ICT PART 2 Flashcards
is a place on the Internet where users with
common interests interact with each other to find
fORUM
is a word or group of words that a person may use to search for in a search engine
Keyword
are software systems that people got to search for things on the Internet.
Examples of popular search engines are Yahoo!, Google, or Bing.
Search engines
is a seminar conducted over the Internet making
it possible to “virtually attend” through an Internet connection.
webinar
is a site written, controlled, and edited by the users themselves.
wiki
is the page seen by the user when browsing the Internet. The webpage can be
compared to a page in a magazine.
webpage
are specific addresses of the Internet pages and files.
UNIFORM RESOURCE LOCATORS (URLs)
is a term generally applies to the transfer of data from the Internet to the
computer or mobile device.
downloading
is a broad term used to describe a protective barrier against computer bugs or viruses
firewall
is also called cyber safety or digital safety which refers to practices and
precautions one should observe when using the Internet.
Online safety
is a very broad issue covering security in relation to transactions made
over the Internet.
internet security
It compasses the security of data entered through a web form, browser
security, and overall authentication and protection of data sent via Internet protocol.
internet security
refers to a set of moral principles that govern an individual or a group on what is
considered as acceptable behavior while using a computer.
ethics
means acceptable rules for online behavior.
netiquette
by means of a hand-held device, such as mobile phone or a tablet. This
takes place anytime and anywhere.
mobile learning
may also be referred to as a digital classroom where learning takes
place over the Internet and not in a physical classroom.
virtual classroom
what are viruses capable of?
Deleting and altering files
§ Redirecting web links to web sites you don’t intend to visit
§ Copying themselves and using up resources on your computer
system
-Standalone malware computer program that replicates
itself in order to spread to other computers.
worm
It is a destructive program that pretends as a desirable application that
tricks the user to allow access to their computers through downloads or
email attachments.
trojan horse
what are the types of virus
trojan horse
worm
virus
It collects information about your browsing history, personal information and others.
Spyware are usually bundled with other software.
Spyware
It often uses the Internet to pass this
information along to third parties without you knowing.
Spyware
Frequent sources of spyware are?
file-sharing sites
It uses a software to record everything you type on your keyboard. The program then
sends the log file to a specified server, where thieves can read any information you
type, including passwords, credit card numbers, etc.
keylogger
What are frequent sources of keylogger
phishing sites
It shows you unwanted ads. It
adware
It could be also a type of free software supported by
advertisements that show up in pop-up windows or on a toolbar on your computer
or browser.
adware
annoying, but safe. It is often built into free software.
adware
is a devious approach that cybercrooks use to trick you into revealing
personal information, such as passwords or credit card, social security, and bank
account numbers.
phishing
It is also an email or instant message scam which looks like an
official message from a legitimate organization like a bank and credit card details.
phishing
(criminals who pretend to be a legitimate organization) are responsible for phishing
phishers
It is an irrelevant, inappropriate, unwanted, or junk email that comes from legitimate
companies which, in the long run may be used for phishing, scams, and malware.
spam
It is a fraudulent practice similar to phishing, except with pharming, a legitimate
website’s traffic is manipulated to direct users to fake lookalikes that will either install
malicious software on visitors’ computers, or harvest (pharm) users’ personal data,
such as passwords or financial details. Even users with fully protected, malware-free devices can become victims
Pharming
A malicious software that is intended to damage or disable computer’s systems
which has codes to collect information without one’s knowledge.
malware
Viruses, Trojan
horse, worms and the like are considered as
malware
It happens when a criminal impersonates a user by stealing his or her personal
information to withdraw money or pay goods online.
Identity theft
What are the different internet threats
spyware
keylogger
adware
phishing
spam
pharming
malware
identity theft
How do you make a strong password?
You can make a smart
password by combining letters, numbers, special characters, and uppercase letter.
how would you know if an site is safe?
Make sure that the website uses a secure technology feature. Verify if it begins
with https web address.