click below
click below
Normal Size Small Size show me how
Business
viruses
Question | Answer |
---|---|
social media | websites that allow average users to create content and interact with each other around the content |
examples of social media | pinterest, facebook, twitter etc. |
social network | an online community of people with a common interest who use websites to communicate with each other and share information |
cyberbullying | bullying that takes place using electronic technology such as cell phones, computers etc. as well as communication tools including social media sites, text messages, chat and websites |
malware | refers to a variety of forms or hostile intrusive software like viruses, worms, trojans, spyware, shareware and other malicious programs |
virus | a malware program that replicates by inserting copies of itself into other computer programs and data files but involves a user |
worm | a standalone malware computer program that replicates itself in order to spread to other computers but doesn't need a user |
trojan | is any malicious computer program which represents itself as a way to make the user install it |
spyware | software that enables a user to transmitting information from other computers |
scareware | a type of malware designed to trick the users into purchasing or downloading useless and potentially dangerous software |
how businesses utilize social networking and social media | advertisement/marketing, communicate with customers and research |
pros of social media | connect with friends and family, learn about events, job opportunities, news, good for shy people |
cons of social media | lack of privacy, isolation, distracting, online bullies, less face to face communication |
advantages of Facebook | meet new people and a way to connect |
disadvantages of Facebook | people use innapropriately and privacy is limited |
Facebook privacy/safety tip 1 | limit the amount of personal information you post on Facebook because once it's on the internet you can never get it back |
Facebook privacy/safety tip 2 | funny or embarrassing photos posted by yourself or someone else on Facebook might seem funny now, but they can have serious negative consequences in the future |
what percentage of employers use online screening for potential employees | 80% |
bullies role | seeking power at the expense of others feelings call names, make nasty comments |
targets role | the victim of the bully examples being criticized and laughed at by others |
bystanders role | most don't approve of bullying but are unsure what to do examples watch others being criticized |
6 things employers are legally allowed to look for in employees when screening online | racism, violent tendencies, sexually explicit material, confession to criminal act, education, appropriate skills |
10 things employers are NOT allowed to look for in employees when screening online | ethnicity, sexual orientation, mental or physical disabilities, religion, age, political leanings, country of origin, martial status, family status, sex |
ways to block a cyberbully | protect your passwords, say no to revenge, tell someone and cut off communications |
difference between worm, trojan and virus | a trojan is a false representation to make a user open, a worm replicates itself to spread to other computers so it doesn't involve a user, and a virus replicates copies of itself into programs and data files user must activate |
difference between spyware and scareware | spyware uses other users to get information from other computers and shareware is a false representation of an ad etc. to trick user into buying or downloading useless or potentially dangerous software |
identity fraud | when personal information is stolen like insurance etc. |
identity theft | use of a person's private identity usually for financial gain |
the difference between identity fraud and theft | identity fraud is purely just when personal information is stolen and identity theft is when the personal information is actually used |
what are some types of information thieves are looking for | insurance numbers, credit card numbers, birth date, full name or maiden name |
phishing | making a false online account to lewer the user into opening or donating money, or giving personal information |