Unit 5: THE NETIQUETTE AND THE COMPUTER ETHICS Flashcards

1
Q

it’s network etiquette - that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life.

A

NETIQUETTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.

A

REMEMBER THE GOLDEN RULE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

treat others with the same respect that you would like to receive and avoid confrontational or offensive language.

A

Make a good impression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to make a good impression?

A
  1. AVOID SLANG, ACRONYMS, AND TEXT TALK
  2. AVOID “SCREAMING” IN TYPED MESSAGES
  3. PROOFREAD YOUR
    MESSAGES BEFORE SENDING
    THEM
  4. EXERCISE GOOD JUDGMENT WHEN SHARING INFORMATION
    WITH OTHERS ONLINE
  5. RESPECT DIVERSITY IN VIEWPOINTS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ten (10) Commandments of Computer Ethics:

A
  1. RULE 1: REMEMBER THE HUMAN
  2. RULE 2: ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE
  3. RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE
  4. RULE 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH
  5. RULE 5: MAKE YOURSELF LOOK GOOD ONLINE
  6. RULE 6: SHARE EXPERT
    KNOWLEDGE
  7. RULE 7: HELP KEEP FLAME WARS UNDER CONTROL
  8. RULE 8: RESPECT OTHER PEOPLE’S PRIVACY
  9. RULE 9: DON’T ABUSE YOUR POWER
  10. RULE 10: BE FORGIVING OF OTHER PEOPLE’S MISTAKES.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

REMEMBER THE HUMAN

A

RULE 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE

A

RULE 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

KNOW WHERE YOU ARE IN CYBERSPACE

A

RULE 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH

A

RULE 4:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAKE YOURSELF LOOK GOOD ONLINE

A

RULE 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SHARE EXPERT
KNOWLEDGE

A

RULE 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HELP KEEP FLAME WARS UNDER CONTROL

A

RULE 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RESPECT OTHER PEOPLE’S PRIVACY

A

RULE 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DON’T ABUSE YOUR POWER

A

RULE 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BE FORGIVING OF OTHER PEOPLE’S MISTAKES.

A

RULE 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risks while using Online Services:

A
  1. Cybercrime
  2. Cybercriminals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Common forms of Cybercrimes:

A
  1. Copyright Infringement
  2. Plagiarism
  3. Computer addiction
  4. Virtual self
20
Q

the violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work.

A

Copyright Infringement

21
Q

an act or instance of using or closely imitating the language and thoughts of another author without authorization.

A

Plagiarism

22
Q

Computer addiction:

A
  1. Offline addiction
  2. Online addiction
23
Q

generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.

A

Offline Addiction

24
Q

Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.

A

Online Addiction

25
Q

The persona virtually.

A

Virtual Self

26
Q

Criminal activities:

A
  1. Hacking
  2. Identity Theft
  3. Electronic theft
  4. Cyberbullying
  5. Cyber sex
  6. Child pornography
  7. Cyber defamation
27
Q

Unauthorized access of or interference with computer systems,
servers, or other
information and communication systems.

A

Hacking

28
Q

An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.

A

Identity Theft

29
Q

Illegal downloading, Obtaining files that you do not have the right to use from the internet.

A

Electronic Theft

30
Q

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.

A

Cyberbullying

31
Q

Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.

A

Cybersex

32
Q

Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti Child Pornography Act of 2009, committed through a computer system.

A

Child Pornography

33
Q

Is an unprivileged false statement of fact, which tends to harm the reputation of a person or company.

A

Cyber Defamation

34
Q

Internet Threats

A
  1. Malware
  2. Pharming
  3. Phishing
  4. Ransom ware
35
Q

one of the more common ways to infiltrate or damage your computer.

A

Malware

36
Q

a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.

A

Pharming

37
Q

used most often by cyber criminals because it is easy to execute and can produce the results they are looking for with very little effort.

A

Phishing

38
Q

a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

A

Ransom ware

39
Q

Two Common Types of Ransom ware:

A
  1. Lock Screen Ransom ware
  2. Encryption Ransom ware
40
Q

displays an image that prevents you from accessing your computer

A

Lock Screen Ransom ware

41
Q

encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them

A

Encryption Ransom ware

42
Q

one of the more common methods of both sending information out and collecting it from
unsuspecting people.

A

Spam

43
Q

Third parties to infiltrate your computer often use
Spyware and adware.
Software that collects
personal information about you without you knowing. They often come in the form of a ‘free’ download and are installed automatically with or without your consent.

A

Spyware

44
Q

It may not be a term you are familiar with, but there is a good chance you or someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate software

A

Trojan horse

45
Q

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.

A

Viruses

46
Q

is another method used by cyber criminals to capture personal information.
Virtual “listening in”
on information that is shared
over an unsecure (not encrypted) Wi-Fi network.

A

Wi-Fi eavesdropping

47
Q

unlike a virus, goes to work on its own without attaching itself to files or Programs. It lives in your computer memory, does not damage or alter the hard drive and propagates by sending itself to other computers in a network - whether within a company or the Internet itself.

A

Worms