Module 1: ICT in the Context of Global Communication Flashcards

1
Q

What is the meaning of ICT?

A

Information and Communications Technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

often deals with the use of different technologies such as mobile phones, telephones, computer, Internet, and other devices, as well as software and applications to locate, save, send, and manipulate information.

A

Information and Communications Technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of web page is classified as flat or stationary?
A. Web 1.0
B. Web 2.0
C. Web 3.0
D. Web 4.0

A

A. Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What web 2.0 feature allows users to subscribe to a data plan that charges for the amount of time spent on the internet?
A. Folksonomy
B. Long Tail
C. User Participation
D. Application

A

B. Long Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the name of the symbol that is used to classify and categorize information?
A. Hashtag
B. Question Mark
C. Asterisk
D. At sign

A

A. Hashtag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What specific type of social media allows you to connect with other people?
A. Microblogging
B. Social Networks
C. Media Sharing
D. Social News

A

B. Social Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Twitter is an example of what specific type of social media?
A. Microblogging
B. Social Networks
C. Media Sharing
D. Social News

A

A. Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

YouTube and Instagram are examples of what specific type of social media?
A. Blogs and Forums
B. Social Networks
C. Media Sharing
D. Bookmarking Sites

A

C. Media Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What specific type of social media allows its users to post their original
content on websites such as WordPress, Blogger, and Tumblr?
A. Blogs and Forums
B. Social Networks
C. Media Sharing
D. Bookmarking Sites

A

A. Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of social media allows you to manage links to various websites?
A. Blogs and Forums
B. Social Networks
C. Media Sharing
D. Bookmarking Sites

A

D. Bookmarking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call the global system of interconnected computer networks that use servers to link billions of devices worldwide?
A. Websites
B. Web browser
C. Internet
D. World Wide Web

A

C. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of web page is classified as a dynamic page?
A. Web 1.0
B. Internet
C. Web 2.0
D. Web 3.0

A

C. Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is an information system on the Internet that allows
documents to be connected to other documents by hypertext links, enabling the user
to search for information by moving from one document to another.

A

The World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It was invented by Tim-Berners Lee

A

The World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is the first stage of the World Wide Web evolution. It
is a flat or stationary page since it cannot be manipulated by the user.

A

Web 1.0 or The Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

allows users to interact with the page, the user may be able to comment or create a user account. Most website that we visit today are Web ____

A

Web 2.0 or The Social Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The semantic web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user. Search Engine will learn about you and your habits from each search you perform and will gather details about you from your previous activities like likes and social postings and present the answers as per your
preferences.

A

Web 3.0 or Semantic Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

allows users to collectively classify and find information using freely chosen keywords (e.g. “tagging” by facebook). Tagging uses the pound sign #, often referred to as hastag.

A

FOLKSONOMY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the owner of website is not the only one who is able to put content. Others are able to place a content on their own by means of comments, reviews, and evaluation.

A

USER PARTICIPATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the Internet, or a data plan that charges you for the amount of bandwidth you used.

A

LONG TAIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

allows you to present and share presentations, infographics and videos with other people. It is used to communicate information clearly and efficiently.

A

Presentation or Visualization Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is also called as “The cloud.” It is the practice of using a network of remote servers hosted on the internet. Instead of using your computer’s hard drive, you store and access your data and programs over the Internet.

A

Cloud Computing Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is used for the storing, naming, sorting, and handling of computer files. Allows you to convert and manage files without download in the software tool.

A

File Management Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is a transformation taking the points of one space into the points of the same or another space. Uses GPS to detect location and used for navigation.

A

Mapping Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is a computer-mediated tools that allow large group of people to create, share or exchange information, interest and the information shared can be in the form of ideas, pictures, videos or anything that you want to create and share to virtual communities.
Social Media Platform
26
What type of web provides a framework that allows data to be shared and reuse to deliver web content specifically targeting the user? A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Website
C. Web 3.0
27
Which of the following is an example of sites under web 2.0? A. Facebook B. YouTube C. Wikipedia D. All of the above
D. All of the above
28
What type of web page is classified as flat or stationary? A. Web 1.0 B. Internet C. Web 2.0 D. Web 3.0
A. Web 1.0
29
Twitter statuses are only composed of a few characters. What type of social media site does Twitter belong? A. Micro blogging B. Media Sharing C. Social Networks D. Bookmarking Sites
A. Micro blogging
30
Social networks are sites that allow you to connect with other people having the same interests. It allows you to share your own news and other news from other sources. A. If only the FIRST statement is TRUE. B. If only the SECOND statement is TRUE. C. If BOTH statements are TRUE. D. If BOTH statements are FALSE.
A. If only the FIRST statement is TRUE.
31
The Philippines is considered as the “ICT Hub in Asia.” The ICT Industry shares 19.3% of the total employment population in the Philippines coming from the government agencies. A. If only the FIRST statement is TRUE. B. If only the SECOND statement is TRUE. C. If BOTH statements are TRUE. D. If BOTH statements are FALSE.
C. If BOTH statements are TRUE.
32
Marisa wants to publish her collections of original poems online. Which online platform must she do this? A. Social News B. Bookmarking Site C. YouTube D. Blogs
D. Blogs
33
Watson is creating a cover video of his favorite song. Which online platform must he publish this? A. Social News B. Bookmarking Site C. YouTube D. Blogs
C. YouTube
34
Cathy has created a very good slideshow presentation on a certain topic, and she wants to share it to other teachers around the world. Which online platform must she publish this? A. Presentation Platforms B. Cloud Computing Platforms C. File Management Platforms D. Social Media Platforms
A. Presentation Platforms
35
What is the name of the symbol that is used to classify and categorize information? A. Hashtag B. Question Mark C. Asterisk D. At sign
A. Hashtag
36
What is Netiquette? A. The proper use of manners and etiquette on the Internet. B. Using a net to catch fish. C. Being mean to other people on Facebook. D. Using proper manners at the dinner table.
A. The proper use of manners and etiquette on the Internet.
37
What is considered shouting over the Internet? A. Screaming at your computer. B. Writing in all CAPS. C. Putting a lot of exclamation marks at the end of a sentence. D. Not answering a friend request on Facebook.
B. Writing in all CAPS.
38
It is OK to forward or post an email message that you received if __________. A. the message is typed in all capitals. B. the author of the message has given you permission to forward or post it. C. it does not contain any copyrighted material. D. the author of the message hasn't marked it as confidential.
B. the author of the message has given you permission to forward or post it.
39
What is a flame in cyberspace? A. A person who follows the rules of Netiquette. B. An expert programmer. C. An online chain letter. D. A post or email message that expresses a strong opinion or criticism.
D. A post or email message that expresses a strong opinion or criticism.
40
Knowledge and understanding of netiquette is useful because ___________. A. it will help you create a positive impression on those you meet in cyberspace. B. it explains some of the technical limitations of online communications. C. it explains the conventions already being used by millions of cybernauts. D. All of the above.
D. All of the above.
41
What type of online threat happens when an attacker uses electronic devices to do unwanted surveillance against its victim? A. Cyberbullying B. Phishing C. Spamming D. Cyberstalking
D. Cyberstalking
42
What type of online threat happens when the attacker impersonates another individual or organization to gather personal or business information? A. Cyberstalking B. Spoofing C. Scamming D. Pharming
B. Spoofing
43
What type of information should you avoid giving when using the internet? A. Phone number B. Profile Picture C. Shirt Size D. Religion
A. Phone number
44
What is the golden rule of netiquette? A. Remember the human. B. Put a smiley in every message. C. Use correct grammar. D. Respect people’s time.
A. Remember the human.
45
You get an email telling you that you won a hundred thousand without joining in a competition. You should ____________. A. Claim the prize. B. Ignore the email. C. Return the email with response. D. Send rude message as revenge
B. Ignore the email.
46
Your family is going out on a vacation. What should you do? A. Post pictures when you return home. B. Post the dates you will be gone online. C. Post updates of where you are currently checking in hotels or places. D. Tell no one. Vacations are for getting away.
A. Post pictures when you return home.
47
Do you have the same passwords for all your accounts? A. Yes. That is how I remember all my passwords. B. I have different passwords for all different accounts. C. I keep it simple. I don’t have any passwords. D. I have two similar passwords that I alternately use for all my accounts.
B. I have different passwords for all different accounts
48
Choose which image below describes how you feel about sharing your password with your boyfriend/ girlfriend?
Forgot About It
49
Your parents bought you your first cellphone. How will you share your cellphone number? A. Do not share your cellphone number to anyone. B. Post your cellphone number in your social media account. C. Share your cellphone number only in person. D. Post your cellphone number in your group chat.
C. Share your cellphone number only in person.
50
Your social media friends list should only be composed of ______________. A. Your favorite brands. B. Family and friends C. Anyone who sends you a friend request D. Foreigners
B. Family and friends
51
is deemed any malicious act that attempts to gain access to a computer network without authorization or permission from the owners.
Online threat
52
happens when an email is sent from an internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.
Phishing
53
happens when a hacker (or “pharmer”) directs an internet user to a fake website instead of a legitimate one. These “spoofed” sites can capture a victim’s confidential information, including usernames, passwords, and credit card data, or install malware on their computer. Pharmers usually focus on websites in the financial sector, including banks, online payment platforms, or other e-commerce destinations.
Pharming
54
generally refers to someone using internet services or software to defraud or take advantage of victims, typically for financial gain. Cybercriminals may contact potential victims through personal or work email accounts, social networking sites, dating apps, or other methods in attempts to obtain financial or other valuable personal information.
Internet Scam
55
are also known as spiders, crawlers, and web bots. It is a software application that is programmed to do certain tasks. Bots are automated, which means they run according to their instructions without a human user. Some bots are useful, such as search engine bots that index content for search or customer service bots that help users. Other bots are "bad" and are programmed to break into user accounts, scan the web for contact information for sending spam, or perform other malicious activities. If it's connected to the Internet, a bot will have an associated IP address.
Internet robots
56
is any program or file that is harmful to a computer user.
Malware
57
is unwanted software designed to throw advertisements up on your screen. Example, pop-up ads and banner ads.
Adware
58
is malware that secretly observes the computer user’s activities without permission and reports it to the software’s author. Example is a keylogger.
Spyware
59
are malwares that attach to another program and, when executed—unintentionally by the user—replicates itself by modifying other computer programs and infecting them with its own bits of code.
Virus and Worms
60
is one of the most dangerous malware types. It usually represents itself as something useful in order to trick you. Once it’s on your system, the attackers behind the Trojan gain unauthorized access to the affected computer.
Trojan, or Trojan horse
61
is a form of malware that locks you out of your device and/or encrypts your files, then forces you to pay a ransom to get them back.
Ransomware
62
are unsolicited emails, instant messages coming from recipients that are not granted verifiable permission for the message to be sent. Spam messages can be damaging if you open or respond to it.
Spams
63
refers to the use of the internet or other electronic device to harass or stalk individuals or organizations.
Cyberstalking
64
refers to the act of tormenting, harassing, or embarrassing another person using the internet.
Cyberbullying
65
happens when someone or something pretends to be something else to gain our confidence, get access to our systems, steal data, steal money, or spread malware.
Spoofing
66
What type of malicious program is designed to replicate itself and transfer from one computer to another either through the internet or local networks or data storage like flash drives and CDs? A. Adware B. Spyware C. Worms and Virus D. Ransomeware
C. Worms and Virus
67
What harmful online programs are designed to send you advertisements, mostly pop-up ads? A. Adware B. Spyware C. Worms and Virus D. Ransomeware
A. Adware
68
What harmful online program is used to record keystrokes done by users to steal passwords? A. Adware B. Spyware C. Worms and Virus D. Ransomeware
B. Spyware
69
What is ransomware based on? A. Fear of hackers B. Fear of the Internet C. Fear of spyware D. Fear of losing important files
D. Fear of losing important files
70
Which of the following is an example of a “phishing” attack? A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone reliable. B. Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information. C. Sending someone a text message looks like a notification that the person has won a contest. D. Sending someone an email that records their keystroke activities while using their computers.
A. Sending someone an email that contains a malicious link that is disguised to look like an email from someone reliable.
71
Which of the following must NOT be done if you received an embarrassing picture from your friend? A. Tell your parents or teachers B. Send the picture on to other friends C. Talk to your friend about its negative outcomes. D. Discourage your friend from sending pictures like that.
B. Send the picture on to other friends
72
What is a flame in cyberspace? A. A person who follows the rules of Netiquette. B. An expert programmer. C. An online chain letter. D. A post or email message that expresses a strong opinion or criticism.
D. A post or email message that expresses a strong opinion or criticism.
73
What is considered shouting over the Internet? A. Screaming at your computer. B. Writing in all CAPS. C. Putting a lot of exclamation marks at the end of a sentence. D. Not answering a friend request on Facebook.
B. Writing in all CAPS.
74
To avoid being cyber-bullied you should always... A. Give out personal information to anyone who asks. B. Strike first - post mean things about other people on your Wall on Facebook. C. Observe proper netiquette rules. D. Ignore any requests from people to be your friend online.
C. Observe proper netiquette rules.
75
How are you judged in cyberspace? A. No one can see you, so no one can judge you. B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette. C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay. D. You
B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
76
What is the Boolean logic technique used for? A. Narrowing, broadening or eliminating a search term. B. Using a robot to do instant research. C. Searching several search engines at the same time. D. Searching the infinite information from the internet.
A. Narrowing, broadening or eliminating a search term.
77
http://www.avg.com/en/signal/what-is-spyware is an example of? A. Access code B. Directory C. Server D. URL
D. URL
78
Which of the following is a search engine? A. Netscape C. Elsevier B. Yahoo D. Macromedia Flash
B. Yahoo
79
Which of the following is NOT an example of a domain? A. .gov B. .com C. .npr D. .edu
C. .npr
80
What are the three Boolean logic search operators? A. FROM, TO, WHOM B. AND, OR, NOT C. AND, OR, BUT D. SEARCH, KEYWORD, TEXT
B. AND, OR, NOT
81
are websites used for retrieval of data, files, or documents from data bases.
Search Engines
82
A URL is one type of Uniform Resource Identifier (URI). It is a generic term for all types of names and addresses that refer to objects on the world wide web. Knowing the URL endings will give you clues to who is sponsoring the website and help evaluate the sources.
Anatomy of a URL
83
What happens when a phrase or sentence is placed inside quotation marks when doing research? A. Will only return items that have both terms. B. Will search for words that are together and in order C. Will return items that exclude a term D. Will return items that have either of the terms
B. Will search for words that are together and in order
84
What is a URL? A. A computer software program B. An acronym for Unlimited Resources for Learning C. The address of a document or "page" on the World Wide Web D. A search engine
C. The address of a document or "page" on the World Wide Web
85
What are the three main search expressions, or operators, recognized by Boolean logic? A. and, or, not C. and, or, but B. from, to, whom D. search, keyword, text
A. and, or, not
86
How do you evaluate a web page? A. You confirm that the author or site an authority on the subject. B. You check to see if the author has been objective. C. You check to see if the information is current. D. You do as many of the above as possible.
D. You do as many of the above as possible.
87
An article that only presents one point of view or omits facts is biased. A. True B. False
A. True
88
Boolean Logic – narrows, broadens, or eliminates search term. a. Boolean “or” – this operator will find pages that include either of the search terms. Ex. A or B b. Boolean “and” – this operator will retrieve only pages containing both terms Ex. A and B c. Boolean “not” – this operator will find pages that do not include search term immediately following it. Ex. A not B
Notes
89
– is used to search for famous quotes, proper names, recommendations, etc. It encloses the phrase in quotation marks. Ex. “Jane Doe” “To be or not to be”
Phase Searching
90
indicates that the word after the sign is a required word must be found in search. Example: +fire
Plus (+)
91
indicates to exclude a word from your search that is not required on the result. Example: Jaguar speed –car
Minus (–)
92
is used to find social tags. Example: @SteveJobs
Ampersand (@)
93
is used to find popular hashtags. Example: #LawOfClassroom
Hashtag (#)
94
using the filetype refines the search for documents on the web. o filetype:pdf o filetype:doc o filetype:xls
Finding Documents
95
– the sites find webpage from a website. Ex.: National Geographic information in Australia Search: Australia site: NationalGeographic.com
Searching Site
96
It reveals that the person, institution or agency responsible for a site has the qualifications and knowledge to do so.
Authority
97
The __________ of the information presented in the site should be clear. Some sites are meant to inform, persuade, state an opinion, entertain, or parody something or someone.
Purpose
98
This refers to how comprehensive the website is in their discussion of certain topics.
Coverage
99
It refers to: (1) how current the information presented is, and (2) how often the site is updated or maintained. It is important to know when a site was created, when it was last updated, and if all of the links are current.
Currency
100
Objective sites present information with a minimum of bias.
Objectivity
101
It refers to the credibility of the website.
Accuracy