ETECH|LESSON 2 & 3 Flashcards

1
Q

refers to the online security or safety of people and their information when using the internet

A

Internet Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Information Usually Shared Online: (5)

A
  1. Name(First, Middle, Last, Parents)
  2. Address
  3. Cellphone No.
  4. Birthdate
  5. Siblings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Be mindful of what you share online

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Read terms & conditions

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Know security features of the site

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Don’t share password

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Avoid public networks(Incognito will not protect you)

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Never post future vacations

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Don’t talk to strangers

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Add friends you know irl

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Avoid untrusted websites

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Make Wi-Fi private by adding a password

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Don’t reply or click links from suspicious emails

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Make online purchases from secure sites

A

Tips to Stay Safe Online:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dangers in Using Internet: (6)

A
  1. Cyber Bullying
  2. Cyber Stalking
  3. Identity Theft
  4. Sexting
  5. Inappropriate Content
  6. Online Grooming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Internet Threats:(12)

A
  1. Spam
  2. Phishing
  3. Social Media Exploits
  4. Pharming
  5. Malware
  6. Virus
  7. Worm
  8. Trojan Horse
  9. Adware
  10. Spyware
  11. Keyloggers
  12. Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

sending email(illegitimate) to scam for private information for identity theft

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

– malicious fb msgs, consisted of SVG(Scalable Vector Graphic), secretly messaging all fb friends

A

Social Media Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

“Phishing without a lure,” more complicated phishing, exploits DNS(Domain Name Service), malicious code is installed on a computer/server, directing users to
fraudulent webs

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

“Malicious software,” software designed to damage/disrupt a system, Virus/Trojan

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

– program or piece of code loaded onto a computer without knowledge, runs on its
own, can replicate themselves, man-made, virus that makes copy of own is easy to make

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

similar/sub-class to a virus, spread from computer to computer, can travel
without human action, takes advantage of file/info transport features on system

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

– appears to be useful, but will damage computer once installed or run

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

– software /w advertisments, considered to be legitimate alternative offered to
consumers who don’t wish to pay for software

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

runs in background without knowledge, monitors your activity and typing
through “keylogging”

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

“Keystroke logger/System monitor,” surveillance tech used to monitor and
record keystrokes on a keyboard

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Good Things to Do in Online Communication: (5)

A

Common acronyms
smileys
clear subject lines
thinking twice before sending an email or post online
consulting a website’s FAQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Avoid in Online Communication: (4)

A

All CAPS
writing lengthy emails
posting spam
sending emails to a large number of recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • the forms required by good breeding or prescribed by authority to be required in social or official life
A

Etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  • network etiquette
  • etiquette of cyberspace
A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Core Rules of Netiquette:
(10)

A
  1. Remember the human
  2. Adhere to same standards of behavior online that you follow irl
  3. Know where you are in the cyberspace
  4. Respect other’s time and bandwidth
  5. Make yourself look good online
  6. Share expert knowledge
  7. Help keep flame wars under control(Flaming – express strongly held opinion)
  8. Respect other’s privacy
  9. Don’t abuse your power
  10. Be forgiving of other’s mistakes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  • “looking something up” (web)
  • any activity where a topic is identified, and an effort is made to actively gather
    information for the purpose of furthering understanding
  • may include some post-collection analysis like a concern for quality or synthesis
A

Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  • a research method in collecting and gathering information via the internet by using a
    search engine such as Google
A

Internet Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  • is a program that allows users to search for content on the internet
A

Search Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Examples of Search Engine:

A

 Google
 Aol Search
 Wow
 Baidu
 Web Crawler
 Yahoo! Search
 MyWebSearch
 WolframAlpha
 Bing
 Info
 Dogpile
 DuckDuckGo
 Ask
 Infospace
 Contenko
 Internet Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Common Commands for Search Engines: (4)

A
  1. Quotation Marks(“”)
  2. Addition Sign(+)
  3. Subtraction Sign(-)
  4. Asterisk(*)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

specific phrases involving more than 1 word

A

Quotation Marks(“”)

40
Q

word must be included

A

Addition Sign(+)

41
Q

word must not be included

A

Subtraction Sign(-)

42
Q

wild-cards [Mexic* - Mexico, Mexican, etc.]

A

Asterisk(*)

43
Q

Tips for Effective Internet Research(George Matthews): (8)

A
  1. Know what kind of research you want to do.
  2. Make a list of keywords you will use in your search.
  3. Enclose keywords in quotation marks.
  4. Use the minus sign (-).
  5. Try specialized search engines.
  6. Skim through search results web pages.
  7. Bookmark
  8. Review your bookmarks.
44
Q

Online Research Skills(Hannah Trierweiler Hudson): (6)

A
  1. Check Your Sources
  2. Ask Good Questions
  3. Go Beyond the Surface
  4. Be Patient.
  5. Respect Ownership
  6. Use Your Networks
45
Q

Preferred Domain Types:(6)

A

.com
.edu
.org
.gov
.net
.mil

46
Q

.com

A

commercial

47
Q

.edu

A

educational

48
Q

.org

A

organization

49
Q

.gov

A

government

50
Q

.net

A

network

51
Q

.mil

A

military

52
Q

Check if the author’s credentials or affiliations are
listed so you can tell whether the author is qualified
to write the topic.
Also, check the publisher of the article if it is a
reliable publisher. Make sure that the author provides
an e-mail or a contact address/phone number.

A

Who wrote the article?

53
Q

It is also important to check the document’s purpose and why it was produced. The document should provide accurate information and must be objective in presenting it. Some websites produce documents to motivate users to buy products. If this is the case,
information might be biased. However, bias is not necessarily bad, but you need to investigate the author or connections.

A

What is the purpose of the document and why was it produced?

54
Q

The document should be regularly updated. As to the freshness of the date, it depends on the information needed. For some topics, you want current information. For others, you want information near the time it became known. The links should also be up to date. There should be no dead links.

A

When was the document published and updated?

55
Q

Are the topics covered in depth?
Does the content appear to be complete?

A

Coverage

56
Q
  • a protection given to the owner of the rights in an original work
  • books, musical works, films, paintings, and other works, and computer programs
  • “intellectual property”(Republic Act 8293 known as the “Intellectual Property Code of the Philippines”)
A

Copyright

57
Q

copyright is called ______________________ which is protected under Republic Act ____ known as the “______________________________________________________________________”.

A

intellectual property

8293

Intellectual Property Code of the Philippines

58
Q
  • copyrighted work is used by another person without the permission of the author or
    copyright holder. Any person who is infringing the right to protected work would be
    liable under the law
A

Copyright Infringement

59
Q
  • the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purposes that is not an infringement of copyright
A

Fair Use

60
Q

Guidelines for Fair Use: (3)

A
  1. Majority of content is yours
  2. Give credit to owner
  3. No profit from copyrighted work
61
Q
  • perform more complex searches than a Standard Search
  • You can enter search terms across a number of fields and combine criteria
    with Boolean
    operators
  • In Google, simply search a word like you would normally do, then click settings and select advanced search option on the options button located at the upper right corner of the page
A

Advanced Search

62
Q

When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press “send” or “submit,” ask yourself, “Would I be okay with this if someone else had written it?”

A

Rule 1: Remember the Human

63
Q

While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit “cyberspace.” Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.

A

Rule 2: Adhere to the same standards of behavior online that you follow in real life

64
Q

“Netiquette varies from domain to domain.” (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague.

A

Rule 3: Know where you are in cyberspace

65
Q

Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don’t have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn’t wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.

A

Rule 4: Respect other people’s time and bandwidth

66
Q

One of the best things about the virtual world is the lack of judgment associated with your physical appearance, sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.)You will, however, be judged by the quality of your writing, so keep the following tips in mind:
*Always check for spelling and grammar errors *Know what you’re talking about and state it clearly

A

Rule 5: Make yourself look good online

67
Q

The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in fact, this “information sharing” capability is one of the reasons the Internet was founded. So in the spirit of the Internet’s “founding fathers,” share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references about your subject matter. Recently expanded your knowledge about a subject that might be of interest to others? Share that as well.

A

Rule 6: Share expert knowledge

68
Q

What is meant by “flaming” and “flame wars?” “Flaming is what people do when they express a strongly held opinion without holding back any emotion.” (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While “flaming” is not necessarily forbidden in virtual communication, “flame wars,” when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the group could be compromised. Don’t feed the flames; extinguish them by guiding the discussion back to a more productive direction.

A

Rule 7: Help keep flame wars under control

69
Q

Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information “got into the wrong hands?” Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.

A

Rule 8: Respect other people’s privacy

70
Q

Just like in face-to-face situations, there are people in cyberspace who have more “power” than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it’s you who posesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human.

A

Rule 9: Don’t abuse your power

71
Q

Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of comm. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it’s a minor “offense,” you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.

A

Rule 10: Be forgiving of other people’s mistakes

72
Q

means familiarize yourself with a discussion group before actively participating.

A

“lurk before you leap”

73
Q

The best way to filter information you get from search engines is by using _________

A

Advanced Search

74
Q
  • is a program that allows users to search for content on the internet.
A

Search Engines

75
Q

Using ________ will help to find specific phrases involving more thanoneword.

A

Quotation Marks ( “ )

76
Q

Adding an _______ before a word means that it MUST be included in each site listed.

A

Addition Sign ( + )

77
Q

Adding a __________ before a word means that it will NOT appear in the sites listed.

A

Subtraction Sign ( - )

78
Q

________ can be used for wild-cards in some search engines.
For example:
Mexic* will look for Mexico, Mexican, Mexicali, etc.

A

Asterisks ( * ) A

79
Q

are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results. This should save time and effort by eliminating inappropriate hits that must be scanned before discarding

A

Boolean Operators

80
Q

—requires both terms to be in each item returned. If one term is contained in the document and the other is not, the item is not included in the resulting list. (Narrows the search) Example: A search on stock market AND trading includes results contains: stock market trading; trading on the stock market; and trading on the late afternoon stock market

A

AND

81
Q

—either term (or both) will be in the returned document. (Broadens the search) Example: A search on ecology OR pollution includes results contains: documents containing the world ecology (but not pollution) and other documents containing the word pollution (but not ecology) as well as documents with ecology and pollution in either order or number of uses.

A

OR

82
Q

the first term is searched, then any records containing the term after the operators are subtracted from the results.

A

NOT or AND NOT (dependent upon the coding of the database’s search engine

83
Q

refers to a person’s right over his idea, invention, form of literary work or research, and on how it should be used by others.

A

Intellectual Property

84
Q

When evaluating websites for their credibility, it is important to look for the __________________ and the _______ of the website

A

website’s domain type

author

85
Q

*When you post a quote from a person on your Facebook wall. Include the name of the person who owns the quote in your post.

A

Examples of Fair Use

86
Q

*When you copy an image from the internet, give credit to the creator of the image. The copied image should be used for educational purposes not for commercial use

A

Examples of Fair Use

87
Q

*In fair use, 5% of the content of reference can only be copied. If 20% or less of the reference is copied, there must be a secondary use agreement and fee. And if 20% or more of the reference is copied, it requires purchasing of creative work.

A

Examples of Fair Use

88
Q

The steps in creating a simple mail merge: (4)

A

1) create form document
2) create data source
3) insert placeholders
4) preview

89
Q
  • allows you to see the result of your mail merge even before you print or send it out.
A

Preview results button

90
Q

-is the image compression/ file type that can display simple animation.

A

.gif

91
Q

allows you to place an image or external material in line with the text, treating the image just like how a text is treated.

A

In line with text

92
Q

The following are a default document type for a mail merge: (5)

A

Letter
Envelopes
Directory
Email messages
Labels

93
Q

In mail merge, _______________is the option in Select Recipients that allows the users to create new data file.

A

Type New List

94
Q

is inserted in MS Word if you want the table to be converted to a graphical form.

A

A Chart

95
Q

The following are the file extensions in MS word: (4)

A

.doc
.docm
.docx
.doctx

96
Q

contains merge fields or placeholders in mail merge.

A

Data Source