LIE CH2 Flashcards

1
Q

has undergone a decisive transformation in a short period
thanks to the technological developments that underpin it.

A

The telecommunications sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a fundamental and innovative revolution
that has touched human life considerably in the last century.

A

information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

impacts of information technology in Society

A
  1. IT IN EDUCATION
  2. IT IN HEALTH SYSTEM
  3. IT IN POLITICS
  4. IT IN ECONOMY
  5. IT IN THE SOCIAL ASPECT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is defined as “the science and activity of using computers and other electronic equipment to store and send information.”

A

INFORMATION TECHNOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sometimes referred to as infrastructure automation

A

IT Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the use of software to create repeatable instructions and processes to replace or reduce human interaction with IT systems.

A

IT Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

works within the confines of those instructions, tools, and frameworks to carry out the tasks with little to no human intervention.

A

Automation Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is key to IT optimization and digital transformation.

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is all about heavy lifting, whether on bare metal or in a private, hybrid, or public cloud.

A

provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

can help you move from commit and build to testing to deployment in a proven, trusted, and codified manner.

A

deployment automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

allows you to deploy your applications with certainty, configure needed
services from the start, and get your apps and their artifacts up and running—all via a common, transparent approach that’s understandable by all of your IT staff.

A

IT Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is an important reason for automating an industrial operation.

A

worker safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The technology that powered the industrial revolution created the

A

industrial society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is an ever present part of our daily lives and the amount of time we spend interacting with our personal technology devices is only increasing as we feel the need to stay connected.

A

technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

are developments in information technology, which quickly gain ground and are commonly used by many.

A

IT trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the IT trends of today

A
  1. Artificial Intelligence
  2. Internet Of Things
  3. Cybersecurity
  4. Alternatives to Cloud Computing
  5. 5G Network
  6. Virtual Reality
  7. Augmented Reality
  8. Chatbot
  9. Blockchain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

are capable of processing data at an amazing speed and accuracy.

A

AI-powered machines and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is one of the most commonplace types of errors and AI solutions don’t suffer from that.

A

Human error

20
Q

What are the latest cybersecurity threats?

A
  1. Phishing
  2. Ransomware
  3. Cryptojacking
  4. Cyber-Physical Attack
  5. State-Sponsored Attacks
  6. IoT Attacks
21
Q

It’s the practice of bringing data and computation closer to the location where it’s needed.

A

edge computing

22
Q

It’s built to bypass the issue with cloud computing not able to process huge amount of data in time.

A

fog computing

23
Q

This is great for managing data flood in a networked environment.

A

fog computing

24
Q

is an initiative brought by the inventor of the web itself, Tim Berners-Lee. This method provides users with complete control over their data by placing them into a container.

A

Project Solid

25
Q

A service initiative that aims to provide everyone with the needed
bandwidth to process their data at tremendous speed.

A

mesh networks

26
Q

A cloud storage service which does not require servers. It follows the principle
of torrents where files are divided and shared in tiny pieces among each member.

A

resilio

27
Q

Combines the blockchain technology with the file-sharing property similar to torrents. This is a great way of distributing videos without the complex RDM schemes.

A

LBRY

28
Q

are the next big thing in mobile internet connectivity.

A

5G networks

29
Q

immerses the user into an environment. By stimulating their hearing
and vision, it makes them feel as if they are experiencing the simulated environment firsthand.

A

virtual reality

30
Q

enhances a real-life view with digital images. This is commonly an app that works with camera lenses. Usually, the overlay images blend into reality in a way that users can easily tell them apart.

A

Augmented reality

31
Q

is a program whose main function is to simulate conversation with humans.

A

chatbot

32
Q

in its most bare form, is a data which you can only add to. It’s like creating a link of blocks to form a chain, hence the name.

A

blockchain

33
Q

The technology is usually related to cryptocurrency such as Bitcoin but it’s more than that.

A

blockchain

34
Q

Some of the major ethical issues faced by Information Technology (IT) are:

A
  1. Personal Privacy
  2. Access Right
  3. Harmful Actions
  4. Patents
  5. Copyright
  6. Trade Secrets
  7. Liability
  8. Piracy
35
Q

becomes a high priority issue for the IT and cyberspace with the great advancement in technology.

A

access right

36
Q

is used to determine whether the user is an intruder or an appropriate user.

A

intrusion detection system

37
Q

refers to the damage or negative consequences to the IT such as loss of important information, loss of property, loss of ownership, destruction of property and undesirable substantial impacts.

A

harmful actions

38
Q

works as a very powerful legal tool in protecting computer
software, both before a security breach and surely after a security breach.

A

copyright law

39
Q

secures something of value and usefulness. This law protects the private aspects of ideas which is known only to the discover or his confidants.

A

trade secret

40
Q

is an activity in which the creation of illegal copy of the software is made. It is entirely up to the owner of the software as to whether or not users can make backup copies of their software.

A

piracy

41
Q

is an essential element for maintaining humanity and social
responsibilities and relationships.

A

privacy

42
Q

is referred as automated systems for processing and storing huge
junks of data and circulating information.

A

information technology

43
Q

when public uses internet they generate huge junks of data when surfing online.

A

big data

44
Q

providing a set of rules and regulations in the initial stage of the
design process keeping in mind certain ethics and values.

A

design methods

45
Q

It has been used as a means of protecting data for a very long time.

A

cryptography

46
Q

it is a means of authenticating and authorizing individuals or
groups to have access to their accounts or systems in an organization through network.

A

identity management