GROUP 6- DIGITAL LITERACY Flashcards

1
Q

ability to locate, evaluate, create and
communicate information various digital
platforms. Put more broadly, it is the
technical, cognitive, and sociological skills
needed to perform tasks and solve problems
in digital environments.

A

cyber/digital literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

individuals’ responsibilities when using
the internet. These responsibilities include
following the law, respecting others’ rights, and being aware of the risks associated with using the internet.

A

cyber citizenship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

one who knows what is right and wrong, exhibits intelligent technology behavior, and
makes good choices when using technology.

A

good cybercitizen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the roles of a good cybercitizen

A
  • use respectful and kind language
  • treat others the way you want to be treated
  • do not share private info
  • do not plagiarize
  • follow security measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the characteristics of a good cybercitizen

A
  • confident and capable of using information communication technologies
  • using technology to participate in educational, cultural, and economic activities
  • developing and using critical thinking in cyberspace
  • using technology to relate to others in positive and meaningful ways
  • respecting concept of privacy and freedom of speech
  • contributing to and actively promoting the values of digital citizenship
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

has become a fundamental topic in our digital world and includes knowing about one’s internet privacy and how one’s behaviors can support a healthy interaction with the use of the internet

A

internet or e-safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tips for ensuring e-safety

A
  • be careful what you put in the web
  • keep track of who you interact with on the internet
  • know that privacy is just an illusion
  • do not open any links in emails or chat rooms that look suspicious or unfamiliar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is when someone repeatedly and intentionally harasses, mistreats, or makes fun of another
person online or while using cellphones or other electronic devices

A

cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are types of cyberbullying (9)

A
  • harassment
  • doxing
  • cyberstalking
  • revenge porn
  • swatting
  • corporate attacks
  • account hacking
  • false profiles
  • slut shaming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When someone is being harassed
online, they are being subjected to a
string of abusive messages or efforts to
contact them by one person or a group
of people

A

harassment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

when an individual distribute another person’s personal information such as their home address, phone number or place of
work onto social media or public forums
without that person’s permission to do so.

A

doxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Involves the perpetrator making persistent
efforts to gain contact with the victim.
People will cyberstalk another person due to
deep feelings towards that person, whether
they are positive or negative.

A

cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is when sexually explicit or compromising
images of a person have been distributed
onto social media or shared on revenge
porn specific websites without their
permission to do so

A

revenge porn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

when someone calls emergency
responders with claims of dangerous events
taking place at an address. People swat
others with the intention of causing panic
and fear when armed response units arrive at
their home or place of work

A

swatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the corporate world, attacks can be
used to send masses of information to a
website in order to take the website down
and make it non-functional

A

corporate attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyberbullies can hack into a victim’s
social media accounts and post abusive or
damaging messages. This can be
particularly damaging for brands and
public figures

A

account hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fake social media accounts can
be setup with the intention of
damaging a person or brand’s
reputation

A

false profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

when girls are called out and labelled as “slut” for the way they look, the way they dress, and their presumed level of sexual activity.

A

slut shaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

why do people cyberbully

A
  • they’ve been bullied themselves
  • to fit in
  • home life
  • power
  • jealousy
  • cyberbullying and video games
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what to do when you are being cyberbullied

A
  • tell someone
  • walk away
  • resist the urge to retaliate or respond
  • report bullying
  • block the bully
  • be safe online
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • was introduced after the latest evolution in the computer industry and networks
  • the illegal usage of any communication device to commit or facilitate in committing any illegal act
A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the most common cybercrimes (11)

A
  • phishing
  • identity theft
  • ransomware
  • hacking
  • internet fraud
  • software piracy
  • social media fraud
  • online drug trafficking
  • intellectual property infringements
  • online recruitment fraud
  • child pornography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

when criminals send fraudulent emails
pretending to be from legitimate businesses, in an attempt to collect sensitive, personal
information.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

occurs when a cybercriminal uses another
person’s personal data like credit card numbers or personal pictures without their permission to commit a fraud or a crime

A

identity theft

25
Q

Cyber criminals install malicious software on your system that will essentially hold your important information hostage until you meet their demands

A

ransomware

26
Q

refers to the illegitimate
access, manipulation, or exploitation of
computer systems, networks, software,
or digital devices to gain information,
disrupt regular operations, or commit
illicit activities

A

hacking

27
Q

is a type of
cybercrimes that makes use of
the internet and it can be
considered a general term that
groups all of the crimes that
happen over the internet.

A

internet fraud

28
Q

is the illegal
use or copy of paid software with
violation of copyrights or license
restrictions

A

software piracy

29
Q

The use of
social media fake accounts to
perform any kind of harmful
activities like impersonating other
users or sending intimidating or
threatening messages

A

social media fraud

30
Q

With the big rise of cryptocurrency technology, it became easy to transfer money in a secured private way and complete drug deals without drawing the attention of law enforcement. This led to a rise in drug marketing on the internet .

A

online drug trafficking

31
Q

the violation or breach of any protected
intellectual-property rights such as copyrights and industrial designs.

A

intellectual property infringements

32
Q

is the fake job opportunities released by
fake companies for the purpose of
obtaining a financial benefit from
applicants or even making use of
their personal data

A

online recruitment fraud

33
Q

The National Center for Missing and Exploited Children received over 10 million reports of suspected child sexual exploitation in the last year alone. Perpetrators will use the Internet to gain access to sexually explicit images of children, and sometimes even arrange for a face-to-face meeting.

A

child pornography

34
Q

how to protect yourself from cybercrime

A
  1. keep your softwares and operating systems updated
  2. use antivirus softwares
  3. use strong passwords and authentication methods
  4. never open attachments in spam emails
  5. do not click links in spam emails/untrusted websites
  6. do not give out personal info
  7. be mindful of the websites you are visiting
  8. contact companies directly about suspicious requests
  9. keep an eye on your bank statements
35
Q

a term that
relates to the security of a
computer system being
compromised. This threat can lead
to cyber-attacks and data being
stolen, lost or edited.

A

computer threat

36
Q

refers to measures and controls that ensure the confidentiality, integrity and availability of the information processed and stored by a computer.

A

computer security

37
Q

types of computer threats

A
  • physical threats
  • non-physical threats
38
Q

what are types of non-physical threats

A
  • malware
  • virus
  • spyware
  • worms
  • trojan
  • denial of service attacks
  • key loggers
39
Q

a type of computer program that
infiltrates and damages systems
without the users’ knowledge

aka malicious software

A

malware

40
Q

a program that replicates
itself and infects your computer’s
files and programs, rendering
them inoperable

A

virus

41
Q

a type of computer
program that tracks, records, and
reports a user’s activity (offline and
online) without their permission for
the purpose of profit or data theft

A

spyware

42
Q

are similar to viruses in
that they replicate themselves and
can inflict similar damage.

these don’t change programs;
instead, they replicate themselves over
and over.

A

worms

43
Q

malicious software that is disguised as a
useful host program. When the host
program is run, the Trojan performs
a harmful/unwanted action

A

trojan

44
Q

an attacker tries to prohibit legitimate users from obtaining information or services

A

denial of service attacks

45
Q

a program that runs in the background and
records every keystroke made by a
user, then sends the data to a hacker
with the intent of stealing passwords
and financial information

A

key loggers

46
Q

portable electronic gadgets
designed for on-the-go use

A

mobile devices

47
Q

what are types of mobile computing devices

A
  1. personal digital assistant (pda)
  2. smartphones
  3. tablet PCs
  4. wearables
  5. apple ios
  6. google android
48
Q

handheld devices that combine elements of computing, telephone/fax, Internet and networking in a single device.

A

personal digital assistant

49
Q

combine mobile phone and a handheld computer into a single device

allow users to access and store information (e.g. e-mail) and install programs (applications) while also being able to use a mobile phone in one device.

A

smartphones

50
Q

an evolution of the notebook computer
with touchscreen LCD screens that can be utilized with your fingertips or with stylus.

A

tablet PCs

51
Q

Smartwatches and fitness trackers are among
the newest additions to the mobile device
landscape

A

wearables

52
Q

powers the company’s line of mobile devices like the iPhone, iPad, iPod touch, and Apple TV.

A

apple ios

53
Q

mobile operating system based on Linux that has quickly become the biggest competitor
to Apple iOS in the mobile device market.

A

google android

54
Q

what are the early mobile os

A
  1. palm ios
  2. symbian os
  3. linux
  4. mxi
55
Q

has provided mobile devices with essential business tools, as well as capability to access the Internet or a central corporate database via a wireless connection.Link: Palm OS Web site

A

palm ios

56
Q

has become a standard operating
system for smartphones, and is licensed by more than 85 percent of the world’s handset
manufacturers.

designed for the specific requirements of 2.5G and 3G mobile phones

A

symbian os

57
Q

The first company to launch phones with Linux as its OS was Motorola in 2003.

has been seen as a suitable option for higher-end phones with powerful processors and larger amounts of memory.

A

linux

58
Q

universal mobile operating system that
allows existing full-fledged desktop and mobile
applications written for Windows, Linux, Java and Palm to be enabled immediately on mobile devices without any redevelopment

allows for interoperability between various platforms, networks, software and hardware components

A

mxi

59
Q

what are the digital traits

(uil gcbi)

A
  1. utilize learner-centered classroom and tailored instruction
  2. inspire students to create
  3. learn new technologies
  4. go paperless
  5. collaborate
  6. build footprints
  7. innovate