Finals Flashcards
ACM
Association of Computing Machinery
API
Application Programming Interface
ATAS
Automated time and attendance System
a sensor that detects sound waves such as how radars and sonars pick up sounds.
Ultrasonic sensor
DBG
Disruptive business group
DTTB
Doctor-to-the-Barrio
e- Payment
Electronic payment
FHSIS
Field Health Service Information System
IBM
International Business Machine Corporation
IoT
Internet of Things
LMS
Learning management system
mHealth
Mobile Health
PIN
Personal Identification Number
RPA
Robotic Process Automation
TMS
Transport management solutions
refers the use of equipment such as machine or computers to accomplish previously human exclusive task.
Automation
a tool in which user access big volume of files and application over the internet using multiple devices.
Cloud computing
delivers enterprise-level services that can easily integrate with cloud application.
Cloud Foundry
is a term for any type of business or commercial transaction, that involves the transfer of information across the internet.
Electronic commerce (e Commerce)
refers the use of information and communication technologies in healthcare.
Electronic health (e Health)
is utilizing electronic technologies to access educational curriculum and facilitate learning outside of a traditional classroom.
Electronic learning (e learning)
refers to ad- supported programs, games or utilities that are distributed as adware.
Freeware
a sensor that detect infrared light. It usually used along with an infrared light source.
Infrared sensor
refers to a network of physical objects like gadgets, consumer appliances or industrial equipment with embedded technology that allows communication and interaction with each other.
Internet of things (IoT)
a sensor that can detect level of liquids, fluids, grainy or granular materials such as powders etc.
Level sensor
access the second level authentication methods to ensure that online transactions are secure.
One time pin
allows a user to execute financial transactions via internet.
Online banking
a sensor helps determine the weight or impact of a certain object.
Pressure sensor
a sensor that is able to detect objects within a certain range even if the object is not physically touching the sensor yet.
Proximity sensor
a type of malware that can block access to the victims data.
Ransomware
The application of technology that allows employees in a company to configure computer software or a “robot” to capture and interpret existing applications for processing a transaction, manipulating data, triggering responses, and communicating with other digital systems.
Robotic process automation (RPA)
Hardware devices that have the capability to measure an event, object, or any physical quality that is happening.
Sensors
These are cities that adopts IoT in traffic management , waste disposal, even community monitoring, ford securing of city’s residents.
Smart cities
It is a sensor that are used to detect the presence of dangerous fumes such as carbon monoxide caused by fire.
Smoke sensor
It is a software that aims to gather information about an organization or a person without his or her knowledge.
Spyware
It is capable of measuring temperature as well as detecting any rise or fall of it.
Temperature sensor
It is a sensor that activates itself and becomes capable of doing its function
Touch sensor
also known as “internet banking” or web banking” allows a user to execute financial transactions via the internet.
Online banking
It is a computer program usually hidden within another program that inserts itself into other programs or files.
Virus
a stand-alone malware that replicates in order to spread to other computers
Worm
a malicious program which initially appears to be useful, routine, or interesting in order to persuade a victim to install it.
Trojan
a software that aims to gather information about an organization or a person without his or her knowledge.
Spyware
type of malware that can block access to a victim’s data.
Ransomware
the victim’s files are encrypted, and the hacker would demand a ransom for the file to be decrypted.
Cryptoviral extortion
A more dangerous type of spyware is one that asserts control over a device without the user’s knowledge. Give examples of this
- Keystroke logging
- Spy cams
This trend created a culture of people dining with friends or family without actually interacting with them.
Weblogging
People can watch videos, comment on them, and upload their own videos, among others.
Youtube Learners
People can watch videos, comment on them, and upload their own videos, among others.
Youtube Learners
it is a is a combination of the words internet and etiquette. It is describe how one should act online.
Netiquette
an unwanted, hostile behavior done by individuals to other people in the hope of gaining control over them.
Cyberbullying
While netiquette applies to all netizens, IT professionals specifically follow an ethical practice as they are the front liners, support, and backend of ICT.
Professional Ethics