etech lesson 2

Cards (46)

  • Ethics refers to dealing with what is good and what is bad.
  • Online safety and security refers to the maximization of internet users' knowledge and awareness of safety protocols, online crimes and security risks in the private property and information which are connected to the use of the internet.
  • Online security is designed by websites and other internet pages to ensure that the people accessing their sites and pages are protected from different online risks and danger.
  • Online crimes refer to violations that inflict harm to other people by internet users.
  • Forms of Online Crimes include Cyberbullying, Online Harassment, Cyberstalking, and Cybercrimes.
  • Flaming is an online fight using electronic messages with angry and vulgar languages.
  • Harassment is the act of repeatedly sending nasty, mean, and insulting messages.
  • Denigration is sending or posting gossip or rumors about a person to damage his or her reputation or friendships.
  • Impersonation is when someone is pretending to be someone else and sending or posting material to get that person in trouble or danger or to damage that person's reputation or friendships.
  • Outing is the act of sharing someone's secrets or embarrassing information or images online.
  • Trickery is when someone is talking to a person to let him or her reveal his or her secrets or embarrassing information and then, shares the sensitive information online.
  • Exclusion is when one is intentionally or cruelly excluded from an online group.
  • Cyberstalking is the act of repeated, intense harassment and denigration that includes threats or creates significant fear.
  • If you are cyberbullied, inform a trusted person, try not to instigate, block connection with the bully, always be aware, logout from online accounts, and be not a cyberbully.
  • Online Ethics and Etiquette include being always courteous, not using foul language, appropriate humor, not sharing or posting offensive materials, and being understanding to a maximum tolerance.
  • Copyright Infringement occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner.
  • Phishing scams are created by cybercriminals who intend to ask private or elicit information from their victims.
  • Ways to be secured from phishing attacks include being scrutinizing of the website that you are logged in, being cautious on giving information online, and being alert with links sent via messages and emails.
  • Malwares are a form of malicious software such as computer viruses, worms, and dishonest spyware.
  • Phishing refers to the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers.
  • Big Data refers to the large amounts of data collected, managed, and maintained by individuals, organizations, government, and corporate.
  • Internet Security Strategies include Browser Selection, Email Security, Multifactor Authentication (MFA), and Firewalls.
  • Report identity theft is helpful in situations like stopping credit companies from letting you pay fraudulent transactions at your name, removing false accounts, extending fraud alert on your account, and examining your report to find out the thief.
  • Common Internet Security threats include Malwares, Computer worms, Spam, and Phishing.
  • Recent means it has been updated lately.
  • Under the regulation for examinations, intentional or reckless plagiarism is a disciplinary offense.
  • Plagiarism may be intentional, or reckless, or unintentional.
  • All unpublished material, whether in manuscript, printed or electronic form, is covered under this definition of plagiarism.
  • Practical can be easily remembered.
  • Unique refers to your passwords.
  • Spam or unwanted messages that are harmless but may be connected to malwares that intend to steal your data.
  • Computer worms are programs that can replicate themselves from one computer to another in great volume and can spread rapidly without human intervention.
  • Identity Theft, also known as identity fraud, is when someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.
  • Identity Theft commonly happens in situations like when shoulder surfing is done by criminals, when pre-approved credit cards are discarded improperly, and when spam mails or unsolicited emails are responded to.
  • To avoid identity theft and fraud, use good passwords, keep personal information private, be careful with pre-approved credit cards, and be careful with spam mails or unsolicited emails.
  • Strong passwords are long enough, unique, recent, and practical.
  • Plagiarism is presenting someone else's work or ideas as your own, with or without their consent, by incorporating it in your work without full acknowledgement.
  • All unpublished material, whether in manuscript, printed or electronic form, is covered under this definition of plagiarism.
  • Copyright Infringement occurs when a copyrighted work is reproduced, distributed, performed, publicly displayed, or made into a derivative work without the permission of the copyright owner.
  • Computer worms are programs that can replicate themselves from one computer to another in great volume and can spread rapidly without human intervention.