EMPTECH π€ (quiz 2) Flashcards
- is a powerful tool.
- used to promote your business, gain new friends, and stay in touch with the old ones.
- a source of entertainment.
Internet
Anyone has access to this highway, can place information, and can grab that information. Any information, even things that you have set privately, can be accessed one way or another.
Information Superhighway
- A type of crime involving a computer or a computer network.
- The computer may have been used in committing the crime, or it may be the target.
- may harm someoneβs security or finances.
Cybercrime
What are the Internet Threats?
- Malware
- Spam
- Phishing
- stands for malicious software
Malware
- a malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs.
- transfers from one computer to another by any type of means.
Virus
- a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information
Trojan
- tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
Rogue security software
- a program that runs in the background without you knowing it (thus called βspyβ).
- It has the ability to monitor what you are currently doing and typing through keylogging.
Spyware
- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
Keyloggers
- used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.
Keyloggers
- unwanted email mostly from bots or advertisers. It can be used to send malware,
Spam
- Its goal is to acquire sensitive personal information like passwords and credit card details.
- This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.
Phishing
Types of phishing: ?
- Email Phishing
- Spear phishing
- Smishing
- Vishing
- The most common form, where attackers send emails that appear to be from legitimate sources, urging recipients to click on a link or download an attachment.
Email Phishing
- attackers customize their messages to a specific individual or organization, using personal information to make the message more convincing.
Spear Phishing
- Phishing attempts sent via SMS (text messages), often containing links to malicious websites or prompting users to call a fake phone number.
Smishing
- where attackers impersonate legitimate entities and attempt to extract personal information.
Vishing
What are the 10 Rules of Netiquette?
- Remember the human.
- Adhere to the same standard of behaviour online that you would
follow in real life. - Know where you are in cyberspace.
- Respect other peopleβs time and bandwidth.
- Make yourself look good.
- Share expert knowledge.
- Help keep flame wars under control.
- Respect other peopleβs privacy.
- Donβt abuse your powers.
- Be forgiving of other peopleβs mistakes
- an attempt to be more precise in providing the list of documents according to the words used by the user to search the Internet.
Contextualized search
- occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner.
Copyright Infringement
- is a word processing
feature that allows you to easily
create multiple letters, labels,
envelopes, nametags, or catalogue
documents to group of people as
stored in a list in a database or
spreadsheet.
Mail Merge
3 Components of the Mail Merge: ?
- Main Document
- Data Source
- Merge Document
- the letter which contain the email
information for each of the merged
document that can be letter, stationary
or template. - It also contains the field names which
contains the instructions for carrying
out the merge.
Main document
- it is also called data file
which comprises the information to be merged into a document such as the list of names and addresses to be used in a mail merge.
Data source
- this is also a word processing document that is the generated output after executing the merge process.
Merge document
- is a single page of a presentation collectively, a group of slides may be known as a slide deck.
Slide
- are pre-designed graphic styles that you can apply to your slides.
Design Templates
- a collection of pages arranged in sequence that contain text and images for presenting to an audience.
Slide Show Button
- a set of effects which can be applied to text or graphics within a slide.
Animation
- are motion effects that when in Slide Show view add movement to your slides as you advance from one slide to another.
Transitions
- buttons that you use to change views into normal, outline, slide, sorter, notes page, and reading views.
Presentation Views
- a simplified layout of the page so you can quickly key, edit, and format the text.
Normal View
- displays your slides on the top portion of the page, with the speaker notes for each slide in the notes pane on the bottom of the pane.
Notes Page View
- displays all of the text in a PowerPoint slide show in outline form regardless of the design, objects and animations.
Outline View
- allows you to see thumbnails of all the slides in your presentation to easily rearrange them.
Slide Shorter View
Tips in Creating an Effective Presentation?
- Minimize
- Clarity
- Simplicity
- Visuals
- Consistency
- Contrast
- Keeps slide counts to minimum to maintain a clear message and to keep the audience attentive
Minimize
- Uses a font style that is easy to read
Clarity
- Uses bullets or short sentences
Simplicity
- Uses graphics to help in presentation but not too many to distract the audience
Visuals
- makes design uniform
Consistency
- uses light font on dark background or vice versa
Contrast
- allows you to easily navigate your slides during your presentation.
- allows you to link to another slide in the current presentation, another slide in a different presentation, another file or webpage, or email address.
Hyperlink
Text hyperlinks are usually in _____ _____ and _________.
Color blue and underlined.