ICT PART 2 Flashcards

1
Q

is a place on the Internet where users with
common interests interact with each other to find

A

fORUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a word or group of words that a person may use to search for in a search engine

A

Keyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are software systems that people got to search for things on the Internet.
Examples of popular search engines are Yahoo!, Google, or Bing.

A

Search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a seminar conducted over the Internet making
it possible to “virtually attend” through an Internet connection.

A

webinar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a site written, controlled, and edited by the users themselves.

A

wiki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is the page seen by the user when browsing the Internet. The webpage can be
compared to a page in a magazine.

A

webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are specific addresses of the Internet pages and files.

A

UNIFORM RESOURCE LOCATORS (URLs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a term generally applies to the transfer of data from the Internet to the
computer or mobile device.

A

downloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a broad term used to describe a protective barrier against computer bugs or viruses

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is also called cyber safety or digital safety which refers to practices and
precautions one should observe when using the Internet.

A

Online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a very broad issue covering security in relation to transactions made
over the Internet.

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It compasses the security of data entered through a web form, browser
security, and overall authentication and protection of data sent via Internet protocol.

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to a set of moral principles that govern an individual or a group on what is
considered as acceptable behavior while using a computer.

A

ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

means acceptable rules for online behavior.

A

netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

by means of a hand-held device, such as mobile phone or a tablet. This
takes place anytime and anywhere.

A

mobile learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

may also be referred to as a digital classroom where learning takes
place over the Internet and not in a physical classroom.

A

virtual classroom

17
Q

what are viruses capable of?

A

Deleting and altering files
§ Redirecting web links to web sites you don’t intend to visit
§ Copying themselves and using up resources on your computer
system

18
Q

-Standalone malware computer program that replicates
itself in order to spread to other computers.

19
Q

It is a destructive program that pretends as a desirable application that
tricks the user to allow access to their computers through downloads or
email attachments.

A

trojan horse

20
Q

what are the types of virus

A

trojan horse
worm
virus

21
Q

It collects information about your browsing history, personal information and others.
Spyware are usually bundled with other software.

22
Q

It often uses the Internet to pass this

information along to third parties without you knowing.

23
Q

Frequent sources of spyware are?

A

file-sharing sites

24
Q

It uses a software to record everything you type on your keyboard. The program then
sends the log file to a specified server, where thieves can read any information you
type, including passwords, credit card numbers, etc.

25
What are frequent sources of keylogger
phishing sites
26
It shows you unwanted ads. It
adware
27
It could be also a type of free software supported by advertisements that show up in pop-up windows or on a toolbar on your computer or browser.
adware
28
annoying, but safe. It is often built into free software.
adware
29
is a devious approach that cybercrooks use to trick you into revealing personal information, such as passwords or credit card, social security, and bank account numbers.
phishing
30
It is also an email or instant message scam which looks like an official message from a legitimate organization like a bank and credit card details.
phishing
31
(criminals who pretend to be a legitimate organization) are responsible for phishing
phishers
32
It is an irrelevant, inappropriate, unwanted, or junk email that comes from legitimate companies which, in the long run may be used for phishing, scams, and malware.
spam
33
It is a fraudulent practice similar to phishing, except with pharming, a legitimate website’s traffic is manipulated to direct users to fake lookalikes that will either install malicious software on visitors’ computers, or harvest (pharm) users’ personal data, such as passwords or financial details. Even users with fully protected, malware-free devices can become victims
Pharming
34
A malicious software that is intended to damage or disable computer’s systems which has codes to collect information without one’s knowledge.
malware
35
Viruses, Trojan horse, worms and the like are considered as
malware
36
It happens when a criminal impersonates a user by stealing his or her personal information to withdraw money or pay goods online.
Identity theft
37
What are the different internet threats
spyware keylogger adware phishing spam pharming malware identity theft
38
How do you make a strong password?
You can make a smart password by combining letters, numbers, special characters, and uppercase letter.
39
how would you know if an site is safe?
Make sure that the website uses a secure technology feature. Verify if it begins with https web address.