Empowerment Technologies Flashcards

1
Q

restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Its goal is to acquire personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a

website and be asked to update his/her username, passwords, credit card, or personal information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or date storage like flash drives and CDs

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

stands for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a program designed to send you advertisements, mostly as pop-ups

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you create something – an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the copyright law includes your rights over your work, and anyone who uses it without your consent is punishable by law.

A

Copyright Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the synergy of the technological advancements to work on a similar goal or task.

A

Technical convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a term coined by Darcy DiNucci on January 1999. In her article titled, “Fragmented Future”

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These are sites that focus on short updates from the users. Those subscribed to the user will be able to receive these updates. Examples: Twitter and Plurk

A

Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are sites that allow you to connect with other people with the same interests or background. Once a user creates his/her account, he/she can set up a profile, add people, create groups, and share content. Examples: Facebook and Google+

A

Social Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– a program that runs in the background without you knowing it). It has the ability to monitor what are you currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unwanted email mostly from bots or advertisers. It can be used to send malware

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

concerned with the “proper” way to communicate in an online environment.

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Core Rules of Netiquette

When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press “send” or “submit,” ask yourself, “Would I be okay with this if someone else had written it?”

A

Remember the Human

17
Q

Rules of Netiquette

While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit “cyberspace.” Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.

A

Adhere to the same standards of behavior online that you follow in real life

18
Q

Rules of netiquette

“Netiquette varies from domain to domain.” (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?

A

Know where you are in cyberspace

19
Q

Rules of netiquette

Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don’t have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn’t wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.

A

Respect other people’s time and bandwidth

20
Q

Rules of netiquette

One of the best things about the virtual world is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the following tips in mind:
Always check for spelling and grammar errors Know what you’re talking about and state it clearly Be pleasant and polite

A

Make yourself look good online

21
Q

Rules of netiquette

The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in fact, this “information sharing” capability is one of the reasons the Internet was founded. So in the spirit of the Internet’s “founding fathers,” share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references about your subject matter. Recently expanded your knowledge about a subject that might be of interest to others? Share that as well.

A

Share expert knowledge

22
Q

Rules of netiquette

What is meant by “flaming” and “flame wars?” “Flaming is what people do when they express a strongly held opinion without holding back any emotion.” (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While “flaming” is not necessarily forbidden in virtual communication, “flame wars,” when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the group could be compromised. Don’t feed the flames; extinguish them by guiding the discussion back to a more productive direction.

A

Help keep flame wars under control

23
Q

Rules of netiquette

Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information “got into the wrong hands?” Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.

A

Respect other people’s privacy

24
Q

Rules of netiquette

Just like in face-to-face situations, there are people in cyberspace who have more “power” than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it’s you who possesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human.

A

Don’t abuse power

25
Q

Rules of netiquette

Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it’s a minor “offense,” you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.

A

Be forgiving of other people’s mistakes