Online Safety and Ethics Quiz
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of these is NOT a type of cybercrime according to the text?

  • Spam
  • Ransomware
  • Netiquette (correct)
  • Phishing
  • Which of these is a type of malware that records a user's keyboard activity?

  • Adware
  • Spyware
  • Worm
  • Keylogger (correct)
  • What is the primary method by which worms typically spread to computers?

  • Through physical contact, like shaking hands
  • By being downloaded from reputable websites
  • Through malicious email attachments or USB sticks (correct)
  • By automatically updating software without user permission
  • What is the primary goal of phishing?

    <p>To steal personal information like passwords and credit card details (C)</p> Signup and view all the answers

    Which of these accurately describes the relationship between Pharming and Phishing?

    <p>Pharming is a more advanced and sophisticated form of Phishing (D)</p> Signup and view all the answers

    What is the primary goal of Rogue Security Software?

    <p>To trick users into paying for fake malware removal tools (D)</p> Signup and view all the answers

    Which of these is considered an example of 'Cybercrime Law' in action?

    <p>A law prohibiting the distribution of child pornography online (C)</p> Signup and view all the answers

    How does Adware typically behave on a victim's computer?

    <p>It displays unwanted advertisements that are difficult to close (B)</p> Signup and view all the answers

    What is the primary purpose of online safety and security practices?

    <p>To prevent unauthorized access to information and resources. (A)</p> Signup and view all the answers

    Which of the following is NOT a recommended online safety practice?

    <p>Sharing your passwords with trusted friends. (D)</p> Signup and view all the answers

    What is a 'Trojan Horse' in the context of online threats?

    <p>A legitimate program containing hidden malicious code. (B)</p> Signup and view all the answers

    What is the main difference between a virus and a worm?

    <p>Worms require user interaction to spread, while viruses do not. (C)</p> Signup and view all the answers

    Which of the following practices can help protect against identity theft?

    <p>Monitoring your credit reports regularly. (A)</p> Signup and view all the answers

    What is cyberbullying?

    <p>The use of technology to harass or intimidate someone. (B)</p> Signup and view all the answers

    Which of the following is NOT considered an online threat?

    <p>Social media networking. (A)</p> Signup and view all the answers

    Why is it important to be cautious about sharing personal information online?

    <p>It can be used to impersonate you or commit fraud. (C)</p> Signup and view all the answers

    Flashcards

    Online Safety

    The act of maximizing awareness of personal safety and security risks when using the internet.

    Password Sharing

    Giving your password to others, which compromises your online safety.

    Cyberbullying

    Intentional abuse or harassment of others using electronic communication.

    Identity Theft

    Stealing personal information to impersonate someone for transactions.

    Signup and view all the flashcards

    Cyber Stalking

    Using electronic communication to harass or stalk someone.

    Signup and view all the flashcards

    Sexting

    Sending explicit messages or images through electronic channels.

    Signup and view all the flashcards

    Malware

    Malicious software designed to harm or exploit devices or networks.

    Signup and view all the flashcards

    Virus

    A program that replicates itself and spreads to other programs or devices.

    Signup and view all the flashcards

    Worms

    Malicious software that spreads by sending copies to email contacts.

    Signup and view all the flashcards

    Spyware

    Malicious software that collects user data and sends it to hackers.

    Signup and view all the flashcards

    Phishing

    Fraudulent emails that mimic trusted sources to steal sensitive information.

    Signup and view all the flashcards

    Pharming

    A sophisticated phishing method using fake websites to steal credentials.

    Signup and view all the flashcards

    Ransomware

    Malware that threatens to block access or publish data unless a ransom is paid.

    Signup and view all the flashcards

    Keyloggers

    Malicious programs that record keystrokes to capture sensitive information.

    Signup and view all the flashcards

    Cybercrime

    Crimes committed using computers, such as hacking and identity theft.

    Signup and view all the flashcards

    Study Notes

    Online Safety, Security, Ethics, and Etiquette

    • Most Essential Learning Competencies: Apply online safety, security, ethics, and etiquette standards, and practice using ICTs relevant to specific professional tracks.
    • Specific Objectives:
      • Identify various online threats.
      • Identify online safety measures.
      • Consider one's and others' reputation when using the internet.

    Activity 1: Self-Check on Online Habits

    • Instructions: Reflect and assess your online habits. Check "Yes" or "No" on the table.

    Self-Check on Online Habits

    • I always talk to strangers on social media.: (Example question, check YES or NO)
    • Giving your password to your friends: (Example question, check YES or NO)
    • Posting about future vacations: (Example question, check YES or NO)
    • Visiting unsecured websites: (Example question, check YES or NO)
    • Ranting on social media: (Example question, check YES or NO)
    • Posting images or videos without permission: (Example question, check YES or NO)

    Online Safety and Security

    • Definition: The act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the internet, and self-protection from computer crime.

    Tips on How to be Safe Online

    • Do not share your password with anyone.
    • Add friends you know in real life.
    • Do not visit untrusted websites.
    • Add a password to your home Wi-Fi.
    • Install and update antivirus software.
    • Do not give personal information to anyone.
    • Think before clicking links.
    • Never post about your future vacation.

    Cyberbullying

    • Definition: Occurs when someone intentionally abuses, harasses, and mistreats another person using electronic communication.

    Identity Theft

    • Definition: Stealing personal information to assume a person's identity for transactions.

    Cyber Stalking

    • Definition: A criminal practice using electronic communication to stalk or harass an individual or group.

    Sexting

    • Definition: Sending sexually explicit text messages, images, and videos.

    Internet Threats

    • (A word cloud listing many types of threats)
    • Examples include conflict, theft, secrecy, antivirus, phishing, breach, burglar, concept, etc.

    Malware (Malicious Software)

    • Definition: Software designed to cause harm to a computer system and includes various types.

    Types of Malware

    • Virus: A malicious program that replicates itself by copying itself to another program.
    • Trojan Horse: A malicious program disguised as a legitimate program to gain control over the computer.
    • Worm: A malicious program that copies itself and spreads to other computers. Spreads via malicious email attachments or USBs.
    • Spyware: A program that gathers information from a victim's computer and sends it back to a hacker.
    • Adware: Unwanted advertisements that pop up repeatedly, behaving abnormally and being difficult to close.

    Phishing

    • Definition: A fraudulent behavior using official-looking emails to impersonate a known source (e.g., a bank) to acquire passwords and credit card information.

    Pharming

    • Definition: More sophisticated phishing using the DNS system. It involves creating fake web pages (e.g., a bank login page) to steal user credentials.

    Rogue Security Software

    • Definition: A form of malicious software and internet fraud misleading users into believing their computer has a virus. It attempts to convince users to pay for fake malware removal tools that actually install malware.

    Keyloggers

    • Definition: Software that records user keyboard operations which can be used to steal bank details and passwords. Similar in nature to spyware.

    Ransomware

    • Definition: Malicious software that threatens to publish victim data or block access unless a ransom is paid. Part of cryptovirology.

    Spam

    • Definition: Junk email or unwanted emails sent by advertisers or bots. Often used to deliver malware.

    Cybercrime

    • Definition: A crime that uses a computer as an object or tool, spanning hacking, phishing, spamming, child pornography, libel, hate crimes, identity theft.

    Cybercrime Law

    • Definition: A law that addresses all forms of cybercrime.

    Netiquette

    • Definition: Etiquette applied online, signifying proper manner and behavior.

    Core Rules of Netiquette

    • Remember the human.
    • Adhere to the standards of behavior observed in real life.
    • Know where you are in cyberspace.
    • Respect other people's time and bandwidth.
    • Make a good online presence.
    • Share expert knowledge.
    • Help control flame wars.
    • Respect other people's privacy.
    • Do not abuse your power.
    • Be forgiving of others' mistakes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Assess your online habits and understand the importance of safety, security, ethics, and etiquette in the digital world. This quiz will help you identify potential online threats and the measures needed to protect your online reputation. Reflect on your behavior while using ICTs relevant to your professional track.

    More Like This

    Digital Citizenship Ethics
    5 questions

    Digital Citizenship Ethics

    UnforgettableWerewolf avatar
    UnforgettableWerewolf
    Educación Digital: Etiqueta y Seguridad en Línea
    17 questions
    Use Quizgecko on...
    Browser
    Browser