Lesson 2 Flashcards

1
Q
  • Internet etiquette, courtesy and consideration for others using shared services, mailing list, etc.
A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

– A network consisting of a worldwide network of
computer networks that use the TCP/IP networks protocols to
facilitate data transmission and exchange.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

– an Interconnected system or web.
– a system intersecting lines or channels and use
communicate between one computer to another computer.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a protocol developed
for the internet to get data from one network device to another.

A

TCP – (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

it is a unique no. that identifies the
location of a particular computer within a network. (192.168.001.01)

A

IP – (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

– stands for malicious software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • a malicious program designed to replicate itself and
    transfer from one computer to another either through the
    internet and local networks or data storage like flash drives
    and CD’s.
A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

– a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to
spread itself. For example, the ILOVEYOU worm
( Love Bug Worm) created by a Filipino.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • a malicious program that disguised as a useful program but
    once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– tricks the user into posting that it is a security software. It asks the user to pay to improve his/her
security but in reality they are not protected at all.

A

Rogue security software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • a program that runs in the background without you knowing it (thus called spy). It has the ability to monitor what you
    are currently doing and typing through keylogging.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • used to record the keystroke done by the users.
    This is done to steal their password or any other sensitive
    information. It can record email, messages, or any information
    you time using your keyboard.
A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • a program designed to send your advertisements,
    mostly popup
A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • unwanted email mostly from bots or advertisers. It can be used to send malware
A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– it’s goal is to acquire sensitive
personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to
update his/her username, password, credit card , or personal information.
*pharming – a more complicated way of phishing
where it exploits the DNS (Domain Name Service) system.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the knowledge of maximizing the user’s personal safety and security and security risk to private information, and self- protection from computer crime in general.

A

online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Learn about different kinds of scams and what you can do to avoid them

A

Know the Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Think twice, thrice anal a zillion time before click any link

A

Think before you click

19
Q

These sites may have an Address that’s very similar to a legitimate site, but the page can have misspelling, Bad Grammar, or low resolution Images

A

Safety Peruse

20
Q

Don’t shop on a site unless it has “https” and padlock icon the left or right if the URL

A

Shop Safety

21
Q

The an Extremely crackable pawn One like

A

Kick-butt Passwords

22
Q

Keep your guard up. Back up all your data on your computer. smartphone and tablet, thett or a cash

A

Protect your info’s.

23
Q

Protect your network by changing your mater’s setting and making sure that you have the connection password-connected

A

Watch your Wi-Fi Connectivity

24
Q

A firewall is grate line of defeme against cyber attracts

A

Install a Firewall

25
Q

The best security updates automatically to protect your compute.
The the manufacturer’s latest secarity patches to make regular updates and make that you have the software set to do routine screen.

A

Keep up to date

26
Q

Use your Cam ser while surfing the web

A

Use your Noggin

27
Q

Is network time the dos and don’ts of online communication

Is a combination of the wonds nerwork and etiquette and is defined as a set of rules for acceptable online behavior.

Netiquette cover both mon courtesy online and the informal rules of the road of cyberspace

A

Netiquette

28
Q

The golden rule your pants and your kindergarten teacher ught you was pretty simple Dhers as you’d have others sunto Imagine how you’d feel if you win the other person’s shoes Stand up for yourself, but try out to hurt people’s

In ryhempien, we stine this in an even min hude mamer

Remember the buman

A

The Golden Rule. Treat others as you would be treated

29
Q

Flames permitud ammunicanal through the internet. “Flaming” in what people do when they express strongly held pinion without holding back any emotion. It’s the kind of message that makes people pond. “Ob come on, tell us bow you really feel” Tact is it bjective.

Flames can be lots of fun, both no write and read And the mcipients of flares sometimes deserve the best

A

No Flaming

30
Q

Pe may misinterpret it.

When you are typing something that will need to be said don’t type in all caps. It is rude. It is equivalent of yelling

It is not necesary unless you are actually “YELLING

A

Don’type ALL CAPS

31
Q

SPAM-it in any solicited email from unknown sources.

Spamming is the use of messaging system to send an onsolicited message, especially advertising, as well as sending messages repeatedly on the same site

mepeatedly on the same site.

A

Don’t Spam SPAM

32
Q

Dont arrange to meet anyone you ment online.

A

Don’t talk with people you don’t know

33
Q

Don’t Steal Someone else’s ideas. Property and right

Copyright law gives the copyright holder (often the author publisher) the right to control certain uses of works protected by copyright. You must obey any terms that you agreed to in order to gain access to a copy if the work

A

Obey Copyright Laws

34
Q

are websites used for
retrieval of data, files, or documents
from data bases.

A

Search Engines

35
Q

Some search engines we use today are:

A

Google
Duck duck go
Bing
Dog pile
Yippy
Google Scholar
Webopedia
Yahoo
The internet archive

36
Q

is one type of Uniform Resource Identifier (URI). It is a generic term for all types of names and addresses that refer to objects on the world wide web. Knowing the URL endings will give you clues to who is sponsoring the website and help evaluate the sources.

A

URL

37
Q

The web provides access to some excellent information and can also give access to those that are irrelevant and outdated.

A

Evaluating Sites

38
Q

. It reveals that the person, institution or agency
responsible for a site has the qualifications and knowledge to do so.

A

Authority

39
Q

The purpose of the information presented in the site should be clear. Some sites are meant to inform, persuade, state an opinion, entertain, or parody something or someone.

A

Purpose.

40
Q

. This refers to how comprehensive the website is in their discussion of certain topics

A

Coverage

41
Q

. It refers to: (1) how current the information presented is, and (2) how often the site is updated or maintained. It is important to know when a site was created, when it was last updated, and if all of the links are current.

A

Currency

42
Q

present information with a minimum of bias.

A

Objectivity

43
Q

. It refers to the credibility of the website.

A

Accuracy

44
Q

is an important skill that everyone should practice and master through time. It is always important to learn which information are relevant and reliable to be able to avoid misinformation and be a victim of fake news.

A

Website evaluation