EMPTECH Flashcards

1
Q

deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send and edit information.

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When the World Wide Web was invented, most web pages were static. Static (also known as flat page or stationary page) in the sense that the page is “as is” and cannot be manipulated by the user.

A

WEB 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the evolution of Web1.0 by adding dynamic webpages—the user is able to see a website differently than others.

Allows users to interact with the page: instead of just reading a page, the user may be able to comment or create a user account.

Examples this include social net working sites, blogs, wikis, video sharing sites, hosted services, and web applications.

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It allows users to categorize and classify/arrange information using freely chosen keywords (e.g., tagging).

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Content is dynamic and is responsive to user’s input.

A

Rich User Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Services are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file-size-based pricing or vice versa.

A

Long Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comment, reviews, and evaluation.

A

User Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software.

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a diverse information sharing through universal web access.

A

Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a movement led by the World Wide Web Consortium (W3C)

provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries.

A

WEB 3.0 (Semantic Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technological convergence is the synergy of technological advancements to work on a similar goal or task.

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a website, application, or online channels that enable web users to create, co-create, discuss, modify, and exchange user-generated content.

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These are sites that allow you to connect with other people with the same interests or background.

A

Social Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These are sites that allow you to store and manage links to various websites and resources.

A

Bookmarking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These are sites that allow users to post their own news items or links to other news sources

A

Social News

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These are sites that allow you to upload and share media content like images, music, and video

A

Media Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These are sites that focus on short updates from the user.

A

Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These websites allow users to post their content.

A

Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers

A

Mobile Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is a nonprofit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.

A

Assistive Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

stands for malicious software

Types: Virus, Worm, Trojan, Spyware, Adware

A

Malware

22
Q

unwanted email mostly from bots or advertisers. It can be used to send malware.

A

Spam

23
Q

Its goal is to acquire sensitive personal information like passwords and credit card details.

A

Phishing

24
Q

refers to a program that induces internet fraud by using security exploits on a target system to mislead, scare or deceive the user into downloading a program, either free for by paying money, in exchange for the removal of malware it claims is on the target system.

A

Rogue security software

25
Q

are a type of monitoring software designed to record keystrokes made by a user.

Record the information you type into a website or application and send to back to a third party

A

Keyloggers

26
Q

is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.

has been called “phishing without a lure.”

A

Pharming

27
Q

Is the crime of obtaining the personal or financial information of another person for the sole purposes of assuming that person’s name or identity to make transactions or purchases.

A

Identity theft

28
Q

a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record.

A

Criminal identity theft

29
Q

someone identifies himself as another person to obtain free medical care.

A

Medical identity theft

30
Q

someone uses another person’s identity or information to obtain credit, goods, services or benefits.

This is the most common form of identity theft.

A

Financial identity theft

31
Q

someone uses a child’s identity for various forms of personal gain.

A

Child identity theft

32
Q

is a type of fraud in which a criminal combines real (usually stolen)and fake information to create anew identity, which is used to open fraudulent accounts and make fraudulent purchases.

A

Synthetic identity theft

33
Q

is a cybercrime in which scammers send a malicious email to individual(s) or mass users of any organization by impersonating a known individual or a business partner or a service provider.

A

Phishing

34
Q

Appears to come from a well-known company like Netflix and asks you to sign in and correct an issue with your account.

Links points to a website pretending to be a company’s legitimate site and asks for your log in credentials

A

Account Verification

35
Q

Contains a link to what appears to be shared file on Google docs, drop box or another filesharing.

Link points to a page pretending to be a file-sharing site and requests you log in.

A

Cloud File Sharing

36
Q

Link will prompt you to sign into view the document, giving attackers control of your inbox.

A

Docusign

37
Q

Contains document presented as an unpaid invoice and claims service will be terminated if invoice is not paid.

A

Fake Invoice

38
Q

Appears to come from a popular delivery service or online retail and includes delivery notification with a malicious link or attachment.

A

Delivery Notifications

39
Q

Appears to come from a government tax revenue agency. Claims you are delinquent on your taxes and provide a means to the issue before additional fines or legal actions are pursued.

A

Tax Scam

40
Q

is the gaining of unauthorized access to data in a system or computer

A

Hacking

41
Q

The implies replicating the original website to that the unsuspecting user enters the information like account password, credit card details, which the hacker seizes and misuses

A

Virus

42
Q

This basically uses the cache data of a website or domain that the user might have forgotten about. It then directs the data to another malicious website.

A

DNS Spoofing

43
Q

These are released by the hacker into the files of the website once they enter into it. The purpose is to corrupt the information or resources on the website.

A

UI Redness

44
Q

A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration Testing and vulnerability assessments.

A

Ethical Hacker (White Hat)

45
Q

A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.

A

Cracker (Black Hat)

46
Q

A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

A

Grey Hat

47
Q

A non-skilled person who gains access to computer systems using already made tools.

A

Script kiddies

48
Q

A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.

A

Hacktivist

49
Q

If you create something—an idea, an invention, a form of literary work, or a research, you have the right of how it should be used by others. This is called intellectual property.

A

Copyright Infringement

50
Q

defined under the Revised Penal Code Section 355

Committed by means of writing, printing, lithography, engraving, radio, phonograph,
painting, theatrical exhibition, cinematographic exhibition, or any similar
means.

A

Libel

51
Q

empowered all existing laws to
recognize electronic documents as evidence (commercial /
non-commercial).

A

E-Commerce Law (Republic Act 8792)