ICT Flashcards

1
Q

Deals with the use of different communication technologies

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ICT

A

Information and Communications Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trends in ICT

A
  1. Convergence
  2. Social Media
  3. Mobile Technologies
  4. Assistive Technologies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
- synergy of technological
advancements to work on a similar
goal or task.
- the usage of several
technologies to accomplish tasks
conveniently
A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • enables users to create, co-create,

discuss, modify, and exchange user-generated content.

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Media

A

a) Social Networking Sites
a) Bookmarking Sites
b) Social News
c) Media Sharing
d) Microblogging
e) Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • devices’ capability to do tasks that a personal computer can and handier than a personal computer
A

Mobile Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OS

A

Operating Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile OS examples

A
  1. iOS
  2. Android
  3. Blackberry OS
  4. WebOS
  5. Symbian
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Originally a smartphone O.S. but is now mostly used for smart TVs

A

WebOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“An act prescribing the intellectual property code and establishing the intellectual property office, providing for its powers and functions, and for other purposes. It shall protect and secure the exclusive rights of scientists, inventors, artists, and other gifted citizens to their intellectual property and creations, particularly when beneficial to the people, for such periods as provided in this Act. “

A

R.A. 8293

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T or F There are 16 crimes under R.A. 10175

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WWW

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

words, phrases, symbols, and/or designs that identify a brand from others.

A

trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a piece of non-public information that is guarded by their respective companies.

A

trade secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

awarded for inventions satisfying a global criterion of non-obviousness, global novelty, and industrial or commercial application.

A

patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

legal protection for the owner of his original work.

A

copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Considered as one of the most destructive computer malware of all time, created by a Filipino programmer back in 2000

A

ILOVEYOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who was the person that once said, “The Internet gave us access to everything, but it also gave everything access to us.”

A

James Veitch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

T or F Setting your post to private will help search engines scan your posts

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A three-dimensional computer-generated environment that can be explored and interacted with by a person

A

VR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VR

A

Virtual Reality

23
Q

Sites that allow you to upload and share media content like images, music, and video

A

Media Sharing

24
Q

any device, software, or equipment that helps people work around their challenges.

A

Assistive Technology

25
T or F A forum is mostly journalistic, while a blog is mainly focused on discussions.
False
26
This type of social media website focuses on short updates posted by the user.
Microblogging
27
OTP
One time pin
28
is based on reality but used to inflict harm
Mal-information
29
is false but not deliberately created to harm
Misinformation
30
is false and intends to cause harm
Disinformation
31
MALWARE
Malicious software
32
Doctrine in the law that allows the limited use of copyrighted materials without acquiring permission from the copyright holder first
fair use
33
- An open-source operating system developed by Google | - being open-source means several mobile phone companies use this OS for free
Android
34
What is the Original phone O.S. used by Nokia, Sony Ericsson, Samsung, and others?
Symbian
35
T or F Using incognito or private mode protects your browsing activity from hackers
False
36
- a term used when someone has posted or emailed something untrue and damaging about someone else on the Internet, including in message boards, bulletin boards, blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
cyber-libel
37
- a term used when someone has posted or emailed something untrue and damaging about someone else on the Internet, including in message boards, bulletin boards, blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
cyber-libel
38
Malware Examples
1. Virus 2. Worm 3. Trojan 4. Spyware 5. Adware
39
These are unsolicited emails, mostly from bots or advertisers, that can be used to send malware.
Spam
40
a stand-alone malicious program that can self-replicate and propagate via computer networks without human help.
Virus
41
The registering, selling, or using a domain name with the intent of profiting from the goodwill of someone else's trademark is called
Cyber-squatting
42
A program that runs in the background without the knowledge of the user
Spyware
43
A malware disguised as a legitimate software
Trojan
44
Pinterest is a social media website that can be classified as a
Bookmarking Sites
45
any program or file that is designed with malicious intent
Malware
46
In the Philippines, copyrights only last a lifetime (of the author) plus ____ __
50 years
47
Cybercrime Prevention Act of 2012
RA 10175
48
ERIC
Education Resources Information Center
49
online digital library of education research and information
ERIC
50
acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information
Phishing
51
more complicate than phishing where it exploits the DNS (Domain Name Service) system.
Farming
52
a crime that involves a computer and a | network
Cybercrime
53
DOAJ
Directory of Open Access Journals
54
a stand-alone malicious program that can self-replicate and propagate via computer networks with human help.
Worm