Online Safety, Security, Ethics, and Etiquette Flashcards

1
Q

a network of zombie computers that have been taken over by a robot or bot that performs large scale malicious acts

A

INTERNET BOTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

generic term for spyware and adware

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

it is the malicious software disguised as real software often secretly installed, intended to transfer and gather private information like passwords without the users permission

A

MALWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

advertising, automatically delivers advertisement

A

ADWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

that function by spying on user activity without their knowledge

A

SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a program design to replicate by attaching itself into other computer problems, data files or the boot sector of the hard drive

A

VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is can be injected into a network by any type of means like usb

A

WORM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a type of malware that disguises itself as a normal file or program to think users into downloading and installing malwares

A

TROJAN HORSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

also known as love bug or love letter

A

ILOVEYOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a computer worm attached or email that have infected

A

ILOVEYOU VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a malfunction on a computer system through its runtime

A

COMPUTER BUG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the use of the internet or other electronic device to harass or stalk individual, group or organization

A

CYBER STALKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the act or tormenting, threatening, harassing or
embarassing another person using the internet or other technologies

A

CYBER BULLYING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information

A

SPOOFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

happens when malware or spyware places a web users browser homepage that redirects the use to unwanted

A

BROWSING HIJACKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

happens when criminal impersonates a user by stealing his or her personal information to withdraw money or pay goods online

A

INDENTITY THEFT

17
Q

enables a user to obtain information about another computer activities by transmitting data correctly to ones hard drive

A

SPYWARE

18
Q

is a destructive program that pretends as a desirable application that tricks user to allow access to computer through downloads or e-mail attachments

A

TROJAN HORSE

19
Q

concerned with how computing professionals should make decisions regarding professionals and social conduct

A

COMPUTER ETHICS

20
Q

10 CORE RULES OF NETIQUETTE

A
  1. Remember the Human
  2. Adhere to the same stand of behavior online that you would follow in real life
  3. Know where you are in cyber space
  4. Respect other people time and bandwith
  5. Make yourself look good
  6. Share expert knowledge
  7. Help keep flames ware under control
  8. Respect other people’s privacy
  9. Don’t abuse your power
  10. Be forgiving of others people’s mistake
21
Q

SAFEBOOK structure

A
  1. THINK before you post
  2. FRIENDS; only connect with friends
  3. KIND; be kind to others
  4. PASSWORD; don’t share your password
  5. PRIVACY; keep your settings private
  6. HURT; don’t be hurtful towards others
22
Q

useful tool that allows you to produce multiple letters using information stored on a list, database, or spreadsheet

A

MAIL MERGING

23
Q

two main parts in a MAIL MERGE

A

DOCUMENT and DATA

24
Q

was originally designed for Macintosh Computers

A

POWERPOINT

25
Q

4 types of animation

A
  1. ENTRANCE
  2. EMPHASIS
  3. EXIT
  4. MOTION PATHS
26
Q

is a connection to another document or to a location such as the internet

A

HYPERLINK

27
Q

document containing the hyperlink is called?

A

SOURCE DOCUMENT

28
Q

is a software system designed to search the internet for documents

A

SEARCH ENGINE

29
Q

types of search engines

A
  1. Google Search
  2. Yahoo
  3. Bing
  4. Yandex
  5. DuckDuckGo
30
Q

it uses a spider or a crawler to serach the internet

A

CRAWLER-BASED SEARCH ENGINE

31
Q

depend on human editors to create their listings or database

A

DIRECTORIES

32
Q

2 types of DIRECTORIES

A
  1. ACADEMIC & PROFESSIONAL
  2. COMMERCIAL & PORTAL
33
Q

uses both crawler based searches and directory searches to obtain their results

A

HYBRID SEARCH ENGINE

34
Q

transmit user supplied keywords simultaneously to several individual search engines

A

META SEARCH ENGINE

35
Q

how to search the internet effectively

A
  1. Use of keywords
  2. Use of phrase
  3. Capitalization
  4. Boolean Logic
  5. Wildcards and Truncation