Lesson 2 - Rules of Netiquette Flashcards

1
Q

The 10 most basic information that could be the source of other people that might lead you to riskier and more unsafe when you are sharing those kinds of information

Type of Information

A
  • First Name
  • Last Name
  • Middle Name
  • Current and Previous Schools
  • Your Cellphone Number
  • Who your Mother and Father are
  • Who your Siblings are
  • Your address
  • Your home phone number
  • Your Birthday
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three Types of Internet Threats

A
  • Malware
  • Spam
  • Phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stands for Malicious Software

Types of Internet Threats

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UNWANTED EMAIL MOSTLY FROM BOTS OR ADVERTISERS. IT CAN BE USED TO SEND MALWARE.

Types of Internet Threats

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ITS GOAL IS TO ACQUIRE SENSITIVE PERSONAL INFORMATION LIKE PASSWORDS AND CREDIT CARD DETAILS.

Types of Internet Threats

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Six Types of Malware

A
  • Virus
  • Worm
  • Trojan
  • Spyware
  • Keyloggers
  • Adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MALICIOUS PROGRAM DESIGNED TO REPLICATE ITSELF AND TRANSFER FROM ONE COMPUTER TO ANOTHER THOUGH STORAGE DEVICE, INTERNET, OR LOCAL NETWORKS.

Types of Malware

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A MALICIOUS PROGRAM TRANSFER FROM ONE COMPUTER TO ANOTHER BY ANY TYPE OF MEANS. OFTEN USED COMPUTER NETWORKS TO SPREAD ITSELF. EX. ILOVEYOU WORM, LOVE BUG WORM. NORMALLY CORRUPT FILES AUTOMATICALLY.

Types of Malware

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A MALICIOUS PROGRAM THAT IS DISGUISED AS A USEFUL PROGRAM, BUT ONCE INSTALLED IT WILL LEAVES YOUR PC UNPROTECTED AND ALLOWS HACKER TO GET YOUR INFORMATION.

Types of Malware

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A PROGRAM THAT RUNS IN THE BACKGROUND WITHOUT YOU KNOWING IT (SPY). IT HAS THE ABILITY TO MONITOR WHAT YOU ARE DOING AND TYPING THROUGH KEYLOGGING.

Types of Malware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

USED TO RECORD THE KEYSTROKE DONE BY THE USERS. THIS IS DONE TO STEAL THEIR PASSWORD, OR ANY SENSITIVE INFORMATION.IT CAN RECORD EMAIL, MESSAGES, OR ANY INFORMATION YOU TYPE USING KEYBOARD.

Types of Malware

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A PROGRAM DESIGNED TO SEND YOU ADVERTISEMENTS, MOSTLY AS POP-UPS.

Types of Malware

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Read mo to tas may 5 ka na sakin, lakas mo sakin ‘hal eh

A

THINK BEFORE YOU CLICK

  1. BEFORE YOU POST SOMETHING ON THE WEB, ASK THESE QUESTIONS TO YOURSELF: WOULD YOU WANT YOUR PARENTS OR GRANDPARENTS TO SEE IT? WOULD YOU WANT YOUR FUTURE BOSS TO SEE IT? ONCE YOU POST SOMETHING ON THE WEB, YOU HAVE NO CONTROL OF WHO SEES YOUR POSTS.
  2. YOUR FRIENDS DEPEND ON YOU TO PROTECT THEIR REPUTATION ONLINE. TALK TO YOUR FRIENDS ABOUT THIS SERIOUS RESPONSIBILITY.
  3. SET YOUR POST TO “PRIVATE.” IN THIS WAY, SEARCH ENGINES WILL NOT BE ABLE TO SCAN THAT POST.
  4. AVOID USING NAMES. NAMES ARE EASY FOR SEARCH ENGINES TO SCAN.
  5. IF YOU FEEL THAT A POST CAN AFFECT YOU OR OTHER’S REPUTATION, ASK THE ONE WHO POSTED IT TO PULL IT DOWN OR REPORT IT AS INAPPROPRIATE.

yieee 5 na siya

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IS A VIOLATION OF AN INDIVIDUAL OR ORGANIZATION’S COPYRIGHT. IT DESCRIBES THE UNAUTHORIZED USE OF COPYRIGHTED MATERIAL, SUCH AS TEXT, PHOTOS, VIDEOS, MUSIC, SOFTWARE, AND OTHER ORIGINAL CONTENT. VIOLATING INTELLECTUAL PROPERTY.

A

COPYRIGHT INFRINGEMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

THE ACTION OF BREAKING THE TERMS OF A LAW, AGREEMENT, ETC.; VIOLATION.

A

Infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A WORK OR INVENTION THAT IS THE RESULT OF CREATIVITY, SUCH AS A MANUSCRIPT OR A DESIGN, TO WHICH ONE HAS RIGHTS AND FOR WHICH ONE MAY APPLY FOR A PATENT, COPYRIGHT, TRADEMARK, ETC.

A

Intellectual Property

17
Q

TO STEAL AND PASS OFF IDEAS OR WORDS OF ANOTHER AS ONE’S OWN”. SIMPLY PUT, PLAGIARISM IS THE PROCESS OF TAKING OTHER PEOPLE’S WORDS AND/OR IDEAS AND PRETENDING THAT THEY ARE YOUR OWN.

A

Plagiarism

gawain mo no? ay hindi ba? oo nga pala chat gpt gamit mo baks

18
Q

FOUR TIPS TO AVOID COPYRIGHT INFRINGEMENT

A
  • Understand
  • Be Responsible
  • Be Creative
  • Know the Law
19
Q

Copyright protects literary works, photographs, paintings, drawings, films, music and lyrics, choreography, and sculptures, but generally it does not protect underlying ideas and facts. Meaning you can express something using your own words but you have to give credits to the source.

FOUR TIPS TO AVOID COPYRIGHT INFRINGEMENT

A

Understand

20
Q

Even if the materials does not say it is copyrighted, its is not a valid defense against copyright. Be responsible enough to know if something has a copyright.

A

Be Responsible

21
Q

Ask yourself whether what your are making is something that came from you or something made from someone’s else’s creativity. It is important to add your own creative thinking in everything that will be credited to you.

A

Be Creative

22
Q

There are some limitations to copyright laws. There are some copyright laws that last for a lifetime of the author. There are also provisions for “fair use” meaning intellectual property maybe used without the consent of the owner.
Like, commentaries, research, library, teaching, search engines, criticisms, news report, etc.

A

Know the Law

23
Q

The law states the principles of convention for the protection of literary and artistic works, patents, trademarks and other forms of intellectual property.

Know the Law

A

Copyright Law of the Philippines, Republic Act No. 8293

Signed by Former Pres. Fidel V. Ramos on June 6, 1997 and took effect on January 1, 1988

24
Q

This law protects an individual from various unwanted online and cyber act that may harm or evade one’s privacy and integrity like: legal access of computers through remote means without permission, interception of one’s information from private conversation, acquisition of passwords and other vital information, computer forgery, and libel.

Know the Law

A

Cybercrime Prevention Act of 2012, Republic Act No. 10175

25
Q

Defined as severe or repeated use by one or more students of a written, verbal, electronic or physical gesture or any combination thereof directed to another student that has the effect of actually causing or placing physical or emotional harm or damage to property.

Know the Law

A

Anti-Bullying Act of 2013, Republic Act No. 10627