Copy - deck_16968565 - Copy Flashcards

1
Q

use of different communication technologies such as phones &, Internet. to locate, save, send and edit information

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enumerate the general Positive Impacts of ICT

A

Access to information, improved access to education, new tools, new opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cheaper communication, more opportunities for leisure and entertainment, interactions with people all over the world, ability to obtain goods and services from a wider range of sources

A

Access to information, improved access to education, new tools, new opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

distance learning, online tutorials, new learning methods VR & interactive multimedia, job opportunities virtual jobs in the communications industry

A

Improved access to education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Photo or video editing software, printers, laptops, assistive technology for those with disabilities

A

New tools, new opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enumerate the General Negative Impacts of ICT

A

Job loss, reduced personal interaction, reduced physical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

manual work replaced by automation with the ability to do the work of multiple people

A

Job loss, reduced personal interaction, reduced physical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

lack of social interaction due to the replacement of human workforce isolates & often becomes a source of unhappiness

A

Reduced personal interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Less manual work/adoption of a sedentary lifestyle may lead to health problems (obesity, heart disease, eyestrain, etc.)

A

Reduced physical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enumerate the positive impacts of ICT in Organizatins

A

Communication, information management, security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cast saving with automatized actions (payment, worldwide website reach, flexible response)

A

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access to customer info : better advertising, business, increased income, basis for decision making

A

Information Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fingerprint, iris or facial recognition, or data encryption like 2-factor authentication

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Enumerate the negative impacts of ICT in Organizatins

A

Cost, competition, security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Expensive hardware/software, and quick improvements in tech may make it hard to keep up with

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Loss of customers & income from other competitors offering similar services at a lower price

A

Competition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hacking, viruses, & malware can endanger safe internet connections and secure data

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Increased access to information leads to increased opportunities in education, communication improvement, and the chance to participate in a society,

A

Positive Impact of ICT in Society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Increased access to information can also cause a digital divide, reducing levels of education and understanding from the incorrect/misleading information that further causes moral and ethical problems.

A

Negative Impacts of ICT in Society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When the World Wide Was made, it used to be static/flat pages/stationary pages; cannot be manipulated by users.

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Added dynamic web pages, displays different content for different users like social networking sites, allowed users to interact instead of just reading, and may be able to comment/make an account. Allows usage of web browsers instead of an operating system

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Enumerate the Features of Web 2.0

A

Folksonomy, Rich User Experience, Long Tail, User Participation, Software as Service, Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ability of users to categorize/flassify info by keywords (tagging)- hashtags in social media platforms

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

content is dynamic/responsive to user’s input. Example: Logging into an account modifies what you see on the website.

A

Rich User Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Services are offered on demand rather than on a one-time purchase. Time-based pricing might be better than file-size-based pricing and vice versa

A

Long Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

users are also able to put content on a website, like posts, comments, reviews, and evaluation

A

User Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Renting instead of purchasing - like monthly payments to google drive, google docs, compared to buying microsoft word.

A

Software as Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

diverse information sharing from universal web access to people from various cultures

A

Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

a movement led by the World Wide Web Consortium, aims to have machines/servers understand user preferences to deliver web content specifically targeting the user

A

Web 3.0

30
Q

Another name for Web 3.0

A

Semantic Web

31
Q

Enumerate the several problems of Web 3.0

A

Compatability, security, vastness, vagueness, logic

32
Q

Enumerate the ICT trends

A

Convergence, social media, mobile technologies, assistive media

33
Q

synergy of advancements to work on a similar goal

A

Convergence

34
Q

allows users to create, discuss, exchange user-generated content through social networks, bookmarking sites, social news, media sharing, microblogging, and blogs and forums

A

Social Media

35
Q

smartphones and tablets’ capability to do personal computer activities, through operating systems such as iOS & Android, WobOS, Windows Mobile

A

Mobile Technologies

36
Q

helps people who have visual/reading impairments

A

Assistive Media

37
Q

Elements of a well-conceptualized website

A

Usefulness of website, Adherence to Functionality, Usability, Influence, Visual Design

38
Q

it’s important to identify the target audience to show the…?

A

Usefelness of website

39
Q

comes with the challenge to pay attention to accessibility. Design must have its function

A

Adherence to Functionality

40
Q

Measure of the simplicity for a user to manipulate the site and the convenience to use on the long term

A

Usability

41
Q

Maximizing the functionality of the website for advertising to influence customers

A

Influence

42
Q

content must contribute to the aesthetic of the website to contribute to user experience/online environment

A

Visual Design

43
Q

AKA Malicious software, like viruses, worms, trojans, spywares, adwares

A

Malware

44
Q

unwanted emails from bots and advertisements that can be used to send malware without being detected

A

Spam

45
Q

acquiring sensitive personal info like passwords and credit; sending malicious emails to individuals by impersonation to get personal information card details

A

Phishing

46
Q

Programs that induce security fraud by using exploits of a system to scare/deceive the user into downloading a program with the promises of removing malware on the system, but ends up installing more malware. Sometimes it ends up in ransomware. Its different names include scareware, fraudware, rogue scanner, and rogue antivirus.

A

Rogue Security Software

47
Q

monitoring software designed to record a user’s keystrokes/info typed by a user in a website/app to send back to a third party

A

Keylogger

48
Q

malicious code is installed on a computer to misdirect users into fraud websites without consent. “Phishing without a lure.”

A

Pharming

49
Q

crime of obtaining personal/financial info of another person to make transactions/purchases

A

Identity Theft

50
Q

criminal misrepresents themself as another person to avoid a summons/warrant/arrest/convictions

A

Criminal Identity Theft

51
Q

identifying as another person to obtain free medical care

A

Medical Identity Theft

52
Q

using another person’s identity/info to get credit, goods, services, benefits. Most common

A

Financial Identity Theft

53
Q

using a child’s identity for personal gain (to obtain residence, employment, etc.)

A

Child identity theft

54
Q

identifies as a well-known company to “fix issues” by a pretend website asking for credentials

A

Account Verification Phishing

55
Q

link appears to look like a shared file, directs you to a log-in page in pretend website

A

Cloud File Sharing Phishing

56
Q

Link will prompt you to sign into view the document, giving attackers control of your inbox

A

Docusign Phishing

57
Q

has a document presented as an unpaid invoice and claims service will be terminated if invoice is not paid

A

Fake invoice Phishing

58
Q

appears to come from a popular retail/delivery app, includes notifications with malicious link

A

Delivery Notifications Phishing

59
Q

Fake government agency claims tax problems and provides means to the issue before legal actions/fines

A

Tax Scame Phishing

60
Q

gaining of unauthorized access to data in a system or computer

A

Hacking

61
Q

criminal makes fake user interface: leads the user to another website instead of the intended website

A

Cookie Theft

62
Q

replication of website so the user enters information without knowing the problem, which the hacker misuses and seizes

A

Virus

63
Q

uses cache of another website to direct to a malicious website

A

DNS Spoofing

64
Q

released into the files of the website once a hacker enters. It corrupts the information on the website

A

UI Redness

65
Q

Enumerate the Types of Hackers.

A

Ethical Hacker (White Hat), Cracker (Black Hat), Grey hat, Script Kiddies, Hacktivist

66
Q

hacks systems to identify weaknesses. Testing & Vulnerability assessments

A

Ethical Hacker (White hat)

67
Q

hacks for personal gain, to steal corporate data, violate privacy rights, transfer bank funds,etc.

A

Cracker (Black hat)

68
Q

in between white hate and black hat. Breaks into systems without authority to identify and reveal weaknesses to the owner

A

Grey hat

69
Q

gains access to computer systems with premade tools

A

Script Kiddies

70
Q

Uses hacking to send messages by hijacking and leaving a message

A

Hacktivist

71
Q

If you create something—an idea, an invention, a form of literary work, or research, you have the right of how it should be used by others. This is called..?

A

Intellectual Property