LESSON (SUB)

Cards (32)

  • EMAIL SPAM Junk email, unsolicited commercial email sent from one source with identical message to send to multiple recipients.
  • PHISHING A fraudulent attempt by an individual or organization posing as a legitimate institution to lure individuals into providing sensitive data such as usernames, passwords, credit card details.
  • EMAIL SPOOFING Deceitful email practice in which the sender address is changed so that it would appear to have come from a different source.
  • PHARMING a dangerous hacker attack on website
  • PHISHING Deceitful practice of trying to get confidential information such as password and username.
  • SPYWARE a computer program that is installed covertly on a personal computer to collect
  • COMPUTER WORM Dangerous computer program that replicate itself
  • COMPUTER VIRUS a program that duplicate itself
  • HACKER a person who is able to control other people's computer without authorization.
  • TRAJAN HORSE malicious software fronting to perform a god task but covertly performs undesirable functions.
  • PROTECTION FROM THREAT
    1. FIREWALL protect the authorized entries, viruses, worm from the internet /network
    2. AUTOMATIC UPDATE must be ON, product of microsoft
    3. VIRUS PROTECTION must be on, current antivirus
  • ANTIVIRUS locate, find, and remove virus threat that are already in your computer.
  • SECURITY CENTER place where you can set protection
    • SEARCH ENGINES are software systems that are designed to search for information on the World Wide Web. The search results are generally presented in a line of results often referred to as “search engine results”.
    • Examples of search engines are Baidu, Bing, Yahoo, and the most popular search engine: Google.
  • Steps in Online Navigation
    • On your phones, open your browser to access the Internet.
    • Type in google.com/advanced_search on the URL box.
    • Type the keywords you would like to search and click the Advanced Search button. You can search through all the words you’ve typed, or you can narrow it down to specific words.
  • Research Skills
    In order to achieve or access what you are looking for, you need to improve yourself. “Practice makes perfect.” Good research is a product of multiple and continuous searches.
  • Critical Thinking
    As you search through the web, you must think very carefully about the information that you have gathered. This involves the ability to reflect on the information presented to you.
  • Data Organizing
    A good researcher is able to organize data. As you collect those data, be sure to track where specific information is gathered. Always cite sources.
  • Research Presenting
    Part of your research is the actual writing, be creative and reflective in writing your search, explain every detail. Do not just copy and paste.
  • Remember that not all searches are good ones. Some are considered satirical or untrue.
  • If the contents of the source are too impossible to happen, or too good to be true, then there must be something wrong.
    If the site started as a false site for public figures, then uploaded stories from different sources, it is a satirical one.
    If the site is unfamiliar and continuously popping ads, then it is satirical.
    • VIRGINIA SHEA
    • AUTHOR OF “NETIQUETTE”
    • WRITER OF THE CORE RULES OF NETIQUETTE
  • REMEMBER THE HUMAN
    • Always remember the Golden Rule “Do not do unto others what you don’t want others to do unto you.” when communicating online.
  • ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE.
  • KNOW WHERE YOU ARE IN CYBERSPACE
    • “Netiquette varies from domain to domain.” (Shea, 1994)
    • What you text or chat to a friend might not be appropriate in an e-mail to a classmate.
  • RESPECT OTHER PEOPLE’S  TIME AND BANDWIDTH
    • Make sure to respect other people’s personal time.
    • Keep your messages concise and straight to the point.
  • MAKE YOURSELF LOOK GOOD ONLINE
    • Always check for spelling and grammar errors.
    • Know what you are talking about.
    • Be pleasant and polite. 
  • SHARE EXPERT KNOWLEDGE
    • Share valuable information.
    • When other people are asking questions and you know the correct answer, help them.
  • HELP KEEP FLAME WARS UNDER CONTROL
    • Do not feed the flames; extinguish them by guiding the discussion back to a more productive direction.
  • RESPECT OTHER PEOPLE’S PRIVACY
    • Do not be a MARITES.
    • JUST DON’T.
    • PLEASE DON’T.
    • PLEASE.
    • PRETTY PLEASE.
  • DON’T ABUSE YOUR POWER
    • Knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone.
  • BE FORGIVING OF OTHER PEOPLE’S MISTAKES
    • If it’s a minor offense, you must learn to forgive.
    • If you feel compelled to respond to a mistake, do so in a private email or chat.