LIVING IN THE IT ERA Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

meaning of ICT

A

Information and Communications Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

set of technological tools and resources used to exchange information

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 Uses of ICT in our Daily Lives

A

Communication
Job Opportunities
Education
Healthcare
Socializing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Provides effective and faster communication

A

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides broader and easier job hunting

A

Job opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides new and different teaching and learning approaches

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides High-tech and state of the art medical equipment

A

Healthcare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides stronger support networks and connections and boosts social skills

A

Socializing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9 Positive impacts of ICT in the Society

A

Daily Routine Management
Social Relationship
Information Sharing
Communication
Usage of Free Time
Creations of Job and Self- Employment
Paperless Environment
Health Literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4 Negative Impacts of ICT in the Society

A

Job Reduction/Loss
Competition and Misuse of Platforms
Reduced Face-to-face interaction
Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is an electronic device that designed to process data. Converting it to information that is useful to people

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two kinds of Computer

A

Analog Computer
Digital Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Represent data as variable points along a continuous spectrum of values

A

Analog Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Break all types of information into tiny units, and use numbers to represent those pieces of information

A

Digital Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 Basic Computing Periods - Ages

A

Premechanical - 3000BC and 1450AD
Mechanical - 1450 and 1840
Electromechanical - 1840 and 1940
Electronic - 1940 and Present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Generations of Computer : (Ages)

A

1st Generation (1946-1958)
2nd Generation (1959 - 1964)
3rd Generation (1965 - 1970)
4th Generation (1971 - today)
5th Generation (Today - Future)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

First generation computers relied on machine language, the lowest-level programming language understood
by computers, to perform operations, and they could only solve one problem at a time. Examples: ENIAC, EDSAC, UNIVAC I

A

Vacuum Tubes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • Moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers
    to specify instructions in words.
    Examples: UNIVAC III, RCA 501, Philco Transact S-2000
A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • It could carry out instructions in billionths of a second. Much smaller and cheaper compare to the second
    generation computers.
A

Integrated Circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Small computers became more powerful that they could be linked together to form networks, which
eventually led to the development of the Internet.

A

Microprocessors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The use of parallel processing and superconductors is helping to make artificial intelligence a reality.

A

Artificial Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is the largest computer network in the world that connects billions of computer user.

A

The Internet or “Net” (network of network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information)

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

5 Major Components of an Internet

A

Servers
IP Address
Browser
Domain Name system
Internet Service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

6 Types of Server

A

Application Server
Web Server
Proxy Server
Mail Server
File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A computer program that provides service to another computer program and it’s user

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A program in computer that provides the business logic for an application program

A

Application server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A computer program that serves requested HTML pages or files

A

Web Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Is a software that acts as an intermediary between an endpoint device, such as computer and another sever from which a user is requesting

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Is an application that receives incoming e-mail and forward outgoing e-mail for delivery

A

Mail Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Is a computer responsible for central storage and management of data files so that other computer on the same network can access them

A

File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Is a security component of a policy-based network that provides authorization services and facilities tracking and control of files

A

Policy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

It is a numerical label assigned to each device. This provides identity to a network device

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

It is an application program that provides a way to look information on the web

A

Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The phonebook of internet. We access information online through domain names

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

It is an organization that provides services for accessing, using or participating in the internet.

A

Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

It is the sending and receiving of typewritten messages from one screen to another

A

Email/Electronic Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The jargon name of unwanted and unsolicited email

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The popular, but imperfect defense against spam

A

Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Is the mathematical scrambling of data so that it is hidden from eavesdroppers

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Related to encryption. The complex way that computer systems verify that you are who you say you are

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Terms that describes transferring something you find on the internet to your computer or device

A

Downloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Transfer of data from your computer to another computer

A

Uploading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Is a generic term to describe a barrier against destruction like hackers and viruses

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

websites and apps that allow people to share comments, photos, and videos

A

Social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Games that allow people to play with and against each other over the internet

A

Online gaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Operating system and application updates can typically downloaded from the internet

A

Software updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Is a single digit in the binary numbering system

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Generally consists of eight bits

A

Byte

51
Q

A term that applies to programs/applets (macros and intelligent agents) used on the internet

A

web bot

52
Q

Specialized software, such as google and yahoo, that lets www browser users search for information on the web by using keywords, phrases

A

Search Engine

53
Q

is defined as an information superhighway, to access information over the web

A

Internet

54
Q

Consists of information organized into Web pages containing text and graphic images. The world wide web is larger collection of interconnected documents or content.

A

The Web (World Wide web)

55
Q

collection of linked web pages that has a common theme or focus

A

Website

56
Q

The main page that all of the pages on a particular web site are organized around and link back to.

A

Home Page

57
Q

6 Key web concepts

A

Web Site
Web server
Web Browser
URL
Protocol
Host
Filename

58
Q

is an English engineer and computer scientist known as the inventor of the World Wide Web

A

Sir Timothy John Berners- Lee

59
Q

Is a collection of related Web pages and associated items, such as documents and pictures

A

Web site

60
Q

is a computer that delivers requested Web pages to your computer. The same Web server can store multiple Web sites

A

Web server

61
Q

or browser is application software that allows users to access and view web pages

A

Web Browser

62
Q

A web page has a unique address

A

URL (Uniform Resource Locator)

63
Q

URL consists of 3 Parts

A

Protocol
Host
Filename

64
Q

3 Generations of Web

A

Web 1.0 (Read- only static Web)
Web 2.0 (Read-write interactive web)
Web 3.0 (Read- write intelligent web)

65
Q
  • Old internet that only allows people to read from the internet.
A

Web 1.0 (Read - only static web)

66
Q

Increased the emphasis on human collaboration. This is about user-generated content and the read-write

A

Web 2.0 (Read write interactive web)

67
Q

More connected, open, and intelligent, with semantic web technologies, distributed databases, natural language processing, machine learning, machine reasoning and autonomous agents.

A

Web 3.0 (Read - write intelligent web)

68
Q

The web pages that are affected by user input or preference.

A

Dynamic Page

69
Q

Provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user.

A

Semantic Web

70
Q

12 Types of Website

A

eCommerce Website
Business Website
Entertainment Website
Portfolio Website
Media Web
Brochure Website
Non- Profit Website
Educational Website
Infopreneur Website
Personal Website
Web Portal
Wiki or Community Forum

71
Q

Exchange of products includes shopping cart and online payment scheme.

A

eCommerce Website

72
Q
  • Representing a company-logo, products and services.
A

Business Website

73
Q

Movies, Music, Gaming.

A

Entertainment Website

74
Q

Showcases past work and highlights competence and credentials.

A

Portfolio Website

75
Q
  • News and Reporting site.
A

Media Web

76
Q
  • Simplified form of a business website. Getting online presence but don’t want to invest much.
A

Brochure Website

77
Q

Medium to open for potential donors donations. Ex: Foundation Websites

A

Non - Profit Website

78
Q

Educational and online learning, Primary goal is providing educational materials to visitors or providing information on an educational institution

A

Educational Website

79
Q

Infopreneurs create and sell information products. That could be in the form of courses, tutorials, videos or eBooks

A

Infopreneurs Website

80
Q
  • Personal space to share thoughts, views, opinions. Ex: Blogs, Vlogs, Photo Diaries
A

Personal Website

81
Q
  • Designed for internal purposes at a business, organization, or institution. They collect information indifferent formats from different sources into one place to make all relevant information accessible to the people who need to see it.
A

Web portal

82
Q
  • A wiki is any website where various users are able to collaborate on content and all make their own tweaks and changes as they see fit
A

Wiki or Community Forum

83
Q

is a set of rules for behaving properly online. Observing and exercising good online behavior is our responsibility.

A

Netiquette and Computer Ethics

84
Q

Be constructive and respectful when sharing opinions, beliefs, and criticisms, or responding to those of others in the conversation.

A

Respect Diversity in viewpoints

85
Q

When sharing a viewpoint that differs from someone else’s, it is a best practice to first acknowledge the other person by briefly restating what he or she said, but in your own words: This lets the person know that you are listening and trying to understand them.

A

Diversity in Views

86
Q

Communicating effectively in college and business environments requires the use correct terminology, spelling, and grammar that can easily be understood.

A

Avoid Slang, Acronyms and Text talk

87
Q

Typing an entire message using all capital letters is known as “screaming”. It is distracting and generally frowned upon in professional environments. It is better to draw emphasis to selected words or

A

Avoid “screaming” in typed messages

88
Q
  • Virtual or not, we are still in school. E-mail and chat messages that you send or receive are considered private and should not be forwarded or copied to others without gaining the consent of all involved participants.
A

Exercise good judgement when sharing information with toehrs online

89
Q

f the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else’s work and passing it off as your own is plagiarism. It damages your reputation and could subject you to serious academic and legal consequences.

A

Avoid Plagiarism

90
Q

Just because a document, article or post appears online does not mean it contains accurate or reliable information, In fact, online information generally demands closer scrutiny than print publications. Always check the source

A

Be able to identify fact from fiction

91
Q

the characteristics of the culture of computers, information, technology and virtual reality.

A

Cyber

92
Q

any criminal activity that involves a computer, networked device or a network.

A

Cybercrime

93
Q

Law that addresses effective prevention and combat of cybercrime offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation.

A

Republic Act No. 10175: Cybercrime Prevention Act of 2012

94
Q

It is an act protecting individual personal information.

A

Republic Act no. 10173 : Data privacy act of 2017

95
Q

The access to the whole or any part of a computer system without right

A

Illegal Access

96
Q

The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system

A

Illegal Interception

97
Q

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

A

Data Interference

98
Q

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network without right

A

System Interference

99
Q

The use, production, sale, distribution, or otherwise making available, without right,

A

Misuse of Devices

100
Q

The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same name.

A

Cyber Squatting

101
Q

The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible

A

Computer - related Forgery

102
Q

The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.

A

Computer- related Fraud

103
Q
  • The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.
A

Computer - related identity theft

104
Q

The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

A

Cybersex

105
Q

The unlawful or prohibited acts defined and punishable by Republic Act No. 9775or the Anti-Child Pornography Act of 2009, committed through a computer system.

A

Child Pornography

106
Q

The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and service are prohibited

A

Unsolicited Commercial Communications

107
Q
  • The unlawful or prohibited acts of libel (publication of false statements that damage someone’s reputation) as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.
A

Libel

108
Q
  • Is a term used to describe actions taken by someone to gain unauthorized access to a computer
A

Hacking

109
Q

Stands for Malicious Software. One common way to infiltrate your computer. It infects your computer.

A

Mailware

110
Q
  • is used most often by cyber criminals because it’s easy to execute and can produce the results they’re looking for with very little effort. Fake emails, text messages and websites created to look like they’re from authentic companies.
A

Phishing (Spoofing)

111
Q

Scammers will register a Web Address that looks like it belongs to a real business or one that can easily by typed by accident when you are trying to type in the real business’ Website

A

Cybersquatting

112
Q
  • A type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.
A

Ransomware

113
Q

2 Types of Ransomware

A

Lock screen ransomware
Encryption Ransomware

114
Q

displays an image that prevents you from accessing your computer.

A

Lockscreen Ransomware

115
Q

encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them.

A

Encryption Ransomware

116
Q

One more common methods of both sending information out and collecting it from unsuspecting people. The mass distribution of unsolicited messages

A

Spam

117
Q

Often used by third parties to infiltrate your computer

A

Spyware and Adware

118
Q

A malicious program that is disguised as, or embedded within, legitimate software.

A

Trojan Horses

119
Q
  • Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list information
A

Viruses

120
Q

Virtual “listening in” on information that’s shared over an unsecure (not encrypted) WiFi network·

A

WIFI eavesdropping

121
Q
  • Unlike a virus, goes to work on its own without attaching itself to files or programs
A

Worm

122
Q

Scammers stealing online identity by getting access to personal information

A

Identity theft

123
Q
  • Making promises more than they can deliver.
A

Online Fraud