Q1: Lesson 2 | Internet Safety Flashcards

1
Q

it refers to the online security or safety of people and their information when using internet.

A

INTERNET SAFETY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is network etiquette, the do’s and don’ts of online communication.

A

NETIQUETTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A person/s who habitually seeks to harm or intimidate those whom they perceive as vulnerable.

A

cyberbullies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A person that uses another person’s personal information in order to make purchases without that person’s permission.

A

identity thieves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The act of sending or receiving sexually-explicit images and messages.

A

sexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A substance that affects the way the body functions; illegal intake makes a person unpredictable and dangerous.

A

Illegal Drugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A person who uses computers to gain unauthorized access to data.

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An act or instance of using or closely imitating the language or thoughts of another author without authorization; the representation of the author’s work as one’s own, as by not crediting the original author

A

plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bullying takes place online, or using electronic technology such as cell phones, computers, and tablets over communication tools including social media sites, text messages, chat, and websites.

A

cyber bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The excessive use of computers to the extent that interferes with daily life. This excessive use may for example interfere with work or sleep, result in problems with social interaction, or affect mood, relationships, and though processes.

A

computer addiction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

as defined by the World Intellectual Property Organization (WIPO), is the “creation of the mind, such as inventions, literary and artistic works, designs and symbols, names, and images used in commerce.”

A

Intellectual Property (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a legal term used to describe the rights that creators have over their literary and artistic works. Works covered by copyright range from books, music, paintings, sculpture and films, to computer programs, databases, advertisements, maps and technical drawings.

A

copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An exclusive right granted for an invention. Generally speaking, a _______ provides the ______ owner with the right to decide how - or whether - the invention can be used by others. In exchange for this right, the _______ owner makes technical information about the invention publicly available in the published ______ document.

A

patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sign capable of distinguishing the goods or services of one enterprise from those of other enterprises. it date back to ancient times when artisans used to put their signature or “mark” on their products. it, includes products sold or services offered by a business entity.

A

trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a process of design applied to products that are to be manufactured through techniques of mass production. The creative act of determining and defining a product’s form and features takes place in advance of the physical act of making a product. Industrial design, includes design of an object (shape or surface, patterns, lines, or colours).

A

industrial design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

and appellations of origin are signs used on goods that have a specific geographical origin and possess qualities, a reputation or characteristics that are essentially attributable to that place of origin.

A

GEOGRAPHICAL INDICATION

17
Q

Most commonly, a __________ includes the name of the place of origin of the goods.

A

geographical indication

18
Q

limits the rights of holders who are entitled to reproduce works for a limited time period, when you wish to copy an entire work or portions even with the copyright holder failing to give his or her permission, _____ may be invoked.

A

fair use

19
Q

What works are covered by fair use?

A

A news report;
Scholarly and research work;
Information found through Web search engines

20
Q

A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and data storage like flash drives and CDs.

A

virus

21
Q

A malicious program that transfers from one computer to another by any type of means. It uses a computer network to spread itself.

A

worms

22
Q

A small text files with a unique ID tag that are embedded in a Web browser and saved on the user’s hard drive.

A

cookies

23
Q

used by a Web page that welcomes you or those used by a Web site that remembers your personal information for online ordering

A

cookies

24
Q

also make it possible for websites to customize pages for users such as Amazon.com recommending books based on your past purchases.

A

cookies

25
Q

can be considered an invasion of privacy and people believe their information should be collected only with their consent.

A

cookies

26
Q

A program that runs in the background without knowing it. It has the ability to monitor what you are currently doing and typing through key logging.

A

spyware

27
Q

It secretly gathers information about users while they browse the Web. it can also interfere with user’s control of their computers by installing additional software or redirecting Web browsers.

A

spyware

28
Q

It used to record and monitor keystroke done by the user and can be a software or hardware devices done by the users. This is done to steal their password or any other sensitive information.

A

key loggers

29
Q

It can record email, messages, or any other information you type using a keyboard.

A

key loggers

30
Q

can collect credit card numbers users enter while shopping online.

A

key loggers

31
Q

Unwanted email mostly from advertisers that it can be used to send malicious software.

A

spam

32
Q

A program designed to send advertisements, mostly as pop-ups.

A

adware

33
Q

Sending fraudulent emails that seem to come legitimate sources and usually direct email recipients to false websites that look like the real thing for the purpose of capturing private information and asking to update his/her account such as bank accounts, Social security numbers.

A

phishing