Ethical Behavior in Online Interactions
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Match the following laws with their primary objectives:

E-commerce Law = To facilitate and regulate commercial transactions using electronic devices or ICT Data Privacy Law = To protect the human right to privacy and communication Digital Access = To ensure equitable dispensation of technology opportunities and online resources Digital Citizenship = To promote responsible and empowered technology use

Match the following concepts with their meanings:

Digital Access = Buying and selling products through electronic means Digital Commerce = The equitable dispensation of technology opportunities and online resources Digital Communication = Exchange of information through ICT Sensitive Personal Information = Information about an individual's health, race, ethnic origin, etc.

Match the following best practices with their benefits:

Never share more than what is necessary = Protecting personal information Protect your password = Preventing unauthorized access Be wary of phishing = Avoiding online scams Try to create secure password = Enhancing online security

Match the following laws with their year of implementation:

<p>E-commerce Law = First law of its kind in the country Data Privacy Law = 2012 Digital Access = Not mentioned Digital Citizenship = Not mentioned</p> Signup and view all the answers

Match the following aspects of digital citizenship with their descriptions:

<p>Digital Access = Refers to the exchange of information through ICT Digital Commerce = Buying and selling products through electronic means Digital Communication = The equitable dispensation of technology opportunities and online resources Elements of Digital Citizenship = Includes digital access, digital commerce, and digital communication</p> Signup and view all the answers

Match the following risks with their consequences:

<p>Phishing = Unauthorized access to personal information Virus = Damage to computer systems and data loss Accepting friend requests from strangers = Risk of online harassment or identity theft Weak password = Compromised online security</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Digital Library = Function as a collection of catalogues. Learning Management System = Web-based application that present a platform for delivering online courses. Assistive Technologies = Aid the elderly and PWD. Blog = Usually created to post regular updates about one’s life.</p> Signup and view all the answers

Match the following cybercrimes with their definitions:

<p>Phishing = Creating emails and websites to gather personal, financial, and sensitive information Identity Theft = Unauthorized or illegal access to a computer system Hacking = Stealing someone's idea, creative expression, or invention from an individual or company Intellectual Property Theft = Occurs when someone deliberately obtains and uses another person's personally identifying information resulting in fraud</p> Signup and view all the answers

Match the following e-learning platforms with their characteristics:

<p>MOOC = Courses that are offered for free. Distance Education = Mainly characterized by arrangement where students and teacher are physically separated from each other. ICT For Experiential Learning = Simulations are also made possible through VR and AR. Massive Open Online Courses = Web-based application that present a platform for delivering online courses.</p> Signup and view all the answers

Match the following cybercrimes with their definitions:

<p>Cyberbullying = Occurs when a person uses online means to aggressively intimidate, discriminate, or pressure a person Social Engineering = Process of trying to get personal information out of someone through personal contact Cyberstalking = Refers to malicious practice of sending nude or semi-nude images of a minor Child Pornography = Committed when an offender repeatedly tracks the location of a victim, either online or physical</p> Signup and view all the answers

Match the following technology aids with their functions:

<p>Text-to-speech = Scanning through text and producing synthesized voice to read the text. Speech Recognition = Words uttered by a person is converted into digital text. Collaborative Writing Tools = Web-based application that allow multiple authors to edit. Assistive Technologies = Aid the elderly and PWD.</p> Signup and view all the answers

Match the following e-governance frameworks with their characteristics:

<p>e-Administration = Includes databanks where information is stored and eventually used by the elected members. e-Government = Create system that facilitate electronic voting. Digital Library = Function as a collection of catalogues. Learning Management System = Web-based application that present a platform for delivering online courses.</p> Signup and view all the answers

Match the following cybercrimes with their definitions:

<p>Internet Piracy = Refers to the act of copying copyrighted digital material, including digital goods, software, documents, music, and video for any reason beyond the fair use policy Dating Scams = Committed by people who seek a romantic partner online through a dating website Cyber Theft = Stealing using computers Hacking = Refers to unauthorized or illegal access to a computer system</p> Signup and view all the answers

Match the following online safety guidelines with their purposes:

<p>Avoid sharing AQ = To maintain personal privacy. Avoid accepting friends to anyone = To avoid online harassment. Keep track on your personal information = To prevent identity theft. Think before you click = To avoid phishing scams.</p> Signup and view all the answers

Match the following cybercrimes with their definitions:

<p>Cybercrime = Affects individual's businesses or even a nation as a whole Identity Theft = Occurs when someone deliberately obtains and uses another person's personally identifying information resulting in fraud Phishing = Creating emails and websites to gather personal, financial, and sensitive information Hacking = Refers to unauthorized or illegal access to a computer system</p> Signup and view all the answers

Match the following online communication guidelines with their purposes:

<p>Be considerate = To maintain online etiquette. Keep an open mind = To promote online inclusivity. Do not type on all caps = To avoid online conflicts. Avoid spamming messages = To prevent online harassment.</p> Signup and view all the answers

Match the following cybercrimes with their definitions:

<p>Child Pornography = Refers to malicious practice of sending nude or semi-nude images of a minor Cyberstalking = Committed when an offender repeatedly tracks the location of a victim, either online or physical Dating Scams = Committed by people who seek a romantic partner online through a dating website Social Engineering = Process of trying to get personal information out of someone through personal contact</p> Signup and view all the answers

Match the following cybercrimes with their definitions:

<p>Intellectual Property Theft = Steals someone's idea, creative expression, or invention from an individual or a company Cyberbullying = Occurs when a person uses online means to aggressively intimidate, discriminate, or pressure a person Phishing = Creating emails and websites to gather personal, financial, and sensitive information Identity Theft = Occurs when someone deliberately obtains and uses another person's personally identifying information resulting in fraud</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser