Online Safety, Security, Ethics, and Etiquette Flashcards

1
Q

a network of zombie computers that have been taken over by a robot

A

Internet bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

generic term for spy ware and adware

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

advertising, automatically delivers advertisements

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

that function by spying on user activity without their knowledge

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

program design to replicate by attaching itself into other computer problem

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

it can be injected inti a network bye any type like USB

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A TYPE OF MALWARE THAT DISGUISES ITSELF AS

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ALSO KNOWN AS LOVE BUG OR LOVE LETTER.

A

ILOVEYOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A MALFUNCTION ON A COMPUTER SYSTEM THROUGH ITS RUNTIME.

A

COMPUTER BUG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

THE USE OF THE INTERNET OR OTHER ELECTRONIC DEVICE TO HARASS OR STALK INDIVIDUAL, GROUP OR ORGANIZATION.

A

CYBER STALKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

THE ACT ORTORMRORT ORMENTING,THREATENING, HARRASSING

A

CYBER BULLYING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DESCRIBES A CRIMINAL WHO IMPERSONATES ANOTHER INDIVIDUAL OR

A

SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HAPPENS WHEN MALWARE OR SPYWARE REPLACES A WEB USERS BROWSER HOMEPAGE THAT REDIRECTS THE USE TO UNWANTED.

A

BROWSING HIJACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HAPPENS WHEN CRIMINAL IMPERSONATES A USER BY STEALING HIS OR HER PERSONAL INFORMATION TO WITHDRAW MONEY

A

IDENTITY THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ENABLES A USER TO OBTAIN INFORMATION ABOUT ANOTHER COMPUTER ACTIVITIES BY TRANSMITTING DATA CORRECTLY TO ONES HARD DRIVE.

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IS A DESTRUCTIVE PROGRAM THAT PRETENDS AS A DESIRABLE APPLICATION THAT TRICKS USER TO ALLOW ACCESS TO COMPUTERS THROUGH DOWNLOADS OR E-MAIL ATTACHMENTS.

A

TROJAN HORSE

17
Q

CONCERNED WITH HOW COMPUTING PROFESSIONALS SHOULD MAKE DECISIONS REGARDING PROFESSIONALS AND SOCIAL CONDUCT.

A

COMPUTER ETHICS

18
Q

10 CORE RULES OF NETIQUETTE

A
  1. REMEMBER THE HUMAN
  2. ADHERE TO THE SAME STAND OF BEHAVIOR ONLINE THAT YOU WOULD FOLLOW IN REAL LIFE.
  3. KNOW WHERE YOU ARE IN CYBER SPACE.
  4. RESPECT OTHER PEOPLE TIME AND BANDWITH.
  5. MAKE YOUSELF LOOK GOOD.
  6. SHARE EXPERT KNOWLEDGE.
  7. HELP KEEP FLAMES WARE UNDER CONTROL.
  8. RESPECT OTHER PEOPLE’S PRIVACY.
  9. DON’T ABUSE YOUR POWER.
  10. BE FORGIVING OF OTHERS PEOPLE’S MISTAKE.
19
Q

Safebook

A

think
friends
kind
password
privacy
hurt