Q1: Lesson 2 | Internet Safety Flashcards
it refers to the online security or safety of people and their information when using internet.
INTERNET SAFETY
is network etiquette, the do’s and don’ts of online communication.
NETIQUETTE
A person/s who habitually seeks to harm or intimidate those whom they perceive as vulnerable.
cyberbullies
A person that uses another person’s personal information in order to make purchases without that person’s permission.
identity thieves
The act of sending or receiving sexually-explicit images and messages.
sexting
A substance that affects the way the body functions; illegal intake makes a person unpredictable and dangerous.
Illegal Drugs
A person who uses computers to gain unauthorized access to data.
hacker
An act or instance of using or closely imitating the language or thoughts of another author without authorization; the representation of the author’s work as one’s own, as by not crediting the original author
plagiarism
Bullying takes place online, or using electronic technology such as cell phones, computers, and tablets over communication tools including social media sites, text messages, chat, and websites.
cyber bullying
The excessive use of computers to the extent that interferes with daily life. This excessive use may for example interfere with work or sleep, result in problems with social interaction, or affect mood, relationships, and though processes.
computer addiction
as defined by the World Intellectual Property Organization (WIPO), is the “creation of the mind, such as inventions, literary and artistic works, designs and symbols, names, and images used in commerce.”
Intellectual Property (IP)
a legal term used to describe the rights that creators have over their literary and artistic works. Works covered by copyright range from books, music, paintings, sculpture and films, to computer programs, databases, advertisements, maps and technical drawings.
copyright
An exclusive right granted for an invention. Generally speaking, a _______ provides the ______ owner with the right to decide how - or whether - the invention can be used by others. In exchange for this right, the _______ owner makes technical information about the invention publicly available in the published ______ document.
patent
sign capable of distinguishing the goods or services of one enterprise from those of other enterprises. it date back to ancient times when artisans used to put their signature or “mark” on their products. it, includes products sold or services offered by a business entity.
trademark
is a process of design applied to products that are to be manufactured through techniques of mass production. The creative act of determining and defining a product’s form and features takes place in advance of the physical act of making a product. Industrial design, includes design of an object (shape or surface, patterns, lines, or colours).
industrial design
and appellations of origin are signs used on goods that have a specific geographical origin and possess qualities, a reputation or characteristics that are essentially attributable to that place of origin.
GEOGRAPHICAL INDICATION
Most commonly, a __________ includes the name of the place of origin of the goods.
geographical indication
limits the rights of holders who are entitled to reproduce works for a limited time period, when you wish to copy an entire work or portions even with the copyright holder failing to give his or her permission, _____ may be invoked.
fair use
What works are covered by fair use?
A news report;
Scholarly and research work;
Information found through Web search engines
A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and data storage like flash drives and CDs.
virus
A malicious program that transfers from one computer to another by any type of means. It uses a computer network to spread itself.
worms
A small text files with a unique ID tag that are embedded in a Web browser and saved on the user’s hard drive.
cookies
used by a Web page that welcomes you or those used by a Web site that remembers your personal information for online ordering
cookies
also make it possible for websites to customize pages for users such as Amazon.com recommending books based on your past purchases.
cookies
can be considered an invasion of privacy and people believe their information should be collected only with their consent.
cookies
A program that runs in the background without knowing it. It has the ability to monitor what you are currently doing and typing through key logging.
spyware
It secretly gathers information about users while they browse the Web. it can also interfere with user’s control of their computers by installing additional software or redirecting Web browsers.
spyware
It used to record and monitor keystroke done by the user and can be a software or hardware devices done by the users. This is done to steal their password or any other sensitive information.
key loggers
It can record email, messages, or any other information you type using a keyboard.
key loggers
can collect credit card numbers users enter while shopping online.
key loggers
Unwanted email mostly from advertisers that it can be used to send malicious software.
spam
A program designed to send advertisements, mostly as pop-ups.
adware
Sending fraudulent emails that seem to come legitimate sources and usually direct email recipients to false websites that look like the real thing for the purpose of capturing private information and asking to update his/her account such as bank accounts, Social security numbers.
phishing