ICT Reviewer Flashcards

1
Q

Basic concept about the internet, computer technology, computer applications,
and online etiquette.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is the collection of information accessed through the Internet. Its primary
purpose is to connect the world in a way
that is not possible before and it made so
much easier for people to share information.

A

World Wide Web (WWW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

British computer scientist who created
the World Wide Web.

A

Tim Burners-Lee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

URL the address of a web page.

A

URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

unique numerical identifier for every device or network that connects to the internet

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a vast network that connects computers
all over the world.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

read-only web also known as static webpage

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • websites and applications that make
    use of user-generated content for end
    users
  • characterized by greater user interactivity and collaboration, more pervasive
    network connectivity and enhanced communication channels.
A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

decentralized, open to everyone (with
a bottom-up design), and built on top
of blockchain technologies and developments in the Semantic Web, which describes the web as a network of meaningfully linked data.

A

Web 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The growth in information and communication technology is enormous. Many different technologies are introduced to the world, as time passes by. In fact, these
technologies make life more comfortable
and enjoyable.

A

Trend in ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can be associated with any technology that applies the process of convergence. In its simplest definition, convergence refers to the meeting of different
elements to make up a whole

A

Convergent Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Process of connecting people and bringing relevant and pertinent Information to
people across the globe.

A

Social Media Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These sites allow the creation of personal accounts that will be used to connect
with people for different purposes

A

Social Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

to search, manage, and store web pages
that a person wants to revisit or share
with others.

A

Bookmarking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These are sites that permit the users to
submit news articles, stories, videos, and
photographs that are worth sharing to
their expected subscribers.

A

Social News

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sites allow their user to share and to upload multimedia contents like graphics,
texts, videos and audios.

A

Media Sharing

17
Q

Online brodcast mediums that allow their
users to post and exchangeshort contents that may include texts, graphics,
audios, and videos.

A

Microblogging

18
Q

allow one to post his or her content. As a
blogger, one has complete control of the
blogs.

A

Blogs and Forums

19
Q

devices that are adaptive, assistive, and
rehabilitative to the elderly and and to
people with special needs that is founded
in Ann Arbor, Michigan in 1996
- is an internet delivered audio reading service for people with visual or perceptual reading impairments

A

Assistive Media

20
Q

refers to the maximization of internet
users’ knowledge and awareness of
safety protocols, online crimes, and security risk in the private property and information which are connected to the use
of the internet.

A

Online Safety

21
Q

Online security refers to the “rules that
are followed and actions that are taken to
make sure that online users and data privacy aren’t compromised by cybercriminals.”

A

Mocan 2019

22
Q

Violations that inflict harm to other people by internet users

A

Online Crimes

23
Q

any severe or repeated gesture use by
one or more students of a written, verbal,
or electronic expression, or a physical act
or gesture, or any combination thereof,
directed to another student that has effect of actually causing or placing the latter in reasonable fear of physical or emotional harm or damage to his property;
creating a hostile environment at school,
infringing on the rights of another, or materially or substantially disrupting the education process.

A

Cyberbullying

24
Q

Online fights using electronic messages
with angry and vulgar language.

A

Flaming

25
Q

act of repeatedly sending nasty, mean, and insulting messages

A

Harassment

26
Q

Sending or posting cruel gossip or rumors about a person to damage their reputation or friendships. Dissing someone online

A

denigration

27
Q

someome pretending to be someone else and sending or posting material to get that person in trouble or danger or damage to ruin their reputations

A

Impersonation

28
Q

an act of sharing someone’s sevrets or embarrassing information or images online

A

outing

29
Q

someone talking to a person to let him or
her reveal his or her secrets or embarrassing information and then, shares the
sensitive information online

A

trickery

30
Q

an individual is intentionally or cruelly excluded from an online group

A

exclusion

31
Q

an act of repeated, intense harassment
and denigration that includes threats or
creates significant fear.

A

cyberstalking

32
Q
  • defined as all types of crime in which
    someone wrongfully obtains and uses
    another person’s personal data in a way
    that involves fraud or deception, typically
    for economic gain
  • shoulder surfing, spam mails
A

Identity theft

33
Q
A
33
Q

the fraudulent practice of sending emails
purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

A

phishing

34
Q

presenting someone elses work or ideas
as your own with or without their consent
by incorporating it in your work without
full acknowledgement. can be intentional, reckless, or unintentional

A

plagiarism