ETECH Flashcards

1
Q

can be traced thousands or years ago, around 3000
BCE to 1450 CE. During this time humans started communicating with one another using words and pictograms curved in rocks.

A

Premechanical period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

considered the first data centers in history.

A

Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

pictogram dating back 3100 BCE

A

Sumerian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

considered to be the first counting device was introduced in the 2nd century BCE. Manually operated device similar to the modern calculator.

A

Abacus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This period served as the bridge between our current period and the
premechanical period. This period started around 1450 – 1840. During this time, the interest in automating and speeding up numerical calculations grew.

A

Mechanical Period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which was invented by the famous mathematician inventor Blaise
Pascal.

A

Pascaline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which is considered the first programmable
mechanical computer and was invented by Charles Babbage.

A

Analytical Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

“Father of the Computer”

A

Charles Babbage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a crime of stealing personal information for the purpose of assuming that
person’s name or identity to make any form of transactions.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

considered the first
electrical communications devices.

A

Telegraph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This period started around 1840 – 1940. In this period, the use of
electricity for information handling and transfer bloomed.

A

Electromechanical Period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

first computer programmer.

A

Ada Lovelace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

invented the
first commercial telegraph in 1837 (OLIVIA AND KING)

A

William Cooke and Sir Charles Wheatstone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An American inventor successfully introduced the first single circuit telegraph

A

Samuel Morse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The last period in ICT history. It started in the 1940s and continues to the present. The highlight of this period is focus on the advent of solid state devices or electronic devices.

A

Electronic Period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

best known for
his invention of the telephone.

A

Alexander Graham Bell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the first electronic and general purpose computer. (1946)

A

ENIAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It is an electronic with properties and
functions similar to vacuum tubes but it is lightweight and faster. (1947)

A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Introduced by Tim Berners-Lee.
It consists of different pages that are formatted in a markup language called HTML (Hypertext Markup Language) and linked to each other that contain text, graphics, multimedia files, hyperlinks, etc.

A

WWW

16
Q

is a device that composed of a group of transistors
and circuit elements compressed in a single package. (ICU)

A

Integrated Circuit (IC)

17
Q

It is also known as a flat or stationary page and it cannot be manipulated by users.

A

WEB 1.0

18
Q

It is a dynamic web page where user can interact with page like
creating a user account, posting comments, uploading files and
images, and others.

A

WEB 2.0

19
Q

Features of web 2.0

A

FOLKSONOMY
RICH USER EXPERIENCE
USER PARTICIPATION
LONG TAIL
SOFTWARE AS A SERVICE
MASS PARTICIPATION

20
Q

users can classify and arrange information by
adding tags or labels. (SODOMY FOLKLORE)

A

Folksonomy

20
Q

Two or more technologies
perform into one single
function

A

Convergent Technology

21
Q

It often deals with the use of different
technological inventions like mobile
phones, telephones, computer, Internet, and other devices

A

ICT

22
Q

It is an etiquette
applied online that shows proper manner and behavior.

A

Netiquette

23
Q

The importance of internet plays a crucial part in human development.

A

Online Safety

24
Q

It happens when someone intentionally abused, harass, and mistreated by other
person using electronic communication.

A

Cyberbullying

25
Q

A criminal practice where electronic communication is used to stalk or harass individual or group.

A

Cyber Stalking

26
Q

The act of sending sexually explicit text messages, images, and videos.

A

Sexting

27
Q

a malicious program that replicate
itself by copying itself to another program.

A

Virus

28
Q

Also known as
Malicious Software. It is a set of
instructions that run on your computer and make your system do
something that an attacker wants it
to do.

A

Malware

29
Q

malicious program that copy is itself and spreads to other computers.

A

Worm

30
Q

a malicious program that disguised as legitimate program that user will accept and use but take control of your computer.

A

Trojan

31
Q

A malicious program that gathers information from victim’s computer and send it back to the hacker.

A

Spyware

32
Q

An unwanted advertisement that will pop-up several
times on victim’s computer then behave abnormally and tedious to close them.

A

ADWARE

33
Q

A program that runs in the background and steals user credentials and confidential information and send back to hack by
recording every keystroke that a user makes on their computer or
device.

A

Keylogger

34
Q

A collection of infected internets–connected devices such as PC and mobile phone that are controlled by a common type of malware.

A

Botnet

35
Q

A software tools used by hackers to gain control over a computer on a network without being exposed.

A

Rootkit

36
Q

A ransom virus that block the user from accessing the
programs or files and demands to pay the ransom through online
method for the removal of the virus.

A

Ransomware

37
Q

Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

A

Spam

37
Q

A cyberattack method
using deceptive emails and websites to acquiring sensitive personal information.

A

Phishing

38
Q

Pharming

A

A more complicated way of phishing where it exploits the DNS (DOMAIN NAME
SERVICE) system.

39
Q

A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

A

Cybercrime