online ethics and etiquette // internet threats Flashcards

1
Q

this is a set of ideal rules and conduct that a netizen should observe in communicating and/or publishing information and materials over the WWW and in ICT in general.

A

netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Deals with placing a value on acts according to whether they are good or bad.

A

ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this refers to the person who is a member or part of the online community

A

netizen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Refers to the transmission of unsolicited messages from various origins using electronic messaging systems such as e-mail and chat messengers.

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is the most common kind of spam

A

email spam a.k.a. (UBE) Unsolicited Bulk E-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software or program used by an attacker to obtain personal information. Attackers commonly target user passwords to hack and take control of a user account.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

longer term for malware

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a program sent by attackers to inflict chaos on a computer’s operation and processes. Most of the time, it is disguised as an enticing web site. They are used to spy upon the activity of the computer and steal information.

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a malicious program that transfers from one computer to another by any types of means.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”.

A

iloveyou

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the iloveyou worm is also referred to as _____ or _____

A

love bug or love letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The iloveyou malware originated in the _________ neighborhood of _______ in the ________ on _________

A

Pandacan
Manila
Philippines
May 5 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a program designed to send you advertisements, mostly as pop-ups.

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

A

ransomware

17
Q

This law includes the protection of individuals

from bullying through electronic means.

A

anti-bullying act of 2013

18
Q

defined as “severe or repeated use by one or more students of a written, verbal or electronic expression, or a physical gesture, or any combination thereof, directed to another student that has the effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property.”

A

bullying

19
Q

This law protects an individual from various unwanted online and cyber acts that may harm or evade one’s privacy and integrity.

A

cybercrime prevention act of 2012