Internet threats
Netiquette
Cybercrimes
200

The process by which cyber criminals gain access to your computer.

Hacking


200

Respect_______ in viewpoints.

Diversity

200

The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

Copyright

400

Often used by third parties to infiltrate your computer

Spyware and adware

400

How many computer ethics rules did the previous reporters mention?

Ten Commandments
400

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.

Cyberbullying

600

A malicious program that is disguised as, or embedded within, legitimate software.

Trojan Horses

600

AVOID ________ IN TYPED MESSAGES

Screaming

600

Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.

Cyber Defamation

800

Virtual “listening in” on information that's shared over an unsecure (not encrypted)

WiFi network.

Wi-Fi Eavesdropping

800

What is netiquette?

it’s network etiquette – that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online.

800

An act or instance of using or closely imitating the language and thoughts of another author without authorization.

Plagiarism

1000

Malicious computer programs that are often sent as an email attachment or a

download with the intent of infecting your computer.

Viruses


1000

What is the difference between ethics and etiquette?

Ethics- moral principles that govern our behavior

Etiquette- set of rules indicating the proper and polite way to behave


1000

An act protecting individual personal information.

Republic Act No. 10173 Data Privacy Act of 2012

M
e
n
u