ICT Flashcards

1
Q

Deals with the use of different communication technologies

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ICT

A

Information and Communications Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trends in ICT

A
  1. Convergence
  2. Social Media
  3. Mobile Technologies
  4. Assistive Technologies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
- synergy of technological
advancements to work on a similar
goal or task.
- the usage of several
technologies to accomplish tasks
conveniently
A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • enables users to create, co-create,

discuss, modify, and exchange user-generated content.

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social Media

A

a) Social Networking Sites
a) Bookmarking Sites
b) Social News
c) Media Sharing
d) Microblogging
e) Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • devices’ capability to do tasks that a personal computer can and handier than a personal computer
A

Mobile Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OS

A

Operating Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile OS examples

A
  1. iOS
  2. Android
  3. Blackberry OS
  4. WebOS
  5. Symbian
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Originally a smartphone O.S. but is now mostly used for smart TVs

A

WebOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“An act prescribing the intellectual property code and establishing the intellectual property office, providing for its powers and functions, and for other purposes. It shall protect and secure the exclusive rights of scientists, inventors, artists, and other gifted citizens to their intellectual property and creations, particularly when beneficial to the people, for such periods as provided in this Act. “

A

R.A. 8293

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T or F There are 16 crimes under R.A. 10175

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WWW

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

words, phrases, symbols, and/or designs that identify a brand from others.

A

trademark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a piece of non-public information that is guarded by their respective companies.

A

trade secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

awarded for inventions satisfying a global criterion of non-obviousness, global novelty, and industrial or commercial application.

A

patent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

legal protection for the owner of his original work.

A

copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Considered as one of the most destructive computer malware of all time, created by a Filipino programmer back in 2000

A

ILOVEYOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who was the person that once said, “The Internet gave us access to everything, but it also gave everything access to us.”

A

James Veitch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

T or F Setting your post to private will help search engines scan your posts

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A three-dimensional computer-generated environment that can be explored and interacted with by a person

A

VR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VR

A

Virtual Reality

23
Q

Sites that allow you to upload and share media content like images, music, and video

A

Media Sharing

24
Q

any device, software, or equipment that helps people work around their challenges.

A

Assistive Technology

25
Q

T or F A forum is mostly journalistic, while a blog is mainly focused on discussions.

A

False

26
Q

This type of social media website focuses on short updates posted by the user.

A

Microblogging

27
Q

OTP

A

One time pin

28
Q

is based on reality but used to inflict harm

A

Mal-information

29
Q

is false but not deliberately created to harm

A

Misinformation

30
Q

is false and intends to cause harm

A

Disinformation

31
Q

MALWARE

A

Malicious software

32
Q

Doctrine in the law that allows the limited use of copyrighted materials without acquiring permission from the copyright holder first

A

fair use

33
Q
  • An open-source operating system developed by Google

- being open-source means several mobile phone companies use this OS for free

A

Android

34
Q

What is the Original phone O.S. used by Nokia, Sony Ericsson, Samsung, and others?

A

Symbian

35
Q

T or F Using incognito or private mode protects your browsing activity from hackers

A

False

36
Q
  • a term used when someone has posted or emailed something untrue and damaging about someone else on the Internet, including in message boards, bulletin boards, blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
A

cyber-libel

37
Q
  • a term used when someone has posted or emailed something untrue and damaging about someone else on the Internet, including in message boards, bulletin boards, blogs, chat rooms, personal websites, social media, social networking sites, or other published articles.
A

cyber-libel

38
Q

Malware Examples

A
  1. Virus
  2. Worm
  3. Trojan
  4. Spyware
  5. Adware
39
Q

These are unsolicited emails, mostly from bots or advertisers, that can be used to send malware.

A

Spam

40
Q

a stand-alone malicious program that can self-replicate and propagate via computer networks without human help.

A

Virus

41
Q

The registering, selling, or using a domain name with the intent of profiting from the goodwill of someone else’s trademark is called

A

Cyber-squatting

42
Q

A program that runs in the background without the knowledge of the user

A

Spyware

43
Q

A malware disguised as a legitimate software

A

Trojan

44
Q

Pinterest is a social media website that can be classified as a

A

Bookmarking Sites

45
Q

any program or file that is designed with malicious intent

A

Malware

46
Q

In the Philippines, copyrights only last a lifetime (of the author) plus ____ __

A

50 years

47
Q

Cybercrime Prevention Act of 2012

A

RA 10175

48
Q

ERIC

A

Education Resources Information Center

49
Q

online digital library of education research and information

A

ERIC

50
Q

acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and be asked to update his/her username, password, credit card, or personal information

A

Phishing

51
Q

more complicate than
phishing where it exploits the DNS
(Domain Name Service) system.

A

Farming

52
Q

a crime that involves a computer and a

network

A

Cybercrime

53
Q

DOAJ

A

Directory of Open Access Journals

54
Q

a stand-alone malicious program that can self-replicate and propagate via computer networks with human help.

A

Worm