Study Guide
Study Guide
1. Plagiarism: Taking someone's work and saying it's your own. Punishable by fine and/or
imprisonment.
2. Cyber Bullying and Online Harassment: Sending hurtful texts or instant messages, posting
embarrassing photos or videos on social media, and spreading mean rumors online or with cell
phones. Punishable by fines ranging from P50,000 to P100,000, or imprisonment between six
months and six years, or both.
3. Identity Theft: Online identity theft that causes damages to a party is punishable by
imprisonment of up to 12 years.
4. Invasion of Privacy: Concerned with proper handling of data (Consent notice and regulatory
obligation).
6. Copyright Infringement: Referred to as piracy or use of work without permission with certain
exclusive rights.
Data Communications: The transmission of digital data between two or more computers and a
computer network or data network.
Local Area Network (LAN): A small network restricted to a small geographic area.
Wide Area Network (WAN): A network that covers a broad range of geographic areas.
Metropolitan Area Network (MAN): A network that connects users with computer
resources in a geographic area larger than LAN but not quite as large as WAN.
Servers: Computers that hold shared files, programs, and the network operating system.
Clients/Workstation: Computers that access and use the network and shared network
resources.
Shared Printers and Other Peripherals: Hardware resources provided to users of the
network by servers.
Network Interface Card (NIC): A special expansion card that prepares and sends data,
receives data, and controls data flow between the computer and the network.
Local Operating System: A program that allows personal computers to access files, print
to a local printer, and have and use one or more disk and Flash Drive/CD drives.
Network Operating System: A program that runs on computers and servers and allows
the computers to communicate over the network.
Data Communication
Transmission Medium: The physical path by which a message travels from sender to
receiver.
Types of Protocols:
Post Office Protocol (POP): A protocol designed for receiving incoming emails.
Simple Mail Transport Protocol (SMTP): A protocol designed to send and distribute
outgoing emails.
File Transfer Protocol (FTP): A protocol that allows users to transfer files from one
machine to another.
Quiz
1. What is plagiarism punishable by? a) Fine and/or imprisonment b) Only fine c) Only
imprisonment d) None of the above
Answer: a) Fine and/or imprisonment
2. What is cyber bullying and online harassment punishable by? a) Fines ranging from P50,000 to
P100,000, or imprisonment between six months and six years, or both b) Only fine c) Only
imprisonment d) None of the above
Answer: a) Fines ranging from P50,000 to P100,000, or imprisonment between six months and six years,
or both
4. What is the main difference between a LAN and a WAN? a) LAN is smaller than WAN b) LAN is
larger than WAN c) LAN is faster than WAN d) LAN is slower than WAN
5. What is the function of a server in a computer network? a) To access and use the network and
shared network resources b) To hold shared files, programs, and the network operating system c)
To connect multiple computers in a network d) To provide internet access
Answer: b) To hold shared files, programs, and the network operating system
7. What is the difference between HTTP and HTTPS? a) HTTP is faster than HTTPS b) HTTP is slower
than HTTPS c) HTTP is not secure, while HTTPS is secure d) HTTP is secure, while HTTPS is not
secure
8. What is the function of a switch in a computer network? a) To split a network connection into
multiple computers b) To connect multiple computers in a network c) To use physical device
addresses in each incoming message to deliver the message to the right destination or port d) To
provide internet access
Answer: c) To use physical device addresses in each incoming message to deliver the message to the
right destination or port
9. What is the purpose of a NIC in a computer network? a) To prepare and send data, receive data,
and control data flow between the computer and the network b) To connect multiple computers
in a network c) To provide internet access d) To hold shared files, programs, and the network
operating system
Answer: a) To prepare and send data, receive data, and control data flow between the computer and the
network
10. What is the difference between TCP and UDP? a) TCP is faster than UDP b) TCP is slower than
UDP c) TCP is a connection-oriented protocol, while UDP is a connectionless protocol d) TCP is a
connectionless protocol, while UDP is a connection-oriented protocol
**IP to
Types of Viruses
Malware
Phishing
Spoofing
Identity-Based Attacks
Insider Threats
DNS Tunneling
Difficult to detect
IoT-Based Attacks
AI-Powered Attacks
Use artificial intelligence or machine learning to automate, accelerate, or enhance cyber attacks
Quiz Time!
2. What is the goal of a Denial-of-Service (DoS) attack? a) To steal user data b) To disrupt system
service c) To install malware d) To spoof a website
3. What is phishing? a) A type of malware b) A type of DoS attack c) A fraudulent email or message
d) A type of spoofing attack
5. What is the goal of an identity-based attack? a) To steal user data b) To gain unauthorized access
to accounts c) To disrupt system service d) To install malware
6. What is code injection? a) A type of phishing attack b) A type of DoS attack c) Injecting malware
into a vulnerable application d) A type of spoofing attack
7. What is a supply chain attack? a) Targeting a company's main system b) Targeting third-party
vendors or suppliers c) Stealing user identities d) Disrupting system service
10. What is DNS tunneling? a) A type of phishing attack b) A type of DoS attack c) Encoding malicious
data in DNS queries and responses d) A type of spoofing attack
11. What is an IoT-based attack? a) Targeting a company's main system b) Targeting IoT devices and
systems c) Stealing user identities d) Disrupting system service
Let me know if you need any further clarification or explanation on any of these topics!
Share
New