Module 2 Flashcards

(41 cards)

1
Q

9 Netiquette Guidelines

A
  1. No Yelling Please!
  2. Sarcasm can (and will) backfire
  3. Do not abuse the chatbox.
  4. Attempt to find your own answer.
  5. Stop… Grammar time!
  6. Set a respectful tone.
  7. Submit files the right way.
  8. Read first.
  9. Think before you type.
  10. Be kind and professional.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to the do’s and don’ts of online communication.

A

Netiquette - Network Etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Netiquette cover?

A

both common courtesy online and the informal “rules of the road” of cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Golden Rule of Netiquette

A

Do unto others as you would have them do unto you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any threat that uses the World Wide Web to facilitate cybercrime

A

Internet Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Any threat that uses the World Wide Web to facilitate cybercrime

A

Malware - Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet Threats

A

Malware, Spam, Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Malware

A

Virus, Worm, Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

malicious program designed to replicate itself and transfer from one
computer to another either through the Internet and local networks or data
storage like flash drives and CDs

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

malicious program that transfers from one computer to another by any
type of means - usually uses a computer network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malicious program that is disguised as a useful program but once
downloaded, leaves the PC unprotected and allows hackers to get user information

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan software that looks like a security software

A

Rogue Security Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

program that runs in the background and has the ability to monitor what the user is currently doing and typing
through keylogging

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used to record the keystroke done by the users

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to record the keystroke done by the users

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

type of malicious software from crypto virology that threatens victim’s data until ransom is paid

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unwanted email mostly from bots or advertisers.

18
Q

Sends you an email that will direct the user to visit a website and be asked to
update his/her personal information

19
Q

Voice Phishing done through call

20
Q

Text Phishing

21
Q

A more complicated way of phishing where it exploits the DNS (Domain Name Service) system

22
Q

an act protecting individual personal
information in information and communications systems in the government and the private
sector

A

Republic Act 10173 – Data Privacy Act of 2012

23
Q

refers to any individual person who can be identified, directly or indirectly, via an
identifier

24
Q

Rights of the Data Subject

A

Article 15 - 21 (no 19)

access, rectification, erasure, restrict processing, data portability, object to processing

25
refers to person or organization who controls the collection, holding or use of personal information including those who instruct others to do so
Personal Information Controller
26
refers to the natural or juridical person to whom a personal information controller may outsource the processing of personal data about a data subject
Personal Information Processor
27
Type of Malware that accesses a back-door entry?
Trojan
28
a person's idea, literary work or invention
Intellectual Property
29
states that anyone who uses your work without your consent is punishable by law
Copyright
30
A provision that allows you to use copyrighted work without consent with certain limitations
Fair Use
31
How to Avoid Copyright Infringement?
Understand, Be Responsible, Be Creative, Know the Law
32
a set of abilities requiring individuals to "recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information."
Information literacy
33
How does acquiring knowledge help a person?
Person becomes competitive, independent, and productive
34
Steps to online research
``` Have a question Narrow it down Advance search Look for credible source Give credits ```
35
Ways to search online
OPAC -Online Public Access Catalog Search Engine URL - Uniform Resource Locator or web page address Hashtag
36
What does the + operator do
Results include both words
37
What does the OR operator do
Results have only one of the words
38
What does the () operator do
Combines words with the or function
39
What does the -- operator do?
Excludes a word
40
What does the "" operator do
Searches for an exact phrase
41
What does the * operator do
Substitute characters in place of the asterisk