ログイン

Internet Risk, Threats, Netiquette
28問 • 1年前
  • Trix Soriano
  • 通報

    問題一覧

  • 1

    It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. .

    Cyberbullying

  • 2

    It is a crime of stealing personal information for the purpose of assuming that person’s nameor identity to make any form of transactions.

    Identity Theft

  • 3

    A criminal practice where electronic communication is used to stalk or harassindividual or group.

    Cyber Stalking

  • 4

    The act of sending sexually explicit text messages, images, and videos.

    Sexting

  • 5

    – also known as Malicious Software.

    Malware

  • 6

    Types of Malware

    VTW - SAK - BRR Virus Trojan Horse Worm Spyware Adware Keylogger Botnet Rootkit Ransomware

  • 7

    a malicious program that REPLICATE ITSELF by copying itself to another program.

    1. Virus –

  • 8

    a malicious program that DISGUISED AS LEGITIMATE PROGRAM that user willaccept and use but take control of your computer.

    2. Trojan Horse –

  • 9

    malicious program that COPY’S ITSELF and SPREADS to other computers.

    3.Worm –

  • 10

    A malicious program that gathers information from victim’s computer and SEND IT BACK TO THE HACKER.

    4.Spyware –

  • 11

    An UNWANTED ADVERTISEMENT that will pop-up several times on victim’s computerthen behave abnormally and tedious to close them.

    5. Adware –

  • 12

    A program that RUNS IN THE BACKGROUND and steals user credentials and confidential information and send back to hackby recording every keystroke that a user makes on their computer or device.

    6. Keylogger –

  • 13

    A collection of INFECTED INTERNET–connected devices such as PC and mobile phone that are controlled by a commontype of malware.

    7. Botnet –

  • 14

    A software tools used by hackers to GAIN CONTROL OVER A COMPUTER on a networkwithout being exposed.

    8. Rootkit

  • 15

    A RANSOM VIRUS that BLOCK the user from accessing the programs or files anddemands to pay the ransom through online method for the removal of the virus.

    9. Ransomware –

  • 16

    Also known as junk email or unwanted emailsend by advertiser or bot. It can be used to send malware.

    Spam

  • 17

    A cyberattack method using DECEPTIVE EMAILS AND WEBSITES to acquiring sensitive personal information.

    Phishing

  • 18

    A crime in which computer is used as object and tool in committing a crime such hacking,phishing, spamming, child pornography, libel,hate crimes, identity thief and others.

    Cybercrime

  • 19

    A law that deals with all forms of cybercrime.

    Cybercrime Law

  • 20

    It is a word that came from the two words “net” and“etiquette”.

    Netiquette

  • 21

    It is an etiquette applied online that shows proper manner and behavior.

    Netiquette

  • 22

    If you are a member of an onlinesociety through social media you are called —.

    netizen

  • 23

    is a research method incollecting and gathering information via internet by using search engine such as google.

    Internet Research

  • 24

    is a program that allows users tosearch for content on internet.

    Search Engine

  • 25

    There are techniques in searching information that can beapplied in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of —

    AND, OR, and NOT.

  • 26

    is a protection given to the owner of the rights in an original work such as books, musicalworks, films, paintings, and other works, and computer programs.

    Copyright

  • 27

    This original work is called — which is protected under — known as the “—”.

    intellectual property RA 8293 Intellectual Property Code of the Philippines

  • 28

    This happens when the copyrighted work is useby other person without permission of the author or copyright holder

    Copyright Infringement

  • ALERTNESS

    ALERTNESS

    24問 • 2年前

    ENTREPRENEUR

    ENTREPRENEUR

    24問 • 2年前

    ATTENTIVENESS

    ATTENTIVENESS

    29問 • 2年前

    ATTENTIVENESS - QUOTES

    ATTENTIVENESS - QUOTES

    6問 • 2年前

    INTRODUCTION TO GREEK LITERATURE

    INTRODUCTION TO GREEK LITERATURE

    29問 • 2年前

    GREEK LITERATURE

    GREEK LITERATURE

    23問 • 2年前

    1.2 Common Logical Fallacies

    1.2 Common Logical Fallacies

    20問 • 2年前

    AVAILABILITY

    AVAILABILITY

    11問 • 2年前

    AVAILABLITIY - Quotes

    AVAILABLITIY - Quotes

    21問 • 2年前

    AVL. - Noah's Ark

    AVL. - Noah's Ark

    9問 • 2年前

    AVL. - George Washington

    AVL. - George Washington

    7問 • 2年前

    PP1 - Lifestyle

    PP1 - Lifestyle

    34問 • 2年前

    PP1 - MODERATE TO VIGOROUS

    PP1 - MODERATE TO VIGOROUS

    19問 • 2年前

    PP1 - MODERATE TO VIGOROUS

    PP1 - MODERATE TO VIGOROUS

    18問 • 2年前

    HP1– Consumer Health Information

    HP1– Consumer Health Information

    17問 • 2年前

    HP1 - Alternative Medicine

    HP1 - Alternative Medicine

    27問 • 2年前

    AD1 - Works

    AD1 - Works

    6問 • 2年前

    PD1

    PD1

    28問 • 2年前

    SKILL RELATED

    SKILL RELATED

    18問 • 2年前

    HEALTH RELATED

    HEALTH RELATED

    14問 • 2年前

    HD1

    HD1

    18問 • 2年前

    1.3 Kalamidad

    1.3 Kalamidad

    6問 • 2年前

    QUIZ

    QUIZ

    52問 • 2年前

    STEPS

    STEPS

    10問 • 2年前

    A3

    A3

    16問 • 2年前

    CATEGORY

    CATEGORY

    11問 • 2年前

    CRITERIA

    CRITERIA

    11問 • 2年前

    Landforms

    Landforms

    40問 • 2年前

    MOUNTAIN RANGES

    MOUNTAIN RANGES

    43問 • 2年前

    Volcano

    Volcano

    40問 • 2年前

    Faults

    Faults

    22問 • 2年前

    Earthquake

    Earthquake

    22問 • 2年前

    HD1 - Med Pro

    HD1 - Med Pro

    26問 • 2年前

    GRAPHICS ORGANIZER

    GRAPHICS ORGANIZER

    38問 • 2年前

    GRAPHIC OG PICS

    GRAPHIC OG PICS

    28問 • 2年前

    CASH FLOW

    CASH FLOW

    25問 • 2年前

    LESSON 9

    LESSON 9

    34問 • 2年前

    MP

    MP

    36問 • 2年前

    Paglutas ng Climate changr

    Paglutas ng Climate changr

    10問 • 2年前

    Kawalan ng Trabaho

    Kawalan ng Trabaho

    25問 • 2年前

    Tyoes of Pronouns

    Tyoes of Pronouns

    25問 • 2年前

    Frictional, Structural, Cyclical

    Frictional, Structural, Cyclical

    10問 • 2年前

    EGGS

    EGGS

    30問 • 2年前

    QUALITY

    QUALITY

    15問 • 2年前

    MARKET

    MARKET

    24問 • 2年前

    Wave Formation

    Wave Formation

    32問 • 2年前

    Proponents of EM Wave Theory

    Proponents of EM Wave Theory

    15問 • 2年前

    ELECTROMAGNETIC WAVES

    ELECTROMAGNETIC WAVES

    30問 • 2年前

    RISKS and HAZARDs

    RISKS and HAZARDs

    35問 • 2年前

    BENEVOLANCE

    BENEVOLANCE

    26問 • 2年前

    Quotes

    Quotes

    5問 • 2年前

    ZACCHEUS

    ZACCHEUS

    13問 • 2年前

    THE GOOD SAMARITAN

    THE GOOD SAMARITAN

    11問 • 2年前

    Joseph the Dreamer

    Joseph the Dreamer

    18問 • 2年前

    RUTH

    RUTH

    22問 • 2年前

    METHODD

    METHODD

    13問 • 2年前

    A simple act of kindness

    A simple act of kindness

    16問 • 2年前

    E - Definition

    E - Definition

    100問 • 2年前

    A DEFINITION PT 2

    A DEFINITION PT 2

    68問 • 2年前

    D - Definition

    D - Definition

    50問 • 2年前

    d definition 2

    d definition 2

    45問 • 2年前

    Facts of Light

    Facts of Light

    48問 • 2年前

    E - Examples

    E - Examples

    100問 • 2年前

    E - Mixed

    E - Mixed

    50問 • 2年前

    Properties of Light

    Properties of Light

    66問 • 2年前

    MM

    MM

    22問 • 2年前

    AM

    AM

    12問 • 2年前

    PM

    PM

    11問 • 2年前

    HM

    HM

    22問 • 2年前

    PARTS

    PARTS

    30問 • 2年前

    VEGETABLES

    VEGETABLES

    43問 • 2年前

    PREPARING

    PREPARING

    9問 • 2年前

    SIZES

    SIZES

    13問 • 2年前

    Image formation

    Image formation

    38問 • 2年前

    Ray Diagramming

    Ray Diagramming

    16問 • 2年前

    Mirror Equation

    Mirror Equation

    9問 • 2年前

    BOLDNESS

    BOLDNESS

    27問 • 2年前

    QUOTES

    QUOTES

    6問 • 2年前

    David and Goliath

    David and Goliath

    23問 • 2年前

    DANIEL FIERY FURNACE

    DANIEL FIERY FURNACE

    9問 • 2年前

    DANIEL LION'S DEN

    DANIEL LION'S DEN

    21問 • 2年前

    SEQUENCE OF EVENTS

    SEQUENCE OF EVENTS

    20問 • 2年前

    TROJAN WAR

    TROJAN WAR

    59問 • 2年前

    TROJANS

    TROJANS

    24問 • 2年前

    MD

    MD

    35問 • 2年前

    AD

    AD

    31問 • 2年前

    PD

    PD

    19問 • 2年前

    HD

    HD

    12問 • 2年前

    LESSON 12

    LESSON 12

    52問 • 2年前

    LESSON 13

    LESSON 13

    26問 • 2年前

    LENS

    LENS

    15問 • 2年前

    CAUTIOUSNESS

    CAUTIOUSNESS

    26問 • 2年前

    OPTICAL DEVICES

    OPTICAL DEVICES

    38問 • 2年前

    COMPASSION

    COMPASSION

    24問 • 2年前

    QUOTATIONS

    QUOTATIONS

    5問 • 2年前

    COMPUTER NETWORK

    COMPUTER NETWORK

    42問 • 1年前

    TOPOLOGY

    TOPOLOGY

    30問 • 1年前

    FEMALE REPRODUCTIVE SYSTEM

    FEMALE REPRODUCTIVE SYSTEM

    23問 • 1年前

    MENSTRUAL CYCLE

    MENSTRUAL CYCLE

    12問 • 1年前

    FERTILIZATION

    FERTILIZATION

    32問 • 1年前

    MALE

    MALE

    28問 • 1年前

    FEMALE

    FEMALE

    15問 • 1年前

    NETWORKING

    NETWORKING

    39問 • 1年前

    Diseases Of The Reproductive System

    Diseases Of The Reproductive System

    26問 • 1年前

    HORMONES

    HORMONES

    27問 • 1年前

    Ethernet Cable

    Ethernet Cable

    20問 • 1年前

    ENDOCRINE SYSTEM

    ENDOCRINE SYSTEM

    43問 • 1年前

    MENSTRUAL CYCLE

    MENSTRUAL CYCLE

    35問 • 1年前

    NERVOUS SYSTEM

    NERVOUS SYSTEM

    35問 • 1年前

    SPINAL CORD

    SPINAL CORD

    30問 • 1年前

    DISEASES OF NS AND ES

    DISEASES OF NS AND ES

    14問 • 1年前

    Odyssey

    Odyssey

    35問 • 1年前

    HOMEOSTASIS

    HOMEOSTASIS

    17問 • 1年前

    STIMULI

    STIMULI

    31問 • 1年前

    steps

    steps

    10問 • 1年前

    PUBLIC SPEAKING

    PUBLIC SPEAKING

    20問 • 1年前

    TYPES OF COMMUNICATION

    TYPES OF COMMUNICATION

    29問 • 1年前

    music

    music

    45問 • 1年前

    GENETIC MUTATION

    GENETIC MUTATION

    60問 • 1年前

    Types of Speech Delivery

    Types of Speech Delivery

    23問 • 1年前

    EVOLUTION

    EVOLUTION

    32問 • 1年前

    The Occurrence of EVOLUTION

    The Occurrence of EVOLUTION

    28問 • 1年前

    Types of Speeches based on special occasion

    Types of Speeches based on special occasion

    32問 • 1年前

    Literary Criticism

    Literary Criticism

    16問 • 1年前

    LitCrit .2

    LitCrit .2

    16問 • 1年前

    SAME SEX MARRIAGE

    SAME SEX MARRIAGE

    20問 • 1年前

    DIVORCE

    DIVORCE

    16問 • 1年前

    DISCRIMINATION

    DISCRIMINATION

    28問 • 1年前

    PROSTITUTION

    PROSTITUTION

    43問 • 1年前

    MUSIC D

    MUSIC D

    14問 • 1年前

    ARTS

    ARTS

    35問 • 1年前

    PE

    PE

    35問 • 1年前

    HEALTH

    HEALTH

    18問 • 1年前

    - DSA

    - DSA

    23問 • 1年前

    quotes

    quotes

    9問 • 1年前

    4th

    4th

    41問 • 1年前

    PART 2

    PART 2

    37問 • 1年前

    Terms

    Terms

    53問 • 1年前

    CELL THEORY

    CELL THEORY

    37問 • 1年前

    CELL: Structure and Function

    CELL: Structure and Function

    35問 • 1年前

    Nature, Process, and Functions

    Nature, Process, and Functions

    25問 • 1年前

    Models of Communication

    Models of Communication

    37問 • 1年前

    Major Historical Events that Shaped 21st Century Philippine Literature

    Major Historical Events that Shaped 21st Century Philippine Literature

    14問 • 1年前

    World Literature

    World Literature

    21問 • 1年前

    Regional Literature

    Regional Literature

    18問 • 1年前

    PRETEST

    PRETEST

    60問 • 1年前

    Literary Timeline

    Literary Timeline

    49問 • 1年前

    ICT

    ICT

    30問 • 1年前

    Literary Genres

    Literary Genres

    56問 • 1年前

    CANONICAL FILIPINO WRITERS AND THEIR CONTRIBUTIONS

    CANONICAL FILIPINO WRITERS AND THEIR CONTRIBUTIONS

    63問 • 1年前

    EUKARYOTIC CELL ORGANELLES

    EUKARYOTIC CELL ORGANELLES

    9問 • 1年前

    Endomembrane System

    Endomembrane System

    83問 • 1年前

    ORGANELLES PRESENT IN ANIMAL CELL ONLY

    ORGANELLES PRESENT IN ANIMAL CELL ONLY

    24問 • 1年前

    ORGANELLES PRESENT IN PLANT CELL ONLY

    ORGANELLES PRESENT IN PLANT CELL ONLY

    30問 • 1年前

    PRODUCTIVITY TOOLS

    PRODUCTIVITY TOOLS

    44問 • 1年前

    IMAGING AND DESIGN FOR THE ONLINE ENVIRONMENT

    IMAGING AND DESIGN FOR THE ONLINE ENVIRONMENT

    48問 • 1年前

    Barayti ng Wika

    Barayti ng Wika

    23問 • 1年前

    Gamit ng Wika

    Gamit ng Wika

    25問 • 1年前

    Prokaryotic: Bacterial Cell

    Prokaryotic: Bacterial Cell

    27問 • 1年前

    Text and Context

    Text and Context

    20問 • 1年前

    Antas ng Wika

    Antas ng Wika

    15問 • 1年前

    Structure and Function of Animal Tissues

    Structure and Function of Animal Tissues

    43問 • 1年前

    Communication Breakdown

    Communication Breakdown

    26問 • 1年前

    Strategies

    Strategies

    31問 • 1年前

    **Types of Speech Context**

    **Types of Speech Context**

    13問 • 1年前

    Tyoes of Soeech Style

    Tyoes of Soeech Style

    14問 • 1年前

    CHARACTERISTICS OF THE EARTH THAT ARE NECESSARY TO SUPPORT LIFE

    CHARACTERISTICS OF THE EARTH THAT ARE NECESSARY TO SUPPORT LIFE

    8問 • 1年前

    QUIZ

    QUIZ

    20問 • 1年前

    MINERALS

    MINERALS

    32問 • 1年前

    CLASSIFICATION OF MINERALS

    CLASSIFICATION OF MINERALS

    22問 • 1年前

    ROCKS

    ROCKS

    28問 • 1年前

    ORES

    ORES

    30問 • 1年前

    9 NA PARAAN NG PAGBABAHAGI NG WIKA SA LIPUNAN (JACKOBSON, 2003)

    9 NA PARAAN NG PAGBABAHAGI NG WIKA SA LIPUNAN (JACKOBSON, 2003)

    15問 • 1年前

    Komunikasyon

    Komunikasyon

    23問 • 1年前

    Kasaysayan ng Wika

    Kasaysayan ng Wika

    22問 • 1年前

    BASIC ELEMENTS OF A SHORT STORY

    BASIC ELEMENTS OF A SHORT STORY

    42問 • 1年前

    IMAGE MANIPULATION TECHNIQUES

    IMAGE MANIPULATION TECHNIQUES

    46問 • 1年前

    COLLABORATIVE ICT DEVELOPMENT

    COLLABORATIVE ICT DEVELOPMENT

    22問 • 1年前

    PHYSICAL FITNESS TESTS MANUAL

    PHYSICAL FITNESS TESTS MANUAL

    27問 • 1年前

    FITT

    FITT

    37問 • 1年前

    FITT

    FITT

    30問 • 1年前

    MULTIMEDIA FORMATS IN INTERPRETING LITERARY TEXT

    MULTIMEDIA FORMATS IN INTERPRETING LITERARY TEXT

    16問 • 1年前

    ANECDOTE

    ANECDOTE

    13問 • 1年前

    SPEECH ACT

    SPEECH ACT

    22問 • 1年前

    ARDUINO PROGRAMMING

    ARDUINO PROGRAMMING

    42問 • 1年前

    ELECTRONIC SOLID-STATE DEVICES

    ELECTRONIC SOLID-STATE DEVICES

    22問 • 1年前

    Module 7

    Module 7

    45問 • 1年前

    Module 8

    Module 8

    33問 • 1年前

    Mineral Resources

    Mineral Resources

    38問 • 1年前

    Types of Communicative Strategy

    Types of Communicative Strategy

    56問 • 1年前

    Visual Persuasion

    Visual Persuasion

    51問 • 1年前

    Energy Resources

    Energy Resources

    53問 • 1年前

    Water Resources

    Water Resources

    21問 • 1年前

    Pananaliksik at Kabanata I

    Pananaliksik at Kabanata I

    35問 • 1年前

    Southeast Asia

    Southeast Asia

    22問 • 1年前

    East Asia

    East Asia

    23問 • 1年前

    West Asia

    West Asia

    16問 • 1年前

    Rhetorics

    Rhetorics

    24問 • 1年前

    ICT FOR CONTENT DEVELOPMENT

    ICT FOR CONTENT DEVELOPMENT

    30問 • 1年前

    Central and South Asia

    Central and South Asia

    30問 • 1年前

    Absolute Dating

    Absolute Dating

    13問 • 1年前

    Relative Dating

    Relative Dating

    14問 • 1年前

    Kabanata 2

    Kabanata 2

    37問 • 1年前

    Classifying Speeches

    Classifying Speeches

    35問 • 1年前

    Kabanata 3, 4

    Kabanata 3, 4

    17問 • 1年前

    SCHOOL AND COMMUNITY RESOURCES INCASE OF EMERGENCY

    SCHOOL AND COMMUNITY RESOURCES INCASE OF EMERGENCY

    22問 • 1年前

    UNINTENTIONAL INJURIES

    UNINTENTIONAL INJURIES

    29問 • 1年前

    Soil Resources

    Soil Resources

    42問 • 1年前

    Soil Resources pt. 2

    Soil Resources pt. 2

    38問 • 1年前

    PROTEINS

    PROTEINS

    30問 • 1年前

    NUCLEIC ACID

    NUCLEIC ACID

    17問 • 1年前

    EXAM

    EXAM

    39問 • 1年前

    mod 1

    mod 1

    29問 • 1年前

    mod 2

    mod 2

    13問 • 1年前

    L1

    L1

    28問 • 1年前

    M1

    M1

    27問 • 1年前

    Mod1

    Mod1

    25問 • 1年前

    Mod2

    Mod2

    22問 • 1年前

    Mod 1

    Mod 1

    33問 • 1年前

    Mod 2

    Mod 2

    23問 • 1年前

    Mod 1

    Mod 1

    40問 • 1年前

    mod 3 A CLOSER LOOK ON QUALITATIVE RESEARCH

    mod 3 A CLOSER LOOK ON QUALITATIVE RESEARCH

    19問 • 1年前

    Mod 3

    Mod 3

    26問 • 1年前

    M3

    M3

    13問 • 1年前

    M4

    M4

    13問 • 1年前

    Mod3

    Mod3

    33問 • 1年前

    Mod 3

    Mod 3

    52問 • 1年前

    Mod 4-6

    Mod 4-6

    21問 • 1年前

    L2

    L2

    62問 • 1年前

    mod 4

    mod 4

    29問 • 1年前

    Mod 4

    Mod 4

    16問 • 1年前

    Normal Distribution

    Normal Distribution

    32問 • 1年前

    mod 5 chapter 2

    mod 5 chapter 2

    40問 • 11ヶ月前

    Basketball

    Basketball

    90問 • 11ヶ月前

    Mod 7-11

    Mod 7-11

    29問 • 11ヶ月前

    M5

    M5

    9問 • 11ヶ月前

    M6

    M6

    47問 • 11ヶ月前

    M7

    M7

    28問 • 11ヶ月前

    Mod 9

    Mod 9

    18問 • 11ヶ月前

    Mod 5 Argumentatibo

    Mod 5 Argumentatibo

    13問 • 11ヶ月前

    Mod 6 Naratibo

    Mod 6 Naratibo

    8問 • 11ヶ月前

    Mod 7 Konseptong Papel

    Mod 7 Konseptong Papel

    23問 • 11ヶ月前

    Mod 7.2 Hanover Grants

    Mod 7.2 Hanover Grants

    11問 • 11ヶ月前

    mod 6 lit review

    mod 6 lit review

    17問 • 11ヶ月前

    問題一覧

  • 1

    It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. .

    Cyberbullying

  • 2

    It is a crime of stealing personal information for the purpose of assuming that person’s nameor identity to make any form of transactions.

    Identity Theft

  • 3

    A criminal practice where electronic communication is used to stalk or harassindividual or group.

    Cyber Stalking

  • 4

    The act of sending sexually explicit text messages, images, and videos.

    Sexting

  • 5

    – also known as Malicious Software.

    Malware

  • 6

    Types of Malware

    VTW - SAK - BRR Virus Trojan Horse Worm Spyware Adware Keylogger Botnet Rootkit Ransomware

  • 7

    a malicious program that REPLICATE ITSELF by copying itself to another program.

    1. Virus –

  • 8

    a malicious program that DISGUISED AS LEGITIMATE PROGRAM that user willaccept and use but take control of your computer.

    2. Trojan Horse –

  • 9

    malicious program that COPY’S ITSELF and SPREADS to other computers.

    3.Worm –

  • 10

    A malicious program that gathers information from victim’s computer and SEND IT BACK TO THE HACKER.

    4.Spyware –

  • 11

    An UNWANTED ADVERTISEMENT that will pop-up several times on victim’s computerthen behave abnormally and tedious to close them.

    5. Adware –

  • 12

    A program that RUNS IN THE BACKGROUND and steals user credentials and confidential information and send back to hackby recording every keystroke that a user makes on their computer or device.

    6. Keylogger –

  • 13

    A collection of INFECTED INTERNET–connected devices such as PC and mobile phone that are controlled by a commontype of malware.

    7. Botnet –

  • 14

    A software tools used by hackers to GAIN CONTROL OVER A COMPUTER on a networkwithout being exposed.

    8. Rootkit

  • 15

    A RANSOM VIRUS that BLOCK the user from accessing the programs or files anddemands to pay the ransom through online method for the removal of the virus.

    9. Ransomware –

  • 16

    Also known as junk email or unwanted emailsend by advertiser or bot. It can be used to send malware.

    Spam

  • 17

    A cyberattack method using DECEPTIVE EMAILS AND WEBSITES to acquiring sensitive personal information.

    Phishing

  • 18

    A crime in which computer is used as object and tool in committing a crime such hacking,phishing, spamming, child pornography, libel,hate crimes, identity thief and others.

    Cybercrime

  • 19

    A law that deals with all forms of cybercrime.

    Cybercrime Law

  • 20

    It is a word that came from the two words “net” and“etiquette”.

    Netiquette

  • 21

    It is an etiquette applied online that shows proper manner and behavior.

    Netiquette

  • 22

    If you are a member of an onlinesociety through social media you are called —.

    netizen

  • 23

    is a research method incollecting and gathering information via internet by using search engine such as google.

    Internet Research

  • 24

    is a program that allows users tosearch for content on internet.

    Search Engine

  • 25

    There are techniques in searching information that can beapplied in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of —

    AND, OR, and NOT.

  • 26

    is a protection given to the owner of the rights in an original work such as books, musicalworks, films, paintings, and other works, and computer programs.

    Copyright

  • 27

    This original work is called — which is protected under — known as the “—”.

    intellectual property RA 8293 Intellectual Property Code of the Philippines

  • 28

    This happens when the copyrighted work is useby other person without permission of the author or copyright holder

    Copyright Infringement