Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

EMPOWERMENT

TECHNOLOGY
PART 1
1. Discuss the difference between pharming and phising how could we
avoid for each?
 PHARMING – a widely use a pharming definition is online found that involve the use
of melicius code to direct vicyims to spooted website in an attempt to steal their
credential and data
 PHISHING- A technique for attempting to acquire sencitive data, such as bank account
number, through a fraudulent solicitation in email or an website in which the
perpretator masqueades as the legitimate buseniss or reputable person
2. Different cyber ethics and netiquette. Give 3 example for each.
 CYBER ETHICS- is the philosophic study ethics perfaining to computer , ecompassing
user behaveor and what computer are programmed to do and how this affects
individual are society
 NETIQUETTE- represent the importance of proper manners and behavior online
general netiquette is the set of professional and social etiquettes practiced and
advocated in electronic communication over any computer network.
 EXAMPLE OF NETIQUETTE- don’t send or videos of other people especially if there
intimate. Also do not disseminate private information about yourself and athers.
 EXAMPLE OF ETHICS- ethics decision made by a standard writer which further. One
own well while serving industry
3. What MALWARE? Give 3 example and discuss each one briefly.
 MALWARE- is any softer intentionally designed to couse dicruption to a computer
server, client unouthorized access to information or system deprive users access
information or which unknowingly infereres with the user computer security and
privacy
 VIRUS- a piece of code that is loaded into your website or computer without your
knowledge attaching themeselve to file or programs and rapidly spreading to
computers of everyone in your contact list.
 ADWARE SEAMS- automatic adverticing software that delivers unwatted promotions
and pop ups while you are browsing the web if you click on one of this ads you will be
a redirected to a malicious sites.
 SPYWARE- malware that designed spy on a user activity harvesting your data and
collecting personal information such a username habits
4. Differentuate virus from a worm. How do we avoid being infected by
both?
VIRUS- A computer virus is a type of a computer program that when excuted , replicate itself and
insert its own code ultimately affecting the functioning of the computer.

PART 2
1. What is social? What its advantage and disadvantage.
WORM- a computer is a type of malware that spreads itself from computer reolicating itself without
any human interaction

CYBER BULLYING- cyberharasment is a form of bullying or harassment using electronic means

2. Discuss the proper use of internet and how to stay safe online.
 When you use a cellphone don’t trust those who notify you because your personal account
maybe compromised and it can be hacked. When someone notifies you with a link you need
to make sure it is to avoid hacking
3. Identify 3 out of the 10 commadments of computer ethics discuss each one
briefly.
 Thou shalt not use a computer to harm other people -it would be better to respect him if
used the computer
 Thou shalt not snoop around in other people fole – avoid interfering with someone who has
a file because you might be blame
 Thou shalt not use a computer steal – make sure that when you use social apps it is better
that you log out for the safety of your account
4. How does technology affects the following
Society

Education

Communication – Because if there is bo communicate with someone who is far away

Health service

Family

You might also like