Internet Ethics and Online Safety
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main function of spyware once it is installed on a computer?

  • To improve internet speed
  • To gather data secretly (correct)
  • To enhance security features
  • To optimize system performance
  • Which of the following is NOT a recommended precaution against spyware?

  • Using Internet security software
  • Installing a personal firewall
  • Avoiding doubtful error dialogs
  • Accepting free software deals (correct)
  • Which security measure helps protect a computer from outside intrusions?

  • Regular software updates
  • Antivirus software
  • Strong passwords
  • Personal firewall (correct)
  • What is a common source from which spyware can be downloaded?

    <p>Email attachments from unknown senders</p> Signup and view all the answers

    What role do parents and teachers play in protecting children online?

    <p>Teaching safe internet practices</p> Signup and view all the answers

    What is a key characteristic of phishing attacks?

    <p>They often mimic official communication.</p> Signup and view all the answers

    Which of the following is a method commonly used by keyloggers?

    <p>Tracking keystrokes to gather data</p> Signup and view all the answers

    What is a pop-up ad often used for in the context of spyware and potential threats?

    <p>To gather personal information illicitly</p> Signup and view all the answers

    What is the primary function of a keylogger?

    <p>To record keystrokes in a hidden file</p> Signup and view all the answers

    Which of the following precautions should be taken when using a public computer?

    <p>Always sign out of password-protected websites.</p> Signup and view all the answers

    Why is it advised to delete unwanted emails without opening them?

    <p>They may contain viruses or phishing attempts.</p> Signup and view all the answers

    What should you do when your web browser prompts you to remember a password?

    <p>Click 'No' to prevent unauthorized access.</p> Signup and view all the answers

    What is a potential risk of cookies stored on your computer?

    <p>They may share stored information with advertisers.</p> Signup and view all the answers

    What type of software is often found on public computers that can compromise your data security?

    <p>Keyloggers</p> Signup and view all the answers

    What is the best practice when receiving web links from unknown sources?

    <p>Never click on them.</p> Signup and view all the answers

    Which statement best describes the function of cookies on websites?

    <p>They track user preferences and sessions.</p> Signup and view all the answers

    What is a primary risk associated with clicking items in a pop-up ad?

    <p>It can lead to the installation of spyware or viruses.</p> Signup and view all the answers

    Which of the following is a recommended precaution against spam emails?

    <p>Sign up for email filtering through your ISP.</p> Signup and view all the answers

    What should you do if you receive a phishing email requesting sensitive information?

    <p>Delete the email and do not engage with it.</p> Signup and view all the answers

    What is a characteristic of viruses as mentioned in the content?

    <p>They are designed to purposefully damage data.</p> Signup and view all the answers

    What tactic do spammers often use to bypass email filters?

    <p>Including hidden text that is visible when highlighted.</p> Signup and view all the answers

    Which action is NOT recommended when dealing with a suspected phishing attempt on your phone?

    <p>Disclose personal information to the caller.</p> Signup and view all the answers

    Which of the following is a common way to protect against potential spyware threats?

    <p>Use a pop-up blocker in your browser.</p> Signup and view all the answers

    What is the primary purpose of a keylogger?

    <p>To capture keystrokes and sensitive information.</p> Signup and view all the answers

    Study Notes

    Internet Ethics and Safeguards

    • Internet (Net) is a global network connecting millions/trillions of computers.
    • Access is via various devices (modems, cables, phone lines, satellites).
    • Enables access to global information, news, research, shopping, communication, music, and games.
    • Internet revolutionized communication, connecting everyone.

    Protecting Yourself from Online Threats

    • Cybercrimes involve unauthorized computer access for malicious purposes.
    • Security and privacy are crucial when sharing sensitive information (bank details, credit cards).
    • Spyware: secretly installs on a computer, collects data, steals passwords, displays ads, controls browser.

    Precautions for Spyware

    • Use Internet security programs.
    • Install a firewall (software to protect network).
    • Don't open suspicious error dialogs or accept free deals (spyware can be hidden).

    Spam Emails

    • Unwanted messages (junk mail) sent en masse by spammers, targeting sensitive data via hidden text.

    Precautions for Spam

    • Email filtering (via ISP or anti-spam).
    • Avoid clicking links or replying to spam.
    • Delete suspicious emails.
    • Keep security software updated.

    Phishing Scams

    • Fake, official-looking emails, websites or calls aiming to extract personal/financial details.
    • Attempts to obtain passwords, credit card numbers, account info.

    Precautions for Phishing

    • Verify email/phone requests from unknown senders.
    • Guard against providing personal information or financial information to unknown parties.
    • Double-check URLs of sites requiring data.
    • Use phishing filters in browsers.

    Virus Infections

    • Programs designed to infect and damage computers, accessing files and operating systems.
    • Often spread through email attachments or website downloads.

    Precautions for Viruses

    • Open only trusted email attachments.
    • Scan files with antivirus software before usage.
    • Keep antivirus software up to date.

    Keyloggers

    • Software recording keystrokes, used to capture sensitive information.
    • Often found on public computers.

    Precautions for Keyloggers

    • Avoid logging in on public computers for sensitive activities.
    • Sign out of all accounts and clear history after using the computer.

    Managing Passwords

    • Browsers can remember passwords or save you from typing them repeatedly.
    • Avoid this feature and create unique passwords for each login session.
    • Unique passwords (containing numbers & symbols, at least six chars) are crucial.

    Cookies

    • Small text messages browsers store on your computer regarding website usage.
    • Used for personalization, tracking user preferences (online shopping carts).

    Social Engineering

    • Tricking people to reveal sensitive information.
    • Targeting frustrated individuals to gain unauthorized access.

    Role of Parents & Teachers

    • Teach children about responsible Internet usage.
    • Set clear online boundaries for children (age-appropriate websites, games).
    • Monitor children's online activities regularly.

    Cyberbullying

    • Harassment, threats, false accusations done through technology (social media).

    Precautions Against Cyberbullying

    • Limit sharing personal data with strangers.
    • Use privacy settings on social media accounts.
    • Do not engage in hateful or threatening online activities.

    Hacking

    • Unlawful access and control of computers or networks.
    • May involve stealing information or damaging data.

    Precautions Against Hacking

    • Create strong passwords.
    • Change passwords regularly.
    • Use antivirus and keep updated.
    • Protect against viruses, malware and unnecessary vulnerabilities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz delves into Internet ethics and crucial online safety measures. Topics include protecting personal information, recognizing cyber threats, and understanding the risks associated with spyware and spam. Test your knowledge about safeguarding yourself in the digital world.

    More Like This

    Bahaya Konten Internet
    18 questions

    Bahaya Konten Internet

    WellKnownOwl8222 avatar
    WellKnownOwl8222
    Cybersecurity and Privacy Laws
    14 questions
    Online Privacy and Security
    5 questions
    Use Quizgecko on...
    Browser
    Browser