GEE 22 FINALS

Cards (72)

  • Netiquette

    Network etiquette - the etiquette of cyberspace and the set of norms of good breeding or prescribed by authority to be required in social or official life
  • Netiquette
    • Concerned with the "proper" way to communicate in an online environment
  • When using e-mail, instant messenger, video calls, or discussion boards to communicate with others online, please be sure to follow the rules of professional online communications known as netiquette
  • Golden Rule
    Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message. Make a good impression - treat others with the same respect that you would like to receive and avoid confrontational or offensive language.
  • Emoticons
    Appropriate to include in informal communications, but inappropriate for professional communications
  • Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood
  • Typing an entire message using all capital letters is known as "screaming". It is distracting and generally frowned upon in professional environments.
  • Proofreading messages before sending them is a best practice for effective and efficient communication
    1. mail and chat messages sent or received are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants
  • Messages posted to discussion boards and social media sites can be read by the public
  • Do not share online any sensitive personal information such as home address, phone number, personal conversations, social plans, financial information, usernames, passwords, or anything personal that is not to be shared by others over the Internet
  • Copying someone else's work and passing it off as your own is plagiarism. It damages reputation and could be subjected to serious academic and legal consequences
  • Respect diversity in viewpoints
    Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation
  • When sharing a viewpoint that differs from someone else's
    Briefly restate what the other person said in your own words to let them know you are listening and trying to understand them
  • When presenting an opinion or criticism
    Use phrases that identify whose point of view is being referred to, e.g. "In my experience", "In my opinion", "According to [name]", "The president believes"
  • Ten Commandments of Computer Ethics
    • Remember the Human
    • Adhere to the same standards of behavior online that you follow in real life
    • Know where you are in cyberspace
    • Respect other people's time and bandwidth
    • Make yourself look good online
    • Share expert knowledge
    • Help keep flame wars under control
    • Respect other people's privacy
    • Don't abuse your power
    • Be forgiving of other people's mistakes
  • The Netiquette and The Computer ethics discusses about the ethical issues in the field of computer, may it be in online or practicing in professional
  • Cyber
    The characteristics of the culture of computers, information, technology and virtual reality
  • Cybercrime
    A crime in which a computer is the object of the crime (e.g. hacking, phishing, spamming, and child pornography) is used as a tool to commit an offense
  • Cybercriminal
    A person who uses computer technology to access personal information, business trade secret or use the internet for exploitative or malicious purposes
  • Laws in the Philippines that protects against cybercrimes
    • RA No. 10175 (Cybercrime Prevention Act of 2012)
    • RA No. 10173 (Data Privacy Act of 2012)
    • RA No. 10627 (The Anti-Bullying Act of 2013)
    • RA No. 9775 (Anti-Child Pornography Act of 2009)
  • Copyright
    Exclusive legal right given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
  • Copyright Infringement
    Violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work
  • Plagiarism
    An act or instance of using or closely imitating the language and thoughts of another author without authorization
  • Types of Computer Addiction
    • Offline (excessive gaming behavior)
    • Online (also known as "Internet Addiction", excessive use of internet)
  • Virtual Self

    The persona created about oneself virtually
  • Common Criminal Activities
    • Hacking
    • Computer-related forgery, fraud, and/or identity theft
    • Electronic theft
    • Cyberbullying
    • Cybersex
    • Child Pornography
    • Cyber Defamation
  • Hacking
    Unauthorized access of or interference with computer systems, servers, or other information and communication systems
  • Phishing
    Practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging with a goal to steal money, gain access to sensitive data and login information
  • Pharming
    A two-step process that begins with an attacker installing malicious code on a victim's computer or server that sends the victim to a spoofed website, where they may be tricked into offering their personal data or login credentials
  • Spam
    Any kind of unwanted, unsolicited digital communication that gets sent out in bulk often sent via email, or via text messages, phone calls or social media
  • Cyberbullying
    The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature
  • Cybersex
    Willful engagement, maintenance, control, operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration
  • Child Pornography
    Form of child sexual exploitation, erotic material that depicts persons under the age of 18, unlawful or prohibited acts against the child committed through a computer system
  • Cyber Defamation
    Unprivileged false statement of fact which tends to harm the reputation of a person or company, the act of distributing false or harmful statements about a person or an organization on the Internet commonly occurring on social media platforms or websites
  • Libel
    False statement in written form could be blog, comment, article, post, online review
  • Slander
    False statement spoken orally could be an interview, podcast, speech on TV
  • Digital age

    Also known as Information age, a period when the computer and internet were introduced
  • Digital age
    • Caused by rapid shift from traditional industry to computerization all the way to artificial intelligence which brought by Industrial Revolution
    • Enabled people to communicate information easily and rapidly
    • Digital Technology became prevalent and widely used around the world
    • Information can be accessed easily specially with the use of the internet
  • Information Communications Technology (ICT)

    A group of interrelated technologies (electronic devices) for accessing, processing, and disseminating information