ict reviewer Flashcards

1
Q

is the largest computer network in the world that connects billions of computer user.

A

The Internet or “net” (network of network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information).

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the word internet started

A

*1982-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is an American internet pioneer and is recognize as one of the fathers the internet

A

VINTON GRAY CERF -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Major Components of the Internet

A

1.Servers
2.IP Address (Internet Protocol)
3.Browser
4.Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is a computer program that provides service to another computer program and it’s user.

A

A.Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– a program in computer that provides the business logic for an application program.

A

Application Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a computer program that serves requested HTML pages or files.

A

Web Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a software that acts as an intermediary between an endpoint device, such as computer and another server from which a user is requesting.

A

.Proxy Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery.

A

Mail Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a computer responsible for central storage and management of data files so that other computer on the same network can access them.

A

File Server –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a security component of a policy – based network that provides authorization services and facilities tracking and control of files.

A

Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a security component of a policy – based network that provides authorization services and facilities tracking and control of files.

A

Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a numerical label assigned to each device. This provides identity to a network device.

A

IP Address (Internet Protocol) –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is an application program that provides a way to look information on the web.

A

Browser –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the phonebook of internet. We access information online through domain names.

A

Domain Name System (DNS) –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

provided internet access to a specific geographic area.

A

Regional ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

business that provides internet access in cities and towns nationwide.

A

National ISP –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a collection of billions of webpages that you can view with a web browser

A

Web –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the most common method of sending and receiving messages online

A

Email –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

websites and apps that allow people to share comments, photos, and videos

A

Social media –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

games that allow people to play with and against each other over the Internet *

A

Online gaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

operating system and application updates can typically downloaded from the Internet

A

Software updates –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page. When a user clicks on a link within a web page, that link, which is coded with HTML, links the user to a specific linked web page.

A

HTML - Hypertext Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HTML

A
  • Hypertext Markup Language
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is a web address used to connect to a remote resource on the world wide web.

A

URL - Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

URL -

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

the data communication standard of web pages. When a web page has this prefix, the links, text, and pictures should work correctly in a web browser.

A

HTTP - Hypertext Transfer Protocol,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HTTP -

A

is the acronym for Hypertext Transfer Protocol,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This indicates that the web page has a special layer of encryption added to hide your personal information and passwords from others.

A

HTTPS Hypertext Transfer Protocol Secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

HTTPS

A

Hypertext Transfer Protocol Secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life. In other words, netiquette is a set of rules for behaving properly online.

A

netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.

A

REMEMBER THE GOLDEN RULE –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Even though you may be interacting with a computer screen, you are communicating with a real person who will react to your message.

A

REMEMBER THE GOLDEN RULE –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

treat others with the same respect that you would like to receive and avoid confrontational or offensive language.

A

Make a good impression -

34
Q

Communicating effectively in college and business environments requires the use of correct terminology, spelling, and grammar that can easily be understood.

A

AVOID SLANG, ACRONYMS, AND TEXT TALK –

35
Q

– Typing an entire message using all capital letters is known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words

A

AVOID “SCREAMING” IN TYPED MESSAGES

36
Q

– Proofreading your messages before you send them is a best practice for effective and efficient communication.

A

PROOFREAD YOUR MESSAGES BEFORE SENDING THEM

37
Q
  • Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation.
A

RESPECT DIVERSITY IN VIEWPOINTS

38
Q

It is the Characteristics of the culture of computers, information, technology and virtual reality.

A

Cyber

39
Q

is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.

A

Cybercrime

40
Q

they may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

A

Cybercriminals

41
Q

is a law in the Philippines approved on September 12,2012 which aims to address legal issues concerning online interactions and internet.

A

Republic Act No. 10175 Cybercrime Prevention Act of 2012

42
Q

s an act protecting individual personal information.

A

Republic Act No. 10173 Data Privacy Act of 2012 i

43
Q

The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

A

Copyright

44
Q

is the violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work.

A

-Copyright infringement

45
Q

An act or instance of using or closely imitating the language and thoughts of another author without authorization.

A

.Plagiarism

46
Q

generally used when speaking about excessive gaming behavior, which can be practiced both offline and online.

A

Offline:

47
Q

Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.

A

Online:

48
Q

The persona you create about yourself virtually.

A

Virtual Self -

49
Q

is a term used to describe actions taken by someone to gain unauthorized access to a computer.

A

Hacking

50
Q
  • An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.
A

Computer-related forgery, fraud and/or identity theft

51
Q

-The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.

A

Cyberbullying

52
Q

-Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.

A

e.Cybersex

53
Q
  • Is a form of child sexual exploitation.
      - Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti- Child Pornography Act of 2009, committed through a computer system.
A

Child Pornography

54
Q
  • Is an unprivileged false statement of fact which tends to harm the reputation of a person or company.
A

.Cyber Defamation

55
Q
  • is a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
A

Pharming

56
Q

is used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort. Fake emails, text messages and websites created to look like they’re from authentic companies. They’re sent by criminals to steal personal and financial information from you. This is also known as “spoofing”

A

Phishing

57
Q

is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

A

Ransomware

58
Q

is one of the more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages, advertising, or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs.

A

Spam

59
Q

are often used by third parties to infiltrate your computer.

A

Spyware (Spyware & Adware) Spyware and adware

60
Q

A malicious program that is disguised as, or embedded within, legitimate software. It is an executable file that will install itself and run automatically once it’s downloaded.

A

Trojan horse

61
Q

is another method used by cyber criminals to capture personal information. Virtual “listening in” on information that’s shared over an unsecure (not encrypted) WiFi network.

A

WiFi eavesdropping

62
Q

is a process in which we use typography, images, colors, icons and other illustrations to communicate visually.

A

Graphic Design -

63
Q

The basic elements of graphic design are the following:

A

Lines
Shapes
Form
Texture
Balance

64
Q

is a kind of shape which connects two or more points. It is also considered as one of the essential element of graphic design. it can be thick, thin, curved, or jagged.

A

Line -

65
Q
  • is a two-dimensional external boundary of an object. Any object outline that has height and width can be considered as a —–. Together with lines, they form the foundation of your design.
A

Shape

66
Q

There are two (2) major categories of shapes in design:

A

geometric
organic

67
Q

these are regular and mathematical shapes.

A

Geometric

68
Q

these are freeform shapes.

A

Organic –

69
Q

is a three-dimensional shape. Shadows, perspective, depth, and sometimes texture creates a form. Without these attributes, a form is just a shape or series of shapes.

A

Form -

70
Q

refers to the physical quality of the surface of an object in an artwork or design. It also refers to how an object look or feels like. An object might be smooth, rough, shiny, hard, or soft. It can be in 3D or 2D Texture adds depth and visual interest to the flat images or objects.

A

Texture -

71
Q

is the creation of visual equilibrium by relating elements such as line, shape, color, space or form in terms of their visual weight.

A

Balance -

72
Q
  • From the name itself, which includes radial symmetry is when both two sides of a piece are equal. If you fold your artwork or piece into two or if you put an imaginary line between your artwork, each half is identical or visually similar to the other half.
A

Symmetrical balance.

73
Q

Both sides of your composition does not contain the same elements but contain almost the same visual weight.

A

Asymmetrical balance -

74
Q

are the building blocks of design. These two focus on the arrangement of your objects or elements on your design. Your good texts, images, or other elements in the graphic will turn to waste if your layout is not well-composed.

A

Layout and composition

75
Q

There are five basic principles of layout and composition:

A
  1. Proximity
  2. White Space
  3. Alignment
  4. Contrast
  5. Repetition
76
Q

is the process of placing related elements together. Elements that are not related to that group should be separated to show that these elements are not related to that group.

A

Proximity

77
Q

the negative space between lines, paragraphs, and element on the design.

A

White space

78
Q

helps designers to organize different elements in their composition. This is similar to the —- that we see in MS Word or other productivity tools. Effective use of——give your composition a definitive structure and a creative balance.

A

Alignment

79
Q

means one element is opposite to the other element. This does not only apply to colors, but to typeface and size of elements as well. — helps you to catch the viewer’s eye, create a direction, or giving emphasis to something. For example, if you use dark color for your background, you should use light color for your foreground; or if you use different test style to give emphasis on your content.

A

Contrast

80
Q

simply means to use of the same typefaces, color palettes, or other elements to achieve consistency in your composition. This creates unity in your composition or make your projects connected to each other.

A

Repetition

81
Q

is the art of arranging texts that makes it readable and appealing to the viewer. It involves font style, typeface, and text structure.

A

Typography

82
Q

refers to the variation of weights of a typeface, while typeface refers to the text style. — also refers to the format or storage mechanism of a text like .of and .tiff.

A

Font

83
Q

Types of Fonts can be categorized into three:

A

Serif
San Serif
Display

84
Q

are fonts that have little strokes called serif on each end of the letter. They are typically used in formal or traditional projects.

A

Serif fonts

85
Q

are fonts with no extra strokes. Sans serif simple means “without serifs” as sans is a French word for without.

A

Sans serif