The Current State of ICT Technologies Flashcards
Who introduced the World Wide Web?
Tim Berners-Lee.
HTML stands for?
Hypertext Markup Language
A site that offers services and brings individuals
and businesses into selling different goods and commodities
Long Tail
Users can put content on their own on a web page, like comments, evaluations, etc.
User Participation
Users can have high interaction with the content of the page and can achieve a level of expertise.
Rich User Experience
Users can classify and arrange information by adding tags or labels.
Folksonomy
It happens when someone intentionally abuses, harasses, and mistreats another person using electronic communication.
Cyberbullying
It is a crime of stealing personal
information for the purpose of assuming that
person’s name or identity to make any form of
transactions.
Identity Theft
A criminal practice where
electronic communication is used to stalk or
harass an individual or group.
Cyber Stalking
The act of sending sexually explicit text
messages, images, and videos
Sexting
a malicious program that
replicates itself by copying itself to
another program.
Virus
a malicious program that
is disguised as a legitimate program that
users will accept and use but take control
of your computer.
Trojan Horse
malicious program that copies
itself and spreads to other computers.
Worm
A malicious program that
gathers information from a victim’s
computer and sends it back to the hacker.
Spyware
An unwanted advertisement
that will pop-up several times on the
victim’s computer then behave
abnormally and tedious to close them.
Adware
A program that runs in the
background and steals user credentials
and confidential information and sends it
back to hack by recording every keystroke
that a user makes on their computer or
device.
Keylogger
A collection of infected
internet–connected devices such as PC
and mobile phone that are controlled by
a common type of malware.
Botnet
A software tool used by hackers
to gain control over a computer on a
network without being exposed.
Rootkit
A ransom virus that block
the user from accessing the programs or
files and demands to pay the ransom
through online method for the removal of
the virus
Ransomware
Also known as junk email or unwanted
email sent by advertiser or bot. It can be used to
send malware.
Spam
A cyber attack method using deceptive
emails and websites to acquire sensitive personal
information.
Phishing
A crime in which a computer is used
as an object and tool in committing a crime such
hacking, phishing, spamming, child pornography,
libel, hate crimes, identity theft and others.
Cybercrime
A law that deals with all forms
of cybercrime
Cybercrime Law