暗記メーカー
ログイン
Internet Risk, Threats, Netiquette
  • Trix Soriano

  • 問題数 28 • 8/11/2024

    記憶度

    完璧

    4

    覚えた

    11

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication. .

    Cyberbullying

  • 2

    It is a crime of stealing personal information for the purpose of assuming that person’s nameor identity to make any form of transactions.

    Identity Theft

  • 3

    A criminal practice where electronic communication is used to stalk or harassindividual or group.

    Cyber Stalking

  • 4

    The act of sending sexually explicit text messages, images, and videos.

    Sexting

  • 5

    – also known as Malicious Software.

    Malware

  • 6

    Types of Malware

    VTW - SAK - BRR Virus Trojan Horse Worm Spyware Adware Keylogger Botnet Rootkit Ransomware

  • 7

    a malicious program that REPLICATE ITSELF by copying itself to another program.

    1. Virus –

  • 8

    a malicious program that DISGUISED AS LEGITIMATE PROGRAM that user willaccept and use but take control of your computer.

    2. Trojan Horse –

  • 9

    malicious program that COPY’S ITSELF and SPREADS to other computers.

    3.Worm –

  • 10

    A malicious program that gathers information from victim’s computer and SEND IT BACK TO THE HACKER.

    4.Spyware –

  • 11

    An UNWANTED ADVERTISEMENT that will pop-up several times on victim’s computerthen behave abnormally and tedious to close them.

    5. Adware –

  • 12

    A program that RUNS IN THE BACKGROUND and steals user credentials and confidential information and send back to hackby recording every keystroke that a user makes on their computer or device.

    6. Keylogger –

  • 13

    A collection of INFECTED INTERNET–connected devices such as PC and mobile phone that are controlled by a commontype of malware.

    7. Botnet –

  • 14

    A software tools used by hackers to GAIN CONTROL OVER A COMPUTER on a networkwithout being exposed.

    8. Rootkit

  • 15

    A RANSOM VIRUS that BLOCK the user from accessing the programs or files anddemands to pay the ransom through online method for the removal of the virus.

    9. Ransomware –

  • 16

    Also known as junk email or unwanted emailsend by advertiser or bot. It can be used to send malware.

    Spam

  • 17

    A cyberattack method using DECEPTIVE EMAILS AND WEBSITES to acquiring sensitive personal information.

    Phishing

  • 18

    A crime in which computer is used as object and tool in committing a crime such hacking,phishing, spamming, child pornography, libel,hate crimes, identity thief and others.

    Cybercrime

  • 19

    A law that deals with all forms of cybercrime.

    Cybercrime Law

  • 20

    It is a word that came from the two words “net” and“etiquette”.

    Netiquette

  • 21

    It is an etiquette applied online that shows proper manner and behavior.

    Netiquette

  • 22

    If you are a member of an onlinesociety through social media you are called —.

    netizen

  • 23

    is a research method incollecting and gathering information via internet by using search engine such as google.

    Internet Research

  • 24

    is a program that allows users tosearch for content on internet.

    Search Engine

  • 25

    There are techniques in searching information that can beapplied in search engine in order to get a better result. Some search engines allow combination of words and logic connectors of —

    AND, OR, and NOT.

  • 26

    is a protection given to the owner of the rights in an original work such as books, musicalworks, films, paintings, and other works, and computer programs.

    Copyright

  • 27

    This original work is called — which is protected under — known as the “—”.

    intellectual property RA 8293 Intellectual Property Code of the Philippines

  • 28

    This happens when the copyrighted work is useby other person without permission of the author or copyright holder

    Copyright Infringement