ICT module 2 Flashcards

1
Q

refers to the act of staying safe online

A

online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

commonly known as internet safety, e-safety, and cyber safety

A

online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

encompasses all tech devices which have access to internet from PCs, smartphones, laptop

A

online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

who you are in the cyberspace and how you present yourself to others online

A

online identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a layer of online identity of what you share, you do control, and consists of data you feed into socmed and mobile app

A

first layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a layer of online identity made of behavioral observations

A

second layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a layer of online identity where your data are analyzed by various algo & compare w/ other user’s data. It is what the machine thinks about you

A

third layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a law approved on Sept 12, 2012 aiming to address legal issues concerning online interactions in the int.

A

Cybercrime Prevention Act of 2012 (R.A. No. 10175)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

offences against the confidentiality, integrity, and availability of of comp data and systems

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

occurs when a bully targets a victim using electronic communication methods

A

cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

event/action that could damage to computer hardware, software, data, info, or processing capability

A

computer security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

types of perpetrator

A

hackers, cracker, script kiddies, corporate spies, cyberextortionists, cyberterrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

indiv who uses comp to overcome a tech problem where he/she uses his/her abilities to gain unauthorized access to systems or networks in order to commit crime

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

indiv whose purpose is to breach int security/ gain access to software w/o paying royalties

A

crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

unskilled indiv who uses scripts/ programs developed by others to attach computer systems and networks and deface websites

A

script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

indiv practicing the act or spying to gain secret info on a government or a business computer through use of any ICT tools

A

corporate spies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

indiv/group who uses email as an offensive force sending a company a threatening email

A

cyberextortionists

18
Q

indiv who are involved in a politically motivated attack against info, comp systems, comp program, and data resulting in violence

A

cyberterrorists

19
Q

the use of a comp network w/o permission

A

unauthorized access

20
Q

the use of a comp or its data for unapproved or possibly illegal act

A

unauthorized use

21
Q

the act of stealing a computer equipment

A

hardware theft

22
Q

the act of defacing or destroying comp equipment

A

hardware vandalism

23
Q

occurs when someone steals a software media, intentionally erases programs, illegally copies a program and illegally registers or activates a program

A

software theft

24
Q

occurs when someone steals personal/ confidential info

A

info theft

25
3 kinds of computer virus
worm, trojan horse, rootkit
26
program that affects a computer negatively by altering the way the comp works
virus
27
copies itself repeatedly, using up resources and possibly shutting down the comp network
worm
28
a malicious program that hides w/in a legitimate program
trojan horse
29
a program that hides in a comp and allows someone from a remote location to take full control
rootkit
30
refers to the growing gap between the underprivileged member of society who does not have access to computer or internet
digital divide
31
people who are not born in the digital era and later adopted the new tech
digital immigrants
32
people who were born during or after the digital era which begins in 1980
digital natives
33
ability to use info and communication tech to find, evacuate, create, and comm info
digital literacy
34
8 elements of digital literacy
cu, cg, cn, co, cf, cr, ct, ci
35
how to behave (memes, emojis, animated gifts)
cultural-cu
36
how to do, what we know of as computer literacy
cognitive-cg
37
how to use, what it means to construct smthg in a digital envi
constructive-cn
38
how to communicate knowing the purpose and difference of various online tools
communicative-co
39
how to belong, understanding the ways in which ol world differs from off world
confident-cf
40
how to make, creating new things which add value
creative-cr
41
hw to evaluate, using reasoning to evaluate digital content, tools, and app
critical-ct
42
how to participate, indivs having knowledge to use digital envi to self-organize and to be part of a movement bigger than themselves
civic-ci