ict Flashcards

1
Q

a combination of texts, numbers, and/or special characters to secure accounts

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

names, common words, birthdates, etc.

A

Weak Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

combination of all characters

A

Strong Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

also known as Cyberspace, is virtual in nature and unbounded unlike our physical environment.

A

Cyber World

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a digital representation of humans to interact in virtual world

A

Virtual Self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data that are available to anyone as long as they have an internet connection

A

Source of Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

digital socialization using chat, blogs, vlogs, online games, etc.

A

Social Interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tools for Social Interaction

A
  1. Facebook
  2. Twitter
  3. Tumblr
  4. Instagram
  5. Online games (Mobile Legends, COL, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

features of the Cyber World

A
  1. Cyber World
    2.Virtual Self
  2. Source of Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dangers and Threats on the Internet

A
  1. Hacking
  2. Identity Theft
  3. Internet Predators
  4. Cyberbullying
  5. Malicious Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

stealing and accessing private information of organizations such as government systems, business systems, etc.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the act of stealing important information from the target user by accessing online accounts such as bank accounts, etc.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

individuals who lure children or teenagers to engage in sexual acts or relationships online

A

Internet Predators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an online act of humiliation and/or threats that is done with and by children and teenagers

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

also known as malware, is created to invade and destroy computer systems

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virus stands for

A

Vital Information Resources under Siege

18
Q

is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system

A

worms

19
Q

LAN stands for

A

Local Area Network

20
Q

type of malware that disguises itself as legitimate code or software.

A

Trojan

21
Q

software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device’s security, or other means.

A

Spyware

22
Q

the term used for various pop-up advertisements that show up on your computer or mobile device

A

Adware

23
Q

type of malware that locks and encrypts a victim’s data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.

A

Ransomware

24
Q

Types of Malware

A
  1. virus
  2. worms
  3. trojan
  4. spyware
  5. adware
  6. ransomware
25
Q

method by which information is converted into secret code that hides the information’s true meaning

A

Encryption

26
Q

science of encrypting and decrypting information is called

A

Cryptography

27
Q

In computing, unencrypted data is also known as plaintext, and encrypted data is called

A

Ciphertext

28
Q

Tips to Stay Safe online

A
  1. Think before you click.
  2. Do not share personal information.
  3. Beware of phishing and scam.
  4. Keep your device secure.
  5. Never share passwords.
  6. Never agree to meet anyone you just met online
  7. Tell your guardian if something goes wrong online.
  8. Cover your webcam when not in used.
  9. Use a strong password.
  10. Make sure to logout your account in public devices.
29
Q

is a short term for “Internet etiquette,” which means proper behavior in cyberspace

A

Netiquette

30
Q

Remember that you are interacting with a person on the other end that deserves respect.

A

Remember the Human

31
Q

Always be lawful and ethical regardless of where you are.

A

Adhere to the same standards of behavior online that you follow in real life.

32
Q

Being rude is prohibited. Always know where you are

A

Know where you are in cyberspace

33
Q

Ensure that the content you give is meaningful and time is not wasted.

A

Respect other people’s time and bandwidth

34
Q

Always produce quality content while being true to yourself

A

Make yourself look good online.

35
Q

Make sure that the information you are sharing is reliable and credible

A

Share expert knowledge

36
Q

Never post messages that are provocative, for these add fuel to the fire.

A

Help keep flame wars under control.

37
Q

There is always a reason why something is private. Never publicly expose private information.

A

Respect other people’s privacy.

38
Q

Nobody has the right to take advantage of being knowledgeable in cyberspace.

A

Don’t abuse your power

39
Q

Give people the benefit of the doubt as they can commit mistakes. Nobody is perfect.

A

Be forgiving of other people’s mistakes

40
Q

rules of netiquette according to Virginia Shea

A
  1. Remember the Human
  2. Adhere to the same standards of behavior online that you follow in real life.
  3. Know where you are in cyberspace
  4. Respect other people’s time and bandwidth
  5. Make yourself look good online.
  6. Share expert knowledge
  7. Help keep flame wars under control.
  8. Respect other people’s privacy.
  9. Don’t abuse your power
  10. Be forgiving of other people’s mistakes