The Current State of ICT Technologies Flashcards

1
Q

Who introduced the World Wide Web?

A

Tim Berners-Lee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTML stands for?

A

Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A site that offers services and brings individuals
and businesses into selling different goods and commodities

A

Long Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Users can put content on their own on a web page, like comments, evaluations, etc.

A

User Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Users can have high interaction with the content of the page and can achieve a level of expertise.

A

Rich User Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users can classify and arrange information by adding tags or labels.

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It happens when someone intentionally abuses, harasses, and mistreats another person using electronic communication.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a crime of stealing personal
information for the purpose of assuming that
person’s name or identity to make any form of
transactions.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A criminal practice where
electronic communication is used to stalk or
harass an individual or group.

A

Cyber Stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The act of sending sexually explicit text
messages, images, and videos

A

Sexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a malicious program that
replicates itself by copying itself to
another program.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a malicious program that
is disguised as a legitimate program that
users will accept and use but take control
of your computer.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

malicious program that copies
itself and spreads to other computers.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A malicious program that
gathers information from a victim’s
computer and sends it back to the hacker.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An unwanted advertisement
that will pop-up several times on the
victim’s computer then behave
abnormally and tedious to close them.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A program that runs in the
background and steals user credentials
and confidential information and sends it
back to hack by recording every keystroke
that a user makes on their computer or
device.

A

Keylogger

17
Q

A collection of infected
internet–connected devices such as PC
and mobile phone that are controlled by
a common type of malware.

A

Botnet

18
Q

A software tool used by hackers
to gain control over a computer on a
network without being exposed.

A

Rootkit

19
Q

A ransom virus that block
the user from accessing the programs or
files and demands to pay the ransom
through online method for the removal of
the virus

A

Ransomware

20
Q

Also known as junk email or unwanted
email sent by advertiser or bot. It can be used to
send malware.

A

Spam

21
Q

A cyber attack method using deceptive
emails and websites to acquire sensitive personal
information.

A

Phishing

22
Q

A crime in which a computer is used
as an object and tool in committing a crime such
hacking, phishing, spamming, child pornography,
libel, hate crimes, identity theft and others.

A

Cybercrime

23
Q

A law that deals with all forms
of cybercrime

A

Cybercrime Law