LESSON 2 Flashcards

1
Q

it refers to the online security or safety of people and their information when using the internet.

A

Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting it’s own code.

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

short for malicious software. ________ is the name that is given to any type of software that could harm a computer system, interfere with and gather a user data or make the computer perform actions without

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

types of malware

A

Virus
Adware
Worm
Trojan
Ransomware
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a piece of malicious code that inserts itself into computer systems, self- replicates, and spreads to other system and devices.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

who is created the ILOVEYOU virus

A

onel de guzman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a type of malware or malicious software that can replicate rapidly and spread across devices within a network. as it spreads a ______ consume bandwidth, overloading infected system and making them unreliable or unavailable

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a malware disguised as harmless and legitimate software, application, or a games, tempting users to download it. once a ______ infiltrates the system, it grants the attacker unauthorized control over devices or spread malware without the users knowledge

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

advertising supported software that display unwanted or malicious advertisements on a user’s device. it tracks userd activity online and collect data to provide targeted advertising

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a time sensitive cyber attack when a hacker encrypt user files or devices and hold them for _______ until a certain deadline.

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

software that secretly monitor and collect information about a user’s activities, often without their knowledge or consent

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients. _____ can be sent by real humand, which a network of computers

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a cyber crime in which a target or target are contacted by email, telephone or text message by someone posing as a legitimate institutions to lure individuals into providing sensitive data such as personally indetifiable information, banking and credit card details anf and password

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ways to protect your computer from viruses

A
  1. keep up to data
  2. antivirus software
  3. antispyware software
  4. use strong protection
  5. choose strong password
  6. use stronger authentication
  7. protect your private information
  8. be careful what you click
  9. shop safely
  10. be careful what you share
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

concerned with the proper manner of communication in the online environment. whenever you communicate in the virtual world, consider the following “rules”, adapted from virginia shea’s core rules of ____

A

netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

when communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the golden rule: do unto others as you would have other do unto you.

A

rule 1: remember the human

17
Q

while it can be argued that standard of behavior may be diff in the virtual world, they certainly should not be lower.

A

rule 2: adhere to the same standards of behavior online that you follow in real life

18
Q

depending on where you are in the virtual world, the same written communication can be acceptable in one area where it might be considered inappropriate in another

A

rule 3: know where you are in cyberspace

19
Q

electronics communication takes time to read and time in which to respond. most people today lead to busy lives, just like you do, and do not have time to read or respond to frivolous email

A

rule 4: respect others people time and bandwidth

20
Q

one of the virtual world’s best things is the lack kf judgment associated with your physical appearance, the sound of your voice, or the clothes you wear

A

rule 5: make yourself look good online

21
Q

Internet offers it’s user many benefits; one is the ease in which information can be shred or accessed, and in fact this “information sharing”

A

rule 6: share expert knowledge

22
Q

what is meant by flaming and flame wars, flaming is what people do when they express a strongly held opinion without holding back any emotion….. bla bla bla

A

rule 7: help keep flame wars under control

23
Q

depending on what you are reading in the virtual world, be it an online class discussion forum, facebook page or an email you may be exposed to some private or personal information that needs to be handled with care

A

rule 8: respect others people’s privacy

24
Q

like in ftf situation, there are people in cyberspace who have more “power” than othersn

A

rule 9: dont abuse your power

25
Q

not everyone has the same amount of experience working in the virtual world. and not everyone knows the rules of netiquette

A

rule 10: be forgiving of other people’s mistake