Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

GUMATAY, GEOFFREY VIN N.

CSCC 101-INTRODUCTION TO COMPUTING

BSCS 1 – A OCTOBER 02, 2021

MODULE 2: ACTIVITY 4

REVIEW QUESTIONS:

1. What are information resellers, electronic profiles, identity theft, and mistaken
identity?
 INFORMATION RESELLERS - Personal information is collected from public
and private data and sold to public and private sector groups for a variety of
objectives, ranging from marketing to law enforcement and homeland security.
 ELECTRONIC PROFILES - are set of detailed information of people using
online identification softwares. Accounts such as Facebook account, Google
account, and Gmail account are few examples of electronic profiles.
 IDENTITY THEFT - is the unethical exploitation of another person's identity
for selfish gains.
 MISTAKEN IDENTITY - it is when someone or something is wrongly
identified as someone or something else.

2. What is the freedom of Information Act?


Freedom of Information Act is characterized as a law that ensures citizens have
access to information about their government.

3. What is employee-monitoring software? Describe the illusion of anonymity.


 EMPLOYEE-MONITORING SOFTWARE - it is the term used by companies
in monitoring and supervising its employees' computers in a single location.
 The illusion of anonymity is described when people assume or claim that their
personal information and other privacies are in good care when browsing a web or
surfing in the Internet, but actually it is not.

4. What is a history file? What are temporary Internet files? What is privacy mode?
 History files are the previous files you last administered, used, or visited using
your computer.
 Temporary Internet files are files that cannot be saved in your computer
permanently.
 Privacy mode is a privacy feature of some web browsers that keeps your data
from being exposed to others including your search's history. Chrome Incognito is
an example of privacy mode.

5. Define spyware, web bugs, keystroke loggers, antispyware programs and online
identity?
 Spyware - it is a kind of malware that spies on devices to secretly gathers or
collects information about the users and distributes it to other entities.
 Web Bugs - are small file object that is invisibly embedded in a web page or
email which enables information to be gathered in a stateless internet
environment. Worry not because web bugs are actually innocuous or not
harmful/offensive to users' privacies and other personal data.
 Keystroke Loggers - are surveillance type technologies that records and monitors
every keystroke typed on a computer's keyboard.
 Antispyware Programs - these programs were created in order to prevent, detect,
and remove unwanted spywares or other malicious programs on a device.
 Online Identity - is an online user's social identity that they create in online
groups and websites. Online identities can be classified as real or fake.\

6. Describe three federal laws to protect privacy.


 Gramm-Leach-Bliley Act - a federal law that secures personal financial
information
 Health Insurance Portability and Accountability Act (HIPAA) - is an
implemented federal law that safeguards medical records of the people
 Family Educational Rights and Privacy Act (FERPA) - an act that limits the
publication of educational records.

7. What is cybercrime? What are malicious programs?


 Cybercrime is defined as committing crimes using digital devices and online
platforms such as phishing, hacking, cybersex, or cyberbullying.
 Malicious programs or malwares are any type of software that damages or
destroys devices' operating systems. Malwares were usually developed by
cybercriminals.

8. Compare viruses, worms and Trojan horses. What are zombies?


 Viruses, worms, and Trojan horses are classified as malwares. To compare,
viruses are malicious programs that travel across networks and operating
systems, attaching themselves to a variety of other programs and databases; for
worms, they are self-replicating malicious programs, even if they were removed
they'll eventually come back themselves over and over again; while Trojan
horses are defined as programs that invade a computer system under the pretense
of another software.
 Zombies - are infected computers that can be remotely controlled for malicious
purposes.

9. What is cyberbullying? A rogue Wi-fi hotspot? Data theft and manipulation?


 Cyberbullying is a type of bullying that occurs online. Excluding a person
intentionally from a groupchat (GC) is an instance of cyberbullying.
 A rogue Wi-Fi hotspot is a Wi-Fi access point that has been put up by a hacker.
It's designed to look like a legitimate hotspot provided by a company, such as a
coffee shop that offers free Wi-Fi to its customers.
 Data theft is the act of stealing digital information from an unknown victim's
computers, servers, or electronic devices with the goal to jeopardize privacy or get
personal information
 Data manipulation is the act of manipulating other's data or information.
Hackers are the common data manipulators because they are using accounts that
is not in their property to provide or send false information and other malicious
deeds to the contacts of the account they'd hacked.

10. What is the distinction between ethics and computer ethics?


Ethics is the general term for all aspects that needs morality and it is commonly
described as defining right from wrong. Computer ethics, on the other hand, is one of the
aspect of ethics that has moral guidelines specifically for the use of computers in the
society.
11. Define copyright, software piracy, digital rights management and the Digital
Millennium Copyright Act.
 Copyright is the right of all authors to publish and distribute their works.
 Software piracy is the illegal act of copying and/or distribution of software
because it was not granted any permission from the owner.
 Digital Rights Management (DRM) is a term that refers to a group of
technologies that regulate access to electronic media and data.
 Digital Millennium Copyright Act makes it illegal to create and distribute
technology, devices, or services that are designed to get around copyrighted work
access controls.

12. What is plagiarism? What is Turnitin and what does it do?


 Plagiarism is an illegal or unethical act of taking/copying/representing other's
work without giving credits to the owner and excluding the original
reference/source on the plagiarized paper.
 Turnitin is a service that intolerates internet plagiarism. In order for Turnitin to
prevent plagiarism, they will analyse a paper's content and compare it to a large
number of publicly available electronic documents, including web page content.
Turnitin can detect undocumented papers or even parts of undocumented papers
in this way.

You might also like