Emtech 1 Flashcards

(69 cards)

1
Q

You could be at risk on scam, bullying, and illegal activities if you will not take precautions in using internet.

A

Online safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A criminal practice where electronic communication is used to stalk or harass individual or group.

A

Cyber Stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The act of sending sexually explicit text messages, images, and videos.

A

Sexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

also known as Malicious Software.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • a malicious program that replicate itself by copying itself to another program.
A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
    • a malicious program that disguised as legitimate program that user will accept take control of your computer.
A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • a malicious program that replicate itself by copying itself to another program.
A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
    • malicious program that copy’s itself and spreads to other computers.
A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
    • A malicious program that gathers information from victim’s computer and send it back to the hacker.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
    • A malicious program that gathers information from victim’s computer and send it back to the hacker.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

. - A program that runs in the

background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • A collection of infected internet-connected devices such as PC and mobile phone that are controlled by common type of malware.
A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

. - A program that runs in the

background and steals user credentials and confidential information and send back to hack by recording every keystroke that a user makes on their computer or device.

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
    • A software tools used by hackers to gain control over a computer on a network without being

exposed.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • A ransom virus that block the user from accessing the programs or files and demands the ransom through online method for virus. to pay the removal of the
A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
    • A software tools used by hackers to gain control over a computer on a network without being

exposed.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • A ransom virus that block the user from accessing the programs or files and demands the ransom through online method for virus. to pay the removal of the
A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
A law that deals with all forms of cybercrime.
Cybercrime Law
23
A law that deals with all forms of cybercrime. The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175,
Cybercrime Law
24
law in the Philippines that was approved on September 12, 2012. ... Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.
No. 10175
25
A law that deals with all forms of cybercrime. The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175,
Cybercrime Law
26
through social media you are called ___. And in interacting with other netizen online, we need to maintain good behavior which is acceptable to others in online community.
netizen
27
It is a word that came from the two words "net" and "etiquette". It is an etiquette applied online that shows proper manner and behavior. If you are a member of an online society
Netiquette
28
The Core Rules of Netiquette by ___ 1. Remember the human. 2. Adhere to the same standards of behavior online that you follow in real life. 3. Know where you are in cyberspace. 4. Respect other people's time and bandwidth. 5. Make yourself look good online. 6. Share expert knowledge. 7. Help keep flame wars under control. 8. Respect other people's privacy. 9. Don't abuse your power. Be forgiving of other people's mistakes.
Seth T. Ross
29
is a research method in collecting and gathering information via internet by using search engine such as google.
Internet Research
29
is a program that allows users to search for content on internet.
Search Engine
30
Tips for Effective Internet Research by ___ 1. Know what kind of research you want to do. 2. Make a list of keywords you will use in your search. 3. Enclose keywords in quotation marks. Use the minus sign (-). Try specialized search engines. Skim through search results web pages. 7. Bookmark 8. Review your bookmarks.
George Mathews
31
is a staff writer for Web Writer Spotlight.com. He is passionate about personal growth and development.
George Mathews
32
Online Research Skills by ___ Check Your Sources Ask Good Questions Go Beyond the Surface Be Patient Respect Ownership Use Your Networks
Hannah Trierweiler Hudson
33
There are millions of information that we can get from the internet. Some of this information are free but others are not. They are protected by a "copyright law."
Copyright Issues
34
is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and computer programs. This original work is called intellectual property which is protected under Republic Act 8293 known as the "Intellectual Property Code of the Philippines".
Copyright
35
is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and computer programs. This original work is called intellectual property which is protected under Republic Act 8293 known as the "Intellectual Property Code of the Philippines".
Copyright
36
What does the Republic Act No 8293 or the Intellectual Property Code of the Philippines state?
It shall protect and secure the exclusive rights of scientists, inventors, artists and other gifted citizens to their intellectual property and creations, particularly when beneficial to the people, for such periods as provided in this Act. The use of intellectual property bears a social function
37
This happens when the copyrighted work is use by other person without permission of the author or copyright holder. Any person who is infringing the right protected work would be liable under the law.
Copyright Infringement
38
Research is important to the students and other people. Most of them rely on the information that they can get online. Although this information is protected by a copyright law but we can still use this information without permission in a limited way under certain condition and purpose.
Fair Use
39
is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Fair use
40
The _____of design are the building blocks of a successful beautiful design.
elements and principles
41
is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Fair use
42
The ___ of design are the things or tools that make up a design while the ___ of design are what we do to those elements.
elements/Principles
43
“There are three responses to a piece of design yes, no, and WOW! Wow is the one to aim for."
Milton Glaser
44
These are the materials or tools to make different designs or Arts
The Elements of Design
45
“There are three responses to a piece of design yes, no, and WOW! Wow is the one to aim for."
Milton Glaser
46
are defined by points moving in space. It can create a sense of movement or direction in your design. ___ is can be smooth, rough, straight, curve, broken, thick or thin
LINE
47
These are the materials or tools to make different designs or Arts
The Elements of Design
48
A ___ is an enclosed space, the boundaries of which are defined by other elements of art like lines, colors, values or textures. Shapes can be used to create patterns and draw the viewer's attention.
SHAPE
49
- Applying motion to create the visual illusion of movement. Use horizontal direction for calmness, stability and tranquility while vertical direction for emotions of balance, formality and alertness
DIRECTION
50
is basically the relationship of the area occupied by one shape to that of another. Large element means more significant than the small one.
SIZE (SCALE) Size
51
refers to surface appearance of an object given by the dimensions, form, thickness, arrangement, and amount of its basic parts.
TEXTURE Texture
52
is light redirected off objects. It is used to create curiosity and emotions to the viewers. It has three main characteristics: hue (these are red, green, blue, etc.), value (lightness/ darkness), and intensity (saturation, or amount of pigment) and temperature (warm and cool)
COLOR Color
53
- in design is the state of equal relationship. It means equal distribution of visual weight in a design. It can be achieved by adjusting the visual weight of each element, in terms of size, color, textures, shapes or contrast. Balance in graphic design provides stability and structure to a design.
BALANCE
54
occurs when identical weights are on equal sides of a composition.
Symmetrical balance
55
56
occurs when a design have unequal graphic weight on either side, but those unequal graphics need to balance each other (un-evenly balanced)
Asymmetrical balance
57
occurs when the design elements swirl out from a central axis (emanating from a central point)
Radial balance
58
maintains a relationship between items that go together. It helps creates organization by grouping the same elements together or in close proximity. The elements should be connected visually.
PROXIMITY Proximity
59
refers to lining up the elements of a design along the top, bottom, center or sides of the elements. It allows us to create order and organization in our design. The whole point of the alignment is that nothing in your design should look as if it were placed there randomly.
ALIGNMENT Alignment
60
maintains a relationship between items that go together. It helps creates organization by grouping the same elements together or in close proximity. The elements should be connected visually.
PROXIMITY Proximity
61
refers to lining up the elements of a design along the top, bottom, center or sides of the elements. It allows us to create order and organization in our design. The whole point of the alignment is that nothing in your design should look as if it were placed there randomly.
ALIGNMENT Alignment
62
____duplicates the characteristics of similar elements to contribute to design consistency. It strengthens a design by tying together individual elements;
Repetition
63
is a regular arrangement of alternated or repeated elements like shapes, lines or colors;
pattern
64
--is a combination of elements repeated, but with variations.
rhythm
65
1. refers to the use of conflicting elements or colors while still remaining harmonious and unified when the artwork is viewed as a whole. It allows you to give emphasis to key elements in your design.
CONTRAST - Contrast