ict reviewer Flashcards

1
Q

is the largest computer network in the world that connects billions of computer user.

A

The Internet or “net” (network of network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information).

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the word internet started

A

*1982-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is an American internet pioneer and is recognize as one of the fathers the internet

A

VINTON GRAY CERF -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Major Components of the Internet

A

1.Servers
2.IP Address (Internet Protocol)
3.Browser
4.Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a computer program that provides service to another computer program and it’s user.

A

A.Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– a program in computer that provides the business logic for an application program.

A

Application Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a computer program that serves requested HTML pages or files.

A

Web Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a software that acts as an intermediary between an endpoint device, such as computer and another server from which a user is requesting.

A

.Proxy Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery.

A

Mail Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a computer responsible for central storage and management of data files so that other computer on the same network can access them.

A

File Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a security component of a policy – based network that provides authorization services and facilities tracking and control of files.

A

Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a security component of a policy – based network that provides authorization services and facilities tracking and control of files.

A

Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a numerical label assigned to each device. This provides identity to a network device.

A

IP Address (Internet Protocol) –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is an application program that provides a way to look information on the web.

A

Browser –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the phonebook of internet. We access information online through domain names.

A

Domain Name System (DNS) –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

provided internet access to a specific geographic area.

A

Regional ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

business that provides internet access in cities and towns nationwide.

A

National ISP –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a collection of billions of webpages that you can view with a web browser

A

Web –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the most common method of sending and receiving messages online

A

Email –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

websites and apps that allow people to share comments, photos, and videos

A

Social media –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

games that allow people to play with and against each other over the Internet *

A

Online gaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

operating system and application updates can typically downloaded from the Internet

A

Software updates –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page. When a user clicks on a link within a web page, that link, which is coded with HTML, links the user to a specific linked web page.

A

HTML - Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
HTML
- Hypertext Markup Language
25
is a web address used to connect to a remote resource on the world wide web.
URL - Uniform Resource Locator
26
URL -
Uniform Resource Locator
27
the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in a web browser.
HTTP - Hypertext Transfer Protocol,
28
HTTP -
is the acronym for Hypertext Transfer Protocol,
29
This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others.
HTTPS Hypertext Transfer Protocol Secure.
30
HTTPS
Hypertext Transfer Protocol Secure.
31
that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online.
netiquette
32
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.
REMEMBER THE GOLDEN RULE –
32
Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.
REMEMBER THE GOLDEN RULE –
33
treat others with the same respect that you would like to receive and avoid confrontational or offensive language.
Make a good impression -
34
Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood.
AVOID SLANG, ACRONYMS, AND TEXT TALK –
35
– Typing an entire message using all capital letters is known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words
AVOID “SCREAMING” IN TYPED MESSAGES
36
– Proofreading your messages before you send them is a best practice for effective and efficient communication.
PROOFREAD YOUR MESSAGES BEFORE SENDING THEM
37
- Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation.
RESPECT DIVERSITY IN VIEWPOINTS
38
It is the Characteristics of the culture of computers, information, technology and virtual reality.
Cyber
39
is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.
Cybercrime
40
they may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
Cybercriminals
41
is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.
Republic Act No. 10175 Cybercrime Prevention Act of 2012
42
s an act protecting individual personal information.
Republic Act No. 10173 Data Privacy Act of 2012 i
43
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Copyright
44
is the violation, piracy or theft of a copyright holder's exclusive rights through the unauthorized use of a copyrighted material or work.
-Copyright infringement
45
An act or instance of using or closely imitating the language and thoughts of another author without authorization.
.Plagiarism
46
generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.
Offline:
47
Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.
Online:
48
The persona you create about yourself virtually.
Virtual Self -
49
is a term used to describe actions taken by someone to gain unauthorized access to a computer.
Hacking
50
* An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
Computer-related forgery, fraud and/or identity theft
51
-The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.
Cyberbullying
52
-Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.
e.Cybersex
53
- Is a form of child sexual exploitation. - Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- Child Pornography Act of 2009, committed through a computer system.
Child Pornography
54
- Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
.Cyber Defamation
55
- is a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
Pharming
56
is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort. Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”
Phishing
57
is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
Ransomware
58
is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising, or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.
Spam
59
are often used by third parties to infiltrate your computer.
Spyware (Spyware & Adware) Spyware and adware
60
A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it's downloaded.
Trojan horse
61
is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that's shared over an unsecure (not encrypted) WiFi network.
WiFi eavesdropping
62
is a process in which we use typography, images, colors, icons and other illustrations to communicate visually.
Graphic Design -
63
The basic elements of graphic design are the following:
Lines Shapes Form Texture Balance
64
is a kind of shape which connects two or more points. It is also considered as one of the essential element of graphic design. it can be thick, thin, curved, or jagged.
Line -
65
- is a two-dimensional external boundary of an object. Any object outline that has height and width can be considered as a -----. Together with lines, they form the foundation of your design.
Shape
66
There are two (2) major categories of shapes in design:
geometric organic
67
these are regular and mathematical shapes.
Geometric
68
these are freeform shapes.
Organic –
69
is a three-dimensional shape. Shadows, perspective, depth, and sometimes texture creates a form. Without these attributes, a form is just a shape or series of shapes.
Form -
70
refers to the physical quality of the surface of an object in an artwork or design. It also refers to how an object look or feels like. An object might be smooth, rough, shiny, hard, or soft. It can be in 3D or 2D Texture adds depth and visual interest to the flat images or objects.
Texture -
71
is the creation of visual equilibrium by relating elements such as line, shape, color, space or form in terms of their visual weight.
Balance -
72
- From the name itself, which includes radial symmetry is when both two sides of a piece are equal. If you fold your artwork or piece into two or if you put an imaginary line between your artwork, each half is identical or visually similar to the other half.
Symmetrical balance.
73
Both sides of your composition does not contain the same elements but contain almost the same visual weight.
Asymmetrical balance -
74
are the building blocks of design. These two focus on the arrangement of your objects or elements on your design. Your good texts, images, or other elements in the graphic will turn to waste if your layout is not well-composed.
Layout and composition
75
There are five basic principles of layout and composition:
1. Proximity 2. White Space 3. Alignment 4. Contrast 5. Repetition
76
is the process of placing related elements together. Elements that are not related to that group should be separated to show that these elements are not related to that group.
Proximity
77
the negative space between lines, paragraphs, and element on the design.
White space
78
helps designers to organize different elements in their composition. This is similar to the ---- that we see in MS Word or other productivity tools. Effective use of------give your composition a definitive structure and a creative balance.
Alignment
79
means one element is opposite to the other element. This does not only apply to colors, but to typeface and size of elements as well. --- helps you to catch the viewer’s eye, create a direction, or giving emphasis to something. For example, if you use dark color for your background, you should use light color for your foreground; or if you use different test style to give emphasis on your content.
Contrast
80
simply means to use of the same typefaces, color palettes, or other elements to achieve consistency in your composition. This creates unity in your composition or make your projects connected to each other.
Repetition
81
is the art of arranging texts that makes it readable and appealing to the viewer. It involves font style, typeface, and text structure.
Typography
82
refers to the variation of weights of a typeface, while typeface refers to the text style. --- also refers to the format or storage mechanism of a text like .of and .tiff.
Font
83
Types of Fonts can be categorized into three:
Serif San Serif Display
84
are fonts that have little strokes called serif on each end of the letter. They are typically used in formal or traditional projects.
Serif fonts
85
are fonts with no extra strokes. Sans serif simple means “without serifs” as sans is a French word for without.
Sans serif