EMPTECH πŸ€• (quiz 2) Flashcards

1
Q
  • is a powerful tool.
  • used to promote your business, gain new friends, and stay in touch with the old ones.
  • a source of entertainment.
A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anyone has access to this highway, can place information, and can grab that information. Any information, even things that you have set privately, can be accessed one way or another.

A

Information Superhighway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • A type of crime involving a computer or a computer network.
  • The computer may have been used in committing the crime, or it may be the target.
  • may harm someone’s security or finances.
A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Internet Threats?

A
  1. Malware
  2. Spam
  3. Phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • stands for malicious software
A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
  • transfers from one computer to another by any type of means.
A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
A

Rogue security software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • a program that runs in the background without you knowing it (thus called β€œspy”).
  • It has the ability to monitor what you are currently doing and typing through keylogging.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • unwanted email mostly from bots or advertisers. It can be used to send malware,
A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Its goal is to acquire sensitive personal information like passwords and credit card details.
  • This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of phishing: ?

A
  1. Email Phishing
  2. Spear phishing
  3. Smishing
  4. Vishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • The most common form, where attackers send emails that appear to be from legitimate sources, urging recipients to click on a link or download an attachment.
A

Email Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • attackers customize their messages to a specific individual or organization, using personal information to make the message more convincing.
A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Phishing attempts sent via SMS (text messages), often containing links to malicious websites or prompting users to call a fake phone number.
A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • where attackers impersonate legitimate entities and attempt to extract personal information.
A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 10 Rules of Netiquette?

A
  1. Remember the human.
  2. Adhere to the same standard of behaviour online that you would
    follow in real life.
  3. Know where you are in cyberspace.
  4. Respect other people’s time and bandwidth.
  5. Make yourself look good.
  6. Share expert knowledge.
  7. Help keep flame wars under control.
  8. Respect other people’s privacy.
  9. Don’t abuse your powers.
  10. Be forgiving of other people’s mistakes
20
Q
  • an attempt to be more precise in providing the list of documents according to the words used by the user to search the Internet.
A

Contextualized search

21
Q
  • occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner.
A

Copyright Infringement

22
Q
  • is a word processing
    feature that allows you to easily
    create multiple letters, labels,
    envelopes, nametags, or catalogue
    documents to group of people as
    stored in a list in a database or
    spreadsheet.
A

Mail Merge

23
Q

3 Components of the Mail Merge: ?

A
  1. Main Document
  2. Data Source
  3. Merge Document
24
Q
  • the letter which contain the email
    information for each of the merged
    document that can be letter, stationary
    or template.
  • It also contains the field names which
    contains the instructions for carrying
    out the merge.
A

Main document

25
Q
  • it is also called data file
    which comprises the information to be merged into a document such as the list of names and addresses to be used in a mail merge.
A

Data source

26
Q
  • this is also a word processing document that is the generated output after executing the merge process.
A

Merge document

27
Q
  • is a single page of a presentation collectively, a group of slides may be known as a slide deck.
A

Slide

28
Q
  • are pre-designed graphic styles that you can apply to your slides.
A

Design Templates

29
Q
  • a collection of pages arranged in sequence that contain text and images for presenting to an audience.
A

Slide Show Button

30
Q
  • a set of effects which can be applied to text or graphics within a slide.
A

Animation

31
Q
  • are motion effects that when in Slide Show view add movement to your slides as you advance from one slide to another.
A

Transitions

32
Q
  • buttons that you use to change views into normal, outline, slide, sorter, notes page, and reading views.
A

Presentation Views

33
Q
  • a simplified layout of the page so you can quickly key, edit, and format the text.
A

Normal View

34
Q
  • displays your slides on the top portion of the page, with the speaker notes for each slide in the notes pane on the bottom of the pane.
A

Notes Page View

35
Q
  • displays all of the text in a PowerPoint slide show in outline form regardless of the design, objects and animations.
A

Outline View

36
Q
  • allows you to see thumbnails of all the slides in your presentation to easily rearrange them.
A

Slide Shorter View

37
Q

Tips in Creating an Effective Presentation?

A
  1. Minimize
  2. Clarity
  3. Simplicity
  4. Visuals
  5. Consistency
  6. Contrast
38
Q
  • Keeps slide counts to minimum to maintain a clear message and to keep the audience attentive
A

Minimize

39
Q
  • Uses a font style that is easy to read
A

Clarity

40
Q
  • Uses bullets or short sentences
A

Simplicity

41
Q
  • Uses graphics to help in presentation but not too many to distract the audience
A

Visuals

42
Q
  • makes design uniform
A

Consistency

43
Q
  • uses light font on dark background or vice versa
A

Contrast

44
Q
  • allows you to easily navigate your slides during your presentation.
  • allows you to link to another slide in the current presentation, another slide in a different presentation, another file or webpage, or email address.
A

Hyperlink

45
Q

Text hyperlinks are usually in _____ _____ and _________.

A

Color blue and underlined.