Lesson 1: Being a Digital Citizen Flashcards

1
Q

A machine that allows a user to perform calculations or computations

A

Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What makes a computer, a computer?

A
  1. Input
  2. Output
  3. Processing
  4. Storage
  5. Programmability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Receives data (keyboard, mouse, camera)

A

Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Displays or produces information (monitor, printer, speakers)

A

Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Manipulates data (CPU)

A

Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Saves data for later use (hard drive, SSD)

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be instructed to perform tasks (software, algorithm, logic)

A

Programmability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computers in Academic Use

A
  1. To check Learning Management Systems (Blackboard Learn)
  2. To read reference material
  3. To communicate with peers or mentors
  4. To write academic or scholarly materials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computers in Proffesional Use

A
  1. Use spreadsheet for budget tracking + performing other heavy-duty computations
  2. Transfer information from one location to another
  3. Conduct virtual meetings with clients and other stakeholders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computers in Society

A
  1. Weather Forecasting
  2. Banking and Finance
  3. Accessing Information
  4. Job Search
  5. Entertainment/Gaming
  6. Accessibility for PWD
  7. Healthcare and Public Safety
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ancient and Classical Era

A
  1. The Abacus, Sumer (ca. 2700 - 2300 BC)
  2. The Abacus, China (ca. 1050 - 771 BC)
  3. The Anikythera Mechanism, Greece (ca. 100 BC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Abacus, Sumer

A

ca. 2700 - 2300 BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Abacus, China

A

ca. 1050 - 771 BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Anikythera Mechanism, Greece

A

ca. 100 BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The 19th Century

A
  1. The Analytical Engine, Babbage & Lovelace (1837), Swade (2002)
  2. Arithmometer, Payen (1887)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Analytical Engine, Babbage & Lovelace (____), Swade (____)

A

1837…2002

17
Q

Arithmometer, Payen (____)

A

1887

18
Q

The 20th Century and Now

A
  1. Electronic Numerical Integrator and Computer (ENIAC), Beck & Snyder, 1945
  2. Universal Automatic Computer (UNIVAC), Eckert & Mauchly, 1951
  3. Age of Transistors, 1950s
  4. Age of Integrated Circuits, 1960s
  5. Age of Microprocessors, 1970s
  6. Apple II Computer, Apple Inc., Jobs & Wozniak, 1978
  7. Age of Personal and Ubiquitous Computers, 1980s - 2020s
  8. Age of Quantum Computers, 2030s
19
Q

Electronic Numerical Integrator and Computer (ENIAC), Beck and Snyder, (____)

A

1945

20
Q

Universal Automatic Computer (UNIVAC), Eckert & Mauchly, (____)

A

1951

21
Q

Age of Transistors

A

1950s

22
Q

Age of Integrated Circuits

A

1960s

23
Q

Age of Microprocessors

A

1970s

24
Q

Apple II Computer, Apple Inc., Jobs & Woziak

A

1978

25
Q

Age of Personal and Ubiquitous Computers

A

1980s - 2020s

26
Q

Age of Quantum Computers

A

2030s

27
Q

Observation by Gordon Moore (1929 - 2023)

A

Moore’s Law

28
Q

Number of transistors on microchip doubles roughly every two years

A

Moore’s Law

29
Q

The act of effective use of digital tools and resources

A

Digital Literacy

30
Q
  1. Geographical
  2. Political
  3. Economic
  4. Educational
A

Digital Divide Factors/Barriers

31
Q

The act of protecting computer systems and networks from digital attacks

A

Cybersecurity

32
Q

Implementing security measures to reduce risks and vulnerabilities
Ensuring business continuity and resilience against cyber threats

A

Cybersecurity

33
Q

Online or computer based illegal actions (includes identity theft and spreading malware to steal data or disrupt systems)

A

Cybercrime

34
Q

Protection of personal information from unauthorized access

A

Data Privacy

35
Q

Occurs when personal information is collected, used, or disclosed without proper authorization or consent

A

Data Privacy Violations