E-TECH Flashcards

1
Q

this is the physical component

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

refers to use of communication and telecommunication technologies to create, collect, process, transmit, and store information

A

ict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the functions of ict

A

communication, date management, marketing, process improvement, enterprise resource planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is an integrated set of components that collects, processes, stores, and distributes information to support organizations operations and decision-making

A

ict system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is the programs and applications

A

software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the ict components

A

hardware, software, networks, data, information, people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is the interconnected devices for communication

A

networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this is the raw, unprocessed facts and figures

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this is the virtual in nature and and unbounded unlike our physical environment

A

cyber world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the processed and contexualized data

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

users and IT professionals

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cyber world is also know as

A

cyber space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the features of cyberworld

A

virtual self, sources of information, social interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is a digital representation/ identity or humans to interact in the virtual world

A

virtual self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the possibility of maliciouos attempt to damage or disrupt a computer network or system

A

cyebrthreat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data that is available to anyone as long as they have internet connection

A

sources of information

14
Q

this is the process of engaging with other through digital platforms, such as social networking sites, where individuals communicate and express themselves through using visual and verbal cues to convey their personality and social status

A

social interaction

15
Q

what are the 5 cyberthreats

A

social engineered trojans, unpatched software, phishing, network travelling worms, advance persistent threats

16
Q

exploitation or harmful activity comitted with the intent of destroying , stealing, or disrupting data, critical systems, and digital life in general

A

cyberattacks

17
Q

this is a program or file that can harm your computer by stealing data or destroying something in your computer

A

malware

18
Q

types of malware

A

ransomware, spyware, adware, worms, trojans, botnets

19
Q

this is a form of cyberattack to obtain sensitive information like username and password through malicious emails

A

phishing

20
Q

occurs when a malicious actor (hacker) stops legitimate users from gettng into specific computer systems, devices, services or other digital resources

A

denial of service (DOS) atatcks

20
Q

happens when a third party is trying to gain acess to your systems by cracking users pasword

A

password attacks

21
Q

This may happen by impersonating the endpoints in an online information exchange via
smartphone to a website.

A

Man in the Middle(MITHM)

22
Q

are done by malicious actors that upload infected ads to different websites using an advertising network

A

malvertising

23
Q

pretends as legitimate and necessary security software that will keep your system safe

A

rogue software

24
Q

individuals who lure children or teenagers to engage in sexual acts

A

internet predators

25
Q

online act of humiliation and/ or threats that is done with and by children and teenager

A

cyberbullying is

26
Q

cyber security is also known as

A

information technology security or electronic information security

27
Q

practice of defending computers, servers, mobile devices, electronic systems, network, and data from malicious attacks

A

cybersecurity

28
Q

things to consider to avoid cyber attacks

A

make a strong and unique password, clear cache, turn off save password

29
Q

protects your device from malware from the web and external devices attached to yours

A

all-inclusive protection

30
Q

it has to conduct regular security scans without user trigger and automatically rejects data from unwanted sources

A

relaible protection

31
Q

in order fot you to maximize the capabilities of the program, you have to be able to understand all of its components just by navigating it

A

easy to use

31
Q

some anti virus programs tend to make devices lag thus making it inefficient to sue

A

performance impact

32
Q

sometimes even if the programs users interface is well done, there are certain things that we still need help with support for the program should always be available and easy to connect

A

available support