Internet Flashcards
the form of required by good breading or prescribed by authority to re required in social or official life.
Etiquette
“network etiquette”. It is a set of rules for behaving properly online.
Netiquette
author of Netiquette. Dubbed the “network manners guru” by the San Jose Mercury News, she has been a student of human nature all her life.
Virginia Shea
actions taken by someone to gain unauthorized access to a computer.
Hacking
software that is specifically designed to disrupt, damage a computer system.
Malware
means to point you to a malicious and illegitimate website by redirecting the legitimate URL.
Pharming
sent by criminals to steal personal and financial information.
Phishing
restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransomware
mass distribution of unsolicited messages to addresses which can be easily found on the internet.
Spam
often come in the form of a free download and are installed automatically with or without your consent.
Spyware
malicious program that is disguised as, or embedded within, legitimate software.
Trojan Horse
often sent as an email attachment or a download with the intent of infecting your computer.
Virus
virtual “listening in” on information that’s shared over an unsecure (not encrypted) Wi-Fi network.
Wi-Fi eavesdropping
are crimes in which a computer is the object of the crime (hacking, phishing, spamming) is used as a tool to commit an offense.
Cybercrimes
A law in the Philippines which aims to address legal issues.
Republic Act No.10175 : Cybercrime Prevention Act of 2012
- An act protecting individual personal information
Republic Act No.10173 : Data Privacy Act of 2012
unauthorized access of or interference with computer systems, servers, or other information and communication systems.
Hacking
to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
Computer-related forgery, fraud and/or identity theft
practice of illegally copying and selling digital music, video, computer software, etc.
Penalty: P50k-500k or imprisonment
Electronic theft
use of electronic communication to bully person, typically by sending a message of an intimidating or threatening nature.
Cyberbullying
willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of computer system for favor or consideration.
Cybersex
a form of child sexual exploitation
Penalty: RA 9775 or Anti-Child Pornography Act of 2009; and/or Reclusion Temporal punishment
Child Pornography
unprivileged false statement of fact which tends to harm the reputation of a person or company.
Penalty: Prison Mayor
Cyber Defamation
the infrastructure and component that enable modern computing
Information and Communication Technology
an electronic device that manipulates data. it has the ability to store, retrieve, and process data
Computer
an ancient memory aid device to record and document numbers, quantities, or even messages
Tally Sticks
a mechanical device used to aid an individual in performing mathematical calculations
Abacus
allowed the operator to multiply, divide, and calculate square and cube roots by moving the roads around and placing them in specially constructed boards
Napier’s Bones
use primarily for multiplication, division, roots, logarithms, trigonometry
Slide rule
during this period were first numbering system
Premechanical