Netiquette & Computer Ethics Flashcards

1
Q

Proper online behavior, respectful & professional communication

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Criminal activity using computer or the internet

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Treat others online as you want to be treated

A

Golden rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

May use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybercrime prevention act of 2012

A

Republic Act no. 10175

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is an act protecting individual personal information

A

Republic Act No. 10173 Data Privacy Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The exclusive legal right, given to an originator or an assignee to print, publish, perform,
film, or record literacy, artistic, or musical material, and to authorize others to do the
same.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the violation, piracy or theft of a copyright holder’s
exclusive rights through the unauthorized use of a copyrighted material or work.

A

Copyright infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An act of using or closely imitating the language and thoughts of another author without
authorization.

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

generally used when speaking about excessive gaming behavior, which can
be practiced both offline and online.

A

Offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is the characteristics of the culture of computers, information, and virtual
reality.

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

also known as “internet addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to excessive use of the internet.

A

Online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the persona you create about yourself virtually.

A

Virtual self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unauthorized access of or interference with computer systems, servers, or other
information and communication systems

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

•Illegal downloading

•Obtaining files that you do not have the right to use from the internet

A

Electronic theft

17
Q

The use of electronic communication to harass a person, typically by sending a message of an
intimidating or threatening nature

A

Cyberbullying

18
Q

Willful engagement, maintenance, control, or operation, directly or indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for
favor or consideration

19
Q

Is a form of child sexual exploitation

A

Child pornography

20
Q

Is an unprivileged false statement of fact which tends to harm the reputation of a
person or company

A

Cyber Defamation

21
Q

is a term used to describe actions taken by someone to gain unauthorized access to a computer.

22
Q

one of the more common ways to
infiltrate or damage your computer.

23
Q

is a common type of online fraud.
A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.

24
Q

used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little
effort.

25
a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransomware
26
is one of the more common methods of both sending information out and collecting it from unsuspecting people.
Spam
27
are often used by third parties to infiltrate your computer.
Spyware and adware
28
may not be a term you’re familiar with, but there’s a good chance you or someone you know has been affected by one. A malicious program that is disgusted as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded.
Trojan horse
29
Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus.
Viruses
30
another method used by cyber criminals to capture personal information.
Wi-Fi Eavesdropping
31
a common threat to computers and the Internet as a whole.
Worms
34