Online Safety and Netiquette Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does netiquette refer to?

  • Techniques for improving internet speed
  • The characteristics of online communities
  • The rules of conduct for respectful communication online (correct)
  • The nature of online business transactions

What is the primary function of a keylogger?

  • To prevent malware from entering the system
  • To provide system updates automatically
  • To record user keystrokes for stealing sensitive information (correct)
  • To improve computer performance

How does the ILOVEYOU Worm spread?

  • By disguising itself as a helpful app
  • Through email attachments to unsuspecting users (correct)
  • Through direct user downloads only
  • By replicating itself across multiple computers

What distinguishes malicious software from regular software?

<p>Its intent to harm or exploit users (B)</p> Signup and view all the answers

Which of the following is not an example of malicious software?

<p>Adobe Acrobat (D)</p> Signup and view all the answers

What threat does ransomware pose?

<p>It threatens to publish or block access to data unless a ransom is paid (A)</p> Signup and view all the answers

What type of malicious software is Fireball classified as?

<p>Adware (A)</p> Signup and view all the answers

What is a significant risk associated with internet threats?

<p>Loss of data and financial resources (B)</p> Signup and view all the answers

What is one of the main goals of ransomware like Slocker?

<p>To lock the phone’s screen and demand payment. (A)</p> Signup and view all the answers

What should you do before posting something online?

<p>Ask yourself if you'd want your family to see it. (A)</p> Signup and view all the answers

Which of the following is NOT a recommended practice for staying safe online?

<p>Ignoring privacy settings on social media. (B)</p> Signup and view all the answers

How can you protect yourself from digital risks?

<p>By avoiding suspicious links. (A)</p> Signup and view all the answers

What is a common misconception about using public Wi-Fi?

<p>Incognito mode offers complete protection from hackers. (C)</p> Signup and view all the answers

What should you do about potential malware emails?

<p>Mark them as spam and avoid interaction. (B)</p> Signup and view all the answers

What action can you take to decrease the likelihood of being hacked?

<p>Use one anti-virus software and keep it updated. (A)</p> Signup and view all the answers

What is a guideline for using social networking sites safely?

<p>Only add friends you know in real life. (D)</p> Signup and view all the answers

Flashcards

Netiquette

Rules for respectful communication on the internet.

Internet Threats

Dangers that compromise online safety and privacy.

Malicious Software

Programs that damage or disrupt computer operations.

ILOVEYOU Worm

A worm that replicates and spreads via email.

Signup and view all the flashcards

Trojan (Triada)

Malicious program masquerading as useful software.

Signup and view all the flashcards

Keylogger

Software that records keystrokes to steal information.

Signup and view all the flashcards

Fireball

Malware that creates excessive pop-up ads.

Signup and view all the flashcards

Ransomware

Software that demands payment to access blocked data.

Signup and view all the flashcards

Slocker

A ransomware that locks the phone’s screen and demands payment to regain access.

Signup and view all the flashcards

Phishing

A scam that uses fake emails to acquire sensitive personal information.

Signup and view all the flashcards

Copyright Infringement

Using protected works without permission, violating copyright laws.

Signup and view all the flashcards

Digital Self-Protection

Practices to protect oneself from cyberbullying, phishing, and online risks.

Signup and view all the flashcards

Private Profiles

Setting your social media profile to private to enhance security.

Signup and view all the flashcards

Avoiding Public Wi-Fi

Not using open networks to safeguard against hackers.

Signup and view all the flashcards

Reading Terms and Conditions

Carefully reviewing agreements before accepting them online.

Signup and view all the flashcards

Antivirus Software

Programs that protect computers from malware and other threats.

Signup and view all the flashcards

Study Notes

Online Safety, Security, Ethics, and Etiquette

  • The internet is a powerful tool for business, friendship, and entertainment.
  • However, it also presents dangers if users aren't careful.
  • Online safety involves protecting yourself from risks like cyberbullying, phishing, scams, and harmful content.
  • It includes using strong passwords, avoiding suspicious links, and being mindful of shared personal information.

Netiquette

  • Netiquette is a set of rules for respectful and appropriate online communication.
  • It's like online etiquette.

Internet Threats

  • Internet threats encompass various dangers and risks that compromise online safety, security, and privacy.
  • These threats can target individuals, businesses, or systems, resulting in data breaches, financial loss, or identity theft.
  • Examples include malware, viruses, worms, Trojans, spyware, adware, ransomware, spam, and phishing.

Malware

  • Malware is any program or file designed to harm a computer user.
  • Specific types include viruses, worms, Trojans, spyware, adware, and ransomware.

Types of Malware

  • Virus: A malware that replicates itself and transfers from one computer to another. Examples include Agent Smith.
  • Worm: A malware that transfers from one computer to another. Examples include the ILOVEYOU worm.
  • Trojan: A malware that disguises as a useful program, downloads, or installs leaving the PC unprotected and allowing hackers to access your information. Example: Triada on Android devices.
  • Spyware: A program that runs in the background without user knowledge, monitoring user activities and typing, often through keylogging. Keylogger is a type of spyware.
  • Adware: A program that displays advertisements, often as pop-ups, can slow down devices and track user activity. Example: Fireball.
  • Ransomware: Malicious software that can encrypt or block access to a victim's data unless a ransom is paid. Example: Slocker.
  • Spam: Unwanted emails mostly from bots or advertisers, sometimes used to distribute malware.
  • Phishing: Attempts to acquire sensitive personal information like passwords and credit card details by sending fake emails or websites.
  • This is the use of copyrighted works without permission.
  • It involves protecting works and obtaining permission before using copyrighted material.
  • Tips to avoid copyright infringement include assuming all works are copyrighted, avoiding copying or altering without permission, reviewing and retaining licensing agreements, considering buying content, and crediting original authors.

Protecting Online Reputations

  • Before posting online, consider if parents, grandparents, or future employers might see it.
  • If a post is harmful, it can be reported as inappropriate, or asked to be removed.

Online Safety Tips

  • Be mindful of what you share, avoiding giving personal information, and being careful about the sites you share information on.
  • Understanding security features of used online sites can be helpful in protecting privacy.
  • Avoid sharing passwords or logging into risky Wi-Fi. Never talk to strangers online or in person. Avoid discussing future trips or plans. Add friends in real life, rather than only online. Be wary of untrusted websites.
  • It is important to have a single antivirus software on a computer to help avoid conflicts.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser