• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/37

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

37 Cards in this Set

  • Front
  • Back

that is the etiquette of cyberspace

Netiquette

means the forms of required by good breeding or prescribed by authority to be required in social or official life.

Etiquette

is a set of rules for behaving properly online. is concerned with the "proper" way to communicate in an online environment

Netiquette

These rules have been established as a result of consensus in society and are often written into laws.

Computer ethics

treat others with the same respect that you would like to receive and avoid confrontational or offensive language.

Make a good impression, the Golden rule

communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood. For example, use “your” instead of “ur”.

Avoid slang, acronym and text talk

typing an entire message using all capital letters is known as

Screaming

It is the Characteristics of the culture of computers, information, technology and virtual reality.

Cyber

is defined as a crime in which a computer is the object of the crimeis used as a tool to commit an offense.

Cybercrime

may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

Cybercriminals

is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.

RA 10175

is an act protecting individual personal information.

RA 10173

The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

Copyright

An act or instance of using or closely imitating the language and thoughts of another author without authorization.

Plagiarism

Unauthorized access of or interference with computer systems, servers, or other information and communication systems

Hacking

An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.

Computer-related forgery, fraud and/or identity theft

Obtaining files that you do not have the right to use from the internet.

Electronic theft

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature

Cyberbullying

sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.

Cybersex

Is a form of child sexual exploitation.

Child pornography

Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.

Cyber defamation

the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

Copyright

is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.

Copyright infringement

the persona you create about yourself virtually.

Virtual self

is a term used to describe actions taken by someone to gain unauthorized access to a computer.

Hacking

is one of the more common ways to infiltrate or damage your computer.- Malicious software that infects your computer, such as computer

Malware

A malicious program designed to replicate itself and transfer from one computer to another either through the Internet and local networks

Viruses

- A malicious program that transfers from one computer to another by any type of means.

Worms

A malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get you information

Trojan horses

A program that runs in the background without you knowing it

Spyware

A program designed to send you advertisement, mostly as pop-ups

Adware

is a common type of online fraudis a scamming practice in which malicious code is installed on a personal computer or server

Pharming

is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.acquiring personal information like passwords and credit card details

Phishing

is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

Ransomware

is one of the more common methods of both sending information out and collecting it from unsuspecting people.

Spam

displays an image that prevents you from accessing your computer

Lockscreen ransomware

encrypts files on your system's hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them

Encryption Ransomware