ict report 2 and 3 Flashcards

1
Q

The short form of internet is the

A

‘net’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a globally connected network system facilitating worldwidecommunication and access to data resources through a vast collection ofprivate, public, business, academic and government networks.

A

The internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Onceyou areconnected to the Internet, you can access and view websitesusing a type of application called

A

webbrowser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet originates in

A

US Government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

when is The creation of ARPANET,

A

1960s :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARPANET,

A

Advanced Research Projects Agency Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the creation of NSFNET, or the National Science Foundation Network.

A

1985s :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NSFNET

A

National Science Foundation Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The system was replaced by new networks operated by commercial internet service providers.

A

1995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

started an experimental computer network.

A

ARPA- Advanced Research Project Agency on January 2, 1969-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the word internet started

A

1982

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is an American Internet pioneer and is: recognized as one of “the fathers of the Internet, sharing this title with TCP/IP co-developer Bob Kahn.

A

Vinton Gray Cerf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

internet invented by 2

A

victon gray cerf and robert kahn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

5 MAJOR COMPONENTS OF THE INTERNET

A

server
ip adress
browser
domain name system
internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a computer program that provides service to another computer program and it’s user.

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • a program in computer that provides the business logic for an application program.
A

Application Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a computer program that serves requested HTML pages or files.

A

Web Server -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a software that acts as an intermediary between an endpoint device, such as computer and another server from which a user is requesting.

A

Proxy Server -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • is an application that receives incoming e- mail from local users and remote senders and forward outgoing e-mail for delivery
A

Mail Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is a computer responsible for central storage and management of data files so that other computer on the same network can access them.

A

File Server -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a security component of a policy-based network that provides authorization services and facilities tracking and control of files

A

Policy Server -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is a numerical label assigned to each device. This provides identity to a network device.

A

IP Address (Internet Protocol)

21
Q

is an application program that provides a way to look information on the web.

A

Browser

22
Q

is the phonebook of internet. We access information online through domain names.

A

Domain Name System (DNS) -

23
Q

Two types of Internet ServiceProvide(ISP)

A

regional isp
national isp

24
Q

provided internet access to a specific geographicarea.

A

Regional ISP -

25
Q

business that provides internet access in cities and towns nationwide.

A

National ISP -

26
Q

A criminal activity that uses or targets a computer, a computer network, or a networked device

A

cybercrime

27
Q

are people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive information or personal data, and use it for their illegal activities.

A

Cybercriminals

28
Q

also known as The Cybercrime Prevention Act of 2012.

A

The R.A 10175

29
Q

It addresses entirely crimes committed against and through the computer system on September 12, 2012, and signed by

A

President Benigno Aquino III.

30
Q

sanctions content-related offenses performed using a computer system, such as cybersex, child pornography, and libel etc.

A

The Cybercrime Prevention Act of 2012

31
Q

is a threat that makes use of the internet to disperse, conceal, and update itself to facilitate cybercrime. These types of internet threats profess a variety of risks, comprisingfinancial damages , personality theft, loss of private information, affecting businesses or in e-commerce and online banking.

A

An Internet threat

32
Q

are the most common among internet security threats out there. Viruses enter your computers by attaching to a host file or a system.

A

Computer virus

33
Q

is a type of malicious software that is created to damage computers and computer contents. It can spread via email files, file-sharing networks, online advertisements, and infected websites.

A

Malware

34
Q

uses tricks or deceit to fool victims into revealing personal information including account numbers, passwords, and credit card details. While immediate chats, social media communications, and text messages can all be used in — attempts, emails are the most common method used.

A

phishing

35
Q

Without the end user’s consent, this is software that is installed on a computing device. Such software is difficult because it occasionally gets installed for curious reasons, even if it has the possibility of being abused and violate the privacy of the end user.

A

spyware

36
Q

has the ability to lock or block data on your computer and ask for payment to unlock them. This kind of assault may be harmful for businesses as it may lead to the loss of important data or the availability of systems.

A

ransomware

37
Q

is a program that looks legitimate and harmless. Once it gains network access, it can steal sensitive or private data. The most common method for ——— attacks is through email. The email usually comes with a link or attachment containing the viruses.

A

Trojan Horse

38
Q

is a malicious code that replicates another program to itself. The virus requires someone to knowingly or unknowingly spread the infection without the knowledge or permission
of a user or system administrator.

A

virus

39
Q

attack is when an attacker floods a website or system with requests until its overwhelmed and unable to function properly. This type of attack can be used to interupt services or extort money from victims.

A

DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACK

40
Q

This is the mass distribution of unwanted messages and advertising to individuals which can simply be found on the internet such as social networking sites, websites and personal blogs.

A

spam

41
Q

tries to manipulate users into purchasing and downloading potentially harmful and worthless software. —-which causes pop-up advertisements, often claims that a lot of issues, including infected files, have been discovered on the computer and urges the user to buy software to remedy them.

A

scareware

42
Q

is a term used to described proper etiquette and rules for online behavior on the internet

A

netiquette

43
Q

from the word network or internet

A

net

44
Q

proper requirements for social behavior

A

etiquette

45
Q

treat other with the same respect that you would like to receive and avoid confrontational or offensive language

A

make a good impression

46
Q

6 golden rules

A

make a good impression
avoid slang, acronyms, and text talk
avoid “screaming” in typed message
proofread your messages before sending
exercise good judgement when sharing information

46
Q

6 golden rules

A

make a good impression
avoid slang, acronyms, and text talk
avoid “screaming” in typed message
proofread your messages before sending
exercise good judgement when sharing information with others online

47
Q

be constructive and respectful when sharing opinions, beliefs, and criticisms , or responding to those of others in the conversation

A

respect diversity in viewpoints

48
Q

URL means

A

uniform resource locator

49
Q

HTML

A

Hyperlink text mark up language

50
Q

HTTP

A

hypertext transfer protocol