IT FINALS Flashcards

(98 cards)

1
Q

Republic Act No. 10175 is

A

Cybercrime Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

approved on

A

September 12, 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Focuses on the pre-emption, prevention, and prosecution of cybercrime such as offenses against the privacy, confidentiality, integrity, and availability of computer data and systems

A

Cybercrime Prevention Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Salient Points of RA 10175

A
  • Internationally consistent definitions for cybercrime
  • Nuanced liability for cybercrime offenders
  • Increased penalties
  • Enhanced authority granted to law enforcement authorities
  • Expanded jurisdictional authority for prosecution
  • Provisions for international cybercrime coordination effort and greater ability to combat cybercrimes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

intentional alteration or reckless hindering with the functioning of computer system or computer network

A

system interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

interception made by technical means without right

A

illegal interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

accessing the whole or any part of the computer system without right

A

illegal access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

use production sale, procurement, importation, distribution or otherwise making available, without right

A

misuse of device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

intentional or reckless alteration, damaging, deletion or deterioration of computer data, including the introduction or transmission of devices

A

data interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same

A

cyber-squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of computer systems, for favor or considerations

A

cybersex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

any visual depiction of minor engaging in sexually explicit activity

A

child pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

it is the act of making false and malicious statements online that harm another’s reputation

A

cyber libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

intentional acquisition use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridicial without right

A

identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

relating to or involving computers or computer networks

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Refers to the virtual computer world
  • an electronic medium used to form a global computer network to facilitate online communication
A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

refers to the criminal activities carried out by mean of computer of the internet

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the persona you create about yourself virtually

A

Virtual Self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) often for malicious reasons, by disguising as a trustworthy entity in an electronic communication

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

refers to obtaining files that you do not have the right to use from the internet

A

Illegal Downloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Illegal Downloading Sites:

A
  • The Pirate Bay
  • Kickass.to
  • TorrentDownloads.me
  • YTS.ag
  • RARBG.to
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Legal Downloading Sites:

A
  • iTunes
  • Yahoo Music
  • Amazon
  • Netflix
  • Ruckus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
the practice of illegally copying and selling digital music video, computer software, etc.
Digital Privacy
24
is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in other person's name
Identity Theft
25
is a form of child sexual exploitation
Child Pornography
26
Cybersex are called
computer sex internet sex net sex
27
is registering, trafficking in, or using an internet domain name with bad faith intent to profit from the good will of a trademark belonging to someone else
Cyber-squatting
28
An act protecting individual personal information in information and communication systems in the government and the private sector, creating for this purpose a national privacy commission and for other purposes
R.A. 10173
29
R.A. 10173 is also known as the
Data Privacy Act of 2012
30
the intellectual property ode of the Philippines of 1997
R.A. 8293
31
Types of Plagiarism (Sources Cited)
- The Forgotten Footnote - The Misinformer -The Too Perfect Paraphrase - The Resourceful Citer The Perfect Crime
32
the writer has altered the paper's appearance slightly by changing key words and phrases
The Poor Disguise
32
states that work are protected by the sole fact of their creation, irrespective of their mode or form of expression, as well as as their content, quality, and purpose
Section 172.2
32
act of using another person's words or ideas without giving credit to the person
Plagiarism
32
the writer copies significant portion of text straight from a single source, without alteration
The Photocopy
33
Types of Plagiarism (Sources Not Cited)
- The Ghost Writer - The Photocopy - The Potluck Paper - The Poor Disguise - The Labor of Laziness - The Self-Stealer
33
- a human right - a law in favor of creators for a limited period of time
Copyright
34
the writer copies from several different sources, tweaking the sentences to make them fit together, while retaining the most of the original phrasing
The Potluck Paper
34
the writer turns in another's work, word for word, as his or her own
The Ghost Writer
35
the writer provides inaccurate information regarding the sources, making it impossible to find them
The Misinformer
35
The writer borrows genuinely from his previous work
The Self-Stealer
36
the writer takes the time to paraphrase most of the paper from the sources and make it all fit together
The Labor of Laziness
37
the writer mentions an author's name for source, but neglects to include specific information on the location of the material referenced
The Forgotten Footnote
38
the writer properly cites a source, but neglects to put in quotation marks on test that has been copied word for word, or close to it
The Too-Perfect Paraphrase
39
the writer properly cites all sources, paraphrasing and using quotations appropriately
The Resourceful Citer
39
the writer properly quotes and cites sources in some places, but goes on to paraphrase other arguments from those sources without citation
The Perfect Crime
40
- government surveillance - security encryption
Constitutional
40
it is right to keep personal matters privately
Privacy
41
- transactional data collection and processing - spam, identity theft, etc.
Privacy in e-commerce
42
- cookies - RFID
Specific Technologies
43
What values are served by preventing or limiting the flow of the information?
- Sphere of freedom from law - Sphere of freedom from social norms - Sphere of freedom from markets - Power of Self-definition
44
being construed by another
profiling and data-mining
45
being limited by another
control over information received
46
allows you to create documents and combine or merge them with another document or data file
Mail merge and label generation
46
Create a document and just copy and paste it several times then just replace the details depending on whom you send it o
Manual Method
46
document that contains the main body of the message we want to convey and send
Form Document
47
Individual Information or data needs to be plugged in (merged) to the form document is placed and maintained
List or Data File
47
two components of mail merging:
- Form Document - List or Data File
47
- Generally, these are electronic or digital pictures or photographs you have saved in any local storage device. - There are three commonly used types of picture files. - You can identify them by the extension on their file names.
Pictures
47
- Matching address printed directly on the envelope or on a mailing label to stick on. - MS word will print Individual addresses to a standard form that it has already pre-formatted
Label Generation
48
- Data fields or merge fields. - Marks the position on your form document where individual data or information will be inserted - Soft copy - denoted by double headed arrows (<< >>) with a gray background - Printed form – underlined spaces that will serve as guide to the information that you need to fill out
Place Holders
49
- This is pronounced as “jay-peg“ and is the short form of .jpeg or Joint Photographic Experts Group. - Like all the rest of the image file extensions, it identifies the kind of data compression process that it uses to make it more compatible and portable through the Internet. - This type of image file can support 16.7 million colors that is why it is suitable for use when working with full color photographic images. - Does not support transparency and therefore, images of this file type can be difficult to integrate in terms of blending with other materials or elements in your document.
JPG/JPEG
50
- This type of image file is capable of displaying transparencies. - Good for blending with other materials or elements in your document. - Capable of displaying simple animation.
GIF
51
GIF stands for
Graphics Interchange Format
52
JPEG stands for
Joint Photographic Experts Group
53
PNG stands for
Portable Network Graphics
54
- built around the capabilities of .GIF. -also good with transparencies but unlike .GIFs, it does not support animation but it can display up to 16 million colors, so image quality for this image file type is also remarkably improved. - allows the control of the transparency level or opacity of images.
PNG
54
This is generally a .GIF type; line art drawings or images used as generic representation for ideas and objects that you might want to integrate in your document.
Clip Art
55
printable objects or materials that you can integrate in your document to enhance its appearance or allow you to have some tools to use for composing and representing ideas or messages.
Shapes
56
- these are predefined sets of different shapes grouped together to form ideas that are organizational or structural in nature. - If you want to graphically represent an organization, process, relationships, or flow for infographic documents, then you will find this easy and handy to use.
Smart Art
57
- Another type of material that you can integrate in your Word document that allows you to represent data characteristics and trends. - useful when you are preparing reports that correlate and present data in a graphical manner.
Chart
58
- creating reports or manuals for training or procedures will require the integration of a more realistic image of what you are discussing on your report or manual. - Nothing can get you a more realistic image than a screenshot.
Screenshot
59
- This is the default setting for images that are inserted or integrated in your document. - treats your image like a text font with the bottom side totally aligned with the text line. - This setting is usually used when you need to place your image at the beginning of a paragraph.
In Line with Text
60
This setting allows the image you inserted to be placed anywhere with the paragraph with the text going around the image in a square pattern like frame.
Square
61
- This is almost the same as the Square setting, but here the text “hug” or conforms to the general shape of the image. - allows you to get a more creative effect on your document. - This setting can mostly be achieved if you are using an image that supports transparency like a .GIF or .PNG file.
Tight
62
- This setting allows the text on your document to flow even tighter taking the contours and shape of the image. - Again, this can be best used with .GIF or .PNG type of image.
Through
63
This setting pushes the texts away vertically to the top and/or the bottom of the image so that the image occupies a whole text line on its own.
Top and Bottom
64
- This allows your image to be dragged and placed anywhere on your document but with all the texts floating in front of it. - It effectively makes your image look like a background.
In Front of Text
65
allows user to organize data in rows and columns and perform calculations on the data
Spreadsheet Software
66
these rows and columns collectively are called
Worksheet
66
how many rows?
1,048,576 rows
66
how many sheets?
255 sheets
67
how many columns?
16,384 columns
68
Examples of Spreadsheet Software
- LibreOffice Calc - OpenOffice.org Calc - StarOffice Calc - Google Sheets - Microsoft Excel - Apple iWork Numbers - Kingsoft Office Spreadsheets
69
Example of Word Software
- Microsoft Word - WPS - Google Docs - iWork Pages - LibreOffice Writer
70
horizontal line of entries in a table
Row
71
vertical line of entries in a table
Columns
71
the selected cell
Active Cell
72
the place where information is held in a spreadsheet
Cell
73
the box at the top of each column containing a letter
Column Heading
73
the box at the left side that contain number
Row Heading
73
combining or joining two or more cells
Merge
74
the cell address of the cell usually combines with letters and numbers
Cell Reference
75
are predefined formulas and are already available in excel
Functions
76
is an expression which calculate the value of a cell
Formula
77
the bar that contains the contents of a cell
Formula Bar