Online Safety, Security & Ethics Flashcards

1
Q

Stands for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A dangerous computer program that replicates itself through a network

A

Computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Usually spread through email and running of attachments from suspicious sources

A

Computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some deleted files, some disrupt network functions

A

Computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A malware that fronts to perform a good funtion, but performs undesirable function without the users consent

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It can disable computers defenses

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can erase data, corrupt files, allow access to computer

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A program that duplicates itself, then infects the computer. It spread like biological virus

A

Computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can be transferred by removable devices

A

Computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A computer program that is installed on a computer to collect information or even take control without the knowledge of user

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can monitor, can collect information from the user

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Designed to send advertisement; mostly pop ups

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unwanted email mostly from bots or advertiser. It can be used to send malware

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2 types of spam

A

Email spam
(Aka junk emails)
Email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A practice of trying to get confidential information by making it appears from a trustworthy source

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A person who is able to enter or control other people’s computer

A

Hacker

17
Q

Illegal activities/offenses that are commited through the use of internetq

A

Cybercrime

18
Q

Repeated harassment, mistreatment, or making fun on someone through the use of gadgets

A

Cyberbullying

19
Q

Is the use of gadgets to stalk or harass an individual

A

Cyberstalking

20
Q

A true _______ intent is to harm their victim using anonymity and untraceable technology

A

Cyber stalkers

21
Q

Occurs when one person takes personal information from another without consent

A

Identify theft

22
Q

Reffered to sending/recieving rude messages or videos

A

Sexting

23
Q

What are the types of cybercrime

A

•cyberbullying
•cyberstalking
•Identity theft
•sexting