1st QE Flashcards

(87 cards)

1
Q

ICT

A

Information and Communications Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to all technology that is used to handle
telecommunications and access information. It also includes broadcast media, management systems, and
network-based control

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the convergence of several technologies including the internet and
wireless medium, but primary focus is on the access and sharing of information and communications

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of ICT

A

Cloud Computing & Internet Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Remote delivery of computing services (servers, storage, databases, applications) over
the internet, accessible on demand.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

enables users to access and use computing resources (such as storage,
processing power, and software) over the internet, providing scalability and flexibility

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides cloud-based services for businesses and individuals, including virtual machines, storage, databases, and analytics
tools.

A

Microsoft Azure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Offers a suite of cloud computing services like computer engine, storage, big data, and machine learning for businesses
and developers.

A

Google Cloud Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Connection to the global network of computers and information resources.

A

Internet Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a facility or service that provides connectivity for a computer, a computer network, or other network device to the Internet

A

Internet Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Internet Access

A

Wi-Fi (Wireless Fidelity), LTE (Long Term Evolution) & 5G Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a widely used wireless networking technology that enables devices to connect to the internet and each other without physical
cables. It operates in a specific radio frequency spectrum, typically 2.4 GHz or 5
GHz, and transmits data using radio waves.

A

Wi-Fi (Wireless Fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a cellular network technology that provides
high-speed wireless internet access for mobile devices like smartphones and tablets. It was designed as an upgrade to earlier 3G networks, offering significantly faster data speeds, lower latency, and improved network capacity.

A

LTE (Long Term Evolution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the latest generation of cellular network technology, promising even faster speeds, lower latency, and significantly improved network capacity compared to its predecessors. It aims to revolutionize various aspects of our lives beyond just mobile internet access, enabling new applications and services

A

5G Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Defined as a collection of individual raw facts or statistics. It can come in the form of text,
observations, figures, images, numbers, graphs, or symbols.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

refers to the massive volume of structured and unstructured data that organizations and systems generate daily. This data comes from a wide range of sources, including sensors, social media, web interactions, transaction records, and more

A

Big Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Refers to all equipment and programs that are used to process and communicate
information. Tools and methods used to transmit and receive information electronically.

A

Communication Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Types of Communication Technologies

A

Machine-to-Machine communication, Human-to-Machine communication & Wearable Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

M2M communication refers to the
direct exchange of data and instructions between the various sensors and
devices embedded within them, without human intervention.

A

Machine-to-Machine communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HMI focuses on how humans interact with
their wearable

A

Human-to-Machine communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

M2M and HMI work together to create the magic of wearable technology. M2M provides the underlying data exchange and intelligence, while HMI allows humans to access and control this technology seamlessly. As both technologies continue to evolve, we can expect even more sophisticated and intuitive ways for wearables to communicate, both with each other and with us.

A

Wearable Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Exchange of information or goods electronically, often involving payment or data transfer.

A

Transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Physical components of an ICT system, including computers, network devices, and
peripherals.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Set of instructions that tell hardware how to perform specific tasks.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
- Online shopping: Purchasing goods and services through e-commerce websites and platforms. - Mobile banking: Making payments, transferring funds, and managing bank accounts through mobile apps.
Transactions
26
- Personal computer: Desktop or laptop used for work, entertainment, and communication. - Smartphones: Mobile devices with internet access, camera, and various applications.
Hardware
27
- Operating system: Manages the computer's hardware and provides a platform for running other programs. (e.g. Windows, macOS, Linux) - Productivity software: Tools for document creation, spreadsheets, presentations, and communication. (e.g. Microsoft Office, Google Workspace)
Software
28
29
30
Web Generation: From Static Pages to Interconnected Ecosystems
Web 1.0 (1991-1995), Web 2.0 (2005-present) &Web 3.0 (emerging)
31
The dawn of the web, characterized by static HTML pages and limited user interaction.
Web 1.0 (1991-1995)
32
User-generated content, social media, and dynamic applications took center stage. Platforms like YouTube and Wikipedia redefined online engagement.
Web 2.0 (2005-present)
33
The web as a more immersive and decentralized space, fueled by blockchain technology and semantic web concepts. Think virtual reality experiences and AI-powered personalized content.
34
Convergent Technology: Blurring the Lines Between Devices and Services
The Internet of Things (IoT), Cloud Computing, & Convergence of Devices and Services
35
Everyday objects equipped with sensors and internet connectivity, creating interconnected ecosystems for smart homes, cities, and industries.
The Internet of Things (IoT)
36
On-demand access to computing resources like servers, storage, and applications remotely, delivered over the internet.
37
Smartphones becoming mini-computers, smart TVs blurring the line between television and computing, and wearables merging fitness tracking with health monitoring.
Convergence of Devices and Services
38
Social Use of ICT: Bridging the Gap and Empowering Communities
E-governance and Citizen Participation, Education and Skills Development & Healthcare and Wellbeing
39
Assistive Technology: Bridging the Digital Divide and Empowering All
Accessibility Tools, Assistive Robotics, Digital Inclusion Initiatives
40
Screen readers, voice recognition software, and specialized hardware enabling people with disabilities to access and interact with technology.
Accessibility Tools
41
Robots and wearable technologies providing support for mobility, daily tasks, and communication, enhancing independence and quality of life for people with disabilities.
Assistive Robotics
42
Programs and policies ensuring equitable access to technology and the internet for marginalized communities, bridging the digital divide.
Digital Inclusion Initiatives
43
It is an area of computer science that emphasizes the creation of intelligent machines that work and react like humans.
Artificial Intelligence (AI)
44
systems are designed to mimic human intelligence and behavior, including the capacity to learn from mistakes, reason and take decisions, comprehend and interpret natural language, spot patterns, and adapt to changing circumstances.
Artificial Intelligence (AI)
45
It is the field of computer science and engineering concerned with creating devices that can move and react to sensory input. It also involves combining the principles of AI with the mechanics of robots to create intelligent machines that can interact with the world, perform tasks, and make decisions based on the data they gather.
Robotics
46
the technology used to measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements, mainly for authentication purposes.
Biometrics
47
It is an area of computing focused on developing computer technology based on the principles of quantum theory. Computers used today can only encode information in bits that take the value of 1 or 0—restricting their ability. It uses quantum bits or qubits.
Quantum computing
48
it is a cutting-edge computing paradigm that uses quantum mechanics principles to process and store information.
Quantum computing
49
decentralized and distributed digital ledger technology that records transactions in a secure and irreversible manner. It is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. It was originally designed to facilitate and verify transactions for the digital currency Bitcoin, but its uses and applications have surpassed cryptocurrencies in every way. It is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system
Blockchain
49
It is the science of encoding and decoding information or messages which depends on physics, not mathematics. It is used for information privacy and security. It provides an ideally unbreakable method of key distribution, as any attempt to intercept or measure the quantum states would introduce errors that can be detected.
Quantum Cryptography
50
digital currencies (or tokens), like Bitcoin, Ethereum or Litecoin, that can be used to buy goods and services. Just like a digital form of cash, crypto can be used to buy everything from your lunch to your next home. Unlike cash, crypto uses blockchain to act as both a public ledger and an enhanced cryptographic security system, so online transactions are always recorded and secured.
Cryptocurrencies
51
decentralized and distributed digital ledger technology that records transactions in a secure and irreversible manner. It is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. It was originally designed to facilitate and verify transactions for the digital currency Bitcoin, but its uses and applications have surpassed cryptocurrencies in every way. It is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system
Blockchain
52
use of computers to assist in the translation of one or more natural languages into another or others, and vice-versa.
Computer-Assisted Translation (CAT)
53
a software application that works as part of a translation workflow where the software automates and assists in the translation process steps.
Computer-Assisted Translation (CAT)
54
a photographic technique that uses light to project objects in a way that appears three-dimensional. It is a technique that allows the creation of three dimensional images, known as holograms. Unlike traditional photographs that capture only the intensity of light, holograms record both the intensity and the phase of light waves.
3D Imaging and Holography
55
the term used to describe a three-dimensional, computer generated environment that can be explored and interacted with a person.
Virtual Reality
56
to immerse users in a synthetic world that appears and feels realistic, tricking their senses into believing they are physically present in the virtual environment
Virtual Reality
57
branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems.
Internet Security
58
to establish rules and measures to use against attacks over the Internet. There are different methods that have been used to protect the transfer of data, including encryption.
Internet Security
59
knowing about one’s internet privacy and how one’s behavior can support a healthy interaction with the use of the internet” together with the existing applications technological devices.
Internet safety or ‘e-safety’
60
5 TIPS TO STAY SAFE ONLINE
Tip #1: Be Aware of Fake websites Tip #2: Check for website safety Tip #3: Choose strong/varied passwords Tip #4: Avoid Spyware Tip #5: It’s NOT all about spyware and scams
61
Misspelled URLs or strange domain names (e.g., "amaz0n.com" instead of "amazon.com") ▪ Poor grammar and spelling errors throughout the site ▪ Unprofessional design or layout ▪ Requests for excessive personal information ▪ Unbelievable deals or offers that seem too good to be true
Tip #1: Be Aware of Fake websites
62
Provide your information to reputable businesses, then ensure that the company's website uses a Web address that starts with "https" and has a padlock symbol either in the address bar or at the bottom of the browser.
Tip #2: Check for website safety
63
o Create strong, complicated passphrases (not passwords) o Use two-factor authentication (2FA) or better, an authenticator app o Make sure you're using a secure Wi-Fi connection.
Tip #3: Choose strong/varied passwords
64
Having anti-spyware and antivirus programs running on your computer is a must.
Tip #4: Avoid Spyware
65
o Limiting the personal information that you share online o Securing your password o Signing in and out o Using secured networks o Locking your screen or device
Tip #5: It’s NOT all about spyware and scams
66
law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
Data Privacy Act
67
Freedom of expression is not an absolute right and can be subjected to restrictions.
The limits of presumed freedom of expression
68
Defamation involves writing or saying something about someone that damages that person’s reputation. There are two categories of defamation: libel (written or published defamation) and slander (spoken defamation).
Issues of libel
69
a part of a law, wherein you have the right/s to your work, and anyone who uses it without your consent is punishable by law.
Copyright Law
70
protects "original works of authorship," including literary, dramatic, musical, artistic, and other intellectual creations. It gives the creator exclusive rights to reproduce, distribute, adapt, display, and perform their work.
copyright
71
protects words, symbols, designs, or phrases that identify and distinguish the source of goods or services. It prevents others from using the same or similar marks that could cause confusion in the marketplace.
trademark
72
information that gives a business a competitive advantage and is protected from unauthorized disclosure. It can include formulas, recipes, customer lists, manufacturing processes, and other confidential information
trade secret
73
grants exclusive rights to the inventor of a new, useful, and non-obvious invention. It prevents others from making, using, selling, or importing the invention without permission.
patent
74
intellectual property may be used without consent as long as it is used in commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and education.
Fair Use
75
short for malicious software. It is a code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.
Malware
76
type of malware that often take the form of a piece of code inserted in an application, program, or system and they’re deployed by victims themselves.
Viruses
77
type of malware that replicates itself. Unlike viruses, however, worm malware can copy itself without any human interaction, and it’s not host-dependent, meaning it does not need to attach itself to a software program to cause damage.
Worms
78
type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices. often spread via email attachments, website downloads, or direct messages.
Trojans
79
type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
Ransomware
80
act more as a “spider,” meaning a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
Bots
81
type of malware that gain access to devices through a piece of malicious coding. In some cases, _________ directly hack devices, with cyber criminals even taking remote control of devices.
Botnets
82
malware that involves advertising. Also known as advertising-supported software, adware displays unwanted advertisements on your computer, sometimes in the form of pop-up ads that track users’ browsing activity.
Adware
83
type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes
Spyware
84
use of electronic messaging systems like e-mails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
Spamming
85
identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. Attackers commonly use phishing emails to distribute malicious links or attachments that can extract login credentials, account numbers and other personal information from victims.
Phishing
86