GE ELEC Flashcards

1
Q

ICT

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

encompasses a wide range of technologies that facilitate the gathering, processing, storage, and dissemination of information.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a technology required for information processing the use of electronics such as computers, communication devices and application software to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

plays a crucial role in various aspects of modern society, impacting individuals, businesses, and governments.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to the knowledge obtained in reading, investigation, study or research.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The tools to transmit information are the telephone, television and radio.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

We need information to make decisions and to predict the future.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

knowledge and helps us to fulfill our daily tasks.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions.

A

COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

through sign or symbols, performing drama or poetry. With the advent of technology, these “older” forms of communication are less utilized as compared to the use of the internet, email or video conferencing.

A

COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

use of scientific knowledge, experience and resources to create processes and product that fulfill human needs.

A

TECHNOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 TECHNOLOGY

A

Aiding communication
Spreading information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

15 Examples of ICT

A
  1. Computers and Laptops:
  2. Smartphones and Tablets:
  3. Internet:
  4. Networking Equipment:
  5. Software Applications:
  6. Cloud Computing:
  7. Social Media Platforms:
  8. Video Conferencing Tools:
  9. E-commerce Platforms:
  10. Data Storage Devices:
  11. Information Systems:
  12. Robotics and Automation:
  13. Geographic Information Systems (GIS):
  14. Educational Technologies:
  15. Digital Cameras and Imaging Software:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Personal computers, laptops, and workstations are fundamental ICT devices used for various tasks such as word processing, data analysis, and programming.

A

Computers and Laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile devices play a crucial role in ICT, providing communication, internet access, and a wide range of applications for productivity, entertainment, and more.

A

Smartphones and Tablets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The internet is a key component of ICT, enabling global communication, information sharing, online collaboration, and access to various services.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Routers, switches, and modems facilitate the creation of computer networks, allowing devices to communicate with each other and access the internet.

A

Networking Equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Various software applications contribute to ICT, including word processors, spreadsheets, databases, graphics editors, and specialized industry-specific applications.

A

Software Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cloud services provide on-demand access to computing resources, storage, and applications over the internet, offering scalability and flexibility for businesses and individuals.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Platforms like Facebook, Twitter, LinkedIn, and Instagram are examples of ICT tools that facilitate social interaction, content sharing, and networking.

A

Social Media Platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tools like Zoom, Microsoft Teams, and Skype enable real-time communication and collaboration over the internet, supporting remote work and virtual meetings.

A

Video Conferencing Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Websites and applications that facilitate online buying and selling of goods and services, such as Amazon, eBay, and Shopify.

A

E-commerce Platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hard drives, solid-state drives (SSDs), and USB flash drives are examples of devices used for storing and retrieving digital data.

A

Data Storage Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Enterprise Resource Planning (ERP) systems, Customer Relationship Management (CRM) software, and other information systems streamline business processes and data management.

A

Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ICT plays a role in controlling and managing robotic systems for various applications, such as manufacturing, healthcare, and logistics.
Robotics and Automation
26
GIS technology helps in capturing, analyzing, and visualizing spatial data, supporting applications in urban planning, environmental monitoring, and more.
Geographic Information Systems (GIS)
27
: Learning Management Systems (LMS), e-learning platforms, and educational software contribute to the integration of technology in education.
Educational Technologies
28
Devices for capturing and processing digital images, used in photography, medical imaging, and various other fields.
Digital Cameras and Imaging Software
29
4 What are the uses of ICT in everyday life?
1. EDUCATION 2. BANKING 3. INDUSTRY 4. E-COMMERCE
30
Teachers use computers to research for teaching materials, participate in online forum and conference
EDUCATION
31
Students use computers as reference tools for looking information on the internet.
EDUCATION
32
Researchers use computers to collect and process data.
EDUCATION
33
School administrators use computers for administrative purposes to ensure that entire operations run smoothly.
EDUCATION
34
Bank administrators can control the entire banking system and banking activities.
BANKING
35
To provide electronic banking services for customers.
BANKING
36
Businessmen can save their time by using online services offered by banks.
BANKING
37
To help workers operate machines.
INDUSTRY
38
To help researchers analyze and collect research data for future references.
INDUSTRY
39
To help administrators to oversee and control entire operations in the factory. To help administrators to oversee and control entire operations in the factory.
INDUSTRY
40
To facilitate production planning and control system.
INDUSTRY
41
To make buying and selling activities faster and more efficient through internet.
E-COMMERCE
42
To connect online customers with suppliers to purchase products.
E-COMMERCE
43
To help employees to communicate with their customers for any inquiries and to get the latest updates inventory to be informed to the customers.
E-COMMERCE
44
15 What are the importance of ICT?
1. Enhanced Communication: 2. Access to Information: 3. Education and E-Learning 4. Business Efficiency 5. Economic Growth 6. Healthcare Advancements 7. Globalization and Trade 8. Social Connectivity: 9. Government Services 10. Research and Innovation 11. Disaster Management: 12. Environmental Monitoring 13. Crisis Response and Humanitarian Aid: 14. Financial Inclusion: 15. Personal Productivity
45
ICT facilitates instant and global communication through email, messaging apps, social media, and video conferencing, breaking down geographical barriers and fostering collaboration.
Enhanced Communication
46
The internet, a key component of ICT, provides access to vast amounts of information. This enables individuals to stay informed, researchers to conduct studies, and students to access educational resources
Access to Information
47
ICT has transformed education by providing e-learning platforms, digital resources, and interactive learning tools. It enables remote learning, making education accessible to people around the world.
Education and E-Learning
48
: ICT tools and systems enhance business operations, streamline processes, and improve overall efficiency. Enterprise Resource Planning (ERP) systems, customer relationship management (CRM), and other business applications contribute to effective management and decision-making.
Business Efficiency
49
ICT contributes to economic development by fostering innovation, improving productivity, and creating new job opportunities. It enables the growth of technology-driven industries and entrepreneurship.
Economic Growth
50
ICT is used in healthcare for electronic health records (EHRs), telemedicine, remote patient monitoring, and medical imaging. These technologies improve healthcare delivery, reduce costs, and enhance patient outcomes.
Healthcare Advancements
51
ICT has facilitated global trade by enabling businesses to communicate and transact internationally. E-commerce platforms and online marketplaces connect buyers and sellers across borders, contributing to economic globalization.
Globalization and Trade
52
Social media platforms and other online communities allow people to connect, share experiences, and build relationships regardless of physical distance. This has social, cultural, and personal implications.
Social Connectivity
53
ICT is used in public administration for delivering government services, managing databases, and facilitating e-governance. This enhances transparency, reduces bureaucracy, and improves citizen engagement.
Government Services
54
ICT supports scientific research and innovation by providing tools for data analysis, simulations, and collaboration. High-performance computing, data analytics, and modeling contribute to advancements in various fields.
Research and Innovation
55
ICT plays a critical role in disaster preparedness, response, and recovery. Communication technologies enable timely dissemination of information, coordination of emergency services, and aid distribution.
Disaster Management
56
ICT is employed in environmental monitoring through remote sensing, sensor networks, and data analytics. This helps in studying climate change, biodiversity, and natural resource management
Environmental Monitoring
57
During crises such as natural disasters or conflicts, ICT is crucial for coordinating humanitarian aid efforts, managing logistics, and ensuring effective communication among relief organizations.
Crisis Response and Humanitarian Aid
58
ICT has expanded financial services to underserved populations through mobile banking, digital wallets, and online payment systems, contributing to financial inclusion.
Financial Inclusion
59
ICT tools, including productivity software and mobile applications, enhance personal and professional productivity by providing tools for organization, time management, and task automation.
Personal Productivity:
60
has become an integral part of modern life, contributing to social, economic, and technological advancements across diverse sectors. Its continued development and adoption are likely to shape the future of how individuals and societies interact with information and technology.
ICT
61
5 Life Before Computers
1. The Number System 2. Computation Tools 3. The First Place-Value Number System 4. The Invention of the Abacus 5. More Major Developments
62
When there were no machines for computing yet, people use their ten fingers The DECIMAL SYSTEM is based from this old practice The decimal system utilized ten digits: zero through nine, base-10 Computers process numbers using the binary (base-2), the octal (base-8)(0-7), and the hexadecimal (base-16) (0-9,A-F)number systems
The Number System
63
based from this old practice
DECIMAL SYSTEM
64
Humans needed to count more items, so they started using other tools for computation like small stones or pebbles, bones with scratches to represent numbers.
Computation Tools
65
The first known place-value number system is the Babylonian’s SEXAGESIMAL SYSTEM ( base-60). Used in measuring time (60 seconds, 60 minutes) and in dividing circles (360 degrees)
The First Place-Value Number System
66
The first known place-value number system is the Babylonian’s
SEXAGESIMAL SYSTEM
67
Not considered a mechanical calculator, but it is one of the first mechanical aids
The Invention of the Abacus
68
first actual calculating machine, invented by the Babylonians between 1000 BC and 500 BC, others say it was invented by the Chinese around 1300 AD
ABACUS
69
9 More Major Developments
1. Aristotle and the Tree of Porphyry (383 BC – 322 BC) 2. John Napier’s Bones (1600 AD) 3. Wilhelm Schickard’s Calculating Clock (1625 AD) 4. Blaise Pascal’s Arithmetic Machine (1640 AD) 5. Gottfried Wilhelm von Leibniz’s Stepped Reckoner (1671) 6. Joseph-Marie Jacquard’s Loom (1804) 7. Charles Babbage’s Machines (1822) 8. Binary Arithmetic (1840) 9. Herman Hollerith’s Tabulating Machine (1890)
70
Used a tree figure (like a family tree) to represent the relationships between (and subdivisions of) things such as species.
Aristotle and the Tree of Porphyry
71
a classic device for illustrating a “scale of being”
Tree of Porphyry
72
Napier’s Bones was used in the multiplication and division of large numbers
John Napier’s Bones
73
The Calculating Clock used wheels to carry out addition and subtraction of numbers up to 6 digits
Wilhelm Schickard’s Calculating Clock
74
The Pascaline is mechanical adding machine performed up to 8-digits calculations, it was the first mechanical calculator.
Blaise Pascal’s Arithmetic Machine
75
The Stepped Reckoner can perform all four basic arithmetic operations, it could multiply numbers up to 5 and 12 digits to give a 16-digit operand.
Gottfried Wilhelm von Leibniz’s Stepped Reckoner
76
The Father of Modern Computers, invented 2 machines: the DIFFERENCE ENGINE (1822) and ANALYTICAL ENGINE (1833). The Difference Engine performed multiplication and division. The Analytical Engine had similarities with the modern electronic digital computers. It had a mill and a store which corresponded to the current processor and memory. It used punch cards to print results and to serve as memory.
Charles Babbage’s Machines
77
The Loom is a weaving device that could produce intricate designs. The automatic loom was controlled by punched cards, a technology for storing data that was used in later computers.
Joseph-Marie Jacquard’s Loom
78
The Father of Modern Computers, invented 2 machines
Charles Babbage’s Machines
79
Hollerith founded the Tabulating Machine Company which later became what?
IBM (International Business Machines Corporation)
80
Invented 2 machines o fCharles Babbage’s Machines
1. DIFFERENCE ENGINE (1822) 2. ANALYTICAL ENGINE (1833).
81
performed multiplication and division.
DIFFERENCE ENGINE (1822)
82
had similarities with the modern electronic digital computers. It had a mill and a store which corresponded to the current processor and memory. It used punch cards to print results and to serve as memory.
ANALYTICAL ENGINE (1833)
83
Developed by LADY AUGUSTA ADA LOVELACE, used only two numbers, 0 and 1, for computation. She was considered the first programmer.
Binary Arithmetic
84
Developed the Tabulating Machine that used cards wherein data was punched. Hollerith founded the Tabulating Machine Company which later became IBM (International Business Machines Corporation)
Herman Hollerith’s Tabulating Machine
85
refers to a computer monitor that functions both as a display screen and an input device. device is made to be sensitive to pressure so that it will follow a command at a user’s touch.
TOUCH SCREEN
86
Technology allows a user to give commands to the computer without touching it.
GESTURAL INTERFACES
87
refers to visual technology that showcases a real-life 3D appearance. This can be viewed on a computer, in print, on TV, or in movies.
3D (THREE-DIMENSIONAL) TECHNOLOGY
88
refers to the process of recording movement and translating that movement into a digital model. It is used in a variety of applications such a video and tv, sports, computer gaming, military and even medical applications.
MOTION CAPTURE IN FILGMAKIN
88
are pocket-sized or handheld computers and the most popular of these are the smartphone and tablet.
MOBILE DEVICES
89
Continued advancements in AI and ML were transforming various industries, from healthcare to finance, with applications like predictive analytics, natural language processing, and computer vision.
Artificial Intelligence (AI) and Machine Learning (ML)
90
The rollout and adoption of 5G networks were gaining momentum, enabling faster and more reliable communication, and paving the way for innovations like the Internet of Things (IoT), augmented reality (AR), and virtual reality (VR).
5G Technology
91
With the rise of IoT devices and the need for real-time processing, edge computing was becoming more important. It involves processing data closer to the source of generation rather than relying solely on centralized cloud servers.
Edge Computing
92
As technology advances, so do cybersecurity threats. There was an increasing focus on enhancing cybersecurity measures, including the use of advanced encryption, biometrics, and AI-driven security solutions.
Cybersecurity
93
The COVID-19 pandemic accelerated the adoption of remote work technologies, including collaboration tools, video conferencing, and cloud-based solutions.
Remote Work Technologies
94
has become pretty common these days. From coffee shop tables to car dashboards and even mousepads, you’ll find charging pads nearly everywhere. And if you own a compatible device, all you need to do is place it on the marked space.
Wireless /Inductive Charging
95
This could be the year the smart ring makes major waves in the wearables market. With new smart rings announced at CES that promise to provide detailed workout recovery data, offer up accurate sleep insights, and track your menstrual cycle, there's a lot to get excited about within the smart ring realm. 
Smart Rings
96
That’s right, at CES 2024 we saw headphones that can read your mind. The Naqi Neural Earbuds are designed “as a safe, non-invasive alternative to brain implants” that could offer you full control over a Windows or Mac computer – including browsing the net and playing games – by using gyroscopic, muscle, and brainwave sensors
Neural Headphones
97
a vast network that connects computers all over the world. people can share information and communicate from anywhere with an Internet connection.
Internet
98
Robert W. Taylor
who led the development of the ARPANET
99
an early prototype of the Internet
ARPANET
100
ARPANET
Advanced Research Projects Agency Network
101
who developed the Transmission Control Protocol/Internet Protocol (TCP/IP) technologies.
Vinton Cerf and Robert Kahn
102
The Internet works through a series of networks that connect devices around the world through telephone lines. Users are provided access to the Internet-by-Internet service providers. The widespread use of mobile broadband and Wi-Fi in the 21st century has allowed this connection to be wireless.
Internet work
103
is a company that provides access to the internet for users via telephone lines or wireless communications
Internet Service Provider (ISP)
104
a set of four numbers between 0 to 255 that are separated by periods i.e. 216.239.39.99 (IP address of Google)
Internet Address (IP Address)
105
is the text version of the IP Address i.e. www.google.com (domain name of Google)
Domain Name
106
Top-level domains are the highest level of domain names of the Internet.
gov, edu, com, mil, org, net, and int
107
Who controls the Internet?
While the Internet is theoretically decentralized and thus controlled by no single entity, many argue that tech companies such as Amazon, Facebook, and Google represent a small concentration of organizations that have unprecedented influence over the information and money on the Internet. In some countries, certain parts of the Internet are blocked via censorship.
108
by name the Web, the leading information retrieval service of the Internet.
WORLD WIDE WEB
109
allows the user to select a word or phrase from text and thereby access other documents that contain additional information pertaining to that word or phrase.
Hypertext
110
documents feature links to images, sounds, animations, and movies.
Hypermedia
111
an electronic document in the web
Web Page
112
a collection of related web pages and associated items stored on a web server
Web Site
113
the first page the users see when they enter the web site 
Home Page
114
refers to the computers that store the HyperText Mark-up Language (HTML) files used on the internet
Web Server
115
is a software allows users to view the retrieved documents in the web.
Web Browser
116
refers to the global address of documents and other resources on the WWW
Uniform Resource Locator (URL)
117
The development of the World Wide Web was begun in 1989 by?
Tim Berners-Lee
118
which standardized communication between servers and clients.
HyperText Transfer Protocol (HTTP)
119
a web browser, which was developed in the United States
Mosaic
120
became the dominant Web browser soon after its release in December 1994
Netscape Navigator
121
the first browser with tabs, in which a user could visit another Web site without opening an entirely new window, debuted that same year.
InternetWorks
122
Mosaic, a web browser, which was developed in the United States by ?
Marc Andreessen
123
web browser developed by Microsoft in 1995 as an add-on to the Windows 95 operating system.
Internet Explorer (IE)
124
Apple's was released in 2003 as the default browser on Macintosh personal computers and later on iPhones (2007) and iPads (2010).
Safari
125
(2005) was the first browser with a privacy mode, Private Browsing
Safari 2.0
126
Mozilla’s released in 2004, the first serious challenger to IE’s dominance, was designed to address issues with speed and security that had plagued IE
Firefox
127
In 2008 Google launched, the first browser with isolated tabs, which meant that when one tab crashed, other tabs and the whole browser would still function.
Chrome
128
refers to internet guidelines that advise people on how to communicate and treat others when interacting online. These guidelines can apply to multiple aspects of the internet, such as email, message forums and video chats.
Netiquette
129
10 rules for practicing netiquette
1. Practice using empathy. 2. Use a friendly tone. 3. Use respectful language. 4. Send messages if appropriate. 5. Check for grammar mistakes. 6. Respect other people's privacy. 7. Ensure messages are clear. 8. Create posts that are appropriate. 9. Respond to emails on time. 10. Read content thoroughly.
130
Empathy involves practicing patience and understanding when interacting with others. For example, if someone says something you disagree with, you can practice empathy by listening actively and asking respectful questions to better understand their point of view.
Practice using empathy.
131
Using a kind tone is important for conveying respect online. Tone refers to how your messages sound to your recipients, including your word choice and syntax. If you're messaging someone online, try to use a kind tone to show that you respect their opinions. Use phrases like "please" and "thank you"
Use a friendly tone.
132
It's important to use respectful language when communicating with others online because people may evaluate how you treat them based on how you speak to them. For example, you might use casual language while talking to a coworker online, but you might use more formal, respectful language when speaking with a manager online.
Use respectful language.
133
It's important to send an appropriate amount or number of messages or emails to people online. For example, you might send only work-related messages to your coworkers or send only school-related messages to your classmates. People might appreciate it if you only send a few emails within a specific timeframe, such as once a week or whenever necessary or appropriate.
Send messages if appropriate.
134
spelling mistakes is important for being professional online. For example, if you need to message your coworkers in an online forum, consider proofreading your message for errors and typos before you send it. You can also read your messages aloud or use grammar-checking software to help you notice potential writing mistakes.
Check for grammar mistakes.
135
Valuing people's privacy online is important when using the internet. Whether you're speaking to people on social media, messaging your classmates or emailing your coworkers, you can respect other people's privacy by asking permission before sharing their information or posting anything about them or with them in it including photos or video.
Respect other people's privacy.
136
Being clear in your communication can help people properly interpret your messages online. You may try writing simple sentences and defining unfamiliar words or acronyms in your writing so the recipient can understand your message clearly.
Ensure messages are clear.
137
Creating appropriate online posts is important for netiquette because your posts can contribute to your online image. Consider posting things about yourself that help maintain a positive image and that are appropriate for a professional setting.
Create posts that are appropriate.
138
Checking emails regularly and responding to them in a timely manner is important because people often use email to communicate ideas and share information with others quickly. For example, a manager could send important work information to their employees in a mass email. If email is your primary mode of communication, you can prioritize responding to your emails by setting a reminder each day to read and reply to your emails.
Respond to emails on time.
139
Reading messages or comments thoroughly is essential for understanding what others are trying to communicate to you. Whether you're replying to a discussion post for an online class or answering a coworker's question on your company's messaging app, try to read comments carefully to ensure that you understand the content of a message before you reply. This can also help you write messages that fully address the recipient's comments or questions.
Read content thoroughly.
140
the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
CYBERCRIME
141
also called computer crime
CYBERCRIME
142
15 Types of cybercrime
1. Identity theft and invasion of privacy 2. Cyberbullying 3. Cyber libel 4. Internet fraud 5. ATM fraud 6. Wire fraud 7. File sharing and piracy 8. Counterfeiting and forgery 9. Child pornography 10. Hacking 11. Computer viruses 12. Denial of service attacks 13. Spam, steganography, and e-mail hacking 14. Sabotage 15. Phishing
143
When criminals steal a firm’s credit card records, they produce two distinct effects. First, they make off with digital information about individuals that is useful in many ways. Second, they might use individual credit card names and numbers to create new identities for other criminals.
Identity theft and invasion of privacy
144
Mental abuse of victims using threats and harassment.
Cyberbullying
145
Also known as online defamation, this can involve attacking individuals or organizations' reputations. This can be done through disinformation (deliberate distribution of inaccurate information) or misinformation (mistaken distribution of inaccurate information).
Cyber libel
146
receiving an unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their wallets
Internet fraud
147
Criminals have developed means to intercept both the data on the card’s magnetic strip as well as the user’s PIN. the information is used to create fake cards that are then used to withdraw funds from the unsuspecting individual’s account.
ATM fraud
148
NEVER wire money to a stranger. Once you wire cash (especially overseas), it’s virtually impossible to reverse the transaction or trace the money
Wire fraud
149
the illegal act of distributing and or the reproduction of digital files that is traded over the internet. These files include digital books, movies, PC games, hacked software, music and others.
File sharing and piracy
150
are crimes of deceit where the criminal act involves tricking another person into receiving property that appears from trustworthy source but is actually an imitation.
Counterfeiting and forgery
151
unlawfully exploits children for sexual stimulation images of children under age 18 engaged in sexual behavior
Child pornography
152
the act of compromising digital devices and networks through unauthorized access to an account or computer system
Hacking
153
the deliberate release of damaging computer viruses
Computer viruses
154
a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network
Denial of service attacks
155
a crime against all users of the Internet since it wastes both the storage and network capacities of ISPs
Spam, steganography, and e-mail hacking
156
Another type of hacking involves the hijacking of a government or corporation web site. Using the Internet to attack the infrastructure of a nation, by rerouting airline traffic, contaminating the water supply, or disabling nuclear plant safeguards.
Sabotage
157
act of sending e-mail that purports to be from a reputable source, such as the recipient’s bank or credit card provider, and that seeks to acquire personal or financial information
Phishing
158
Internet-based threats or online threats, are a category of cybersecurity risks that may cause an undesirable event or action via the internet.
web threats
159
2 Example of web threats
1. WannaCry ransomware 2. Celebrity iCloud phishing
160
In May 2017, the WannaCry ransomware spread to many networks and locked down countless Windows PCs. This threat was particularly dangerous because of its worm functionality, allowing it to spread completely autonomously.
WannaCry ransomware
161
A spear-phishing attack led to the breach of numerous celebrity iCloud accounts. This breach ultimately resulted in the unauthorized leak of countless private photos from these accounts
Celebrity iCloud phishing