Living in the IT Era

FinestSwan avatar
FinestSwan
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the primary purpose of encryption?

To allow only trusted readers to access private data

What is the main function of a web bot?

To perform a repetitive function on the Internet

What is the purpose of netiquette?

To set rules for behaving properly online

What is the benefit of proofreading messages before sending them?

<p>It improves the effectiveness and efficiency of communication</p> Signup and view all the answers

What is considered 'screaming' in typed messages?

<p>Typing an entire message using all capital letters</p> Signup and view all the answers

What is emphasized by the Golden Rule of netiquette?

<p>The importance of treating online communication with respect and professionalism</p> Signup and view all the answers

What is the primary function of a router or router-modem combination?

<p>To act as a traffic cop for network signals</p> Signup and view all the answers

What is HTML used for?

<p>To tell a browser how to place pictures, text, and links on a web page</p> Signup and view all the answers

What is the purpose of HTTPS?

<p>To add a special layer of encryption to hide personal information</p> Signup and view all the answers

What is a bit in the binary numbering system?

<p>A single digit that can be 1 or 0</p> Signup and view all the answers

What is the main difference between uploading and downloading?

<p>Uploading is transferring data from your computer to another, while downloading is the reverse</p> Signup and view all the answers

What is the primary purpose of a URL?

<p>To connect to a remote resource on the world wide web</p> Signup and view all the answers

What is encryption?

<p>The mathematical scrambling of data to hide it from eavesdroppers</p> Signup and view all the answers

What is the function of HTTP?

<p>To provide a data communication standard for web pages</p> Signup and view all the answers

What is the main goal of striving to make your communications concise and free of errors?

<p>To avoid confusion</p> Signup and view all the answers

What is the primary consideration when sharing information with others online?

<p>To gain the consent of all involved participants</p> Signup and view all the answers

What is the definition of cybercrime?

<p>A crime committed using a computer as a tool</p> Signup and view all the answers

What is the purpose of the Republic Act No. 10175?

<p>To address legal issues concerning online interactions and internet</p> Signup and view all the answers

What is the definition of copyright?

<p>The exclusive legal right to print, publish, or perform creative work</p> Signup and view all the answers

What is the consequence of violating copyright holders' exclusive rights?

<p>Copyright infringement occurs</p> Signup and view all the answers

What is the definition of plagiarism?

<p>The act of using someone else's language and thoughts without authorization</p> Signup and view all the answers

What is the main goal of the Republic Act No. 10173?

<p>To protect individual personal information</p> Signup and view all the answers

What is the primary goal of phishing and pharming attacks?

<p>To steal personal and financial information</p> Signup and view all the answers

How do pharming attacks typically work?

<p>By redirecting users to fake websites</p> Signup and view all the answers

What is ransomware commonly spread through?

<p>Phishing emails with malicious attachments</p> Signup and view all the answers

What is the main difference between phishing and pharming attacks?

<p>Phishing uses emails, while pharming uses fake websites</p> Signup and view all the answers

What is the ultimate goal of cyber criminals who use phishing attacks?

<p>To steal personal and financial information</p> Signup and view all the answers

What technique do phishing and pharming attacks often use?

<p>Spoofing</p> Signup and view all the answers

What might a phishing attack use to trick victims into taking action?

<p>Urgent messages from a bank</p> Signup and view all the answers

What is the result of a successful ransomware attack?

<p>Restricted access to computer or files</p> Signup and view all the answers

What is the primary goal of spyware and adware?

<p>To collect personal information about the user without their knowledge</p> Signup and view all the answers

How do Trojan horses typically spread to a computer?

<p>Disguised as, or embedded within, legitimate software</p> Signup and view all the answers

What can a virus do to your contact list?

<p>Infect your contacts' computers</p> Signup and view all the answers

What is a common way for spyware and adware to infect a computer?

<p>Through a free software download</p> Signup and view all the answers

What can a Trojan horse do to your computer?

<p>Delete your files</p> Signup and view all the answers

What is a potential consequence of visiting a website infected with a virus?

<p>An automatic download of the virus will occur</p> Signup and view all the answers

What can spyware and adware do to your web browsing experience?

<p>Take you to unwanted sites</p> Signup and view all the answers

What is a potential action a virus can take on your computer?

<p>Provide criminals with access to your computer</p> Signup and view all the answers

More Quizzes Like This

Understanding the Internet Basics
12 questions
Internet Basics Quiz
5 questions

Internet Basics Quiz

BoundlessWilliamsite avatar
BoundlessWilliamsite
Internet Basics
36 questions

Internet Basics

RefreshingTruth7024 avatar
RefreshingTruth7024
Use Quizgecko on...
Browser
Browser