記憶度
3問
10問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
Tips to Stay Safe
Be mindful of what you share online, Do not just accept terms and conditions;read it, Know the security features of the sns you use, keeping a private profile will prevent search engines to scan your profile, Do not share your passwords with anyone , Avoid logging into public networks/wifis, Do not talk to strangers , Never post about future vacations, Add friends you know irl, Avoid visting untrusted websites, Install and update anti-virus software on your computer, Make wifi at home private by putting a password, Avoid downloading anything form untrusted websites, Buy the software, do no use pirated ones, Do not reply or click links from suspicious links, Make online purchases from secure sites
2
It is created to penalized people who are proved to be guilty in any form of dishonesty before, during, and after an online transaction.
Republic Act 7394, The Consumer Act
3
It is made to penalize people for theft, swindling or estafa which concern most online scams. Swindling happens when a seller sends a buyer a product that is of a different quality, quantity, or material from what he promised and what the buyer paid for.
The Revised Penal Code
4
happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money. or spread malware.
Spoofing
5
malicious program designed to replicate itself and transfer from one computer to another (local networks, FDs, CDs, etc.
virus
6
Ten Rules of Netiquette
Remember the Human, Adhere to the same standards online that you follow in real life, Know where you are in cyberspace, Respect other people’s time and bandwidth, Make yourself look good online, Share expert knowledge, Help keep flame wars under control, Respect pther people’s privacy, Don’t abuse your power, Be forgiving to other people’s mistake
7
program designed to send you advertisements, mostly as pop-ups.
adware
8
a hacker (or "pharmer") directs an internet user to a fake website instead of a legitimate one. These "spoofed" sites can capture a victim's confidential information, including usernames, passwords, and credit card data, or install malware on their computer
pharming
9
refers to the act of tormenting, harassing, or embarrassing another person using the internet.
Cyberbullying
10
malicious program that disguises as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
trojan
11
It is a law stating that personal information collected from users should only be used for specific purposes, such as online buying, and cannot be shared with anyone else.
Republic Act 10173, Data Privacy Act of 2012
12
Common Internet Threats
Malware, Spam, Phising, Pharming, Internet Scams, Internet Robots, Cyberstalking, Cyberbullying, Spoofing, Hacking, Identity Theft, Inappropriate Contents, Online grooming, Blended Threats
13
Some bots are useful, such as search engine bots that index content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities
Internet Robots
14
malicious program that transfers from one computer to another by any means.
worm
15
refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.
Cyberstalking
16
unwanted email mostly from bots or advertisers. It can be used to send malware.
spam
17
malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid
ransomware
18
It aims to address legal issues concerning online interactions and the Internet in the Philippines. It focuses on the pre-emption, prevention, and prosecution of cybercrimes such as offenses against the privacy, confidentiality, integrity, and availability of computer data and systems, computer-related offenses, and content-related offenses.
Republic Act No. 10175, Cybercrime Prevention Act of 2012
19
program that runs in a background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging
spyware
20
it refers to the online security or safety of people and their information when using internet.
Internet Safety
21
Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a fake website and be asked to update his/her name, username, password, credit card, etc.
phising
22
malicious software, is any program or file that is harmful to a computer user.
malware
23
generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain come in various forms such as lottery scam, charity fraud scams, job offer scams, and online dating scams to name a few.
Internet Scams