Disadvantages of ICT Flashcards

1
Q

are illegal acts done through the use of the Internet.

A

Cybercrimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the act of sending multiple emails to multiple users in hopes of having a number of them clicking on the links or malwares attached to the email.

A

Phishing/Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the act of wagering on any sports event over the Internet. In some countries, gambling (including sports betting) is illegal even if you are doing it over the Internet.

A

Sports Betting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the act of devising a scheme wherein a culprit posts an item or service for sale over the Internet and once the transactions have been done, does not really give the item or service.

A

Non-Delivery of Merchandise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the act of anonymously using the Internet to harass, abuse, threaten, or annoy other people

A

Electronic Harassment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the act of using the Internet to show child pornography. This act is highly punishable by law.

A

Child Pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

using the Internet. the act of selling illegal substances

A

Drug Trafficking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the act of piracy mainly for financial gain. In late 2014, the number one pirate website, ThePirateBay, was raided for the second time due to years of pirating movies, music, games, books, and other software. These kinds of websites earn money through advertising.

A

Criminal Copyright Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Before a hacker can get through the unauthorized files he or she is targeting, the hacker has to get through several security measures like firewalls, secure connections, passwords, anti-malwares, and data encryptions. The Disadvantages of ICT 177

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

URL tracing and logging are used by websites to track your unique IP addresses. This can be used by investigators to trace hackers. In piracy, trackers are used to identify IP addresses currently sharing a pirated file.

A

Investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

More and more laws are being created and implemented today. Penalties include both a fine and imprisonment.

A

Penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly