Empowerment Technologies Lesson 2
40 Questions
1 Views

Empowerment Technologies Lesson 2

Created by
@FineLookingDoppelganger

Questions and Answers

Which of the following accurately describes a computer worm?

  • It attaches itself to existing programs.
  • It is a type of virus that triggers on a specific date.
  • It requires user permission to transfer.
  • It can replicate and transfer without user intervention. (correct)
  • What is the primary purpose of malware?

  • To steal sensitive personal or financial information. (correct)
  • To enhance software functionality.
  • To create larger data files.
  • To improve system performance and speed.
  • What is a common characteristic of a computer virus?

  • It is triggered by specific conditions. (correct)
  • It monitors user activities without detection.
  • It primarily collects data from external sources.
  • It can replicate independently.
  • How do Trojan horses primarily deceive users?

    <p>By appearing as useful, legitimate applications.</p> Signup and view all the answers

    What function does spyware serve on a computer?

    <p>To steal passwords without user awareness.</p> Signup and view all the answers

    How does a Trojan horse compromise a computer system?

    <p>By granting remote access to hackers.</p> Signup and view all the answers

    Which type of malware can spread through networks without user intervention?

    <p>Worm</p> Signup and view all the answers

    Which statement best differentiates a Trojan horse from a virus?

    <p>Trojan horses are disguised as legitimate software, while viruses infect files without user consent.</p> Signup and view all the answers

    What is a primary reason for the increasing concern over online safety?

    <p>The internet can expose individuals to new risks.</p> Signup and view all the answers

    Which of the following best describes malware?

    <p>Software used to disrupt computer operation.</p> Signup and view all the answers

    Why is online safety particularly important for children?

    <p>Children often engage in online interactions without awareness of risks.</p> Signup and view all the answers

    How does the internet function as a double-edged sword?

    <p>It offers vast information but exposes users to threats.</p> Signup and view all the answers

    Which of the following is a crucial online safety measure?

    <p>Using complex passwords for accounts.</p> Signup and view all the answers

    What can potentially affect an individual's future according to online safety principles?

    <p>The information shared on the internet.</p> Signup and view all the answers

    What is one of the main features that social networking sites improve upon to enhance online safety?

    <p>Enhancement of security features.</p> Signup and view all the answers

    Which of the following actions is NOT recommended for maintaining online safety?

    <p>Clicking on unknown email links.</p> Signup and view all the answers

    What is a common characteristic of spam emails?

    <p>They often contain malware.</p> Signup and view all the answers

    Which of the following is NOT a recommended way to protect personal information online?

    <p>Use incognito mode to browse.</p> Signup and view all the answers

    What should you do to ensure your home Wi-Fi network is secure?

    <p>Make it a private network with a password.</p> Signup and view all the answers

    What is the purpose of a CAPTCHA?

    <p>To prevent spam bots from accessing websites.</p> Signup and view all the answers

    What action should be avoided when you receive a suspicious email?

    <p>Replying to the sender.</p> Signup and view all the answers

    How can you minimize risks when visiting websites?

    <p>Only visit trusted websites.</p> Signup and view all the answers

    What can pose the highest risk during file downloads?

    <p>Peer-to-peer downloads (torrents).</p> Signup and view all the answers

    Which practice is essential for keeping your personal information safe online?

    <p>Read privacy policies before using services.</p> Signup and view all the answers

    What is considered a violation of privacy in an academic context?

    <p>Plagiarism</p> Signup and view all the answers

    Which of the following is an example of unethical behavior online?

    <p>Congesting someone's system with unwanted information</p> Signup and view all the answers

    What does the term 'Netiquette' refer to?

    <p>The special behavior expected in online interactions</p> Signup and view all the answers

    Which of the following behaviors is discouraged under the Ten Golden Rules of Netiquette?

    <p>Typing in all capital letters</p> Signup and view all the answers

    What should you do to avoid copyright infringement?

    <p>Seek permission before using another's work</p> Signup and view all the answers

    Which principle encourages understanding and kindness in online communication?

    <p>Be forgiving of others' mistakes</p> Signup and view all the answers

    Which of the following actions would violate copyright laws?

    <p>Copying materials without permission</p> Signup and view all the answers

    What does 'flaming' mean in the context of online communication?

    <p>Posting personal insults over the internet</p> Signup and view all the answers

    What is the primary function of keylogger software?

    <p>To collect user information without their knowledge</p> Signup and view all the answers

    Which of the following is a type of malware that aims to steal personal information?

    <p>Spyware</p> Signup and view all the answers

    What is a common method through which malware spreads?

    <p>Using social networks</p> Signup and view all the answers

    Which of the following symptoms could indicate that your system is infected with malware?

    <p>Strange files or programs appear</p> Signup and view all the answers

    How can malware potentially lead to financial loss?

    <p>Through access to credit card or bank account information</p> Signup and view all the answers

    What action is recommended as part of preventing malware infection?

    <p>Install and keep anti-virus/malware software up-to-date</p> Signup and view all the answers

    Which type of malware is primarily known for flooding users with advertisements?

    <p>Adware</p> Signup and view all the answers

    What could be a consequence of a computer being turned into a 'bot'?

    <p>Executing Distributed Denial of Service attacks</p> Signup and view all the answers

    Study Notes

    Online Threats and Safety Measures

    • Online threats can range from malware to phishing and spam, presenting risks to users' personal information and security.
    • It is essential to acknowledge one's responsibility for personal information shared online, as it can have lasting implications on reputation.

    Types of Malware

    • Malware: General term for harmful software designed to disrupt operations, steal information, or gain unauthorized access.
    • Viruses: Malicious code designed to replicate and spread from one system to another, potentially deleting critical files.
    • Worms: Self-replicating programs that transfer via networks without user intervention, often used to spread junk mail.
    • Trojan Horses: Malicious programs disguised as legitimate software, allowing unauthorized access and potential data theft.
    • Spyware: Background-running programs that monitor user activities, often collecting sensitive information such as passwords.
    • Adware: Software that generates unwanted advertisements, often traps users into installation through deceptive methods.

    How Malware Spreads

    • Common methods include infected email attachments, untrusted websites, infected downloads, and removable media devices.

    Consequences of Malware Infection

    • Data Loss: Viruses may delete files or render hard drives unusable.
    • Identity Theft: Malware like keyloggers captures sensitive information such as passwords and banking details.
    • Botnets: Computers can be commandeered for malicious purposes, contributing to larger cyber-attacks.
    • Financial Loss: Access to financial information can result in unauthorized charges or drained accounts.

    Signs of Malware Infection

    • Slower device performance, unexpected restarts, strange error messages, or unusual files appearing are typical indicators of infection.

    Preventative Measures Against Malware

    • Install and regularly update antivirus/malware software.
    • Ensure operating systems are up to date.
    • Use strong, secure networks and avoid open Wi-Fi.
    • Be cautious with downloads and email attachments, particularly from unknown sources.

    Spam and Phishing

    • Spam: Unwanted emails often used for advertising or to distribute malware; legitimate companies also utilize similar tactics.
    • Phishing: Attempts to acquire personal information through fraudulent emails that redirect users to fake websites.

    Tips for Staying Safe Online

    • Maintain privacy by controlling shared information and understanding the terms of service of websites.
    • Use strong, unique passwords and never share them.
    • Avoid public Wi-Fi for sensitive tasks and consider using secure private networks.
    • Regularly review security features of social networking platforms.

    Computer Code of Ethics

    • Treat computer information with respect, akin to written or spoken words; avoid plagiarism and unauthorized modification.
    • Abide by laws against distributing destructive software or sending inappropriate content.

    Netiquette Guidelines

    • Golden Rule: Treat others online as you wish to be treated.
    • Avoid personal insults or "flaming" and understand perceived shouting via all-caps typing.
    • Refrain from spamming or engaging with unknown individuals in chats.
    • Maintain proper spelling and grammar to support message credibility and respect for others.
    • Always assume that online works are copyrighted and seek permission before use.
    • Understand that plagiarism involves using protected works without authorization and can have legal consequences.
    • Proper practices include crediting original authors and reviewing licensing agreements before using or altering content.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz focuses on online safety, security, ethics, and etiquette as outlined in Lesson 2 of Empowerment Technologies. Participants will explore various online threats, safety measures, and the importance of reputation in the digital world. Test your understanding of how to navigate the internet responsibly.

    Use Quizgecko on...
    Browser
    Browser