IT- NETIQUETTE (MIDTERMS Flashcards

1
Q

NETIQUETTE is a combination of?

A

Network Etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_________ of cyberspace and “_________” means the forms of required by good breeding or prescribed by authority to be required in social or official life.

A

Etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a set of rules for behaving properly online.

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is concerned with the “proper” way to communicate in an online environment.

A

Netiquette, or network etiquette,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

REMEMBER THE GOLDEN RULE

  • Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.
    -________________ - treat others with the same respect that you would like to receive and avoid confrontational or offensive language.
  • To help convey meaning when creating messages, it is sometimes acceptable to include appropriate ______________, such as a smiley face :) However, for professional communications these would be inappropriate.
A

*Make a good impression
**emoticon symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Typing an entire message using all capital letters is known as “screaming”.
  • It is better to draw emphasis to selected words or phrases by: using italic or bold text; using a different color for text or background color; or denoting emphasis using special characters.

(Example: Important).

A

AVOID “SCREAMING” IN TYPED MESSAGES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the possible template in highlighting important information?

A

Example: Important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Proofreading your messages before you send them is a best practice for effective and efficient communication. Strive to make your communications concise and free of any:
  • Spelling and grammar errors.
  • Confusing terms or phrases that could be misunderstood.
  • Errors of omission, such as missing content or recipients.
  • Errors in accuracy of information.
A

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants.

A

EXERCISE GOOD JUDGEMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else’s work and passing it off as your own is plagiarism. It damages your reputation and could subject you to serious academic and legal consequences.

A

EXERCISE GOOD JUDGEMENT WHEN SHARING INFORMATION WITH OTHERS ONLINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation.

A

RESPECT DIVERSITY IN VIEWPOINTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words. This lets the person know that you are listening and trying to understand them.

A

RESPECT DIVERSITY IN VIEWPOINTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When presenting an opinion or criticism, it is helpful to use phrases that identify to whose point of view you are referring. If the opinion is yours, you can begin with the phrase “In my experience” or “In my opinion”. If it is a viewpoint of someone else, make sure you identify that in your message
- Example: “According to Eric Ericson,” or “The president believes”.

A

RESPECT DIVERSITY IN VIEWPOINTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Top Commandments of Computer Ethics

A

Rule 1: Remember the Human.
Rule 2: Adhere to the same standards of behavior online that you follow in real life.
Rule 3: Know where you are in cyberspace.
Rule 4: Respect other people’s time and bandwidth.
Rule 5: Make yourself look good online.
Rule 6: Share expert knowledge.
Rule 7: Help keep flame wars under control.
Rule 8: Respect other people’s privacy.
Rule 9: Don’t abuse your power.
Rule 10: Be forgiving of other people’s mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Forms of Cybercrimes

Enumerate:

A
  1. Copyright
  2. Plagiarism
  3. Computer Addiction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Offline: generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.
Online: Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.

A
  1. Computer Addiction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is the violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work.

A

Copyright infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An act or instance of using or closely imitating the language and thoughts of another author without authorization.

A
  1. Plagiarism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The persona you create about yourself virtually.

A

Virtual Self

(3. Computer Addiction)

21
Q

generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.

A

Offline:

(3. Computer Addiction)

22
Q

Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.

A

Online:

(3. Computer Addiction)

23
Q

Criminal Activities

A
  1. Hacking
  2. Computer-related forgery, fraud and/or identity theft
  3. Electronic theft
  4. Cyberbullying
  5. Cybersex
  6. Child Pornography
  7. Cyber Defamation
24
Q
  • Unauthorized access to corrupt, alters, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent.
  • The introduction of computer viruses resulting in the corruption, alteration, theft, or loss of such data.
A
  1. Hacking
25
Q

-Illegal Access
- Illegal Interception
- Data Interference
- System Interference
- Misuse of Devices
- Infection of IT Systems with Malware
- If the act is committed against critical infrastructure of the Philippines the, penalty is between 12-20 years reclusion temporal.

A
  1. Hacking
26
Q

Six years up to twelve years of imprisonment also known as prison mayor.

A
  1. Hacking
26
Q

-An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
- Phishing
- Pharming
- Spam
- Maximum of Php 200,000 fine or prison mayor.

A
  1. Computer-related forgery, fraud and/or identity theft
27
Q
  • Illegal Downloading
  • Obtaining files that you do not have the right to use from the internet.
  • Digital Piracy
  • Practice of illegally copying and selling digital music, video, computer software, etc.
  • Copyright Infringement
    Penalty of Php 50,000 – 500, 000 and or prison mayor.
A
  1. Electronic theft
28
Q
  • The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
  • The Anti-Bullying Act of 2013 (RA 10627)
A
  1. Cyberbullying
29
Q
  • Is a form of child sexual exploitation.
  • Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system.
  • Penalty of 12-20 years of imprisonment or reclusion temporal.
A
  1. Child Pornography
30
Q
  • Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
  • There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in __________.
  • Penalty at least Php 200,000 and or prison mayor.
A
  1. Cybersex
31
Q
  • Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
  • Penalty of 6-12 years of imprisonment or prison mayor.
A
  1. Cyber Defamation
32
Q

INTERNET THREATS

A
  1. Malware
33
Q

Malware stands for?

A

Stands for malicious software.

34
Q

Types of Malware

A
  1. Worm
  2. Trojan
  3. Spyware
  4. Spam
  5. Phishing
35
Q
  • A malicious program that is disguised as a useful program, but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
  • Rogue Security Software – tricks the user into posing that it is security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.
A
  1. Trojan
35
Q

A malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.

A
  1. Worm
36
Q

A program that runs in the background without you knowing it (thus called “spy”). It has the ability to monitor what you are currently doing and typing through key logging.

A

Spyware

36
Q

tricks the user into posing that it is security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all.

A

Rogue Security Software

(Trojan)

37
Q

used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, any information you type using your keyboard.

A

Keyloggers

(Spyware)

38
Q

Unwanted email mostly from bots or advertisers. It can be used to send malware.

A

Spam

39
Q

It goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information.

A

Phishing

40
Q

a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

A

Pharming –

(Phishing)

40
Q
A
41
Q
A
42
Q
A
42
Q
A
43
Q
A
44
Q
A