IT Flashcards

1
Q

An electronic device that processes data according to a set of instructions called a program. It can store, retrieve, and manipulate data to perform a variety of tasks, such as calculations, communication, and information management. A computer typically consists of hardware components and software that controls its operations.

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The abacus is one of the earliest known tools used for calculation. It was used in ancient civilizations for performing arithmetic operations such as addition, subtraction, multiplication, and division.

A

500 BC: The Abacus Calculator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This refers to the invention of the first mechanical computer by Charles Babbage. His design, known as the Difference Engine, could perform complex mathematical calculations automatically.

A

1821: The First Computer is Invented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The first electric computer designed for regular use was built in 1939. Early examples include the Atanasoff-Berry Computer (ABC), which is considered the first electronic digital computer.

A

1939: The First Electric Computer for Routine Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In 1971, the first email was sent by Ray Tomlinson. He is credited with developing the email system, using the “@” symbol to distinguish between the user and the computer system.

A

1971: First Email Sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This refers to the development of the Xerox Alto, one of the earliest computers to feature a graphical user interface, keyboard, and mouse—elements that would become standard in personal computing.

A

1973: First Computer with Graphical User Interface (GUI), Keyboard, and Mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

released in 1981 by Osborne Computer Corporation

A

Osborne 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

was introduced by Motorola in 1983

A

Motorola DynaTAC 8000X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to the physical components of a computer system that you can see and touch.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the set of programs, applications, and data that instruct the hardware on how to perform specific tasks.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the process of entering data into the computer

A

Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

performing operations on the data.

A

Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the computer saves data either temporarily (in RAM) or permanently (on storage devices).

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the computer presents results through output devices

A

Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The software that acts as an intermediary between computer hardware and the user. It manages the computer’s hardware resources and provides a variety of services to ensure that programs can function efficiently and that users can interact with the system in a user-friendly way. Essentially, the OS allows the computer to run applications, manage files, and perform tasks like input/output processing and memory management.

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a command-line operating system that was widely used in the early days of personal computing. It provides a simple interface for managing files and running programs.

*Historically used on early IBM PCs and personal computers in the 1980s and early 1990s.
*While largely obsolete, it is still used in embedded systems or to run older legacy software.
*Occasionally used by hobbyists and retrocomputing enthusiasts for running classic software and games.

A

DOS (Disk Operating System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is a popular, user-friendly operating system that provides a graphical user interface (GUI), multitasking capabilities, and support for a wide range of hardware and software.

  • Mostly used on personal computers (PCs) for home, office, and business environments.
  • Widely adopted in educational institutions and corporate environments due to its compatibility with various software applications.
  • It is also commonly used in gaming due to broad support for a large variety of games.
A

Windows (by Microsoft)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

operating system for Macintosh computers, known for its smooth, intuitive interface and tight integration with Apple’s hardware ecosystem.

*Primarily used on Apple’s desktop and laptop computers like the MacBook, iMac, and Mac Pro.
*Favored in creative industries (e.g., design, video editing, music production) due to its optimized performance for graphic-intensive applications like Adobe Creative Cloud and Final Cut Pro.
*Often used by developers due to its UNIX-based structure, which makes it ideal for programming and app development, especially for the iOS and macOS ecosystems.

A

macOS (by Apple)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is an open-source operating system that is known for its flexibility, security, and stability. It is freely available and can be customized to suit various needs.

*Predominantly used in servers, data centers, and cloud environments due to its stability, efficiency, and security. *Widely used in embedded systems (e.g., routers, smart TVs, IoT devices).
*Preferred by developers, network administrators, and tech enthusiasts for its open-source nature, flexibility, and extensive customization options.
*Popular distributions (distros) like Ubuntu and Fedora are used on desktops by users who prefer open-source alternatives to Windows or macOS.

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is a mobile operating system based on the Linux kernel, designed primarily for touchscreen mobile devices such as smartphones and tablets.

*Primarily used on smartphones and tablets, making it the most widely used mobile operating system in the world. *Also found on smart TVs, smartwatches, and other smart devices.
*Favored in mobile development for apps available in the Google Play Store, with Android’s open-source nature allowing developers and manufacturers to customize it.

A

Android (by Google)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is Apple’s operating system for mobile devices, designed specifically for iPhones and iPads. It is known for its strong security, smooth user experience, and integration with Apple’s ecosystem.

*Used exclusively on Apple’s mobile devices, including iPhones, iPads, and iPod Touch.
*Known for its high-security standards, it is widely used in consumer electronics and enterprise environments where security and privacy are important.
*Popular in the app development community, as iOS apps often generate higher revenue than Android apps, despite having a smaller user base.

A

iOS (by Apple)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is a global network that connects millions of private, public, academic, business, and government networks. These networks use standardized communication protocols to exchange data. Essentially, the internet allows different types of devices (computers, smartphones, tablets) to communicate with one another, forming the backbone of modern information sharing and connectivity.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

operates on a set of protocols that regulate how data is transmitted

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the core protocols that govern the flow of information across the web.

A

Transmission Control Protocol (TCP) and Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Information is divided into packets before being sent over the internet. These packets travel through routers and networks, eventually reassembling at their destination.
Data Transmission
26
Ensures that data packets are correctly sent and received in the correct order.
Transmission Control Protocol
27
Handles the addressing system that ensures packets find their way from source to destination
Internet Protocol (IP)
28
are companies that provide internet access to consumers and businesses.
Internet Service Providers (ISPs)
29
Uses existing phone lines to provide internet access, typically with speeds ranging from 1 to 100 Mbps.
DSL (Digital Subscriber Line)
30
The fastest internet connection available, using fiber-optic cables to deliver speeds of up to 1 Gbps or more. Fiber is ideal for high-demand users, such as businesses or homes with heavy streaming and gaming activities.
Fiber-Optic
31
Uses the same infrastructure as cable television to provide internet access. It is commonly available and faster than DSL, but may slow down during peak usage times.
Cable
32
to provide internet access in remote areas where other connection types are unavailable. Satellite connections tend to be slower and have higher latency but are essential for rural locations.
Satellites
33
Mobile networks that allow internet access via cellular devices. 4G offers download speeds up to 100 Mbps, while 5G can exceed 1 Gbps, making it a strong alternative to fixed broadband in areas with good coverage.
4G and 5G
34
One of the oldest and most widely used internet services, enabling users to send text messages, attachments, and multimedia to other users across the world.
Email
35
allows users to upload, download, and manage files on remote servers. It's commonly used for transferring large files between computers.
File Transfer Protocol (FTP)
36
The most common service, where users access web pages using HTTP/HTTPS protocols via web browsers. Users can retrieve and interact with a wide range of information, from simple blogs to complex interactive websites.
VoIP (Voice over Internet Protocol)
37
Streaming services provide real-time access to media content like video, music, and live broadcasts. Examples include Netflix, YouTube, and Spotify.
Streaming
38
Enables users to access services and store data remotely via the internet. Cloud services offer tools for storage (Google Drive), computing power (AWS, Azure), and collaboration (Google Workspace, Microsoft Teams)
Cloud Computing
39
often simply called "the web," is a vast information system on the internet. It allows users to access and interact with documents, multimedia, and web pages that are interconnected by hyperlinks. These documents are accessed through a web browser using URLs (Uniform Resource Locators), which act as addresses for each piece of content.
World Wide Web (WWW)
40
are software applications that allow users to access and interact with websites and web applications on the internet.
Web browsers
41
Known for its speed, reliability, and wide range of available extensions.
Google Chrome
42
Emphasizes privacy and security, with robust customization options
Mozilla Firefox
43
Built on Chromium (the same engine as Chrome) and integrated with Microsoft services, known for good performance and security features.
Microsoft Edge
44
is a software program that runs on a web server and is accessed by users through a web browser. Unlike traditional desktop applications, which are installed on the user's local device, web apps are accessed over the internet and do not require installation.
web application (web app)
45
Web apps can run on any device with a web browser (e.g., laptops, tablets, smartphones).
Cross-platform compatibility
46
Users simply visit a URL to access the app, making web apps easy to use and update.
No installation required
47
Many web apps allow multiple users to collaborate on a single task simultaneously, such as editing a document or managing a project.
Real-time collaboration
48
is the web address that identifies the location of a resource on the internet, such as a web page, image, or document.
Uniform Resource Locator (URL)
49
Defines how the data is transferred. The two most common protocols are:
Protocol
50
The two most common protocols are:
HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure)
51
The website’s address, such as www.example.com. It points to the server where the website is hosted.
Domain Name
52
The specific location of a file or page on the server. For example, in www.example.com/about, the /about is the path to the "About" page.
Path
53
Additional data passed to the website to customize the content or behavior of the page. Query parameters usually follow a ? symbol in the URL, e.g., www.example.com/search?query=internet.
Query Parameters
54
Protecting systems, networks, and programs from cyberattacks.
Cybersecurity Fundamentals
55
Key components of Cybersecurity Fundamentals
Confidentiality (Data access control) Integrity (Data accuracy and consistency) Availability (Ensuring uptime and accessibility)
56
Viruses, worms, ransomware
Malware
57
Fraudulent emails and messages
Phishing
58
Disrupting online services
DDoS Attacks
59
Employees misusing access
Insider Threats
60
Spreads by attaching to files or programs
Virus
61
Self-replicate across networks
Worm
62
Pretends to be legit software, then causes harm
Trojan
63
Steals your data, like passwords or keystrokes
Spyware
64
Locks your files and demands payment
Ransomware
65
Bombards you with unwanted ads
Adware
66
Hides malware and gives attacker control over the system
Rootkit
67
Turns your device into part of a hacker's remote-controlled army
Botnet
68
Block unauthorized network access
Firewalls
69
Secure data transmission and storage
Encryption
70
Secure remote connection
VPNs (Virtual Private Networks)
71
Extra layer of security
Multi-Factor Authentication (MFA)
72
This is the primary law addressing cybercrimes in the Philippines. Punishable Acts: - Illegal Access (Hacking, unauthorized access to computer systems) - Data Interference (Intentional damage to data) - System Interference (Disrupting network operations) - Cybersex (Exploiting individuals through online sexual acts) - Child Pornography (Online distribution of child exploitation materials) - Online Libel (Defamation using the internet) - Identity Theft (Fraudulently using another person’s identity) Penalties: Imprisonment from 6 years to 12 years, and fines up to ₱1 million.
Republic Act No. 10175 - Cybercrime Prevention Act of 2012
73
Penalizes fraud using access devices like credit/debit cards and online payment systems. Punishable Acts: - Unauthorized possession or use of stolen credit cards. - Producing counterfeit payment instruments. - Hacking or unauthorized transactions. Penalties: 6 to 20 years imprisonment and fines up to ₱10 million.
Republic Act No. 8484 - Access Devices Regulation Act of 1998
74
An act protecting individual personal information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purpose.
RA 10173 - DATA PRIVACY ACT OF 2012
75
It refers to any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual.
Personal information
76
You have the right to know: -That your personal data will be collected and processed. -The purpose and extent of processing. -Who will have access to it (recipients) -Your rights as a data subject. -The identity of the data controller or processor. Example: Before signing up on a website, you should be told how your data will be used and who it will be shared with.
Right to be informed
77
You can refuse the processing of your data, especially if: -It's for marketing, profiling, or automated decision-making. -It's not covered by a lawful basis or without your consent. Example: You can opt out of receiving marketing email or SMS messages.
Right to Object
78
You the right to access: -The personal information held about you. -The sources from which the data was obtained. -Names of individuals or organizations your data was shared with. -Reasons for processing your data. Example: You can ask a company for a copy of your profile or transaction history stored in their system.
Right to Access
79
If your data is inaccurate or outdated, you have the right to: -Request its correction, update, or completion. Example: If your address or contact info changes, you can request it be updated in the company's records.
Right to Correct (Rectify)
80
Also called the right to be forgotten. You can demand that: -Your data be deleted or blocked from further processing if: -It is no longer necessary. -It was unlawfully processed. -You withdraw your consent. Example: You can ask a social media site to delete your profile and all related data permanently.
Right to Erase or Block
80
You can claim compensation if: -Your personal data was misused. -You suffered harm, loss, or distress due to a violation of your data privacy rights. Example: If your data was leaked due to poor security and you suffered financial loss, you can seek damages.
Right to Damages
81
You have right to: -Obtain your data in a commonly used format. -Transfer your data from one service provider to another. Example: You can request a copy of your phone call records from one telco to use them when switching to another.
Right to Data Portability
81
If you believe your data privacy rights were violated, you can: -File a complaint with the National Privacy Commission (NPC). -Seek investigation and appropriate corrective measures. Example: You can report a company to the NPC if they shared your personal data without your permission.
Right to File a Complaint