L2 STUDENT NOTES.pdf
Document Details
Uploaded by BestKnownGorgon
Tags
Full Transcript
As the world of ICT continues to grow, the industry has focused on several innovations. 1. DIGITAL CONVERGENCE 3. MOBILE TECHNOLOGIES 2. SOCIAL MEDIA 4. ASSISTIVE MEDIA Digital Convergence is the tendency for technologies that were ori...
As the world of ICT continues to grow, the industry has focused on several innovations. 1. DIGITAL CONVERGENCE 3. MOBILE TECHNOLOGIES 2. SOCIAL MEDIA 4. ASSISTIVE MEDIA Digital Convergence is the tendency for technologies that were originally unrelated to become more closely integrated and unified. Identification 10 0 9 8 7 6 5 4 3 2 1 It controls and manages the HARDWARE & OTHER SOFTWARE ON A COMPUTER. Clue: TWO WORDS An operating system is a system software that manages computer hardware and software resources and provides common services for computer programs. McOS Windows Linux This is used in Apple devices such as the iPhone and iPad. It is a commercial OS developed by Google. This is used in Blackberry devices. It is a closed source and proprietary OS developed by Microsoft. This is the original smartphone OS; used by Nokia devices This is originally used for smartphones; now used for smart TVs. This is a non- profit service designed to help who have a visual and reading impairments. Multiple Choice 10 0 9 8 7 6 5 4 3 2 1 Which country placed FIRST of spending the most time in using the internet each day on any device. Identification 10 0 9 8 7 6 5 4 3 2 1 This website is ranked as SECOND most-visited website in the world.. _________... EMPOWERMENT TECHNOLOGIES Identification 10 0 9 8 7 6 5 4 3 2 1 What does ‘NETIQUETTE’ stand for? Clue: 2 words It is the abbreviation of ‘Internet Etiquette’ or ‘Network Etiquette’. Netiquette is defined as the set of rules for acceptable behavior. Identification 10 0 9 8 7 6 5 4 3 2 1 Malware is the abbreviation form of the term Malicious S_______. What does this ‘S’ stand for? MALWARE This software is specifically designed to gain access to or damage a computer, usually without the knowledge of the owner. Your computer slows down. You notice a mysterious loss of disk space. Your antivirus product stops working. Your screen is inundated and setup changes. Identification 10 0 9 8 7 6 5 4 3 2 1 What is the MOST COMMON Malware that PEOPLE know? It is a malicious program attached to another program which can replicate and spread after an initial execution on a target system. It does not replicate itself, thus requires HUMAN ACTION to spread. Computer Viruses are harmful and can destroy your data, slow down system resources and log keystrokes. Multiple Choice 10 0 9 8 7 6 5 4 3 2 1 ? It is a malicious program that transfers from one computer to another computer by replicating itself and does NOT require human action to spread. Write Once, Read Many It often uses a COMPUTER NETWORK to spread itself. Computer worms monopolize the CPU and the memory. It makes Write Once, Read Many your computer to be sluggish and consume bandwidth. Multiple Choice 10 0 9 8 7 6 5 4 3 2 1. A screenshot of ILOVEYOU Computer Worm Onel De Guzman Identification 10 0 9 8 7 6 5 4 3 2 1 , ’ ? It is a malware that disguises as a useful program but once downloaded or installed, it leaves your PC unprotected and allows hackers to get your information. It does NOT replicate itself, thus requires HUMAN ACTION to spread. It is a malware that encrypt you files then demands a RANSOM from you to get your data back. Multiple Choice 10 0 9 8 7 6 5 4 3 2 1 Which of the choices best describes how criminals start ransomware attacks? 1 Getting into your 2 Sending a scam 3 Using infected server through email with links or websites that 4 All of the vulnerabilities and attachments that automatically above. installing malware. put your data & download malicious network at risk. software to your PC. ! It is a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging. It is used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. Multiple Choice 10 0 9 8 7 6 5 4 3 2 1 ? Browser default Hard disk Deletion of key Mouse or page being corruption or application keyboard changed. failure. software. faults. Browser Hijacking New ICONS appearing on your system tray Increased appearance of POP-UP ADS Unusual and random error messages. ! -. Identification 20 1 0 9 8 7 6 5 4 3 2 1 It is a form of Online Advertising in the Web. It is a small window, that suddenly appears in the foreground of the visual interface. - / - It is a malware designed to throw ADVERTISEMENTS your screen, mostly often within a web browser as pop – ups. !. ONLINE ONLINE AVOID visiting untrusted websites. Identification 20 1 0 9 8 7 6 5 4 3 2 1 ? _________ ONLINE Use “INCOGNITO MODE”. ONLINE Avoid clicking ADVERTISEMENTS from the internet. ONLINE Do not OPEN suspicious emails Identification 10 0 9 8 7 6 5 4 3 2 1. Anti-virus ONLINE Use LEGITIMATE Anti-virus. Multiple Choice 10 0 9 8 7 6 5 4 3 2 1 - ? ONLINE Create a STRONG Password. ONLINE DO NOT share your password to anyone. ONLINE Be MINDFUL of what you share online and what site you share it to. Identification 10 0 9 8 7 6 5 4 3 2 1 - _________. ONLINE Check out the PRIVACY POLICY page of a website to learn how the website handles the information you share. …..……..……..……..……..…….. EMPOWERMENT TECHNOLOGIES …..……..……..……..……..…….. MS. CHARLENE KEITH T. SARMIENTO Multiple Choice 10 0 9 8 7 6 5 4 3 2 1 Which one of the following could ADWARE be classified as? Multiple Choice 10 0 9 8 7 6 5 4 3 2 1 Which one of the following programs is designed to propagate across networks for the purpose of distributing security patches from known vulnerabilities? Identification 10 0 9 8 7 6 5 4 3 2 1 -. …..……..……..……..……..…….. EMPOWERMENT TECHNOLOGIES …..……..……..……..……..…….. MS. CHARLENE KEITH T. SARMIENTO