Lesson 2: Online Safety, Security, Ethics, and Etiquette Flashcards

1
Q

defined as the
information
superhighway. This
means that anyone has
access to this highway,
can place info, and can
grab that info

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Eight types of information with risk

A

Mather’s and Father’s Name, Sibling’s Name, Address, Home and Cell Phone Number, Birthday, Email Address, First, Middle, & Last Name, and Current & Previous School

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

stands for malicious software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a malicious program
designed to replicate itself and transfer
from one computer to another (internet,
local networks, FDs, CDs, etc.)

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a malicious
program that transfers
from one computer to
another by any types of
means.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

was
a computer worm that attacked tens of millions of Windowspersonal
computers on and after 5 May 2000[1] local time in the Philippines when it
started spreading as an email message with the subject line “ILOVEYOU” and
the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”.

A

ILOVEYOU worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ILOVEYOU worm sometimes is also referred to as

A

Love Bug or Love Letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A file extension that was most often hidden by default on Windows
computers of the time (as it is an extension for a file type that is known by
Windows), leading unwitting users to think it was a normal text file.

A

vbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What did the ‘vbs’ file extension activate on the computer?

A

Visual Basic Script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where did the ILOVEYOU worm originate from?

A

Pandacan neighborhood of Manila in the Philippines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When was the ILOVEYOU Worm created?

A

May 5, 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where and when did the ILOVEYOU worm break out?

A

Following daybreak on May 5, 2000 across the world as employees began their workday that Friday morning, moving first to Hong Kong, then to Europe, and finally the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a malicious program
that disguises as a useful
program but once downloaded or
installed, leaves your PC
unprotected and allows hackers
to get your information.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a program that runs
in the background without you
knowing it. It
has the ability to monitor what
you are currently doing and
typing through keylogging.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

used to record keystrokes done by the user. This is
done to steal their password or any other sensitive information. The key
logger software typically uses log file to store its recording.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a program designed to send you advertisements, mostly as pop-ups.

A

Adware

17
Q

a type of
malicious software from
cryptovirology that threatens
to publish the victim’s data or
perpetually block access to it
unless a ransom is paid.

A

Ransomware

18
Q

an unwanted
email mostly from bots or
advertisers. It can be used to
send malware.

A

Spam

19
Q

an unwanted acquisition of
sensitive personal information like
passwords and credit card details.

A

Phishing

20
Q

Ten Cores Rules of Netiquette

A
  1. Remember the human
  2. Adhere to the same standard of behavior online that you would follow in real life
  3. Know where you are in cyberspace
  4. Respect other people’s time and bandwidth
  5. Make yourself look good
  6. Share expert knowledge
  7. Help keep flame wars under control
  8. Respect other people’s privacy
  9. Don’t abuse your power
  10. Be forgiving of other people’s mistakes
21
Q

It is the use of works protected by copyright law without permission for a usage where
such permission is required

A

Copyright Infringement

22
Q

Tips to help you avoid copyright infringement

A
  1. Always assume that the work is copyrighted.
  2. Do not copy, share or alter without seeking permission.
  3. Review and retain licensing agreements.
  4. Consider buying content.
  5. Give credit to the original author of the page or information.