mst finals Flashcards

1
Q

An information space where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the internet

A

WORLD WIDE WEB (WWW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The address of a web page or colloquially termed a web address

A

URL
Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Text which contains links to the other texts or information

A

HYPERTEXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hypertext which is not constrained to be text, can include graphics, video and sound

A

HYPERMEDIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A link from a hypertext file or document to another location or file, usually activated by clicking on a highlighted word or image

A

HYPERLINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images

A

THUMBNAIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

He invented the World Wide Web
in the year 1989.

A

TIM BERNERS-LEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tim Berners-Lee wrote the first web browser in the year ___.

A

1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CERN
The ___ ___ ___ ___ ___, where Tim Berners-Lee worked when he invented the World Wide Web

A

European Organization for Nuclear Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What year the browser was released outside of CERN?

A

1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A link from a hypertext file or document to another location or file, usually activated by clicking on a highlighted word or image

A

HYPERLINK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The name of the browser that helped to get the World Wide Web popular

A

MOSAIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The World Wide Web has been central to the development of the ___ ___ and is the primary tool for billions of people use to interact on the Internet

A

INFORMATION AGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first generation of the world wide web, which is the “read-only web”

A

WEB 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web _.0 allowed users to search for information and read it, with very little user interaction or content generation

A

1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web 1.0 is also known as ___

A

Static web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of Internet sites classified as Web 1.0

A

Britannica Online, personal websites, and mp3.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disadvantages of Web 1.0

A

Read-only web
Limited user interaction
Lack of standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Without the ___ ___ community, browser makers would be the ones making decisions on what should and shouldn’t be features of the World Wide Web, which could lead to the Web becoming a monopolized commodity

A

WEB STANDARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The second stage/generation of the development of the internet, focused on user-generated content and the __-__ web

A

READ-WRITE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An improved version of Web 1.0 which focuses primarily on user interactivity, collaboration, enhanced network connection, and a shift from a static to a dynamic approach to the internet

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An author, web designer and expert in user experience, who coined the term “Web 2.0” in 1999 and predicted the influence it would have on public relations

A

Darcy DiNucci

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A formal set of standards and technical specifications used to define aspects of the world wide web

A

WEB STANDARDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web pages that are affected by user input or preference, where the user can interact with the page instead of just reading it

A

DYNAMIC PAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Examples of Web 2.0

A

Social Networking
Blogs
Wikis
Video sharing sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A user-generated system of classifying and organizing online content into different categories by the use of metadata such as electronic tags

A

TAGGING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A well-designed ___ __ interface draws the user in and encourages the user to interact with it and learn from the application

A

RICH USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Synonymous to subscribing to a data plan that charges you for the amount of time you spent on Internet or a data plan that charges you for the amount of bandwidth you used

A

SUBSCRIPTION-BASED INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

_ _ _ _ (SaaS)

Subscribing to a software only when needed and involving human interactions with digital content facilitated by applications delivered over the web and that free the user from locally installed software

A

SOFTWARE AS A SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

T or F
Web 2.0’s content is based on people from various cultures

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

T or F
Web 3.0 is also known as Semantic Web

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Main features that can help define Web 3.0

A

Semantic Web
Artificial Intelligence
3D Graphics
Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

T or F
Semantic web technologies is a two-way interaction

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which is correct about Hypermedia?

A. Hypertext which is not constrained to be text, can include graphics, video, and sound.

B. Hypertext Markup Language, is a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

_____ Web technologies enable people to create data stores on the Web, build vocabularies, and write rules for handling data

A

SEMANTIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Main features That can Help us Define Web 3.0

A

Semantic Web
Artificial Intelligence
3D Graphics
Connectivity
Ubiquity
DLT (Distributed Ledger Technology) and Smart Contracts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Combining natural language processing, computers can distinguish information like humans to provide faster and more relevant results. They become more intelligent to fulfill the requirements of users.

A

ARTIFICIAL INTELLIGENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The three-dimensional design is being used widely in websites and services in Web 3.0. Museum guides, computer games, e-commerce, geospatial contexts, etc. are all examples that use 3D graphics

A

3D GRAPHICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

With Web 3.0, information is more connected thanks to semantic metadata. As a result, the user experience evolves to another level of connectivity that leverages all the available information

A

CONNECTIVITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Content is accessible by multiple applications, every device is connected to the web, and the services can be used everywhere

A

UBIQUITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

With the help of _ _ _, we can have a virtually impossible to hack database from which one can have value to their content and things they can own virtually

A

DLT
Distributed Ledger Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The ___ is the largest computer network in the world that connects billions of computer user

A

INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Hypertext
Definition?

A

Text which contains links to the other texts or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

____ is a collection of computers and devices connected via communication channels and transmission media allow to share resources (hardware, software, data, information).

A

NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

First version of the internet created as ARPANET

A

1969

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

First message sent over ARPANET

A

1969

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Vinton Gray Cerf and Robert Kahn develop TCP/IP

A

1973

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

First “free net” created

A

1986

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

US government allowed business agencies to connect to internet

A

1991

50
Q

Major Components of the Internet

A

SERVERS
IP ADDRESS (Internet Protocol)
BROWSER
(DOMAIN NAME SYSTEM (DNS)
INTERNET SERVICE PROVIDER (ISP)

51
Q

Computer programs that provide services to other computer programs and users

A

servers

52
Q

___ ___ (Internet Protocol)

Numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication, providing identity to a network device

A

IP ADDRESS

53
Q

Application program that provides a way to look information on the web

A

BROWSER

54
Q

Browsers

A

Google chrome, Safari, Internet explorer, Opera, Mozilla

55
Q

The phonebook of the internet, we access information online through domain names

A

Domain Name System (DNS)

56
Q

Domain Name Examples

A

www.eac.edu.ph
www.facebook.com
sss.gov.ph
https://thenew.org/

57
Q

2 Types of ISP

A

National ISP
Regional ISP

58
Q

ISP Examples

A

Sky Broadband, PLDT, Converge

59
Q

A collection of billions of webpages that you can view with a web browser

A

WEB

60
Q

The most common method of sending and _ messages online

A

EMAIL

61
Q

Websites and apps that allow people to share comments, photos, and videos

A

SOCIAL MEDIA

62
Q

Games that allow people to play with and against each other over the Internet

A

ONLINE GAMING

63
Q

Operating system and application updates can typically downloaded from the Internet

A

SOFTWARE UPDATES

64
Q

a coding language used to tell a browser how to place pictures, text, multimedia and links to create a web page

A

HTML
HYPERTEXT MARKUP LANGUAGE

65
Q

To transfer data from your computer to another computer

A

DOWNLOAD

66
Q

it indicates the web page has a special layer of encryption added to hide personal information and passwords

A

HTTPS
HYPERTEXT TRANSFER PROTOCOL SECURE

67
Q

Hardware device that acts as the traffic cop for network signals arriving at your home or business from your ISP

A

ROUTER or router modern combination

68
Q

The mathematical scrambling of data so that it is hidden from eavesdroppers

A

ENCRYPTION

69
Q

Programs/applets (macros and intelligent agents) used on the Internet to perform repetitive functions, such as posting messages to multiple newsgroups or doing searches for information

A

WEB BOT

70
Q

Specialized software, such as Google and Yahoo, that lets www browser users search for information on the web by using keywords and phrases

A

SEARCH ENGINE

71
Q

the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life

A

NETIQUETTE

72
Q

Virginia Shea
Dubbed the “_” by the San Jose Mercury News

A

NETWORK MANNERS GURU

73
Q

Give Rules of Netiquette

A
  1. Remember the Human
  2. Adhere to the same standards of behavior online that you follow in real life
  3. Know where you are in cyberspace
  4. Respect other people’s time and bandwidth
  5. Make yourself look good online
  6. Share expert knowledge
  7. Help keep flame wars under control
  8. Respect other people’s privacy
  9. Don’t abuse your power
  10. Be forgiving of other people’s mistakes
74
Q

A branch of philosophy that deals with determining what is right and wrong

A

COMPUTER ETHICS

75
Q

Main concerns of computer ethics

A

Internet privacy
Cracking
Copyright infringement
Internet control

76
Q

Main concerns of computer ethics

A

Internet privacy
Cracking
Copyright infringement
Internet control

77
Q

An adjective or prefix which means relating to or characteristic of information technology, virtual reality, and computers

A

CYBER

78
Q

T or F
When working on animation films or designing video games, it is the programmer’s responsibility to understand his target audience/users and the effect it may have on them

A

T

79
Q

T or F
A computer game for kids should have content that can influence them negatively

A

F

80
Q

A ____ ____/development firm should consider the influence their code can have on society at large

A

SOFTWARE

81
Q

The ____ we follow in the real world applies to communication over computers as well

A

COMMUNICATION ETIQUETTE

82
Q

A crime in which a computer or the internet is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense

A

CYBERCRIME

83
Q

Individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit

A

CYBERCRIMINALS

84
Q

Republic Act No. 10173 _ _ _ _ _ is an act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes

A

DATA PRIVACY ACT OF 2012

85
Q

Republic Act No. 11449 Access Devices Regulation Act of 1998 is an Act Providing for Additional Prohibitions to and Increasing Penalties for Violations of Republic Act No. _

A

8484

86
Q

Illegal Downloading. Obtaining files that you do not have the right to use from the internet. Digital Piracy, Practice of illegally copying and selling digital music, video, computer software, etc. Copyright Infringement

A

ELECTRONIC THEFT

87
Q

Republic Act No. 9775 The _ Act of 2009 defines the crime of child pornography, prescribing penalties therefor and for other purposes

A

ANTI-CHILD PORNOGRAPHY

88
Q

A type of intellectual property that gives its owner the exclusive right to print, publish, distribute, adapt, display, and perform a creative work

A

COPYRIGHT

89
Q

The violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work

A

COPYRIGHT INFRINGEMENT

90
Q

Presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement

A

PLAGIARISM

91
Q

_ applies when ideas are copied; copyright violation occurs only when a specific fixed expression (e.g., sequence of words, use of an image) is copied

A

PLAGIARISM

92
Q

COMMON CYBERCRIMES

A

Hacking
Computer related forgery, fraud and/or identity theft
Electronic theft
Cyberbullying
Cybersex
Child Pornography
Cyber Libel

93
Q

_

Unauthorized access of or interference with computer systems, servers, or information and communication system or any access in order to corrupt, alter, steal, or destroy electronic data using computers or other information and communication systems without the computer or system owner’s knowledge and consent of the owner of the computer or information communication system, including the introduction of computer viruses and the like resulting in the corruption, destruction, alteration, theft, or loss of electronic data messages or electronic documents

A

HACKING

94
Q

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature

A

CYBERBULLYING

95
Q

Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration

A

CYBERSEX

96
Q

A form of child sexual exploitation committed through a computer system

A

CHILD PORNOGRAPHY

97
Q

An unprivileged false statement of fact which tends to harm the reputation of a person or company

A

CYBER LIBEL

98
Q

A threat that makes use of the World Wide Web to disperse, conceal, and update itself to facilitate cybercrime

A

INTERNET THREAT

99
Q

Internet Threats

A

Malware
Spam
Phishing
Pharming

100
Q

Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, adware, and ransomware

A

MALWARE

101
Q

Malicious program designed to replicate itself and transfer from one computer to another either through the internet and local network or data storage (like flash drives and CD’s)

A

VIRUS

102
Q

Malicious program designed that transfer from one computer to another by any type of means. Often, it uses a computer network to spread it

A

WORM

103
Q

The ___ ___ ___ worm was created by a Filipino destroys all the kinds of files including photographs, audio files and documents. Affected users who didn’t have backup copies lost them permanently

A

I LOVE YOU

104
Q

A malicious program disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allow hackers to get information

A

TROJAN

105
Q

Trojan files are usually saved as ____. An example of Trojan is Roque Security Software which tricks the user into posing that it is a security software. It asked the user to pay to his/her security. But, in reality they are not protected at all

A

.EXE.files

106
Q

Program that runs in the background without knowing it. That’s why it is called “spy”. It has the ability to monitor what are you are currently doing through keylogging. Used to record the keystrokes done by the user. Done to steal password or any other sensitive information. Can record email, messages, any information you type using your keyboard

A

SPYWARE

107
Q

Program designed to send you advertisements, mostly as pop ups. You can usually see adware in restricted or unwanted site. Some would tell you that you won a million dollar and you have to claim it before time runs out

A

ADWARE

108
Q

A type of malicious software designed to block access to a computer system until a sum of money is paid

A

RANSOMWARE

109
Q

The mass distribution of unsolicited messages, advertising or pornography to addresses which can be easily found on the Internet through things like social networking sites, company websites and personal blogs

A

SPAM

110
Q

The Three Ages of Digital

A
  1. Pre-digital Age
  2. Mid-digital Age
  3. Post-digital Age
111
Q

The time before our world became digital can simply be identified as a physical world where media channels were consumed on TV, newspaper, radio, and people loved reading magazines. These were all one-way communication.

A

PRE-DIGITAL AGE

112
Q

Computers
In _, the first set of computers for commercial purposes were released but solved only simple arithmetic problems and data handling and were expensive for most people.

A

1951

113
Q

In _, laptops with tiny screens were invented.

A

1981

114
Q

It took almost a week for pictures to be developed. The process involved taking pictures on film, getting the roll developed, and then printed. It was until 1988 that a fully functional camera with storage of up to 10 photos was released.

A

CAMERA AND PHOTOGRAPHY

115
Q

Music was only heard live before LP records. Then there came in 12-inch discs and music was recorded and played by placing the needle on the record. It was long after that the Walkman was a thing and music was recorded on cassettes and movies were recorded on VCRs. Then music was recorded on compact discs and movies on DVD.

A

DATA AND STORAGE

116
Q

___________ Age

This was the time when TV didn’t show anything anywhere because of digital rights that were yet not cleared and most of what TV showed were headlines about new discoveries and inventions which were happening fast.
Soon after digitalization started to become more and more accepted and immersed in society, knowledge started becoming vast.

A

MID-DIGITAL AGE

117
Q

Mobile Phones
In _ saw the release of a smartphone that not only supported calls but also email and fax.

A

1994

118
Q

The concept of digital has far gone out of the conversation by this time as it has become a norm to live in a digital world. In fact, the time before this has become irrelevant and off-topic by this era. In this era, digital technology is the backbone of life and it becomes the elephant in the room only in its absence. On the spot videos, smart homes, and offices, digital news and content are already the essences of life.

A

POST-DIGITAL AGE

119
Q

_ is defined as a group of interrelated technologies (electronic devices) for accessing, processing, and disseminating information. It is a system of electronic network activated through a complex hardware and software systems linked by a vast array of technical protocols.

A

ICT
INFORMATION AND COMMUNICATIONS TECHNOLOGY

120
Q

refers to a transformation of culture and social organizations / structures over time. We are aware that in a modern world, a society is never static and that of social, political, economic, and cultural changes occurs constantly.

A

SOCIAL CHANGE

121
Q

Fulfils a number of important roles for human wellbeing, such as time structure, social contact, a sense of purpose, a valued social position as well as an opportunity for skill use

A

EMPLOYMENT

122
Q
A