Empower technologies 2 Flashcards

1
Q

It is an interactive process to collect
and gather data and information

through online.

Ease and speed

A

ONLINE SEARCH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ability to use online library catalogue, online library databases
(e.g., FirstSearch) and their Boolean operators.

A

Online research skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ability to identify and use best scholarly resources,
knowledge of terminology (e.g., abstract and bibliography)
and citation rules.

A

Knowledge of information resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ability to identify plagiarism and copyright violations.

A

Understanding of plagiarism and copyright issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Measures the extent to which a student relies on the Internet
and search engines (e.g., Yahoo and Google) to obtain
scholarly resources for class research projects (e.g., papers,
research assignments).

A

Attitudes toward internet research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ability to evaluate the quality of full-text articles from scholarly
Journals.

A

Evaluation of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Motivation to supplement instructor-assigned readings with

additional materials.

A

Motivation to supplement readings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contacts with librarians, access to OCLS Web site, use of

document delivery services, and general use of libraries.

A

Frequency of library use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Likelihood of contacting a reference librarian.

A

Likelihood of contacting a librarian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Writing papers, citing sources, using bibliographies,
encyciopedias, periodical indexes and subject headings,
summarizing ideas and other research behaviors.

A

Research experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

refer to software created to
cause a broad range of risks or damage to
websites, files, or networks dependent on

the Internet.

A

Web threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A malicious software that is needed to
damage or disable computer systems which
has codes to collect information without
one’s knowledge.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
An e-mail or instant
message scam which
looks like an official
message from a
legitimate organization
that asks about one’s
personal information
such as password and
details.
A

PHISHING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
An irrelevant,
inappropriate, unwanted
e-mail that comes from
legitimate companies
which, in the long run
may be used for
phishing, scams, and
malware.
A

SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A technique which
directs legitimate
website’s traffic to an
illegitimate website to
gain access to a user’s
personal information.
A

PHARMING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The use of technologies to
display behavior that
harms another.
Hurtful messages are
posted and/or shared
through email, instant
messaging, and social
networking sites.
A

CYBERBULLYING

17
Q

It is a term used to
describe inappropriate
photos or text sent via
cellphone or mobile

phone.

A

SEXTING

18
Q

It is also called cyber safety or digital safety
which refers to practices and precautions
one should observe when using the Internet.

A

ONLINE SAFETY

19
Q

It encompasses the security of data entered through a web
form, browser security, and overall authentication and

protection of data sent via Internet protocol.

A

INTERNET SECURITY

20
Q

Consent of the data subject refers to any freely
given, specific, informed indication of will, whereby
the data subject agrees to the collection and
processing of personal information about and/or
relating to him or her. Consent shall be evidenced
by written, electronic or recorded means. It may
also be given on behalf of the data subject by an
agent specifically authorized by the data subject to
do so.

A

DATA PRIVACY ACT

Republic Act No. 10173 – “Data Privacy Act of 2012”

21
Q

Acceptable rules for online behavior.

The word “netiquette” is formed from the words

“net” and “etiquette”.

A

NETIQUETTE

22
Q

The word “netiquette” is formed from the words

A

“net” and “etiquette”

23
Q

Stealing one’s idea.

Proper citation should be observed.

A

PLAGIARISM