Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
37 Cards in this Set
- Front
- Back
that is the etiquette of cyberspace |
Netiquette |
|
means the forms of required by good breeding or prescribed by authority to be required in social or official life. |
Etiquette |
|
is a set of rules for behaving properly online. is concerned with the "proper" way to communicate in an online environment |
Netiquette |
|
These rules have been established as a result of consensus in society and are often written into laws. |
Computer ethics |
|
treat others with the same respect that you would like to receive and avoid confrontational or offensive language. |
Make a good impression, the Golden rule |
|
communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use “your” instead of “ur”. |
Avoid slang, acronym and text talk |
|
typing an entire message using all capital letters is known as |
Screaming |
|
It is the Characteristics of the culture of computers, information, technology and virtual reality. |
Cyber |
|
is defined as a crime in which a computer is the object of the crimeis used as a tool to commit an offense. |
Cybercrime |
|
may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. |
Cybercriminals |
|
is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet. |
RA 10175 |
|
is an act protecting individual personal information. |
RA 10173 |
|
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. |
Copyright |
|
An act or instance of using or closely imitating the language and thoughts of another author without authorization. |
Plagiarism |
|
Unauthorized access of or interference with computer systems, servers, or other information and communication systems |
Hacking |
|
An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons. |
Computer-related forgery, fraud and/or identity theft |
|
Obtaining files that you do not have the right to use from the internet. |
Electronic theft |
|
The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature |
Cyberbullying |
|
sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet. |
Cybersex |
|
Is a form of child sexual exploitation. |
Child pornography |
|
Is an unprivileged false statement of fact which tends to harm the reputation of a person or company. |
Cyber defamation |
|
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. |
Copyright |
|
is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work. |
Copyright infringement |
|
the persona you create about yourself virtually. |
Virtual self |
|
is a term used to describe actions taken by someone to gain unauthorized access to a computer. |
Hacking |
|
is one of the more common ways to infiltrate or damage your computer.- Malicious software that infects your computer, such as computer |
Malware |
|
A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks |
Viruses |
|
- A malicious program that transfers from one computer to another by any type of means. |
Worms |
|
A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get you information |
Trojan horses |
|
A program that runs in the background without you knowing it |
Spyware |
|
A program designed to send you advertisement, mostly as pop-ups |
Adware |
|
is a common type of online fraudis a scamming practice in which malicious code is installed on a personal computer or server |
Pharming |
|
is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.acquiring personal information like passwords and credit card details |
Phishing |
|
is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. |
Ransomware |
|
is one of the more common methods of both sending information out and collecting it from unsuspecting people. |
Spam |
|
displays an image that prevents you from accessing your computer |
Lockscreen ransomware |
|
encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them |
Encryption Ransomware |