1/47
Vocabulary flashcards covering computer ethics, intellectual property, netiquette rules, cybersecurity threats, and protective practices drawn from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Ethics
The study of assigning value to actions based on whether they are good or bad.
Computer Ethics
Moral guidelines that govern online behavior and protect users from privacy breaches, identity theft, and other harms.
10 Commandments of Computer Ethics
A set of guidelines created by the Computer Ethics Institute outlining responsible computer use.
Commandment 1
Thou shalt not use a computer to harm other people.
Commandment 2
Thou shalt not interfere with other people's computer work.
Commandment 3
Thou shalt not snoop around in other people's files.
Commandment 4
Thou shalt not use a computer to steal.
Commandment 5
Thou shalt not use a computer to bear false witness (spread misinformation).
Commandment 6
Thou shalt not use or copy software for which you have not paid.
Commandment 7
Thou shalt not use other people's computer resources without authorization.
Commandment 8
Thou shalt not appropriate other people's intellectual output.
Commandment 9
Thou shalt think about the social consequences of the program you write.
Commandment 10
Thou shalt use a computer in ways that show consideration and respect.
Intellectual Property (IP)
Creations of the mind—such as inventions, literary works, and designs—protected by law.
World Intellectual Property Organization (WIPO)
UN agency that serves as the global forum for IP services, policy, and cooperation.
Intellectual Property Office of the Philippines (IPOPHL)
Government agency that administers and enforces IP rights in the Philippines.
Patent
Exclusive legal right granted to an innovator to make, use, or sell an invention for 20 years.
Utility Model
Protection for a novel, industrially applicable technical solution, valid for 7 years.
Industrial Design
Right that safeguards the ornamental or aesthetic aspects of a product; initial term 5 years, renewable twice.
Trademark
Word, phrase, symbol, or logo that identifies the source of goods or services and protects brand identity.
Copyright
Automatic protection for creators of original literary, artistic, and scientific works; lasts 50 years after author’s death in PH.
Netiquette
Etiquette for online communication that emphasizes respect, courtesy, and responsible behavior.
Remember the Human
Netiquette rule urging users to treat others online as they wish to be treated.
Same Standards Online
Maintain the same courtesy and respect online as in real-life interactions.
Know Where You Are in Cyberspace
Adjust communication to suit the norms of each online environment.
Respect Time & Bandwidth
Share concise, meaningful content; avoid wasting others’ resources.
Make Yourself Look Good Online
Use correct spelling, grammar, and a polite tone in digital communication.
Share Expert Knowledge
Contribute accurate information to benefit the online community.
Keep Flame Wars Under Control
Avoid escalating heated online arguments; aim for constructive dialogue.
Respect Privacy
Do not disclose or misuse other people’s personal information online.
Don’t Abuse Power
Having greater knowledge or access does not justify exploiting others online.
Be Forgiving of Mistakes
Respond kindly to online errors; correct privately when possible.
Cybersecurity
Practices and technologies that protect computer systems, networks, and data from threats.
Phishing
Deceptive emails or sites that trick users into revealing sensitive information.
Ransomware
Malware that encrypts a user’s files and demands payment for their release.
Malware
Malicious software—viruses, worms, trojans—that causes data theft, destruction, or unauthorized access.
Distributed Denial of Service (DDoS)
Attack that floods a target server or network with traffic, disrupting services.
Unauthorized Access
Physical or digital entry into computer systems without permission.
Cybercrime Prevention Act of 2012
Philippine law (RA 10175) defining and penalizing cyber offenses like hacking, fraud, and online libel.
Data Privacy Act of 2012
Philippine law (RA 10173) that protects personal information and establishes data subject rights.
Data Processing Principles
Openness, proportionality, legitimate purpose, and security when handling personal data.
Consent (Data Privacy)
Data subject’s voluntary agreement required before personal data processing, unless exempted by law.
Privacy Impact Assessment (PIA)
Process that evaluates and mitigates privacy risks in high-risk data processing activities.
Physical Security
Restricting physical access to computers and server rooms to authorized personnel only.
Authentication & Access Control
Using strong passwords, passphrases, and role-based privileges to limit system access.
Encryption
Technique such as Full Disk Encryption that encodes data to prevent unauthorized reading.
Regular Backups
Scheduled copies of data stored offsite or in the cloud to prevent loss from damage or attacks.
Firewall
Hardware or software that filters network traffic, blocking unauthorized connections.