SPIIT Final Exam Flashcards
The network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
Internet of things
It involves fitting more transistor nodes on a smaller integrated circuit (IC)
Miniatiurization
It is a term used to describe three-dimensional computer-generated environments that replace the normal reality in which our everyday lives play out.
Virtual Reality
This system allows you to input additional data without changing, replacing, or deleting anything
blockchain data
It refers to the measures taken to protect a computer or computer system against unauthorized access from a hacker.
Cybersecurity or information security
It is the use of a network that is comprised of remotely connected servers.
cloud computing
From Asimov’s Three Laws of Robotics. No. 1 rule is “Robots must never harm ____________.
human being
What are Asimov’s Three laws of robotics?
- Robots must never harm human beings
- Robots must follow instructions from humans without violating rule 1
- Robots must protect themselves without violating the other rules
It is the unequal access of information and communication technology between different groups of society, and the knowledge of the skills required to use the technology.
digital divide
It is a way companies can predict growth opportunities and achieve future success.
data mining
This process can collect information from vendors, customers, and other documentation.
automation
What are the issues concerning the industries in the Philippines?
- Health issues
- Political issues
- Economic issues
IT-BPO Industry is composed of eight sub-sectors, give at least 4 sub sectors.
- knowledge process outsourcing
- back offices
- animation
- call centers
- software development
- game development
- engineering design
- medical transcription
What is the Cybercrime Prevention Act of 2012 that was approved on September 12, 2012?
R.A. 10175
What are the advantages of internet censorship?
- It creates the chance to set common sense limits.
- It limits access to harmful activities.
- It could lessen the impact of identity theft.
- It may provide a positive impact on national security.
- It stops fake news.
What are the 2 BPO setups model (Captive Markets and Offshoring/Third Party Outsourcing)?
- Build operate transfer model
- Start from scratch model
Why there is a need for website content filtration? Give 2 reasons.
- safe access to the internet
- for business
- protect children from unsuitable contents
Give 2 examples of trends in the industry.
- better information security
- strategic balanced-shore outsourcing
- booming blogging and social media outsourcing
- popularity of cloud-based software
What are the three commonly used techniques to block access to Internet sites using a proxy.
- IP blocking
- DNS tampering
- URL blocking
It is much less dangerous and much more complete because these technologies can be used to infiltrate situations and gather accurate information with minimal loss of fidelity.
information collection
One of the main purposes of this is to identify financial transactions that may involve tax evasion, money laundering, or some other criminal activity. It may also be involved in identifying the financing of criminal and terrorist organizations.
financial intelligence (FININT)