General Education Elective 1 Reviewer
Lesson 1: Information and Communication Three principal characteristics of computer:
Technology • It responds to a specific set of
instructions in a well-defined manner.
Information and Communications Technology
• It can execute a pre-recorded list of
(ICT) - is the infrastructure and components that
instructions.
enable modern computing.
• It can quickly store and retrieve large
amounts of data.
Uses of ICT In Our Daily Lives
• Communication
Applications of ICT (Computers) in Our Daily
• Job Opportunities
Lives:
• Education
• Business
• Socializing
• Education
Impact of ICT in The Society
• Healthcare
Positive:
• Retail and Trade
• Access to information
• Government
• Improved access to education
• Marketing
• New tools, new opportunities
• Science
• Communication
• Publishing
• Information management
• Arts and Entertainment
• Security
• Communication
• Creation of new more interesting jobs
• Banking and Finance
Negative:
• Transport
• Job loss
• Navigation
• Reduced personal interaction
• Working From Home
• Reduced physical activity
• Military
• Cost
• Social and Romance
• Competition
• Booking Vacations
• Security and Surveillance
MODULE 2: HISTORY OF COMPUTER: BASIC
COMPUTING PERIODS • Weather Forecasting
Computer • Robotics
• Computer is a programmable machine.
History of Computer: Basic Computing Periods
• Computer is an electronic device that
manipulates information, or data. It can
1613 - The first use of the word "computer" was
store, retrieve, and process data.
recorded, and the word continued to be used in
• Computer is a machine that manipulates
that sense until the middle of the 20th century.
data according to a list of instructions
a) Tally sticks - was an ancient memory aid
(program).
device to record and document numbers,
• Computer is any device which aids
quantities, or even messages.
humans in performing various kinds of
b) Abacus - is a mechanical device used to aid
computations or calculations.
an individual in performing mathematical
calculations.
General Education Elective 1 Reviewer
c) Napier’s Bones - Invented by “John Napier m) Harvard Mark 1 - Also known as “IBM
in 1614”. Allowed the operator to multiply, Automatic Sequence Controlled
divide and calculate square and cube roots Calculator (ASCC)”. Invented by “Howard
by moving the rods around and placing H. Aiken in 1943”. The first electro-
them in specially constructed boards. mechanical computer.
d) Slide Rule - Invented by “William Oughtred n) Z1 - The first programmable computer.
in 1622”. Is based on Napier's ideas about Created by “Konrad Zuse in Germany from
logarithms. Used primarily for 1936 to 1938”. To program the Z1 required
multiplication, division, roots, logarithms, that the user insert punch tape into a punch
Trigonometry. Not normally used for tape reader and all output was also
addition or subtraction. generated through punch tape.
e) Pascaline - Invented by “Blaise Pascal in o) Atanasoff-Berry Computer (ABC) - It was
1642”. It was its limitation to addition and the first electronic digital computing device.
subtraction. It is too expensive. Invented by “Professor John Atanasoff”
f) Stepped Reckoner - Invented by “Gottfried and graduate student “Clifford Berry” at
Wilhelm Leibniz in 1672”. The machine Iowa State University between 1939 and
that can add, subtract, multiply and divide 1942.
automatically. p) ENIAC - stands for Electronic Numerical
g) Jacquard Loom - The Jacquard loom is a Integrator and Computer. It was the first
mechanical loom, invented by “Joseph- electronic general-purpose computer.
Marie Jacquard in 1881”. It is an automatic Completed in 1946. Developed by “John
loom controlled by punched cards. Presper Eckert and John Mauchly”.
h) Arithmometer - A mechanical calculator q) UNIVAC 1 - (Universal Automatic
invented by “Thomas de Colmar in 1820”. Computer 1) was the first commercial
The first reliable, useful and commercially computer. Designed by “John Presper
successful calculating machine. The Eckert and John Mauchly”.
machine could perform the four basic r) EDVAC - stands for Electronic Discrete
mathematic functions. The first mass- Variable Automatic Computer. The First
produced calculating machine. Stored Program Computer. Designed by
i) Difference Engine and Analytical Engine - “Von Neumann in 1952”. It has a memory
It an automatic, mechanical calculator to hold both a stored program as well as
designed to tabulate polynomial functions. data.
Invented by “Charles Babbage in 1822 and s) Osborne 1 – the first portable computer.
1834”. It is the first mechanical computer. Released in 1981 by the Osborne Computer
j) First Computer Programmer - In 1840, Corporation.
Augusta Ada Byron suggests to Babbage t) Electronic Controls Company - The first
that he use the binary system. She writes computer company. Founded in 1949 by
programs for the Analytical Engine. “John Presper Eckert and John Mauchly”.
k) Scheutzian Calculation Engine - Invented
by “Per Georg Scheutz in 1843”. Based on Basic Computing Periods – Ages
Charles Babbage's difference engine. a. Pre-mechanical - is the earliest age of
l) Tabulating Machine - Invented by “Herman information technology. It can be defined as
Hollerith in 1890”. To assist in summarizing the time between 3000B.C. and 1450A.D.
information and accounting. When humans first started communicating,
they would try to use language or simple
picture drawings known as petroglyths
which were usually carved in rock. Early
General Education Elective 1 Reviewer
alphabets were developed such as the they could only solve one problem at a
Phoenician alphabet. time.
b. Mechanical - is when we first start to see 2. The Second Generation
connections between our current - Transistors replaced vacuum tubes and
technology and its ancestors. The ushered in the second generation of
mechanical age can be defined as the time computers.
between 1450 and 1840. - Second-generation computers moved
c. Electromechanical - can be defined as the from cryptic binary machine language to
time between 1840 and 1940. These are the symbolic, or assembly, languages,
beginnings of telecommunication. The which allowed programmers to specify
telegraph was created in the early 1800s. instructions in words.
Morse code was created by Samuel 3. The Third Generation
Morse in 1835. The telephone (one of the - The development of the integrated
most popular forms of communication circuit was the hallmark of the third
ever) was created by Alexander Graham generation of computers.
Bell in 1876. The first radio developed by Transistors were miniaturized and
Guglielmo Marconi in 1894. The first placed on silicon chips, called
large-scale automatic digital computer in semiconductors, which drastically
the United States was the Mark 1 created increased the speed and efficiency
by Harvard University around 1940. of computers. It could carry out
d. Electronic - age is what we currently live in. instructions in billionths of a
It can be defined as the time between 1940 second. Much smaller and cheaper
and right now. The ENIAC was the first high- compared to the second-generation
speed, digital computer capable of being computers.
reprogrammed to solve a full range of 4. The Fourth Generation
computing problems. This computer was - The microprocessor brought the
designed to be used by the U.S. Army for fourth generation of computers, as
artillery firing tables. thousands of integrated circuits
were built onto a single silicon chip.
History of Computer: Generations of Computer As these small computers became
There are five generations of computer: more powerful, they could be linked
• First generation – 1946 to 1958 together to form networks, which
• Second generation – 1959 to 1964 eventually led to the development of
• Third generation – 1965 to 1970 the Internet.
• Fourth generation – 1971 to Today 5. The Fifth Generation
• Fifth generation – Today to future - Based on Artificial Intelligence
(AI). Still in development. The use of
1. The First Generation parallel processing and
- The first computers used vacuum tubes superconductors is helping to make
for circuitry and magnetic drums for artificial intelligence a reality.
memory, and were often enormous,
taking up entire rooms.
- First generation computers relied on
machine language, the lowest-level
programming language understood by
computers, to perform operations, and
General Education Elective 1 Reviewer
MODULE 3: THE WEB AND THE INTERNET Example of Web 2.0
Internet - is defined as an information 1. Social Networking - Example Facebook,
superhighway, to access information over the web. Twitter, LinkedIn, Google+, Pinterest,
Internet is a world-wide global system of Tumblr, Instagram, and Page.
interconnected computer networks. 2. Blogs – Wordpress, Blogger, and Tumbler
3. Wikis – Wikipedia, Wikibooks, Wikiversity,
Web (World Wide Web) - consists of information Commons, Wiktionary, Wikiquote,
organized into Web pages containing text and Wikivoyage, Wikidata, Wikinews,
graphic images. The world wide web is larger Wikispecies, and MediaWiki.
collection of interconnected documents or 4. Video Sharing Sites - a website that lets
content. It contains hypertext links, or highlighted people upload and share their video clips
keywords and images that lead to related with the public at large or to invited guests.
information. Youtube, Facebook, LinkedIn, Flickr,
Photobucket, Photobucket, Twitte,r Veoh,
Web site - A collection of linked Web pages that
Dailymotion, VimeoPRO, Myspace.com,
has a common theme or focus.
and Metacafe.
Site’s home page - The main page that all of the
pages on a particular Web site are organized around C. Web 3.0: (Read-write intelligent web)
and link back to. - Suggested name by John Markoff of
the New York Times for the third
Timothy John Berners-Lee OM KBE FRS FREng generation of the web.
FRSA FBCS, also known as TimBL - is an English
engineer and computer scientist best known as the Types of websites:
inventor of the World Wide Web.
• eCommerce Website - is a website people
A. Web 1.0 (Read Only Static Web) can directly buy products
• Business Website - is any website that’s
Example of Web 1.0 devoted to representing a specific business.
• Entertainment Website
• Mp3.com • Portfolio Website - are sites devoted to
• Home Page showing examples of past work.
• Directories • Media Website - collect news stories or
• Page Views other reporting.
• HTML/Portals. • Brochure Website - are a simplified form of
business websites
Disadvantages
• Nonprofit Website - is the easiest way for
many potential donors to make donations
• Read only web
and will be the first place many people look
• Limited user interaction
to learn more about a nonprofit and
• Lack of standards
determine if they want to support it.
• Educational Website -
B. Web 2.0 (Read-write interactive web)
• Infopreneur Website - create and sell
- A term used to describe a new
information products. That could be in the
generation of Web services and
form of courses, tutorials, videos or eBooks.
applications with an increasing
emphasis on human collaboration. • Personal Website
General Education Elective 1 Reviewer
• Web Portal - are often websites designed 2. IP Address (Internet Protocol) – is a
for internal purposes at a business, numerical label assigned to each device.
organization, or institution. They collect This provides identity to a network device.
information in different formats from 3. Browser – is an application program that
different sources into one place to make all provides a way to look information on
relevant information accessible to the - Example of browsers: Google
people who need to see it. chrome, safari, internet explorer,
• Wiki or Community Forum Website opera, Mozilla
4. Domain Name System (DNS) – is the
Lesson 2: The Internet phonebook of internet. We access
information online through domain names.
Internet or “net” (network of network) - is the
Name Entity
largest computer network in the world that
commercial
connects billions of computer user. The word .com
internet comes from combination between organization
“interconnection” and “network”. .org
education
Major Components of the Internet .edu
National and State
1. Servers – is a computer program that .gov Government Agencies
provides service to another computer Philippines
program and its user. .ph
Australia
Types of Servers .au
network
• Application Server – a program in .net
computer that provides the business
logic for an application program. 5. Internet Service Provide (ISP) – is an
• Web Server – a computer program that organization that provides services for
serves requested HTML pages or files. accessing, using or participating in the
• Proxy Server – is a software that acts internet.
as an intermediary between an
Two types of ISP:
endpoint device, such as computer and
another server from which a user is
National ISP – provided internet access to a
requesting.
specific geographic area.
• Mail Server – is an application that Regional ISP – business that provides
receives incoming e-mail from local internet access in cities and towns
users and remote senders and forward nationwide. Example of ISP: Sky Broadband,
outgoing e-mail for delivery PLDT, Converge
• File Server – is a computer responsible
for central storage and management of Uses of Internet
data files so that other computer on the
same network can access them. • Look for information
• Policy Server – is a security component • School works, jobs, and home purposes
of a policy – based network that • Send and receive electronic mail
provides authorization services and • Video teleconferencing (video call, video
facilities tracking and control of files. chat)
• Buy and sell product
General Education Elective 1 Reviewer
• Social networking prefix, the links, text, and pictures should
• Watch & post videos work correctly in a web browser. •
• Games o HTTPS - is the acronym for Hypertext
• Take college courses Transfer Protocol Secure. This indicates that
• Monitor home while away the web page has a special layer of
• Financial transactions encryption added to hide your personal
• Download music and movies information and passwords from others. •
o Router or router-modem combination is
Internet Terms and Definition the hardware device that acts as the traffic
o Internet - A global network of thousands of cop for network signals arriving at your
computer networks linked by data lines and home or business from your ISP. A router
wireless systems. can be wired or wireless or both. •
o Web – a collection of billions of webpages o Encryption - is the mathematical
that you can view with a web browser scrambling of data so that it is hidden from
o Email – the most common method of eavesdroppers. Encryption uses complex
sending and receiving messages online math formulas to turn private data into
o Social media – websites and apps that meaningless gobbledygook that only
allow people to share comments, photos, trusted readers can unscramble. •
and videos • o Web Bot - A term that applies to
o Online gaming – games that allow people programs/applets (macros and intelligent
to play with and against each other over the agents) used on the Internet. Such bots
Internet • perform a repetitive function, such as
o Software updates – operating system and posting messages to multiple newsgroups
application updates typically downloaded or doing searches for information. •
from the Internet can • o Search Engine - specialized software, such
o HTML - Hypertext Markup Language is a as Google and Yahoo, that lets www
coding language used to tell a browser how browser users search for information on the
to place pictures, text, multimedia and links web by using keywords, phrases.
to create a web page. When a user clicks on
a link within a web page, that link, which is MODULE 4: THE NETIQUETTE AND THE
coded with HTML, links the user to a COMPUTER ETHICS
specific linked web page. • Netiquette - Netiquette or Network Etiquette is the
o URL - Uniform Resource Locator is a web set of rules and guidelines for appropriate behavior
address used to connect to a remote and online communication.
resource on the world wide web. •
o Bit - is a single digit in the binary numbering o Avoid slang, acronyms, and text talk
system (base 2). For example: 1 is a bit or 0 o Avoid “screaming” in typed messages –
is a bit. • Typing an entire message using all capital
o Byte - generally consists of eight bits. • letters is known as “screaming”.
o Upload - To upload is to transfer data from o Proofread your messages before sending
your computer to another computer. • them
o Download - To download is to transfer data o Exercise good judgment when sharing
from another computer to your computer. • information with others online
o HTTP - is the acronym for Hypertext Transfer o Respect diversity in viewpoints - Be
Protocol, the data communication standard constructive and respectful when sharing
of web pages. When a web page has this opinions, beliefs, and criticisms, or
responding to those of others in the
conversation.
General Education Elective 1 Reviewer
Lesson 2: Cybercrimes CRIMINAL ACTIVITIES
Cyber - refers to anything related to computers, • Hacking - Infection of IT Systems with
information technology, and virtual reality. Malware – if the act is committed
against critical infrastructure of the
Cybercrime - a crime in which a computer is the Philippines the penalty is between 12-
object of the crime (hacking, phishing, spamming 20 years reclusion temporal. Six years
and child pornography) is used as a tool to commit up to twelve years of imprisonment also
an offense. known as prison mayor.
• Computer-related forgery, fraud
Cybercriminals - may use computer technology to
and/or identity theft - Maximum of
access personal information, business trade
Php 200,000 fine or prison mayor
secrets or use the internet for exploitative or
• Electronic theft - Obtaining files that
malicious purposes.
you do not have the right to use from the
Republic Act No. 10175 - Cybercrime Prevention internet. Penalty of Php 50,000 – 500,
Act of 2012 - is a law in the Philippines approved on 000 and or prison mayor.
September 12,2012 which aims to address legal • Cyberbullying - The Anti-Bullying Act of
issues concerning online interactions and internet. 2013 (RA 10627).
It defines different types of cybercrimes, such as • Cybersex - Penalty at least Php 200,000
Cybersex, Child Pornography, Unsolicited and or prison mayor
commercial communications, and libel. • Child Pornography - Unlawful or
prohibited acts defined and punishable
Republic Act No. 10173 “Data Privacy Act of by Republic Act No. 9775 or the Anti
2012” - is an act protecting individual personal Child Pornography Act of 2009,
information. committed through a computer system.
Penalty of 12-20 years of imprisonment
National Privacy Commission - They are
or reclusion temporal.
responsible for monitoring and ensuring
• Cyber Defamation - Is an unprivileged
compliance with data privacy laws, guidance on
false statement of fact which tends to
data protection, and investigations related to data
harm the reputation of a person or
privacy breaches.
company. Penalty of 6-12 years of
COMMON FORMS OF CYBERCRIMES: imprisonment or prison mayor.
1. Copyright
2. Plagiarism
3. Computer Addiction
- Offline
- Online: Also known as “Internet
Addiction”
- Virtual Self - The persona you
create about yourself virtually.
4. Trademark
5. Trademark Infringement - Copying
distinctive signs or symbols that identify a
company’s products or services, such as
logos, brand names, and slogan.
General Education Elective 1 Reviewer
Lesson 3: Internet Threats WannaCry was a ransomware attack that spread to
over 150 countries in 2017. It was designed to
Hacking - is a term used to describe actions taken exploit a security vulnerability in Windows
by someone to gain unauthorized access to a
computer. The process by which cyber criminals Crypto Locker: Crypto Locker is an example of
gain access to your computer. ransomware that was first seen in 2013. This
ransomware is typically spread through phishing
Malware - is one of the more common ways to emails.
infiltrate or damage your computer. Malicious
software that infects your computer, such as Ryuk is a type of ransomware that typically targets
computer viruses, worms, Trojan horses, spyware, very large organizations
and adware. Reformat the hard drive of your
computer causing you to lose all your information. Spam - is one of the more common methods of
both sending information out and collecting it from
Pharming - is a common type of online fraud. A unsuspecting people.
means to point you to a malicious and illegitimate
website by redirecting the legitimate URL. Even if Spyware (Spyware & Adware)
the URL is entered correctly, it can still be
- Spyware and adware are often used by third
redirected to a fake website.
parties to infiltrate your computer. Software
Phishing - is used most often by cyber criminals that collects personal information about
because it's easy to execute and can produce the you without you knowing. They often come
results they're looking for with very little effort. in the form of a ‘free' download and are
They're sent by criminals to steal personal and installed automatically with or without your
financial information from you. This is also known consent. These are difficult to remove and
as “spoofing”. can infect your computer
Ransomware - is a type of malware that restricts Trojan Horses - A malicious program that is
access to your computer or your files and displays disguised as, or embedded within, legitimate
a message that demands payment for the software. It is an executable file that will install
restriction to be removed. The two most common itself and run automatically once it's downloaded.
means of infection appear to be phishing emails
Viruses - Malicious computer programs that are
that contain malicious attachments and website
often sent as an email attachment or a download
pop-up advertisements.
with the intent of infecting your computer, as well
There are two common types of ransomwares: as the computers of everyone in your contact list.
Just visiting a site can start an automatic download
• Lockscreen ransomware: displays an of a virus.
image that prevents you from accessing
your computer Wi-Fi Eavesdropping - WiFi eavesdropping is
• Encryption ransomware: encrypts files on another method used by cyber criminals to capture
your system's hard drive and sometimes on personal information. Virtual “listening in” on
shared network drives, USB drives, external information that's shared over an unsecure (not
hard drives, and even some cloud storage encrypted) WiFi network.
drives, preventing you from opening them
Worms - A worm, unlike a virus, goes to work on its
Types of Ransomware: own without attaching itself to files or programs. It
lives in your computer memory, doesn't damage or
alter the hard drive and propagates by sending itself
to other computers in a network – whether within.
General Education Elective 1 Reviewer
ICT Input Devices
ICT - was defined in the study conducted by Zuppo • Keyboard
(2012) as “related to technologies that facilitate • Mouse
the transfer of information and various types of • Trackball
electronically mediated communication.” • Touchpad
• Microphone
“Belongingness hypothesis” states that people
• Scanner
have a basic psychological need to feel closely
connected to others, and that caring, affectionate Output Devices
bonds from close relationships are a major part of
human behavior. • Printer
• Monitor
ICT or information and communications technology
• Speaker
is often used in a more general sense and is
described as using computers and other digital System Unit - is the enclosure composed of main
technologies to assist individuals or institutions in elements of a computer that are used to administer
handling or using information. data, this can be referred to as a computer case or
tower.
IT or information technology, pertains to the
industry that involves computers, software, Storage Devices
networking, and other IT infrastructure to help relay
or manage information important in modern-day Types of storage device:
living as seen primarily in large companies or
corporations. Flash disk drive - is a small portable storage device
often referred to as pen drives, thumb drives, or
Computer is an electronic device, operating under jump drives.
the control of instructions stored in its own memory
that can accept data, manipulate the data Hard disk drive - is a non-volatile memory which
according to specified rules, produce results, and permanently stores and retrieves data.
store the results for future use.
Compact disc - is a flat, round and portable metal
Components of Computer / Computer disc. Ex: CD-ROM, DVD- ROM.
Peripherals
General Classifications of Computers:
Computer - can store, retrieve, and process data.
• Personal computer
It contains both hardware components and
• Workstation
software applications.
• Minicomputer
Hardware - pertains to the computer’s physical • Mainframe
devices. It is any part of the computer that can be • Supercomputer
seen and touched.
Different Types of Computers
• Desktop computers
• Laptop computers
• Tablet computers
• Smartphones
• Wearables
• Smart TVs
General Education Elective 1 Reviewer
Media in the Digital Age
Media refers to the means of communication that
uses unique tools to interconnect among people.
Media is considered to be the message itself for
those who create and own the rights of content.
Media tools used especially by millennials to
generate content
• Blog - Keeping a diary or a journal is a
traditional method of recording one’s
thoughts or expressing one’s emotions
through writing.
• The Medium - refers to the tool or tools
used in sending a message from the source
to the destination. Ex: Twitter
• Messenger - is the one who delivers the
message.
Trends - refer to something hip or popular at a
certain point in time.
Smartphone - was coined as the cellular or mobile
phone has now become smarter- it can run apps
which help people perform their day-to-day
activities.
General Education Elective 1 Reviewer
MODULE 2: MODULE 3
1. What was the name of first computer 1. What are the four examples of Web 2.0
designed by Charles Babbage? - Social Networking, Blogs, Wikis, Video
- Analytical Engine sharing Sites
2. Which was the first electronics digital 2. Who is the inventor/father of the internet
programmable computing device? and www?
- ENIAC - Timothy John Berners-Lee
3. EDVAC stands for 3. Give at least 6 uses of the internet.
- Electronic Discrete Variable Automatic -
Computer 4. Define web, web 1.0, 2.0 and 3.0
4. Which was the first commercial 5. What are the different types of servers?
computer? - Application, Web, Proxy, Mail, File, Policy
- UNIVAC Server
5. UNIVAC stands for 6. Give 5 types of website and its features.
- Universal Automatic Computer - eCommerce, Business, Entertainment,
6. ENIAC stands for Portfolio, Media Website
- Electronic Numerical Integrator And 7. What are the top-level domains?
Computer - .com , .edu , .gov ,
7. John Mauchly and J. Presper Eckert are 8. What are the two types of ISP?
the inventors of? - National and Regional ISP
- ENIAC 9. DNS stands for? And give some
8. Who invented the punch card? examples.
- Herman Hollerith - Domain Name System
9. In the late __________, Herman Hollerith - www.facebook.com , www.pup.edu.ph
invented data storage on punched cards 10. Give examples of browsers.
that could then be read by a machine. - Google Chrome, Safari, Internet explorer,
- 1880 Opera, Mozilla
10. Which electronic components are used in
First Generation Computers?
- Vacuum Tubes
11. Which electronic components are used in
Second Generation Computers?
- Transistors
12. Which electronic components are used in
Third Generation Computers?
- Integrated Circuits
13. Which electronic components are used in
Fourth Generation Computers?
- Microprocessor
14. Which electronic components are used in
Fifth Generation Computers?
- Artificial Intelligence (AI)
15. ENIAC Computer belongs to __________.
- First Generation Computers
General Education Elective 1 Reviewer
13. _______ are common threat to computer
and the internet as a whole.
MODULE 4 - Worms
14. Action taken by someone to gain
1. Malware is a short term used for
unauthorized access to a computer.
- Malicious software
- Hacking
2. It displays an image that prevents you
15. It encrypts files on your system’s hard
from accessing your computer.
drive and sometimes on shared network,
- Lockscreen Ransomware
drives, USB drives, and external hard
3. _______ is a common type of online fraud.
drives and even some cloud storage
- Pharming
drives preventing you from opening them.
4. Netiquette is a short term used for
- Encryption Ransomware
- Network Etiquette
16. They often come in the form of a free
5. The mass distribution of unsolicited
download and are installed automatically
messages, advertising or pornography to
with or without your consent.
addresses which can be easily found on
- Spyware
the internet.
17. A malicious program that is disguised as
- Spam
or embedded within legitimate software.
6. ______ and ______ are often used by third
- Trojan Horses
parties to infiltrate your computer.
18. Virtual listening in on your information
- Spyware and Adware
that’s shared over an unsecured or not
7. It is an executable file that will install
encrypted network.
itself and run automatically once it’s
- Wi-Fi Eavesdropping
downloaded.
19. It is the proper way to communicate in an
- Trojan Horses
online environment.
8. Malicious computer programs that are
- Netiquette
often sent as an email attachment or a
20. Software that collects personal
download with the intent of infecting your
information about you without you
computer.
knowing.
- Viruses
- Spyware
9. It is one of the more common methods of
both sending information out and
collecting it from unsuspecting people.
- Spam
10. It is a set of rules for behaving properly
online.
- Netiquette
11. A type of malware that restricts access to
your computer or your files and displays a
message that demands payment for the
restriction to be removed.
- Ransomware
12. A means to point you to a malicious and
illegitimate website by redirecting the
legitimate URL.
- Pharming