combination
54
connects two values to produce one continuous
TEXT OPERATOR
55
Comparative Operators SYMBOLS
= Equal to > Greater than < Less than >= Greater than equal <= Less than equal <> Not equal
56
range, which produces one reference to all the cells between two references, including two references
REFERENCE OF OPERATORS
57
which combines multiple references into one
UNION OPERATOR
58
which returns a reference to the cells common to the ranges in the formula
INTERSECT OPERATOR
59
is one of the key features of the internet
VAST SEA
60
is a software system designed to search the internet for documents related to the keyword
SEARCH ENGINE
61
Different kinds of SEARCH ENGINES
Google Search Yahoo Bing Aoi DuckDuckGo Aoi Yandex
62
it uses a spider or a crawler to search the internet
CRAWLER BASED SEARCH ENGINE
63
digs through individual web pages, pull out keywords, and then adds the pages
CRAWLER BASE SEARCH ENGINE
64
Sample of CRAWLER BASED ENGINE
GOOGLE YAHOO
65
depends on human editors to create their listings or database
DIRECTORIES
66
two types of DIRECTORIES
ACADEMIC & PROFESSIONAL DIRECTORIES COMMERCIAL & PORTAL DIRECTORIES
67
which are often created and maintained by subjects experts
ACADEMIC & PROFESSIONAL DIRECTORIES
68
cater to the general public and are competing for internet traffic
COMMERCIAL & PORTAL DIRECTORIES
69
uses both crawler based searches and directory searches to obtain results
HYBRID SEARCH ENGINE
70
transmit user supplied keywords simultaneously to several individual search engines to carry out the serach
META SEARCH ENGINE
71
duplicate can be eliminated and clustering by subjects within search is implemented
META SEARCH ENGINE
72
How to search the INTERNET effectively
1. Use of keywords 2. Use of Phrase 3. Capitalization 4. Boolean Logic 5. Wildcards and Truncation
73
recommended maximum is six to eight carefully chosen, words preferably nouns and objects
USE OF KEYWORDS
74
it is a combination of two or more words that must be found in the documents being searched
USE OF PHRASE
75
searching for proper names, use capital or uppercase to narrow the search
CAPITALIZATION
76
it is a powerful search to a reasonable number of result and increase the chance of a useful outcome
BOOLEAN LOGIC
77
BOOLEAN LOGIC has three most commonly used commands
AND OR NOT
78
these are used to search for items containing both terms, either term, or a term only
AND OR NOT
79
this involves substituting symbols for certain letters of a word so that the search engine will retrieve items with any letter in that spot in the word
WILDCARDS AND TRUNCATION
80
is very important measure for productivity
TIME
81
one feature of ICT
PRODUCTIVITY TOOLS
82
productivity tools:
WORD PROCESSORS DATABASES SPREADSHEETS PRESENTATIONS MULTIMEDIA
83
are used to organize, manipulate, shape, and ultimately, present ideas in creative new ways
PRODUCTIVITY TOOLS
84
which is a word processing application software
MICROSOFT WORD
85
offers a wide variety of features and tools that can be used in everyday school and office work
MICROSOFT WORD
86
one of advance tools of MICROSOFT WORD
MAIL MERGE
87
How to use MAIL MERGE
1. Create the Main Document 2. Identify the Data Source 3. Define the merge fields 4. Merge the data and save from the mailings tab