Lesson 4 Flashcards

1
Q

● a combination of texts, numbers, and/or
special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is
virtual in nature
and unbounded
unlike our physical
environment.

A

Cyber World,
also known as
Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Features of the Cyber World

A

Virtual Self
Source of Information
Social Interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a digital representation of
humans to interact in
virtual world

A

Virtual Self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data that are
available to
anyone as
long as they
have an
internet
connection

A

Source of
Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

digital
socialization
using chat,
blogs, vlogs,
online games,
etc.

A

Social
Interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tools for Social
Interaction

A

● Facebook
● Twitter
● Tumblr
● Instagram
● Online games
(Mobile
Legends, COL,
etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dangers and
Threats on the
Internet

A

Hacking
Identity Theft
Internet Predators
Cyberbullying
Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

individuals
who lure
children or
teenagers to
engage in
sexual acts or
relationships
online

A

Internet
Predators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

an online act
of humiliation
and/or threats
that is done
with and by
children and
teenagers

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

also known as malware,
is created to invade and
destroy computer
systems

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Think before you click.
  2. Do not share personal
    information.
  3. Beware of phishing and
    scam.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Keep your device secure.
  2. Never share passwords.
  3. Never agree to meet
    anyone you just met
    online
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Tell your guardian if
    something goes wrong
    online.
  2. Cover your webcam when
    not in used.
  3. Use a strong password.
  4. Make sure to logout your
    account in public devices.
A
17
Q

The cyber world allows us to navigate through Wrap Up
a virtual world, interact with other people
through the use of the internet, and retrieve
data from the vast information available
online.
The Internet is very powerful but along with
these advancements, we can encounter risks
such as exposure to unsuitable content,
crime-related dangers, privacy-related
dangers, and malicious software.
Being a generation of technology-dependent
human beings, we need to be more careful on
the internet to avoid risks. We protect
ourselves by simply creating strong passwords,
and by avoiding sharing personal information
with others, especially with strangers.

A