Ethical Behavior in Online Interactions

FriendlyPyrope avatar
FriendlyPyrope
·
·
Download

Start Quiz

Study Flashcards

18 Questions

Match the following laws with their primary objectives:

E-commerce Law = To facilitate and regulate commercial transactions using electronic devices or ICT Data Privacy Law = To protect the human right to privacy and communication Digital Access = To ensure equitable dispensation of technology opportunities and online resources Digital Citizenship = To promote responsible and empowered technology use

Match the following concepts with their meanings:

Digital Access = Buying and selling products through electronic means Digital Commerce = The equitable dispensation of technology opportunities and online resources Digital Communication = Exchange of information through ICT Sensitive Personal Information = Information about an individual's health, race, ethnic origin, etc.

Match the following best practices with their benefits:

Never share more than what is necessary = Protecting personal information Protect your password = Preventing unauthorized access Be wary of phishing = Avoiding online scams Try to create secure password = Enhancing online security

Match the following laws with their year of implementation:

E-commerce Law = First law of its kind in the country Data Privacy Law = 2012 Digital Access = Not mentioned Digital Citizenship = Not mentioned

Match the following aspects of digital citizenship with their descriptions:

Digital Access = Refers to the exchange of information through ICT Digital Commerce = Buying and selling products through electronic means Digital Communication = The equitable dispensation of technology opportunities and online resources Elements of Digital Citizenship = Includes digital access, digital commerce, and digital communication

Match the following risks with their consequences:

Phishing = Unauthorized access to personal information Virus = Damage to computer systems and data loss Accepting friend requests from strangers = Risk of online harassment or identity theft Weak password = Compromised online security

Match the following terms with their definitions:

Digital Library = Function as a collection of catalogues. Learning Management System = Web-based application that present a platform for delivering online courses. Assistive Technologies = Aid the elderly and PWD. Blog = Usually created to post regular updates about one’s life.

Match the following cybercrimes with their definitions:

Phishing = Creating emails and websites to gather personal, financial, and sensitive information Identity Theft = Unauthorized or illegal access to a computer system Hacking = Stealing someone's idea, creative expression, or invention from an individual or company Intellectual Property Theft = Occurs when someone deliberately obtains and uses another person's personally identifying information resulting in fraud

Match the following e-learning platforms with their characteristics:

MOOC = Courses that are offered for free. Distance Education = Mainly characterized by arrangement where students and teacher are physically separated from each other. ICT For Experiential Learning = Simulations are also made possible through VR and AR. Massive Open Online Courses = Web-based application that present a platform for delivering online courses.

Match the following cybercrimes with their definitions:

Cyberbullying = Occurs when a person uses online means to aggressively intimidate, discriminate, or pressure a person Social Engineering = Process of trying to get personal information out of someone through personal contact Cyberstalking = Refers to malicious practice of sending nude or semi-nude images of a minor Child Pornography = Committed when an offender repeatedly tracks the location of a victim, either online or physical

Match the following technology aids with their functions:

Text-to-speech = Scanning through text and producing synthesized voice to read the text. Speech Recognition = Words uttered by a person is converted into digital text. Collaborative Writing Tools = Web-based application that allow multiple authors to edit. Assistive Technologies = Aid the elderly and PWD.

Match the following e-governance frameworks with their characteristics:

e-Administration = Includes databanks where information is stored and eventually used by the elected members. e-Government = Create system that facilitate electronic voting. Digital Library = Function as a collection of catalogues. Learning Management System = Web-based application that present a platform for delivering online courses.

Match the following cybercrimes with their definitions:

Internet Piracy = Refers to the act of copying copyrighted digital material, including digital goods, software, documents, music, and video for any reason beyond the fair use policy Dating Scams = Committed by people who seek a romantic partner online through a dating website Cyber Theft = Stealing using computers Hacking = Refers to unauthorized or illegal access to a computer system

Match the following online safety guidelines with their purposes:

Avoid sharing AQ = To maintain personal privacy. Avoid accepting friends to anyone = To avoid online harassment. Keep track on your personal information = To prevent identity theft. Think before you click = To avoid phishing scams.

Match the following cybercrimes with their definitions:

Cybercrime = Affects individual's businesses or even a nation as a whole Identity Theft = Occurs when someone deliberately obtains and uses another person's personally identifying information resulting in fraud Phishing = Creating emails and websites to gather personal, financial, and sensitive information Hacking = Refers to unauthorized or illegal access to a computer system

Match the following online communication guidelines with their purposes:

Be considerate = To maintain online etiquette. Keep an open mind = To promote online inclusivity. Do not type on all caps = To avoid online conflicts. Avoid spamming messages = To prevent online harassment.

Match the following cybercrimes with their definitions:

Child Pornography = Refers to malicious practice of sending nude or semi-nude images of a minor Cyberstalking = Committed when an offender repeatedly tracks the location of a victim, either online or physical Dating Scams = Committed by people who seek a romantic partner online through a dating website Social Engineering = Process of trying to get personal information out of someone through personal contact

Match the following cybercrimes with their definitions:

Intellectual Property Theft = Steals someone's idea, creative expression, or invention from an individual or a company Cyberbullying = Occurs when a person uses online means to aggressively intimidate, discriminate, or pressure a person Phishing = Creating emails and websites to gather personal, financial, and sensitive information Identity Theft = Occurs when someone deliberately obtains and uses another person's personally identifying information resulting in fraud

Test your knowledge on ethical guidelines for online interactions, including social media, chatting, and online forums. Learn how to avoid spamming, keep personal information private, and be considerate in online communications.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Internet Safety for Kids
18 questions

Internet Safety for Kids

VersatileBowenite859 avatar
VersatileBowenite859
Educación Digital: Etiqueta y Seguridad en Línea
17 questions
Use Quizgecko on...
Browser
Browser