Empowerment Technology - 1st Session Examination Flashcards

1
Q

technologies that are used to support the processing, storing, securing and transmitting of information.

A

Information and communications technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

six components of ICT.

A

Software, hardware, information, procedures, people, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following components of information and communications technology includes electronic devices such as the keyboard, mouse, and printer?

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This component of ICT is the output from an ICT system that is useful and meaningful to the people using the system. What is this component?

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to all electronic and communication technologies that enable the management and distribution of information

A

Information and communications technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

individuals who are responsible for the development, improvement, and
maintenance of an ICT system

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

actions performed in a certain order and condition to make sure an ICT system runs smoothly.

A

procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the technical term used to describe physical or tangible parts of an ICT system. If you can touch it, then it is considered hardware.

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the generic term for programs and applications installed on your personal computer, laptop, or smartphone. It is an ICT component that is responsible for providing
sets of instructions that the computer has to follow to accomplish a specific task.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the raw facts or figures that can be processed, stored, and transmitted by an ICT system

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the result of processed, organized, and structured data.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the term used to describe websites or applications that give people the capability to exchange messages, and to share information and media content with one another using their social media account connected to a social network.

A

social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These are social media sites used for communication, where users can communicate via text chat, phone call, or video call.

A

Social Networking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is a social media site used for sharing multimedia contents like photos, images, audio, and videos.

A

Media Sharing Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is a social media site used to facilitate the active exchange of views, comments, and opinions on issues and matters discussed among its participants of the same interest or expertise.

A

Discussion Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This refers to social media sites that aid users in discovering, sharing, and discussing the latest and trending content and media.

A

Bookmarking and Content Curation Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This refers to social media sites that provide its users with the tools that will help them to publish their content in a creative and engaging manner

A

Blogging and Publishing Network Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This is a social media site that provides a way for users to inform other people or organizations about their views regarding a particular product or service.

A

Consumer Review Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

refers to electronic devices that are characterized by their portability or their ability to be carried or transported easily

A

mobile media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

are electronic devices or programs that aim to provide support for people with disabilities. It generally seeks to increase or improve the functional capability of individuals who face mental or physical challenges.

A

assistive media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An assistive media that can convert visual cues to audible sounds is beneficial for persons with

A

speech difficulty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Karen fulfilled her childhood dream of owning a flower shop in Pasig and named it “Pretty Blossoms.” As a newcomer in the flower business, she knew that for her to be a successful entrepreneur, she must learn from people who have the same type of business as hers. What kind of social media can help her connect with other flower shop owners?

A.   social networking sites
B.   media sharing sites
C.   discussion sites
D.   blogging and publishing network sites
E.   bookmarking and content curation sites
F.   customer review networks

A

a and c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It includes text-to-speech devices, reading pens, braille displays, magnifiers, and talking devices.

A

Assistive Media for the Visually Impaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The assistance is through sound amplification, conversion of sounds into visual cues, and conversion of sounds into sensory signals like vibrations which includes hearing aids, amplified telephones, devices with vibrating alarms, speech-to-text devices, and captioning devices

A

Assistive Media for People with Hearing Impairments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
These devices enable users to communicate with other people or express their thoughts using a system that converts visual cues to audible speech. Included in this category are speech-generating devices, voice amplification devices, stuttering aids, artificial larynx, and communication boards
Assistive Media for People with Speech Difficulty
26
These electronic devices or software act as instructional supports for learners to understand their lessons according to their pace or abilities. Memory aids, specialized applications, audiobooks, activity-driven devices, and text-to-speech devices are just a few of the technologies included in this category
Assistive Media for People with Learning Difficulty
27
allows us to navigate through a virtual world, interact with other people through the use of the internet, and retrieve data from the vast information available online.
cyber world
28
What feature of the cyber world allows us to freely get information on different topics?
Information source
29
Which of the following online threats is considered a crime-related danger?
phishing
30
This is a malware used by criminals to block the account, files, or system of the victim, then later on ask for money.
ransomware
31
Your six-year-old sibling borrowed your tablet to watch Peppa Pig. You opened YouTube and let her watch while you are doing your homework on your laptop. Your sibling is smart and knows how to search different videos. After an hour, you remember that you forgot to change the settings for parental control on your tablet. Which of the following dangers can your sibling encounter? A.   internet predators B.   verbal obscenity C.   hackers D.   graphic violence
B and D
32
There are so many dangers on the internet, one of which is malicious software. Aside from installing an antivirus on your computer, what else could you do to prevent data loss and protect your system from these harmful software? A.   Avoid clicking suspicious links. B.   Keep your device updated. C.   Do not share personal information. D.   Cover your webcam.
A and B
33
refers to the improvements made on electronic devices or gadgets by combining the functions of two or more devices into one gadget.
computing technology
34
combines different media formats such as text, pictures, sounds, and videos into one multimedia content.
content technology
35
refers to the fastand effective transfer of information through the collaboration of different communication technologies.
communication technology
36
characterized by their fixed content, which means that it shows the same content every time the web page is accessed.
static web pages
37
are known for being changeable, which means that its content can change each time the web page is accessed.
dynamic web pages
38
the first generation of websites that was marked as read-only web.
Web 1.0
39
tools used to develop websites under web 1.0.
HTML and CSS
40
the second generation of websites that is referred to as the writable web
Webs 2.0
41
social web
web 2.0
42
the executable web of web evolution
web 3.0
43
system that enables computer devices to think and act like human beings
artificial intellegence
44
refers to a state where two or more technology entities and functions are combined into one device or system.
Technological convergence
45
refers to the individual links or pages of a website that act like the pages of a book.
web page
46
A strong password usually contains
at least 8 characters
47
is composed of complex interconnected networks that provides a virtual environment for different users to interact with each other
cyber world
48
permanent marks of your identity, and activities on the internet that could lead and be traced back to you.
digital footprints
49
to keep track of your activities
cookies
50
one of the main security risks online. These criminals will try to access private information, accounts, websites, or servers in order to steal, manipulate, destroy, sell or use the information gathered for their own benefit.
hacker
51
one of the main security risks online. These criminals will try to access private information, accounts, websites, or servers in order to steal, manipulate, destroy, sell or use the information gathered for their own benefit.
identity theft
52
the criminal sends you a personalized message accompanied by a shortened link asking you to provide personal information or bank account details
phishing
53
individuals who lure children or teenagers into engaging to sexualacts or relationship online.
internet predators
54
an online form of bullying with the aid of the internet and other technology-based communication
cyberbullying
55
malicious software, is created to invade and destroy the computer system.
malware
56
software that inserts its code into files and programs infecting other softwares inside the computer system
virus
57
software that can rapidly spread from one computer to another by replicating itself through the computer network even without human interaction
worms
58
secretly invades your computer and targets sensitive information.
spyware
59
dangers are associated with attackers that want to gather information about you in order for them to benefit through stealing money or engaging vulnerable victims into doing inappropriate things
crime related
60
dangers are usually caused by carelessness of the user or intended access of an external attacker to harm your reputation.
Privacy-related
61
dangers are caused by software that are installed or passed on to your computer through networks or opening unsafe links.
Malicious software related
62
an informal term which is short for "internet etiquette."
Netiquette