Module 1 Flashcards

1
Q

Refers to the process of giving yourself, or other people, the capacity to achieve a specific end-goal. It is a strategy that aims to give individuals the tools and resources necessary to take initiative

A

Empowerment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to computer technology that we use almost every day, which enables us to do tasks that, in the past require professional help

A

Empowerment technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A platform commonly used by people who want to participate in an active discussion, give and gain information or updates, and a mean of communication

A

Social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ability to use digital technology, communication tools, and/or networks to define an information need, access, manage, integrate and evaluate information, create new information or knowledge and be able to communicate this information to others

A

Technology literacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A word processing application developed by the Microsoft Corporation. It lets you create documents for your assignments, term paper or research work, letters, and certificates or just edit any text document

A

Microsoft Word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A feature by Microsoft Word that will allow you to create mass letters, labels, envelopes, etc. using the pieces of information that are stored in a list, database, or spreadsheet

A

Mail Merge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 SOCIAL MEDIA TRENDS

A
  • Video content
  • Niche platforms
  • Advertising
  • Emojis explosion
  • Virtual reality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These are sites that allow you to connect with other people with the same interests or background

A

Social Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These are sites that allow you to store and manage links to various websites and resources.
Examples: StumbleUpon, Pinterest

A

Bookmarking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These are sites that allow users to post their own news items or links to other news sources.
Examples: Reddit, Digg

A

Social News

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

These are sites that allow you to upload and share media content like images, videos, and music.
Examples: Flickr, Youtube, Instagram

A

Media Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These are sites that focuses on short updates from the user.

Examples: Twitter, Plurk

A

Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These websites allow users to post their content

A

Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The discipline dealing with that is good and bad

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The rules indicating the proper and polite way to behave

A

Etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to Internet etiquette. This simply means the use of good manners in online communication

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

10 NETIQUETTE GUIDELINES

A
  • The Golden Rule
  • No Flaming
  • Don’t type in ALL CAPS
  • Don’t talk with people you do not know
  • Obey Copyright Laws
  • Use Proper Grammar and Spelling
  • Be Honest/ Be Yourself
  • Respond to Emails Promptly
  • Share with Discretion
  • Fact Check before Reposting
18
Q

This stands for Malicious Software. It is any software intentionally designed to cause damage to a computer, server, client, or computer network

A

Malware

19
Q

5 TYPES OF MALWARES

A
  • Virus
  • Trojan
  • Spyware
  • Worms
  • Adware
20
Q

A type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another

A

Virus

21
Q

Can be employed by cyber-thieves and hackers trying to gain access to users’ systems

A

Trojan

22
Q

Describes software with malicious behavior that aims to gather information about a person or organization

A

Spyware

23
Q

Uses a computer network to spread itself, relying on security failures on the target computer to access it. They copy themselves hundreds of times so they can very quickly harm your device or other devices. They don’t need to attach themselves to other programs

A

Worms

24
Q

Often called advertising-supported software by its developers, is a software that generates revenue for its developer by automatically generating online advertisements. These are unwanted emails for the purpose of advertising

A

Adware

25
Q

The most popular social media platform

A

Facebook

26
Q

A social media platform that does not have a private messaging system

A

Youtube

27
Q

A website, application or online channel that enables web users to create, co-create, discuss, modify and exchange user generated content

A

Social Media

28
Q

Spreadsheet or database with personalized information such as name, address, and phone numbers

A

Source Data

29
Q

You need to add these into your document so Word knows where to put the data

A

Merge Fields

30
Q

Formula in creating a Mail Merge?

A

Source Data + Generic Data = Mail Merge

31
Q

How many components come together during the mail-merge operation?

A

2

32
Q

A social media that is known as the world’s largest professional network

A

LinkedIn

33
Q

The knowledge of maximizing the user’s personal safety and security to private information and property associated with using the Internet, and the self-protection from computer crime in general

A

Online Safety

34
Q

It deals with the use of different communication technologies such as mobile phones, telephones, Internet, etc. to locate, save, send, and edit information

A

Information Communication Technologies (ICT)

35
Q

A simulated experience that can be similar to or completely different from the real world. Its applications can include entertainment and educational purposes

A

Virtual Reality

36
Q

A person who intentionally gains access on your computer when you connect it to the Internet with the Intent of doing harm

A

Hacker

37
Q

The information in a data source is organized through this

A

Table

38
Q

The social media site that has the most reports of cyberbullying

A

Instagram

39
Q

It is a case for copying verbatim the works of others whether printed or posted

A

Plagiarism

40
Q

A free social networking micro blogging service that allows registered members to broadcast short posts called tweets

A

Twitter

41
Q

This is used to gain access to your computer

A

Password

42
Q

The body of technologies, process, and practices designed to protect networks, computer programs, and data from attacks, damage, and unauthorized access

A

Cyber Security