SPIIT Final Exam Flashcards

1
Q

The network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

A

Internet of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It involves fitting more transistor nodes on a smaller integrated circuit (IC)

A

Miniatiurization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a term used to describe three-dimensional computer-generated environments that replace the normal reality in which our everyday lives play out.

A

Virtual Reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This system allows you to input additional data without changing, replacing, or deleting anything

A

blockchain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It refers to the measures taken to protect a computer or computer system against unauthorized access from a hacker.

A

Cybersecurity or information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is the use of a network that is comprised of remotely connected servers.

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

From Asimov’s Three Laws of Robotics. No. 1 rule is “Robots must never harm ____________.

A

human being

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Asimov’s Three laws of robotics?

A
  1. Robots must never harm human beings
  2. Robots must follow instructions from humans without violating rule 1
  3. Robots must protect themselves without violating the other rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is the unequal access of information and communication technology between different groups of society, and the knowledge of the skills required to use the technology.

A

digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a way companies can predict growth opportunities and achieve future success.

A

data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This process can collect information from vendors, customers, and other documentation.

A

automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the issues concerning the industries in the Philippines?

A
  1. Health issues
  2. Political issues
  3. Economic issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IT-BPO Industry is composed of eight sub-sectors, give at least 4 sub sectors.

A
  1. knowledge process outsourcing
  2. back offices
  3. animation
  4. call centers
  5. software development
  6. game development
  7. engineering design
  8. medical transcription
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Cybercrime Prevention Act of 2012 that was approved on September 12, 2012?

A

R.A. 10175

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the advantages of internet censorship?

A
  1. It creates the chance to set common sense limits.
  2. It limits access to harmful activities.
  3. It could lessen the impact of identity theft.
  4. It may provide a positive impact on national security.
  5. It stops fake news.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 2 BPO setups model (Captive Markets and Offshoring/Third Party Outsourcing)?

A
  1. Build operate transfer model
  2. Start from scratch model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why there is a need for website content filtration? Give 2 reasons.

A
  1. safe access to the internet
  2. for business
  3. protect children from unsuitable contents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give 2 examples of trends in the industry.

A
  1. better information security
  2. strategic balanced-shore outsourcing
  3. booming blogging and social media outsourcing
  4. popularity of cloud-based software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three commonly used techniques to block access to Internet sites using a proxy.

A
  1. IP blocking
  2. DNS tampering
  3. URL blocking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is much less dangerous and much more complete because these technologies can be used to infiltrate situations and gather accurate information with minimal loss of fidelity.

A

information collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

One of the main purposes of this is to identify financial transactions that may involve tax evasion, money laundering, or some other criminal activity. It may also be involved in identifying the financing of criminal and terrorist organizations.

A

financial intelligence (FININT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It may also be perpetrated by government actors, state-sponsored or state-directed groups, or others acting on behalf of a government, seeking to gain unauthorized access to systems and data in an effort to collect intelligence on their targets in order to enhance their own country’s national security, 34 economic competitiveness, and/or military strength

A

cyberespionage

23
Q

Any military action involving the use of electromagnetic energy to determine, exploit, reduce or prevent hostile use of electromagnetic spectrum and action which retains friendly use of the electromagnetic spectrum.

A

electronic warfare

24
Q

It is intelligence about human activity on earth derived from the exploitation and analysis of imagery and geospatial information that describes, assesses and visually depicts physical features and geographically referenced activities on the earth.

A

Geospatial intelligence (GEOINT)

25
Q

It is defined as scientific and technical intelligence derived from the analysis of data from sensing instruments for the purpose of identifying any distinctive features associated with the source, emitter or sender, to facilitate the latter’s measurement and identification.

A

Measurement and signature intelligence (MASINT)

26
Q

It is intended primarily to allow the armed forces to avoid technological surprises. Knowledge of the characteristics and capabilities of enemy weapons allows nations to develop effective countermeasures for them

A

technical intelligence (TECHINT)

27
Q

List 3 disadvantages of Virtual Therapy

A
  1. Data concerns
  2. Relationship concerns
  3. Technological limitations
  4. Technological expertise and philosophy
28
Q

A nation or company would cut off the targeted countries access to outside information. This blockade would cripple the economy of the targeted nation.

A

economic information warfare

29
Q

Give 4 benefits of Virtual Therapy

A
  1. Increased access to care
  2. More privacy
  3. Cost savings
  4. Client satisfaction
30
Q

The planned operations to convey selected information and indicators to audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of organizations, groups, and individuals.

A

pyschological warfare

31
Q

It is the manipulation of information trusted by a target without the target’s awareness, so that the target will make decisions against their interest but in the interest of the one conducting it.

A

information warfare

32
Q

This refers specifically to remote clinical services, while telehealth can refer to remote non-clinical services.

A

telemedicine

33
Q

This type of telemedicine allows providers to share patient information such as lab results, with physical at another location.

A

store-and-forward

34
Q

It is data collected from publicly available sources to be used in an intelligence context.

A

open-source intelligence (OSINT)

35
Q

Is defined by the Internet Crime Complaint Center as “fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.

A

auction fraud

36
Q

They are the good guys of the hacker world. They typically have a strong IT security background, and may even be certified as an ethical hacker. They are sometimes called “penetration testers”.

A

white hat hackers

37
Q

It serves as back door in a computer system to allow an intruder to gain access to the system later.

A

trojan horse

38
Q

It is the intimidation or coercion of a government or organization to advance an individual’s or group’s political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.

A

cyber-terrorism

39
Q

What does CBT stand for?

A

computer-based training

40
Q

Are the one’s you hear about in the news. They gain access to information from banks or other businesses and typically steal money, credit card information or proprietary data.

A

black hat hackers

41
Q

The process of recovering passwords from data stored or transmitted by computer systems.

A

password cracking

42
Q

Nigerian scams involve someone overseas offering you a share in a large sum of money or a payment on the condition you help them to transfer money out of their country.

A

West African scams

43
Q

A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

A

spoofing

44
Q

They are the black hat hackers who are just starting out in the hacking world.

A

Green hat hackers

45
Q

What does SMS stand for?

A

short message service

46
Q

Are world wide web pages created by an individual to contain content of a personal nature rather than content pertaining to a company, organization or institution.

A

personal web pages

47
Q

To send (a message) indiscriminately to multiple mailing lists, individual, or newsgroups. The sending of multiple unsolicited e-mails or text messages, usually for marketing purposes.

A

spamming

48
Q

Are the vigilante who go after the black hat hackers using aggressive hacking methods.

A

red hat hackers

49
Q

It refers to writing, photography, and other media that’s self-published online.

A

blogging

50
Q

It is also known as gaming disorder or internet gaming disorder, is generally defined as the problematic, compulsive use of video games that results in significant impairment to an individual’s ability to function in various life domains over a prolonged period of time.

A

video game addiction

51
Q

It is a type of cybercrime fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance.

A

online fraud

52
Q

It is a form of electronic commerce which allows consumers to directly buy goods or services from a seller over the Internet using a web browser

A

online shopping

53
Q

Involves websites which falsify data by mimicking legitimate sites, and they are therefore treated as trusted sites by users or other programs.

A

spoofing attack

54
Q
A