Documente Academic
Documente Profesional
Documente Cultură
Netizen
- an active participant in the online
community of the internet
Types of Malware:
d. Spyware – a program that runs in the background
without you knowing it. It has the ability to monitor
what you are currently doing and typing through
keylogging.
3. Set your post to “private.” In this way, search engines will not be able
to scan that post.
4. Avoid using names. Names are easy for search engines to scan.
5. If you feel that a post can affect you or other’s reputation, ask the one
who posted it to pull it down or report it as inappropriate.
If you create something—an
idea, an invention, a form of literary
work, or a research, you have the
right of how it should be used by
others. This is called intellectual
property.
Cybercrime – a crime committed or assisted through the use
of the internet
Privacy Policy – tells the user how the website will handle its
data.
Copyright – a part of the law, wherein you have the right to
your work, and anyone who uses it without your consent is
punishable by law.
Fair use – means that an intellectual property may be used
without a consent as long as it is used in commentaries,
criticisms, search engines, parodies, news reports, research,
library archiving, teaching and education.
A. Virus I. Private
B. Rogue J. Malware
C. Keylogger K. Incognito
D. Adware L. Internet
E. Spam M. Trojan
F. Phising N. Copyright
G. Fair use O. Pharming
H. Spyware
GROUP ACTIVITY