UTS - Digital Self Flashcards

1
Q

are attempts by scammers to trick you into giving
out your personal information such as bank account numbers, passwords and credit card
numbers.

A

Phishing Scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

–Showing that we are better or capable than others so others will
admire us or they would think highly of us.

A

Self-Promotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is the aspect of the self that is expressed or shared to others through the use
of digital technology especially the Internet and social networking.

A

Digital Self:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is about using technology confidently as you live, learn, and work in a
challenging digital world.

A

Digital Literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You only want people to like you because you crave attention.

A

Ingratiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

basically scams that happen online.

A

Online scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intentions to make others feel bad or make feel not good
enough.

A

Exemplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • is the contraction of malicious software onto
    your system. It’s a piece of software written with the intent of causing harm to data and
    devices.
A

Malware/Virus Dissemination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Instilling fear to other people because you want them to think that
you are dangerous.

A

Intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

bombing is an overload of emails directed to one email
address, this will cause the person receiving the emails server to become sluggish or
even crash

A

Email Bombing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The aim of internet theft is to steal your personal information and use it to then
steal money out of your bank account or make purchases using your details.

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You want to appear handicapped or unfortunate. But for some
there are reasons behind it (e.g. they might need help). Others do this to get
attention.

A

Supplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

By sourcing the contact details and available account
information for savings or investment account holders, fraudsters can adopt the persona
of an investment broker.

A

Sales & Investment Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Eavesdropping without the consent
    of the parties is a crime and can be done online or over the phone.
A

Eavesdropping & Surveillance/Cyber Stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the unauthorized use and distribution of computer
software.

A

Software Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The action of skewing data entries in the user’s system.

A

Data Diddling

17
Q

Criminals usually steal identity information of others such as credit
card information, addresses, email addresses and more. With this information they can
pretend to be someone else and create new bank accounts.

A

Identity Theft

18
Q

Child soliciting and abuse online is a type of cybercrime
where criminals solicit children via chat rooms for the purpose of pornography. It can also

A

Child Soliciting & Abuse

19
Q

lack of restraint that one feels when communicating online

A

Online Disinhibition:

20
Q
A
21
Q
A