0% found this document useful (0 votes)
4 views3 pages

Em Tech

The document provides a glossary of terms related to internet technology, communication, and cybersecurity threats. It includes definitions of concepts like Web 2.0, phishing, and various types of malware, as well as true/false statements regarding internet safety practices. The content emphasizes the importance of understanding these terms to navigate the digital landscape securely.

Uploaded by

rodrigojrmarino6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

Em Tech

The document provides a glossary of terms related to internet technology, communication, and cybersecurity threats. It includes definitions of concepts like Web 2.0, phishing, and various types of malware, as well as true/false statements regarding internet safety practices. The content emphasizes the importance of understanding these terms to navigate the digital landscape securely.

Uploaded by

rodrigojrmarino6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Em Tech revealing sensitive information or

downloading malware
1. Web 2.0 - Refers to the generatio
15. Smishing Internet thret that send
of internet, which is dynamic and
fragalent messages via messaging
focuses on user participation
apps that conent links that direct
2. Communication-Refers to the
reciepient to malicious websites,
means of transmitting messages or
logging pages or apps to amnipulat
sending and receiving information
victims into performing specific
3. iOS- Operating system that is used
actions
in apple devices
16. Whaling- Sophisticated cyber
4. Web 1.0- Refers to the first
threats targeting organizations high
generation of the internet
profile top CEO
5. ICT Deals with the use of different
17. Vishing What is short for voice
communication tool
phishing which involes scammers
6. WEB 2.0Refers to the second
using phone calls or voice
generation of the internet
messages to decieve individuals
7. World Wide WebWWW?
into divulging sensitive informaiton
8. Social Networks- What enables
or makinf fragellent payments
people to connect with other people
18. Fo lksonomyAllows users to
with the same interest or
categorize and classify/arrange
background
information using freely chosen
9. Semantic- Referes to the abilities
keywords ex. Tagging
to understand and interpret human
19. Android What do you calll an open
generated content
souce operating system developed
10. Information Refers to the idead or
by google
concepts obtained from reading,
investigatiom, study or research 20.Microblogging What site focuses
11. Mobile Technologies- Refers to on short updates from the user wherein
the devices ranging from basic subscribers of this user will be able to
mobile phones to tablet, PC’S, receive these updates?
PDA’s, MP3 players, Memory
21. Trojan- What is a form of a
sticks, E-readers, and Smartphones
malicious program that is disguised as
12. Technology- Term that means the
a useful program but once downloaded
use of scientific knowledge,
or installed, leaves your PC
experience, and resources to
unprotected and allows hacker to get
create products that fullfill human
you information?
needs
13. PhishingInternet threats refers to 22. Spyware What kind of malware
reecord the key stroke done by the that runs in the background without
user like easily identifiable key you knowing it?
entires, such as bank card numbers
23. Assistive Media Wheelchair is
and passwords and records for
one of the trends in ICT which is?
fragalent activities
14. Spear Phishing- A targeted form of 24. Software as a service- Which of
cyber attack where attckers send the following allows the user to
specially crafted emails to subscribe to a free web-based
individuals or organizations, application rather than purchasing
mimicking ucnknown sender to gan online?
trust and decieve the recipient into
25.Assistive media- What
technology includes adaptive and
rehabilitative devices for people with 38.FALSE You can share your
disabilities? password with your sister
26. Virus- What is a malicious 39. TRUE Do not talk to strangers.
executable code attached to another
40. TRUE Only download music or
executable file which can be harmless
video from a trusted website.
or can modify or delete data?
41FALSE. Letting people know your
27. Trojan- Which of the following
birthday in Facebook is a must if you
internet threats frequently disguise
want to get many gifts.
themselves as harmless computer
programs for hackers to gain access to 42.FALSE You can use pirated
your computer without being detected software for personal use only,
by you?
43.TRUE Avoid replying to negative
28. Keyloggers What is like spyware, comments with more negative
in which it records a user's keyboard comments.
operations?
44.FALSE It is okay to share photos or
29. Netiquette- What is a code of videos of your friend in your social
appropriate online behavior that is like media account.
politeness in society?
45. FALSEYou should not add a
30.SPAM- What refers to unwanted password to your Wifi at home. Read
email mostly from advertisers? the terms and conditions before
accepting it.
31.Worm- What is a form of malware
that replicates itself and can spread to 46.TRUE Be mindful of what you share
different computers via network? and what site you share it to.
32.Internet Safety- What refers to the 47 FALSE Install many anti-viruses to
online security or safety of people and ensure protection to your computer.
their information when using internet?
48. TRUE There is a danger if you post
33-60, determine if the following your future travel plans.
statements are true or false. Write
49. TRUE Avoid logging in to free
TRUE if the statement is correct;
WIFI.
otherwise write FALSE
50. FALSE It is okay to open any
33. TRUE- The internet provides a
attachments or clicking ads if you have
sense of anonymity.
an antivirus in your computer.
34. FALSEWebOS is used for smart
51.TRUE There is a give and take
phones only.
relationship betweek a website and its
35.TRUE While the internet is an users
excellent source of communication and
52. FALSE ]You can curse your
information, there are a lot of
opponent during your online games.
dangerous risks to be aware of.
53. TRUE Do not repeatedly Tag or
36.FALSE Add someone in Facebook
annoy people in your website
even if you don't know the person to
comments.
have many friends.
54.TRUE Do not send large amounts
37.TRUE Read the terms and
of unsolicited email.
conditions before accepting it
55. TRUE You should replace your
password often.
56. FALSE You can publish online a
funny video of your best friend without
his consent.
57. TRUE Even if your profile is
already set to private, hackers can find
a backdoor and steal your information
online.
58 FALSE. Singapore is considered
as the ICT Hub of Asia.
59.FALSE You can click a pop-up ad
with a message that you won an
iPhone,
60.TRUE Our habits in using the
internet determine our online safety.

You might also like