1st QE Flashcards

1
Q

ICT

A

Information and Communications Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to all technology that is used to handle
telecommunications and access information. It also includes broadcast media, management systems, and
network-based control

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the convergence of several technologies including the internet and
wireless medium, but primary focus is on the access and sharing of information and communications

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of ICT

A

Cloud Computing & Internet Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Remote delivery of computing services (servers, storage, databases, applications) over
the internet, accessible on demand.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

enables users to access and use computing resources (such as storage,
processing power, and software) over the internet, providing scalability and flexibility

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides cloud-based services for businesses and individuals, including virtual machines, storage, databases, and analytics
tools.

A

Microsoft Azure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Offers a suite of cloud computing services like computer engine, storage, big data, and machine learning for businesses
and developers.

A

Google Cloud Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Connection to the global network of computers and information resources.

A

Internet Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a facility or service that provides connectivity for a computer, a computer network, or other network device to the Internet

A

Internet Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Internet Access

A

Wi-Fi (Wireless Fidelity), LTE (Long Term Evolution) & 5G Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a widely used wireless networking technology that enables devices to connect to the internet and each other without physical
cables. It operates in a specific radio frequency spectrum, typically 2.4 GHz or 5
GHz, and transmits data using radio waves.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a cellular network technology that provides
high-speed wireless internet access for mobile devices like smartphones and tablets. It was designed as an upgrade to earlier 3G networks, offering significantly faster data speeds, lower latency, and improved network capacity.

A

LTE (Long Term Evolution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the latest generation of cellular network technology, promising even faster speeds, lower latency, and significantly improved network capacity compared to its predecessors. It aims to revolutionize various aspects of our lives beyond just mobile internet access, enabling new applications and services

A

5G Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Defined as a collection of individual raw facts or statistics. It can come in the form of text,
observations, figures, images, numbers, graphs, or symbols.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

refers to the massive volume of structured and unstructured data that organizations and systems generate daily. This data comes from a wide range of sources, including sensors, social media, web interactions, transaction records, and more

A

Big Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Refers to all equipment and programs that are used to process and communicate
information. Tools and methods used to transmit and receive information electronically.

A

Communication Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Types of Communication Technologies

A

Machine-to-Machine communication, Human-to-Machine communication & Wearable Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

M2M communication refers to the
direct exchange of data and instructions between the various sensors and
devices embedded within them, without human intervention.

A

Machine-to-Machine communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HMI focuses on how humans interact with
their wearable

A

Human-to-Machine communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

M2M and HMI work together to create the magic of wearable technology. M2M provides the underlying data exchange and intelligence, while HMI allows humans to access and control this technology seamlessly. As both technologies continue to evolve, we can expect even more sophisticated and intuitive ways for wearables to communicate, both with each other and with us.

A

Wearable Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Exchange of information or goods electronically, often involving payment or data transfer.

A

Transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Physical components of an ICT system, including computers, network devices, and
peripherals.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Set of instructions that tell hardware how to perform specific tasks.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • Online shopping: Purchasing goods and services through e-commerce
    websites and platforms.
  • Mobile banking: Making payments, transferring funds, and managing
    bank accounts through mobile apps.
A

Transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • Personal computer: Desktop or laptop used for work, entertainment, and
    communication.
  • Smartphones: Mobile devices with internet access, camera, and various
    applications.
A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • Operating system: Manages the computer’s hardware and provides a
    platform for running other programs. (e.g. Windows, macOS, Linux)
  • Productivity software: Tools for document creation, spreadsheets,
    presentations, and communication. (e.g. Microsoft Office, Google
    Workspace)
A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Web Generation: From Static Pages to Interconnected Ecosystems

A

Web 1.0 (1991-1995), Web 2.0 (2005-present) &Web 3.0 (emerging)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The dawn of the web, characterized by static HTML pages and limited user interaction.

A

Web 1.0 (1991-1995)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

User-generated content, social media, and dynamic applications took center stage. Platforms like YouTube and Wikipedia redefined online engagement.

A

Web 2.0 (2005-present)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The web as a more immersive and decentralized space,
fueled by blockchain technology and semantic web concepts. Think virtual reality
experiences and AI-powered personalized content.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Convergent Technology: Blurring the Lines Between Devices and Services

A

The Internet of Things (IoT), Cloud Computing, & Convergence of Devices and Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Everyday objects equipped with sensors and
internet connectivity, creating interconnected ecosystems for smart homes, cities,
and industries.

A

The Internet of Things (IoT)

36
Q

On-demand access to computing resources like servers, storage, and applications remotely, delivered over the internet.

A
37
Q

Smartphones becoming mini-computers,
smart TVs blurring the line between television and computing, and wearables
merging fitness tracking with health monitoring.

A

Convergence of Devices and Services

38
Q

Social Use of ICT: Bridging the Gap and Empowering Communities

A

E-governance and Citizen Participation, Education and Skills Development & Healthcare and Wellbeing

39
Q

Assistive Technology: Bridging the Digital Divide and Empowering All

A

Accessibility Tools, Assistive Robotics, Digital Inclusion Initiatives

40
Q

Screen readers, voice recognition software, and specialized hardware enabling people with disabilities to access and interact with technology.

A

Accessibility Tools

41
Q

Robots and wearable technologies providing support for mobility, daily tasks, and communication, enhancing independence and quality of life for people with disabilities.

A

Assistive Robotics

42
Q

Programs and policies ensuring equitable access to
technology and the internet for marginalized communities, bridging the digital
divide.

A

Digital Inclusion Initiatives

43
Q

It is an area of computer science that emphasizes the creation of intelligent machines that work and react like humans.

A

Artificial Intelligence (AI)

44
Q

systems are designed to
mimic human intelligence and behavior, including the capacity to learn from mistakes,
reason and take decisions, comprehend and interpret natural language, spot patterns,
and adapt to changing circumstances.

A

Artificial Intelligence (AI)

45
Q

It is the field of computer science and engineering concerned with creating devices that can move and react to sensory input. It also involves combining the principles of AI
with the mechanics of robots to create intelligent machines that can interact with the
world, perform tasks, and make decisions based on the data they gather.

A

Robotics

46
Q

the technology used to measure and analyze human body characteristics
such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, and
hand measurements, mainly for authentication purposes.

A

Biometrics

47
Q

It is an area of computing focused on developing computer technology based on the principles of quantum theory. Computers used today can only encode information in
bits that take the value of 1 or 0—restricting their ability. It uses quantum bits or qubits.

A

Quantum computing

48
Q

it is a cutting-edge computing paradigm that uses quantum mechanics principles to process and store information.

A

Quantum computing

49
Q

decentralized and distributed digital ledger technology that records transactions in a secure and irreversible manner. It is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. It was originally designed to facilitate and verify transactions for the digital currency Bitcoin, but its uses and applications have surpassed cryptocurrencies in every way. It is a system of recording information in a way that makes it difficult or impossible to
change, hack, or cheat the system

A

Blockchain

49
Q

It is the science of encoding and decoding information or messages which depends on
physics, not mathematics. It is used for information privacy and security. It provides
an ideally unbreakable method of key distribution, as any attempt to intercept or
measure the quantum states would introduce errors that can be detected.

A

Quantum Cryptography

50
Q

digital currencies (or tokens), like Bitcoin, Ethereum or Litecoin, that can be used to buy goods and services. Just like a digital form of cash, crypto can be used to buy everything from your lunch to your next home. Unlike cash, crypto uses blockchain to act as both a public ledger and an enhanced cryptographic security system, so online transactions are always recorded and secured.

A

Cryptocurrencies

51
Q

decentralized and distributed digital ledger technology that records
transactions in a secure and irreversible manner. It is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. It was originally designed to facilitate and verify transactions for the digital currency
Bitcoin, but its uses and applications have surpassed cryptocurrencies in every way. It
is a system of recording information in a way that makes it difficult or impossible to
change, hack, or cheat the system

A

Blockchain

52
Q

use of computers to assist in the translation of one or more natural languages
into another or others, and vice-versa.

A

Computer-Assisted Translation (CAT)

53
Q

a software application that works as part of a translation workflow where the software
automates and assists in the translation process steps.

A

Computer-Assisted Translation (CAT)

54
Q

a photographic technique that uses light to project objects in a way that
appears three-dimensional. It is a technique that allows the creation of three dimensional images, known as holograms. Unlike traditional photographs that capture
only the intensity of light, holograms record both the intensity and the phase of light
waves.

A

3D Imaging and Holography

55
Q

the term used to describe a three-dimensional, computer
generated environment that can be explored and interacted with a person.

A

Virtual Reality

56
Q

to immerse users in a synthetic world that appears and feels realistic,
tricking their senses into believing they are physically present in the virtual
environment

A

Virtual Reality

57
Q

branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems.

A

Internet Security

58
Q

to establish rules and measures to use against attacks over the Internet. There are different methods that have been used to protect the transfer of data, including encryption.

A

Internet Security

59
Q

knowing about one’s internet privacy and how one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.

A

Internet safety or ‘e-safety’

60
Q

5 TIPS TO STAY SAFE ONLINE

A

Tip #1: Be Aware of Fake websites
Tip #2: Check for website safety
Tip #3: Choose strong/varied passwords
Tip #4: Avoid Spyware
Tip #5: It’s NOT all about spyware and scams

61
Q

Misspelled URLs or strange domain names (e.g.,
“amaz0n.com” instead of “amazon.com”)
▪ Poor grammar and spelling errors throughout the site
▪ Unprofessional design or layout
▪ Requests for excessive personal information
▪ Unbelievable deals or offers that seem too good to be
true

A

Tip #1: Be Aware of Fake websites

62
Q

Provide your information to reputable businesses, then ensure that the company’s website uses a Web address that starts with “https” and has a padlock symbol either in the address bar or at the bottom of the browser.

A

Tip #2: Check for website safety

63
Q

o Create strong, complicated passphrases (not passwords)
o Use two-factor authentication (2FA) or better, an authenticator
app
o Make sure you’re using a secure Wi-Fi connection.

A

Tip #3: Choose strong/varied passwords

64
Q

Having anti-spyware and antivirus programs running on your computer is a must.

A

Tip #4: Avoid Spyware

65
Q

o Limiting the personal information that you share online
o Securing your password
o Signing in and out
o Using secured networks
o Locking your screen or device

A

Tip #5: It’s NOT all about spyware and scams

66
Q

law that seeks to protect all forms of information, be it private, personal, or
sensitive. It is meant to cover both natural and juridical persons involved in the
processing of personal information.

A

Data Privacy Act

67
Q

Freedom of expression is not an absolute right and can be subjected to
restrictions.

A

The limits of presumed freedom of expression

68
Q

Defamation involves writing or saying something about someone that damages
that person’s reputation. There are two categories of defamation: libel (written or
published defamation) and slander (spoken defamation).

A

Issues of libel

69
Q

a part of a law, wherein you have the right/s to your work, and anyone who uses
it without your consent is punishable by law.

A

Copyright Law

70
Q

protects “original works of authorship,” including literary, dramatic, musical,
artistic, and other intellectual creations. It gives the creator exclusive rights to reproduce, distribute, adapt, display, and perform their work.

A

copyright

71
Q

protects words, symbols, designs, or phrases that identify and distinguish
the source of goods or services. It prevents others from using the same or similar marks
that could cause confusion in the marketplace.

A

trademark

72
Q

information that gives a business a competitive advantage and is
protected from unauthorized disclosure. It can include formulas, recipes, customer lists,
manufacturing processes, and other confidential information

A

trade secret

73
Q

grants exclusive rights to the inventor of a new, useful, and non-obvious
invention. It prevents others from making, using, selling, or importing the invention
without permission.

A

patent

74
Q

intellectual property may be used without consent as long as it is used in
commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education.

A

Fair Use

75
Q

short for malicious software. It is a code or
software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

A

Malware

76
Q

type of malware that often take the form of a piece of code inserted in an application, program, or system and they’re deployed by victims themselves.

A

Viruses

77
Q

type of malware that replicates itself.
Unlike viruses, however, worm malware can copy itself without any human
interaction, and it’s not host-dependent, meaning it does not need to attach
itself to a software program to cause damage.

A

Worms

78
Q

type of malware disguised as bona fide software, applications, or
files to deceive users into downloading it and, unknowingly, granting control of
their devices. often spread via email attachments, website downloads, or direct messages.

A

Trojans

79
Q

type of malware that comes with a
ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.

A

Ransomware

80
Q

act more as a “spider,” meaning a program that crawls the internet
looking for holes in security infrastructures to exploit, and the hacking is done
automatically — or robotically if you will.

A

Bots

81
Q

type of malware that gain access to devices through a piece of malicious coding. In some cases, _________ directly hack devices, with cyber criminals even taking remote control
of devices.

A

Botnets

82
Q

malware that involves advertising. Also
known as advertising-supported software, adware displays unwanted advertisements on your computer, sometimes in the form of pop-up ads that track users’ browsing activity.

A

Adware

83
Q

type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be
used for fraudulent purposes

A

Spyware

84
Q

use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages
indiscriminately.

A

Spamming

85
Q

identity theft that generally targets users with the aim to con them into revealing
their personal and confidential information. Attackers commonly use phishing emails to
distribute malicious links or attachments that can extract login credentials, account
numbers and other personal information from victims.

A

Phishing

86
Q
A