ICT, Kinds of Malware, and Violations & Laws Flashcards

1
Q

ICT stands for

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Through the power of ICT technologies like computer networks and gadgets made the world connected in the ___________________

A

cyber world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Though we can use these features effortlessly, every one of us needs to be technology enabled and be aware of the __________________

A

digital community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Philippines is the fastest growing app market in Southeast Asia and the ________________ in the world.

A

highest digital population

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It refers to fusing of technological advancement to work on a similar task. Example. Using smartphone as camera in taking pictures instead of DSLR camera.

A

Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An application and website where user can communicate, create and share content, and participate in online communities.

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A website where people with the same come together to share information. Examples: Twitter, Instagram, Facebook

A

Social Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A website where user can post stories and are ranked based on the popularity through voting. Examples: Digg, Reddit, Propeller, Slashdot, Fark

A

Social News

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A website that allows you to share and store internet bookmarks, articles, posts, blogs, images and others. Examples: Pinterest, StumbleUpon, Dribble

A

Bookmarking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A website that allows you to share and store multimedia files such as video, photos and music. Examples: Instagram, YouTube, Flickr

A

Media Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a website that allows you to broadcast short message. Examples: Twitter, Tumblr,

A

Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a discussion website that allows user to ask questions and comments on a journal posted by an individual or group. Examples: Wordpress, Blogger

A

Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a technology used in cellular and other devices such netbook, laptop, tablet, smartphones and etc.

A

Mobile Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A platform that assist people with disability. It will guide the individual like a blind person by using an audio recording.

A

Assistive Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you can program it, then it’s a platform. If you can’t, then it’s not.” - Marc Andreessen

A

Online Platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Online Platform: Google Chrome, Yahoo, Microsoft Edge

A

Web Search Engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Online Platform: Globe Telecom, Smart Communications, PLDT

A

Communication Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Online Platform: BDO Online, GCASH, PayMaya

A

Payment System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Online Platform: Lazada, Shopee, Amazon

A

Advertising Platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Online Platform: Canva, Powtoon, Capcut

A

Creative Content Outlets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Think before you _____________

A

click

22
Q

Never post about your ____________________

A

future vacation

23
Q

Add people whom _________________________

A

you only know in real life

24
Q

Install and update ________________ in your computer

A

antivirus

25
Q

Do not share your ______________ or OTPs with anyone

A

password

26
Q

Add password to your ______________ at home to make it private

A

WIFI

27
Q

Do not visit _______________ and download files from unknown sources.

A

untrusted websites

28
Q

Do not give your ___________________ to anyone or post it in unknown sites

A

personal information

29
Q

It happens when someone intentionally abused, harass, and mistreated by other person using electronic communication.

A

Cyberbullying

30
Q

It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.

A

Identity Theft

31
Q

A criminal practice where electronic communication is used to stalk or harass individual or group

A

Cyber Stalking

32
Q

The act of sending sexually explicit text messages, images, and videos

A

Sexting

33
Q

Also known as Malicious Software

A

Malware

34
Q

A malicious program that replicate itself by copying itself to another program.

A

Virus

35
Q

A malicious program that disguised as legitimate program that user will accept and use but take control of your computer.

A

Trojan Horse

36
Q

Malicious program that copy’s itself and spreads to other computers.

A

Worm

37
Q

A malicious program that gathers information from victim’s computer and send it back to the hacker.

A

Spyware

38
Q

An unwanted advertisement that will pop-up several times on victim’s computer then behave abnormally and tedious to close them.

A

Adware

39
Q

Also known as junk email or unwanted email send by advertiser or bot. It can be used to send malware.

A

Spam

40
Q

A cyberattack method using deceptive emails and websites to acquiring sensitive personal information.

A

Phishing

41
Q

A crime in which computer is used as object and tool in committing a crime such hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and others.

A

Cybercrime

42
Q

It is an etiquette applied online that shows proper manner and behavior.

A

Netiquette

43
Q

If you are a member of an online society through social media you are called __________________

A

Netizen

44
Q

_____________ is a research method in collecting and gathering information via internet by using search engine such as google.

A

Internet Research

45
Q

___________________ is a program that allows users to search for content on internet.

A

Search Engine

45
Q

There are millions of information that we can get from the internet. Some of this information are free but others are not. They are protected by a _______________________

A

copyright law

46
Q

_______________________ is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and computer programs.

A

Copyright

47
Q

This original work is called intellectual property which is protected under Republic Act 8293 known as the _______________________________

A

Intellectual Property Code of the Philippines

48
Q

This happens when the copyrighted work is use by other person without permission of the author or copyright holder. Any person who is infringing the right protected work would be liable under the law.

A

Copyright Infringement

49
Q

_________________________ is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright.

A

Fair use