Empowerment Technologies Flashcards
restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements.
Ransomware
a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
Trojan
Its goal is to acquire personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a
website and be asked to update his/her username, passwords, credit card, or personal information.
Phishing
a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or date storage like flash drives and CDs
Virus
stands for malicious software
Malware
a program designed to send you advertisements, mostly as pop-ups
Adware
If you create something – an idea, an invention, a form of literary work, or a research, you have the right as to how it should be used by others.
Intellectual Property
the copyright law includes your rights over your work, and anyone who uses it without your consent is punishable by law.
Copyright Infringement
the synergy of the technological advancements to work on a similar goal or task.
Technical convergence
a term coined by Darcy DiNucci on January 1999. In her article titled, “Fragmented Future”
Web 2.0
These are sites that focus on short updates from the users. Those subscribed to the user will be able to receive these updates. Examples: Twitter and Plurk
Microblogging
These are sites that allow you to connect with other people with the same interests or background. Once a user creates his/her account, he/she can set up a profile, add people, create groups, and share content. Examples: Facebook and Google+
Social Networks
– a program that runs in the background without you knowing it). It has the ability to monitor what are you currently doing and typing through keylogging.
*Keyloggers – used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
Spyware
unwanted email mostly from bots or advertisers. It can be used to send malware
spam
concerned with the “proper” way to communicate in an online environment.
Netiquette