Module 2.5 Flashcards

1
Q

what is a virus

A

software that is written to disrupt the normal functioning of a computer & is loaded into computer without knowledge or consent of the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is malware

A

malicious software
software with negative intentions

eg adware ; ads popping up whilst surfing the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

name 4 ways in which viruses spread

A
  • attachments sent via emails
  • files downloaded from the internet
  • files shared over a network
  • files stored on portable media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

name 5 ways in which you know your computer has a virus

A
  • files start disappearing
  • computer slows down
  • programs stop working properly
  • computer no longer boots up
  • anti-virus software reports threat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

name 3 ways to prevent viruses

A
  • antivirus software
  • act responsibly
  • use common sense when on internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is antivirus software

A

software that scans computer files for viruses & tries to eliminate them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

name 3 functions of the antivirus program

A
  • warn you of virus presence/sus activity
  • automatically delete virus
  • quarantine virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

name some antivirus software

A
  • Norton AntiVirus
  • AVG
  • Mcfee
  • Avast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the proper ways for virus prevention

A
  • anti-virus software
  • avoiding pirated software
  • scanning email attachments & downloaded files b4 opening them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a computer worm

A

malware that distributes itself over a network, k no normally via email, without a person having run an infected program
able to reproduce itself
can send copies of itself to everyone in your email address book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a trojan

A

destructive program disguised as a useful application

delete files on computer / scan computer for personal info and send it off to person who created it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how can we deal with spam

A
  • be careful who you give your email address to
  • check if your ISP can help
  • some anti-viruses have anti-spam
  • never respond to spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is an internet hoax?

A

message or article intended to deceive or defraud others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how can we protect ourselves from hoaxes?

A
  • never accept info at face value
  • always check source of info
  • legitimize info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is phishing

A

attempts by criminals to con users into giving out personal, confidential details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

give 3 times for prevention of phishing

A
  • don’t respond to requests via email
  • type in URL of bank in address
  • check site is secure
17
Q

what is pharming

A

scamming practice where a user is automatically redirected to another website even if they type in correct URL for official website

18
Q

how can we prevent pharming

A
  • ensure you got updated anti-spyware
  • many sites requiring secure info will warn you
  • ensure the site you’re accessing is secure
19
Q

what is email spoofing

A

changing of email header so it appears the email comes from a different source

20
Q

give general guidelines for using the internet safely

A
  • keep operating system updated
  • don’t click links in pop-ups
  • be careful when opening attachments
  • have good password policies
  • stay informed
  • don’t be gullible
21
Q

name some of the best practices when interacting g with others online

A
  • don’t make arrangements to meet in person
  • consider turning off geotagging
  • be sus of someone who is too “perfect•
  • it’s accepted to ignore some friend requests
  • be aware that no posting on social media can be regarded as private