EXAM Q2 Flashcards
practices and precautions that should be observed while using the internet to ensure that the users as well as their computers and personal information are safe from some associated with using the internet
ONLINE SAFETY
Numerous delinquencies that can be committed on the internet
- STALKING
- IDENTITY THEFT
- PRIVACY VIOLATIONS
- HARASSMENT
Online Safety Measures
- Never give any personal information out about yourself over the internet
- Never open messages or attachments from someone you do not know
- Do not give any banking or sensitive information unless you are sure that it is a reputable business having a secure service
- Do not ever access your accounts by following an email link, instead type of URL by yourself
an act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone’s information
ONLINE THREATS
Types of Threats
- PHISHING
- PHARMING
- INTERNET SCAM
- INTERNET BOTS
- MALWARE
- ADWARE
- SPYWARE
an email sent from an internet criminal disguised as an email from a legitimate, trustworthy source
PHISHING
the message is meant to like your into revealing sensitive or confidential information
PHISHING
a malicious website that resembles a legitimate website
PHARMING
use to gather usernames and passwords
PHARMING
a type of scam that misleads the user into many ways attempting to take lead of them
INTERNET SCAM
a network of zombie computers that have been taken over by a robot or bot that performs large scale malicious acts
INTERNET BOTS
generic term for spyware and adware
MALWARE
it is the malicious software disguised as real software often secretly installed, intended to transfer and gather private information
MALWARE
advertising, automatically delivers advertisement
ADWARE
that function by spying on user activity without their knowledge
SPYWARE
is a program design to replicate by attaching itself into other computer problems
VIRUS
can be injected into a network by any type of means like USB
WORM
EXAMPLES OF THREATS
- TROJAN HORSE
- ILOVEYOU VIRUS
- COMPUTER BUG
- CYBER STALKING
- CYBER BULLYING
- SPOOFING
- BROWSING HIJACKING
- IDENTITY THEFT
- SPYWARE
- COMPUTER ETHICS
a type of malware that disguises itself as a normal file or program to think users into downloading and installing malwares
TROJAN HORSE
also known as love bug or love letter
ILOVEYOU VIRUS
a computer worm attached or email that have infected
ILOVEYOU VIRUS
a malfunction on a computer system through its runtime
COMPUTER BUG
the use of the internet or other electronic device to harass or stalk individual, group or organization
CYBER STALKING
the act or tormenting, threatening, harassing or embarrassing another person using the internet or other technologies
CYBER BULLYING
describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information
SPOOFING
happens when malware or spyware replaces a web users browser homepage that redirects the use to unwanted
BROWSING HIJACKING
happens when criminal impersonates a user by stealing his/her personal information to withdraw money or pay goods online
IDENTITY THEFT
enables a user to obtain information about another computer activities by transmitting data correctly to ones hard drive
SPYWARE
is a destructive program that pretends as a desirable application that tricks user to allow access to computers through download or e-mail attachments
TROJAN HORSE
concerned with how computing professional should make decisions regarding professional and social conduct
COMPUTER ETHICS
10 CORE RULES OF NETIQUETTE
- REMEBER THE HUMAN
- ADHERE TO THE SAME STAND OF BEHAVIOR ONLINE THAT YOU WOULD FOLLOW IN REAL LIFE
- KNOW WHERE YOU ARE IN CYBER SPACE
- RESPECT OTHER PEOPLE TIME AND BANDWIDTH
- MAKE YOURSELF LOOK GOOD
- SHARE EXPERT KNOWLEDGE
- HELP KEEP FLAMES WARE UNDER CONTROL
- RESPECT OTHER PEOPLE’S PRIVACY
- DON’T ABUSE YOUR POWER
- BE FORGIVING OF OTHERS PEOPLE’S MISTAKE
Safebook Parts
THINK (Head)
FRIENDS (Shoulder)
KIND (Chest)
PASSWORD (Stomach)
PRIVACY (Waist)
HURT (Knees)
SAFEBOOK description for THINK
think before you post
SAFEBOOK description for FRIENDS
only connect with friends
SAFEBOOK description for KIND
be kind to others
SAFEBOOK description for PASSWORD
don’t share your password
SAFEBOOK description for PRIVACY
keep your settings private
SAFEBOOK description for HURT
don’t be hurtful towards others
useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored on a list database, or spreadsheet
MAIL MERGING
two main parts in mail merge
DOCUMENT
DATA
helps convey the meaning of the text being accompanied by it
IMAGE
are protected by copyright
PHOTOS & IMAGE
was originally designed for Macintosh computers
POWERPOINT
was the old first name of POWERPOINT
PRESENTER
Four types of animation
- ENTRANCE
- EMPHASIS
- EXIT
- MOTION PATHS
is a connection to another document or to a location such as the internet
HYPERLINK
the document containing the hyperlink is called:
SOURCE DOCUMENT
is a powerful spreadsheet application software that integrates graphic and data management
MS EXCEL
an interactive computer application for organization, analysis, and storage of data in tabular for is called:
SPREADSHEET
Elements of FORMULA
- ARITHMETIC
- TEXT OPERATOR
- COMPARATIVE OPERATORS
- REFERENCE OF OPERATORS
each box a spreadsheet is called
CELL
the order of precedence used in excel
PEMDAS
Arithmetic Symbols
^ Exponentiation
+ Addition
- Subtraction
* Multiplication
/ Division Combination
connects two values to produce one continuous
TEXT OPERATOR
Comparative Operators SYMBOLS
= Equal to
> Greater than
< Less than
>= Greater than equal
<= Less than equal
<> Not equal
range, which produces one reference to all the cells between two references, including two references
REFERENCE OF OPERATORS
which combines multiple references into one
UNION OPERATOR
which returns a reference to the cells common to the ranges in the formula
INTERSECT OPERATOR
is one of the key features of the internet
VAST SEA
is a software system designed to search the internet for documents related to the keyword
SEARCH ENGINE
Different kinds of SEARCH ENGINES
Google Search
Yahoo
Bing
Aoi
DuckDuckGo
Aoi
Yandex
it uses a spider or a crawler to search the internet
CRAWLER BASED SEARCH ENGINE
digs through individual web pages, pull out keywords, and then adds the pages
CRAWLER BASE SEARCH ENGINE
Sample of CRAWLER BASED ENGINE
GOOGLE
YAHOO
depends on human editors to create their listings or database
DIRECTORIES
two types of DIRECTORIES
ACADEMIC & PROFESSIONAL DIRECTORIES
COMMERCIAL & PORTAL DIRECTORIES
which are often created and maintained by subjects experts
ACADEMIC & PROFESSIONAL DIRECTORIES
cater to the general public and are competing for internet traffic
COMMERCIAL & PORTAL DIRECTORIES
uses both crawler based searches and directory searches to obtain results
HYBRID SEARCH ENGINE
transmit user supplied keywords simultaneously to several individual search engines to carry out the serach
META SEARCH ENGINE
duplicate can be eliminated and clustering by subjects within search is implemented
META SEARCH ENGINE
How to search the INTERNET effectively
- Use of keywords
- Use of Phrase
- Capitalization
- Boolean Logic
- Wildcards and Truncation
recommended maximum is six to eight carefully chosen, words preferably nouns and objects
USE OF KEYWORDS
it is a combination of two or more words that must be found in the documents being searched
USE OF PHRASE
searching for proper names, use capital or uppercase to narrow the search
CAPITALIZATION
it is a powerful search to a reasonable number of result and increase the chance of a useful outcome
BOOLEAN LOGIC
BOOLEAN LOGIC has three most commonly used commands
AND
OR
NOT
these are used to search for items containing both terms, either term, or a term only
AND
OR
NOT
this involves substituting symbols for certain letters of a word so that the search engine will retrieve items with any letter in that spot in the word
WILDCARDS AND TRUNCATION
is very important measure for productivity
TIME
one feature of ICT
PRODUCTIVITY TOOLS
productivity tools:
WORD PROCESSORS
DATABASES
SPREADSHEETS
PRESENTATIONS
MULTIMEDIA
are used to organize, manipulate, shape, and ultimately, present ideas in creative new ways
PRODUCTIVITY TOOLS
which is a word processing application software
MICROSOFT WORD
offers a wide variety of features and tools that can be used in everyday school and office work
MICROSOFT WORD
one of advance tools of MICROSOFT WORD
MAIL MERGE
How to use MAIL MERGE
- Create the Main Document
- Identify the Data Source
- Define the merge fields
- Merge the data and save from the mailings tab