click below
click below
Normal Size Small Size show me how
IT-ERA_FINALS_PART 2
| Question | Answer |
|---|---|
| Tools that enable the transmission of information, including telephones, radio, television, and the internet. | Communication Technology |
| Types of Communication Technology | Telephone Radio Television Internet |
| When you visit Google, YouTube, or Facebook, you’re using the World Wide Web. | World Wide Web (WWW) |
| A single document or screen you see on a website. | Web Page |
| Powerful computers that store websites, apps, or data and send them to your device when you request it. | Servers |
| The companies that give you ACCESS TO THE INTERNET | Internet Service Providers (ISP) |
| The WEB ADDRESS you type to visit a website. | Uniform Resource Locator (URL) |
| Like a PHONEBOOK of the Internet | Domain Name Servers (DNS) |
| SPECIAL CABLES that use light to carry Internet data super fast under the ground or even under the ocean. | Fiber Optic Cables |
| A building full of servers that store and manage Internet data. | Data Center |
| SMALL OF PIECES OF DATA that travel across the Internet and reassemble when they reach your device. | Packets |
| ONLINE PLATFORMS where people create, share, and view content. | Social Media |
| about BUILFIND and MAINTAINING connections with people | Social Networking |
| information that is false, but not intended to cause harm. | Misinformation |
| information that is true, but is shared to cause harm. | Malformation: |
| false information that is deliberately created or disseminated with the express purpose to cause harm. | Disinformation: |
| Content meant to be funny or entertaining, not to harm—but it can still fool people. | Satire or Parody |
| Using information in the wrong way to frame someone or an issue unfairly | Misleading Content |
| Fake accounts or sources pretending to be real ones. | Imposter Content |
| Entirely false information made to trick or harm people. | Fabricated Content |
| When the headline, image, or caption doesn’t match the actual content. | False Connection |
| Real content but placed in the wrong situation | False Context |
| Real photos, videos, or info that has been edited or changed to deceive. | Manipulated Content |
| following a set of moral principles and value | Workplace ethics |
| using technology responsibly and fairly at work. | Digital ethics |
| Viewing or using data without permission. | Unauthorized Data Access |
| Stealing, leaking, or losing sensitive information. | Data Theft and Breaches |
| Ignoring security rules | Cybersecurity Negligence |
| Using someone else’s work, software, or content without credit or permission. | Plagiarism and Copyright Infringement |
| Installing or sharing unlicensed software illegally. | Software Piracy |
| SEND UNWANTED MESSAGES or tricking people into revealing personal information. | Spam and Phishing |
| Using work computers, internet, or emails for personal or unethical purposes. (USING FOR PERSONAL USE) | Misuse of Company Resources |
| BREAKS INTO SYSTEM, networks, or accounts without authorization. | Hacking |
| MONITORING OR COLLECTING people’s information without their knowledge or consent. | Invasion of Privacy |
| TRICKING people into revealing confidential data or giving access. | Social Engineering |
| Intentionally DAMAGING OR DELETING Digital files, software, or networks. | Sabotaging Systems |
| Creating or using programs that UNFAIRLY TREAT PEOPLE based on bias or prejudice. | Discriminatory Algorithms |
| LYING ABOUT YOUR ABILITIES or certifications. | Misrepresentation of Skills |
| SHARING CONFIDENTIAL INFO or posting inappropriate content about work. | Social Media Misuse |
| Using digital tools to INSULT, THREATEN, or EMBARRASS others. | Online Harassment and Bullying |
| refers to the proper handling, processing, storage, and use of personal information. | Data Privacy |
| Companies often share personal data with third-party service provider | Third-Party Management |
| Converting data into a coded format so that only those with the correct decryption key can access it. This is especially important for data transmitted over the internet. | Encryption |
| A security process that requires more than just a password to access an account, usually combining something you know | Multi-Factor Authentication |
| Three Pillars of Information Security | ( CIA ) Confidentiality, Integrity, Availability |
| Malware includes viruses, worms, Trojans, ransomware, and spyware. | Malware (Malicious Software) |
| A trick where attackers send fake emails or messages that look real to steal your information. | Phishing |
| These come from people within an organization, like employees or contractors, who misuse their access. | Insider Threats |
| These attacks overload a website or network with too much traffic, causing it to crash or slow down. | Denial of Service (DoS) and Distributed Denial of Service (DDoS) |
| These are long-term, targeted attacks where hackers secretly stay inside a network to steal data over time. Usually used against large organizations or governments. | These attacks overload a website or network with too much traffic, causing it to crash or slow down. |
| Happen when unauthorized people gain access to private or sensitive data. | Data Breaches |
| Involve guessing passwords by trying every possible combination | Brute Force Attacks |
| The attacker secretly intercepts communication between two people or systems. | Man-in-the-Middle (MITM) Attacks |
| Hackers insert harmful code into a website’s database through input boxes (like login or search fields). | SQL Injection Attacks |