Living in the IT Era Flashcards

1
Q

What is Data mining?

A

Getting the customer information to produce list for targeted advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Job Export?

A

Data exporting work being sent to other countries where operating costs are lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet is?

A

International Networks of interconnection of computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Main purpose for the institution of internet is?

A

Quest for Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List of Several formed of ICT Components

A
  1. Hardware
  2. Software
  3. Communications
  4. Online data sharing platforms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VoIP stand for?

A

Voice over internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is soft skills?

A

Non-technical skills that relate to how you work. (how you interact with colleagues, how you solve problems, and how you manage your work)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Personal attributes needed for success on the job is?

A

Soft skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 types attribute of the Soft Skills.

A

Time management
Networking
Teamwork
Creative Thinking
Conflict Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ICT?

A

is the infrastructures and components that enable modern computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The term that describes the abilities required to effectively use the ICT components.

A

ICT Skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ICT skills?

A

A term that describes the abilities required to effectively use the ICT Components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is netiquette?

A

It’s a “Network Etiquette” that is etiquette to cyberspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you mean by etiquette in technology?

A

It means the forms requited by good breeding prescribe by authority to be required in social or official life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a set of rules for behaving properly online.

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Core rules of netiquette adapted from?

A

Virginia Shea’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Netiquette is concerned with the “proper” way to communicate in an offline environment.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The use of emoticon symbol or emoji is appropriate for professional communications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Typing an entire message using all capital letters is known as?

A

“Screaming”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Copying someone else’s work and passing it off-as your own is

A

Plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Email and chat that you send or received are considered__?, and should not be forwarded or copied to others without gaining the consent of all involved participants.

A

“Private”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Information that are sensitive and not to be share in social media?

A
  1. Your home address or phone number
  2. Personal conversations
  3. Social plans, such as vacations
  4. Financial Informations
  5. Username, password or hints
  6. Personal information that are sensitive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

10 commandments of computer ethics

A
  1. You shall not use a computer to harm people.
  2. You shall not interfere with other people’s work.
  3. You shall not snoop around in other people’s computer files.
  4. You shall not use a computer to steal.
  5. You shall not use a computer to bear false witness.
  6. You shall not use or copy proprietary software for which you have not paid.
  7. You shall not use other people’s computer resources without authorization or proper compensation.
  8. You shall not appropriate other people’s intellectual output.
  9. You shall think about the social consequences of the program you are writing or the system you are designing.
  10. You shall always use a computer in ways that show consideration and respect for your fellow humans.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is there a single, universal definition of ICT?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Top 5 ICT Skills All Employees Should Have, what are those?

A
  1. Basic Operation of ICT Hardware
  2. Safe Internet Usage
  3. Typing
  4. Document Creation
  5. Email and Calendar Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the positive impacts of ICT, and then explain it.

A

Access to Information
Improve access to education
New ways of learning
New tools, new opportunities
Communication
Information management
Security
ICT allows people to participate in a wider, even worldwide, society.
Distance learning
ICT facilities the ability to perform ‘impossible’ experiments’ by using simulation
Creation of new more interesting jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the negative impacts of ICT, and then explain it.

A

JOB LOSS
REDUCED PERSONAL INTERACTION
REDUCED PHYSICAL ACTIVITY
COST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is netiquette?

A

Netiquette, or network etiquette, is concerned w/ the “proper” way to communicate in an online environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is cybercrime?

A

It’s defined as a crime in which a computer is the object of the crime. They use computer as a tool to commit an offense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is cyberciminal?

A

May use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

31
Q

Cybercrime prevention act of 2012

A

(RA 10175) - is a law in the Philippines approved on Sept 12, 2012 which aims to address legal issues concerning online interactions and internet.

32
Q

Data Privacy Act of 2012

A

(RA 10173) - is an act protecting individual personal and information.

33
Q

The common forms of cybercrimes.

A
  1. Copyright infringement
  2. Plagiarism
  3. Computer Addiction
34
Q

The person you create about yourself virtually.

A

Virtual Self

35
Q

What is offline in computer addiction.

A

It is generally used when speaking about excessive gaming behavior, which can be practiced both offline and online

36
Q

What is online in computer addiction?

A

Also known as “Internet Addiction”, gets more attention in general from scientific research than offline computer addiction, mainly because most cases of computer addiction are related to the excessive use of the Internet.

37
Q

What is Hacking?

A

The introduction of computer viruses resulting in the corruption, alteration, theft or loss of such data.

38
Q

Example of “Electronic theft”

A
  1. Illegal downloading
  2. Obtaining files that you do not have the right to use from the internet
  3. Piracy
  4. Practice of illegally copying and selling digital music, video, computer software, etc.
  5. Copyright infringement
39
Q

Republic act no., unlawful or prohibited acts defined and punishable.

A

Republic act no. 9775

40
Q

Act of anti child pornography, committed through a computer system.

A

Act of 2009.

41
Q

What is cyber defamation?

A

Is an unprivileged false statement of fact, which tends to harm the reputation of a person or company.

42
Q

What is cyberlibel?

A

A defamatory remark published on the Internet.

43
Q

Are digitally literate and undestand how to integrate it to curriculum

A

Education

44
Q

Students can access teaching materials from all over the world. Called?

A

Distance Learning

45
Q

Data mining of customer information to produce lists for targeted advertising.

A

Information Management

46
Q

ICT take major role for us by means of

A

Communicating

47
Q

networking people ____ w/ each other

A

Communicate

48
Q

ICT allows students to

A

monitor, manage, think critically, creatively, simulated, collaboratively, engage, global perspective, expert, resources, expertise, and effeciently

49
Q

ICT enables organizations to

A

Operate more effeciently

50
Q

It can be seen as a process by which a child adapts a behavior to an effective member of the society.

A

Socializing

51
Q

What is cyber?

A

characteristics of a culture of computers, information technology, and virtual reality.

52
Q
  • is the violation, piracy or theft of a copyright holder’s
    exclusive rights through the unauthorized use of a copyrighted
    material or work.
A

Copyright infrigment.

53
Q

The exclusive legal right, given to an originator or an
assignee to print, publish, perform, film, or record literary, artistic,
or musical material, and to authorize others to do the same.

A

Copyright

54
Q

Types of Criminal Activities

A

Hacking, ( Computer-related forgery, fraud, and/or identity
theft ), Electronic Theft, Cyberbullying, Cyber Sex, Child Pronography, and Cyber Defamation

55
Q

The penalty of hacking?

A

between 12-20 years

56
Q

Six years up to twelve years of imprisonment also known as?

A

Prison Mayor

57
Q

cyber defamation penalty?

A

6-12 yrs of imprisonment or prison mayor

58
Q

Causes of Computer Failure, then explain

A

Hardware Errors, Software Errors (Bugs), The computer solves the wrong problem, Misuse (GIGO), Communication Failure, Malice (Malware).

59
Q

GIGO stand for?

A

Garbage In, Garbage Out

60
Q

Computer Security that are prevalent

A

( Increasing Complexity, Increases Vulnerability ), Higher Computer User Expectations, Expanding/Changing Systems Introduces New Risks, Increased Reliance on Commercial
Software w/ Known Vulnerabilities

61
Q

Sample Security Incidents

A

The Morris Worm
( November 1988 ), The Code Red Worm
( 2001 ),
Kevin Mitnick ( February 1995 ),
The Slammer Worm ( 2003 ),
The Melissa Virus ( March 1999 ),
Fiber Cable Cut
( 2009 )

62
Q

What is Exploit?

A

An attack on an information
system that takes advantage
of a particular system
vulnerability.

63
Q

Types of exploits

A

Virus, SQL injection Attack, Cross-Site Scripting (XSS), Worm, Trojan Horse, Denial of Service, Ransomware, Phishing, Session Hijacking and Man in the Middle
Attacks

64
Q

What is virus?

A

A type of malicious code or program written to alter the way a computer operates.

65
Q

What is trojan horse?

A

a program which appears to be
one thing.

66
Q

What is ransomware?

A

is a type of malicious software, or
malware, designed to deny access to
a computer system or data until a
ransom is paid.

67
Q

What is phishing?

A

Act of using email fraudulently to try
to get the recipient to reveal personal
data

68
Q

Types of phishing?

A

Vishing, Pharming, and Smishing

69
Q

What is SQL Inject Attacks?

A

uses malicious code to manipulate
database into revealing
information

70
Q

What is (XSS)?

A

this attack also involves infecting malicious
code into a website.

71
Q

What is Denial-Of-Service Attacks ( DOS )?

A

focus on disrupting or preventing legitimate
users from accessing websites, applications, or
other resources.

72
Q

What is Browser Hijacking?

A

A browser hijacker is a malware
program that alters your computer’s
browser settings and redirects you to
websites that you had no intention of
visiting.

73
Q

A virus actively works to infect other targets?

A

False

74
Q

Employees are greatest threats to information security?

A

True