The document discusses various topics related to living in the IT era, including the evolution of the internet and world wide web, common types of malware, cybercrimes, and cybersecurity best practices. It provides definitions and examples of key terms through multiple choice questions, fill-in-the-blank identifications, and enumerated lists. The document serves to test the reader's understanding of important concepts in information and communication technology.
The document discusses various topics related to living in the IT era, including the evolution of the internet and world wide web, common types of malware, cybercrimes, and cybersecurity best practices. It provides definitions and examples of key terms through multiple choice questions, fill-in-the-blank identifications, and enumerated lists. The document serves to test the reader's understanding of important concepts in information and communication technology.
The document discusses various topics related to living in the IT era, including the evolution of the internet and world wide web, common types of malware, cybercrimes, and cybersecurity best practices. It provides definitions and examples of key terms through multiple choice questions, fill-in-the-blank identifications, and enumerated lists. The document serves to test the reader's understanding of important concepts in information and communication technology.
Direction: Write TRUE if the statement is correct but if it’s false, change the underlined word or group of words to make the whole statement true. __TRUE __1. Tm Berners-Lee created the World Wide Web. _Internet _2. World Wide Web is a global network that connects millions of computers around the world. Dynamic_3. Web 2.0 introduced static web pages that allow users to interact with the web page. Folksonomy_4. Rich user experience allows users to categorize and locate information. __TRUE__5. Technological convergence is the synergy of technological advancements to work on similar goal or task. __TRUE__6. Pinterest is a type of social media that allows user to upload photos, videos and audio that can be accessed from anywhere in the world. Microblogging_7. Blogging sites are sites that focus on short updates from the user. IOS_ 8. Android is a mobile operating system for Apple devices. __TRUE__ 9. Web 1.0 introduced static web pages that allow users to interact with the web page. __TRUE__10. Information and Communication Technology (ICT) deals with the use of different communication technology to locate, save, send and edit information.
II. IDENTIFICATION: Read the questions carefully. Write your answer before the number.
Malicious Software 1. Malware is a short term used for _________.
__Lockscreen_Ransomware __2. It displays an image that prevents you from accessing your computer. _____Pharming __3. _______ is a common type of online fraud. Internet Etiquette _4. Netiquette is a short term used for _______. Spam _____5. The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the internet. Spyware and Adware 6. ______ and ______ are often used by third parties to infiltrate your computer. Trojan Horses __7. It is an executable file that will install itself and run automatically once it’s downloaded. Viruses ____8. Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer. Spam ____9. It is one of the more common methods of both sending information out and collecting it from unsuspecting people. Netiquette _10. It is a set of rules for behaving properly online. Ransomware __11. A type of malware that restricts access to your computer or your files and displays a message that demands payment for the restriction to be removed. Pharming ___ 12. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Worms ____13. _______ are common threat to computer and the internet as a whole. Hacking ____ 14. Action taken by someone to gain unauthorized access to a computer. Encryption Ransomware 15. It encrypts files on your system’s hard drive and sometimes on shared network, drives, USB drives, and external hard drives and even some cloud storage drives preventing you from opening them. Spyware and Adware 16. They often come in the form of a free download and are installed automatically with or without your consent. Trojan Horses __ 17. A malicious program that is disguised as or embedded within legitimate software. Wi-Fi Eavesdropping 18. Virtual listening in on your information that’s shared over an unsecured or not encrypted network. Netiquette __ 19. It is the proper way to communicate in an online environment. Spyware and Adware 20. Software that collects personal information about you without you knowing. Social Media _ 21. It is a website, application or online channel that enables web users to create, co-create, discuss, modify and exchange user-generated content. Information and communication 22. It deals with the use of different communication technologies to send and edit information. _Online computer addiction_ 23. It is also known as Internet addiction. Copyright __ 24. The exclusive legal right given to an originator or an assignee to print, publish, perform, film or record literary, artistic or musical material and to authorize others to do the same. -Child Pornography_ 25. It is a form of child sexual exploitation. Netiquette ___26. The correction or acceptable way of communicating on the internet. Republic Act No. 10175 27. Unauthorized acquisition use or misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical. Illegal downloading 28. Obtaining files that you do not have the right to use from the internet. Cybersex ___ 29. Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration. Online identity _30. This is the persona you create about yourself in cyberspace. Offline computer addiction 31. Generally used when speaking about excessive gaming behavior, which can be practiced both offline and online. __Cyberbullying___ 32. The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature. __Copyright Infringement__ 33. It is the violation, piracy, or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work. __ Cybercrime___ 34. It is a crime in which a computer is the object of the crime. Cybercriminals__35. _________ may use computer technology to access personal information, business trade secrets or use the internet for exploitive or malicious purposes. _ Plagiarism__ 36. It is an act of using or closely imitating the language and thoughts of another author without authorization. Cybernetics (Cyber) 37. Relating to or characteristic of the culture of computers, information technology and virtual reality. _Cyber Defamation __ 38. It is an unprivileged false statement of fact which tends to harm the reputation of a person or company. _ Piracy __ 39. Practice of illegally copying and selling digital music, video, computer software, etc. __Cybercrime Prevention Act of 2012 – Republic Act No. 10175__ 40. It is the law in the Philippines which aims to address legal issues concerning online interactions and internet.
V. ENUMERATION
1-6 The Core Rules of Netiquette
1. Know where you are in cyberspace. 2. Adhere to the same standards of behavior online that you follow in real life. 3. Respect other people’s time and bandwidth. 4. Respect other people’s privacy. 5. Don’t abuse your power. 6. Make yourself look good online.