ICT module 2 Flashcards

1
Q

refers to the act of staying safe online

A

online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

commonly known as internet safety, e-safety, and cyber safety

A

online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

encompasses all tech devices which have access to internet from PCs, smartphones, laptop

A

online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

who you are in the cyberspace and how you present yourself to others online

A

online identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a layer of online identity of what you share, you do control, and consists of data you feed into socmed and mobile app

A

first layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a layer of online identity made of behavioral observations

A

second layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a layer of online identity where your data are analyzed by various algo & compare w/ other user’s data. It is what the machine thinks about you

A

third layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a law approved on Sept 12, 2012 aiming to address legal issues concerning online interactions in the int.

A

Cybercrime Prevention Act of 2012 (R.A. No. 10175)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

offences against the confidentiality, integrity, and availability of of comp data and systems

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

occurs when a bully targets a victim using electronic communication methods

A

cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

event/action that could damage to computer hardware, software, data, info, or processing capability

A

computer security risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

types of perpetrator

A

hackers, cracker, script kiddies, corporate spies, cyberextortionists, cyberterrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

indiv who uses comp to overcome a tech problem where he/she uses his/her abilities to gain unauthorized access to systems or networks in order to commit crime

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

indiv whose purpose is to breach int security/ gain access to software w/o paying royalties

A

crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

unskilled indiv who uses scripts/ programs developed by others to attach computer systems and networks and deface websites

A

script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

indiv practicing the act or spying to gain secret info on a government or a business computer through use of any ICT tools

A

corporate spies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

indiv/group who uses email as an offensive force sending a company a threatening email

A

cyberextortionists

18
Q

indiv who are involved in a politically motivated attack against info, comp systems, comp program, and data resulting in violence

A

cyberterrorists

19
Q

the use of a comp network w/o permission

A

unauthorized access

20
Q

the use of a comp or its data for unapproved or possibly illegal act

A

unauthorized use

21
Q

the act of stealing a computer equipment

A

hardware theft

22
Q

the act of defacing or destroying comp equipment

A

hardware vandalism

23
Q

occurs when someone steals a software media, intentionally erases programs, illegally copies a program and illegally registers or activates a program

A

software theft

24
Q

occurs when someone steals personal/ confidential info

A

info theft

25
Q

3 kinds of computer virus

A

worm, trojan horse, rootkit

26
Q

program that affects a computer negatively by altering the way the comp works

A

virus

27
Q

copies itself repeatedly, using up resources and possibly shutting down the comp network

A

worm

28
Q

a malicious program that hides w/in a legitimate program

A

trojan horse

29
Q

a program that hides in a comp and allows someone from a remote location to take full control

A

rootkit

30
Q

refers to the growing gap between the underprivileged member of society who does not have access to computer or internet

A

digital divide

31
Q

people who are not born in the digital era and later adopted the new tech

A

digital immigrants

32
Q

people who were born during or after the digital era which begins in 1980

A

digital natives

33
Q

ability to use info and communication tech to find, evacuate, create, and comm info

A

digital literacy

34
Q

8 elements of digital literacy

A

cu, cg, cn, co, cf, cr, ct, ci

35
Q

how to behave (memes, emojis, animated gifts)

A

cultural-cu

36
Q

how to do, what we know of as computer literacy

A

cognitive-cg

37
Q

how to use, what it means to construct smthg in a digital envi

A

constructive-cn

38
Q

how to communicate knowing the purpose and difference of various online tools

A

communicative-co

39
Q

how to belong, understanding the ways in which ol world differs from off world

A

confident-cf

40
Q

how to make, creating new things which add value

A

creative-cr

41
Q

hw to evaluate, using reasoning to evaluate digital content, tools, and app

A

critical-ct

42
Q

how to participate, indivs having knowledge to use digital envi to self-organize and to be part of a movement bigger than themselves

A

civic-ci