The Netiquette and the Computer Ethics - MST Flashcards

1
Q

The violation, piracy or theft of a copyright holder’s exclusive
rights through the unauthorized use of a copyrighted material or work.

A

Copyright infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes.

A

Republic Act No. 10173 Data Privacy Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Program designed to send you advertisements, mostly as pop ups. You can usually see adware in restricted or unwanted site.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement.

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.

A

Cybersex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.

A

Republic Act No. 10175 Cybercrime Prevention Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of intellectual property that gives its owner the exclusive right to print, publish, distribute, adapt, display, and perform a creative work. In simpler terms, copyright is the right to copy

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An adjective or prefix which means relating to or characteristic
of information technology, virtual reality, and computers

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Individuals or teams of people who use technology to commit
malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A more complicated way of phishing where it exploits the Domain Name Service (DNS) system. It is when a hacker directs an internet user to a fake website instead of a legitimate one.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Program that runs in the background without knowing it. That’s why it is called “spy”. It has the ability to monitor what are you are currently doing through keylogging.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious program designed to replicate itself and transfer from one computer to another either through the internet and local network or data storage (like flash drives and CD’s)

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allow hackers to get information. It is an executable file that will install itself and run automatically once it’s downloaded.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An unprivileged false statement of fact which tends to harm the reputation of a person or company

A

Cyber Libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These were created in 1992 by the Washington, D.C. based Computer Ethics Institute.

A

Ten Commandments of Computer Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An act is to provide safer communities by creating administrative and court processes that can be used to address and prevent cyberbullying.

A

Republic Act No. 10627. The Anti-Bullying Act of 2013

17
Q

Unauthorized access of or interference with computer systems, servers, or information and communication system or any access in order to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent of the owner of the computer or information communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents.

A

Hacking

18
Q

A form of cybercrime that involves illegal downloading and obtaining files that you do not have the right to use from the internet (Digital Piracy, Practice of illegally copying and selling digital music, video, computer software, etc.)

A

Electronic theft

19
Q

The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.

A

Spamming

20
Q

Malicious program designed that transfer from one computer to another by any type of means. Often, it uses a computer network to spread it.

A

Worm

21
Q

A crime in which a computer or the internet is the object of the
crime (hacking, phishing, spamming and child pornography) and used as a tool to commit an offense.

A

Cybercrime

22
Q

A form of child sexual exploitation committed through a computer system

A

Child Pornography

23
Q

The etiquette of cyberspace and set of rules for behaving properly online.

A

Netiquette

24
Q

It is a threat that makes use of the World Wide Web to disperse, conceal, and update itself to facilitate cybercrime.

A

Internet threat

25
Q

An act defining the crime of child pornography, prescribing penalties therefor and for other purposes.

A

Republic Act No. 9775. The Anti- Child Pornography Act of 2009

26
Q

A type of internet threat; it is one of the more common ways to
infiltrate or damage your computer.

A

Malware

27
Q

Its goal is to acquire sensitive personal information like password and credit card details; done by sending you email that will direct the user to visit a website and be asked to update his/her username, password, credit card details or personal information

A

Phishing

28
Q

An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.

A

Computer-related forgery, fraud and/or identity theft

29
Q

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature

A

Cyberbullying