Internet Ethics and Online Safety
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main function of spyware once it is installed on a computer?

  • To improve internet speed
  • To gather data secretly (correct)
  • To enhance security features
  • To optimize system performance

Which of the following is NOT a recommended precaution against spyware?

  • Using Internet security software
  • Installing a personal firewall
  • Avoiding doubtful error dialogs
  • Accepting free software deals (correct)

Which security measure helps protect a computer from outside intrusions?

  • Regular software updates
  • Antivirus software
  • Strong passwords
  • Personal firewall (correct)

What is a common source from which spyware can be downloaded?

<p>Email attachments from unknown senders (B)</p> Signup and view all the answers

What role do parents and teachers play in protecting children online?

<p>Teaching safe internet practices (A)</p> Signup and view all the answers

What is a key characteristic of phishing attacks?

<p>They often mimic official communication. (B)</p> Signup and view all the answers

Which of the following is a method commonly used by keyloggers?

<p>Tracking keystrokes to gather data (D)</p> Signup and view all the answers

What is a pop-up ad often used for in the context of spyware and potential threats?

<p>To gather personal information illicitly (C)</p> Signup and view all the answers

What is the primary function of a keylogger?

<p>To record keystrokes in a hidden file (A)</p> Signup and view all the answers

Which of the following precautions should be taken when using a public computer?

<p>Always sign out of password-protected websites. (A)</p> Signup and view all the answers

Why is it advised to delete unwanted emails without opening them?

<p>They may contain viruses or phishing attempts. (C)</p> Signup and view all the answers

What should you do when your web browser prompts you to remember a password?

<p>Click 'No' to prevent unauthorized access. (B)</p> Signup and view all the answers

What is a potential risk of cookies stored on your computer?

<p>They may share stored information with advertisers. (A)</p> Signup and view all the answers

What type of software is often found on public computers that can compromise your data security?

<p>Keyloggers (B)</p> Signup and view all the answers

What is the best practice when receiving web links from unknown sources?

<p>Never click on them. (D)</p> Signup and view all the answers

Which statement best describes the function of cookies on websites?

<p>They track user preferences and sessions. (D)</p> Signup and view all the answers

What is a primary risk associated with clicking items in a pop-up ad?

<p>It can lead to the installation of spyware or viruses. (D)</p> Signup and view all the answers

Which of the following is a recommended precaution against spam emails?

<p>Sign up for email filtering through your ISP. (A)</p> Signup and view all the answers

What should you do if you receive a phishing email requesting sensitive information?

<p>Delete the email and do not engage with it. (C)</p> Signup and view all the answers

What is a characteristic of viruses as mentioned in the content?

<p>They are designed to purposefully damage data. (A)</p> Signup and view all the answers

What tactic do spammers often use to bypass email filters?

<p>Including hidden text that is visible when highlighted. (B)</p> Signup and view all the answers

Which action is NOT recommended when dealing with a suspected phishing attempt on your phone?

<p>Disclose personal information to the caller. (A)</p> Signup and view all the answers

Which of the following is a common way to protect against potential spyware threats?

<p>Use a pop-up blocker in your browser. (B)</p> Signup and view all the answers

What is the primary purpose of a keylogger?

<p>To capture keystrokes and sensitive information. (C)</p> Signup and view all the answers

Flashcards

Pop-up Ad

An advertisement that unexpectedly opens in a new browser window, often on top of the current window.

Spam Email

Unwanted or unsolicited bulk email messages.

Phishing

A deceptive technique to trick you into giving away personal information by pretending to be a legitimate company.

Spam filter

A feature to automatically block or identify spam emails.

Signup and view all the flashcards

Pop-up blocker

A software that prevents pop-up ads from appearing in your browser.

Signup and view all the flashcards

Virus

A malicious program designed to harm or damage your computer or data.

Signup and view all the flashcards

Phishing scam

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

Signup and view all the flashcards

Security Software

Programs designed to protect your computer from malware and other threats.

Signup and view all the flashcards

Spyware

Software secretly installed on your computer to gather data, steal passwords, display ads, and control your browser.

Signup and view all the flashcards

Cybercrime

Illegal activities committed using computers and the internet, aiming to access and exploit sensitive information

Signup and view all the flashcards

Internet

A vast network connecting millions of computers worldwide, accessible via various communication devices and media.

Signup and view all the flashcards

Firewall

Software that protects your network resources from external intrusions, acting as a security barrier.

Signup and view all the flashcards

Internet Security Program

Software that protects your computer from spyware, viruses, and other online threats.

Signup and view all the flashcards

Potential Threats on the Web

Possible dangers you might encounter while browsing the internet, including spyware, malware, phishing attempts, and cybercrime.

Signup and view all the flashcards

Protecting Yourself Online

Taking precautions to safeguard your computer and personal information while navigating the internet.

Signup and view all the flashcards

Precautionary Measures

Steps you can take to mitigate online threats, such as using security software, avoiding suspicious links, and being cautious with personal information.

Signup and view all the flashcards

Web Browser Password Prompt

When a browser offers to remember your password, clicking 'Yes' makes your account vulnerable to anyone using that computer.

Signup and view all the flashcards

Cookie's Purpose

Cookies are small files that websites place on your computer to track information about you and your preferences.

Signup and view all the flashcards

Email Attachment Risk

Opening an email attachment can expose your computer to viruses, especially if it's from an unknown source.

Signup and view all the flashcards

Public Computer Safety

Using public computers can be risky due to potential keyloggers that secretly record your keystrokes, including passwords.

Signup and view all the flashcards

Cookie's Privacy Impact

Information stored in cookies, like your browsing history, can be sold or traded for targeted advertising.

Signup and view all the flashcards

Keylogger's Function

A keylogger secretly records every key you press on a computer, potentially stealing your passwords and private information.

Signup and view all the flashcards

Antivirus Software's Role

Antivirus programs protect your computer by detecting and removing harmful programs, such as viruses and keyloggers.

Signup and view all the flashcards

File Transfer Precautions

Before transferring files to your computer, always scan them with an antivirus program to prevent introducing viruses.

Signup and view all the flashcards

Study Notes

Internet Ethics and Safeguards

  • Internet (Net) is a global network connecting millions/trillions of computers.
  • Access is via various devices (modems, cables, phone lines, satellites).
  • Enables access to global information, news, research, shopping, communication, music, and games.
  • Internet revolutionized communication, connecting everyone.

Protecting Yourself from Online Threats

  • Cybercrimes involve unauthorized computer access for malicious purposes.
  • Security and privacy are crucial when sharing sensitive information (bank details, credit cards).
  • Spyware: secretly installs on a computer, collects data, steals passwords, displays ads, controls browser.

Precautions for Spyware

  • Use Internet security programs.
  • Install a firewall (software to protect network).
  • Don't open suspicious error dialogs or accept free deals (spyware can be hidden).

Spam Emails

  • Unwanted messages (junk mail) sent en masse by spammers, targeting sensitive data via hidden text.

Precautions for Spam

  • Email filtering (via ISP or anti-spam).
  • Avoid clicking links or replying to spam.
  • Delete suspicious emails.
  • Keep security software updated.

Phishing Scams

  • Fake, official-looking emails, websites or calls aiming to extract personal/financial details.
  • Attempts to obtain passwords, credit card numbers, account info.

Precautions for Phishing

  • Verify email/phone requests from unknown senders.
  • Guard against providing personal information or financial information to unknown parties.
  • Double-check URLs of sites requiring data.
  • Use phishing filters in browsers.

Virus Infections

  • Programs designed to infect and damage computers, accessing files and operating systems.
  • Often spread through email attachments or website downloads.

Precautions for Viruses

  • Open only trusted email attachments.
  • Scan files with antivirus software before usage.
  • Keep antivirus software up to date.

Keyloggers

  • Software recording keystrokes, used to capture sensitive information.
  • Often found on public computers.

Precautions for Keyloggers

  • Avoid logging in on public computers for sensitive activities.
  • Sign out of all accounts and clear history after using the computer.

Managing Passwords

  • Browsers can remember passwords or save you from typing them repeatedly.
  • Avoid this feature and create unique passwords for each login session.
  • Unique passwords (containing numbers & symbols, at least six chars) are crucial.

Cookies

  • Small text messages browsers store on your computer regarding website usage.
  • Used for personalization, tracking user preferences (online shopping carts).

Social Engineering

  • Tricking people to reveal sensitive information.
  • Targeting frustrated individuals to gain unauthorized access.

Role of Parents & Teachers

  • Teach children about responsible Internet usage.
  • Set clear online boundaries for children (age-appropriate websites, games).
  • Monitor children's online activities regularly.

Cyberbullying

  • Harassment, threats, false accusations done through technology (social media).

Precautions Against Cyberbullying

  • Limit sharing personal data with strangers.
  • Use privacy settings on social media accounts.
  • Do not engage in hateful or threatening online activities.

Hacking

  • Unlawful access and control of computers or networks.
  • May involve stealing information or damaging data.

Precautions Against Hacking

  • Create strong passwords.
  • Change passwords regularly.
  • Use antivirus and keep updated.
  • Protect against viruses, malware and unnecessary vulnerabilities.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz delves into Internet ethics and crucial online safety measures. Topics include protecting personal information, recognizing cyber threats, and understanding the risks associated with spyware and spam. Test your knowledge about safeguarding yourself in the digital world.

More Like This

The Internet Basics Quiz
5 questions
Bahaya Konten Internet
18 questions

Bahaya Konten Internet

WellKnownOwl8222 avatar
WellKnownOwl8222
Cybersecurity and Privacy Laws
14 questions
Online Privacy and Security
5 questions
Use Quizgecko on...
Browser
Browser