Lesson 2 Flashcards

(22 cards)

1
Q

A crime committed or assisted through the use of the Internet.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It tells the user how the website will handle its data.

A

Privacy Policy/ Terms of Services (ToS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

stands for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A malicious program designed to transfer from one computer to another by any means possible.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A program that runs in the background without you knowing it. It can monitor what you are currently doing and typing through keylogging.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A program designed to send you advertisements, mostly pop-ups.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unwanted emails mostly from bots or advertisers.

A

Spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Acquires sensitive personal information like passwords and credit card details.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A more complicated way of phishing where it exploits the DNS system.

A

Pharming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A part of the law wherein you have the right to work, anyone who uses it without your consent is punishable by law.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Means that intellectual property may be used without consent as long as it is used in commentaries, criticism, parodies, research, etc.

A

Fair use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used to record the keystrokes done by the user. This is done to steal passwords or any other sensitive information.

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the knowledge of maximizing the user’s personal safety and security risks to private information and property associated with intemet use, and the self-protection from computer harm in general.

A

Online Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a tree branch of computer security specifically related to the internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems as a whole.

A

Online Security

17
Q

refers to patterns of behavior used when on the internet, guided both by law and personal philosophy. The great capabilities of this communication medium allow for the potential of great harm, cruelty, and even crime

A

Online Ethics

18
Q

Even though we’re going to list this as a way to avoid plagiarism, it’s also possible to cause it while using this technique. It’s all about doing it right. And just one tiny component added to paraphrasing can help you keep from plagiarizing material. Keep reading to find out how to paraphrase right.

19
Q

It might not seem wrong to reuse works that you’ve written in the past but it is, The problem is that this work has already been evaluated. So, unless you acknowledge that you’re using your previous findings, it will be classified as plagiarism.

A

Self-plagiarism

20
Q

It might not seem wrong to reuse works that you’ve written in the past but it is, The problem is that this work has already been evaluated. So, unless you acknowledge that you’re using your previous findings, it will be classified as plagiarism.

A

Self-plagiarism

21
Q

this one is more of an unintentional case of plagiarism. The main characteristic of it is that the work only contains source materials.

A

Piling up sources

22
Q

the most obvious one. And the name explains it all. It’s using another person’s work completely unaltered and without referencing the source.