1st Quarter Flashcards

(51 cards)

1
Q

What does ICT stands for?

A

Information and Communications Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is an umbrella term that includes any communication device or application.

A

ICT (Information and Communications Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is an interconnected system of public webpages accessible through the Internet.

A

WWW (World Wide Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Web pages can either be _____ or _____.

A

static or dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The web page is “ as is “ and cannot be manipulated by the user, moreover, the content is also the same for all users.

A

Web 1.0 or Static Web Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The web page have more and developed features, where what I see is not what another person sees.

A

Web 2.0 or Dynamic Web Pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is an etiqutte applied online that shows proper manner and behavior

A

Netiqutte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It happens when someone intentionally abused,
harass, and mistreated by other person using
electronic communication.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a crime of stealing personal information for the purpose of assuming that person’s name or identity to make any form of transactions.

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A criminal practice where electronic communication is used to stalk or harass individual or group.

A

Cyber Stalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The act of sending sexually explicit text messages, images, and videos

A

Sexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is designed to replicate itself and transfer from one computer to another either through the Internet and local networks or data storage like flash drives and CDs

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tricks used into posting that it is a security software. It ask the user to pay to improve his/her security but in reality they are not protected at all.

A

Rogue Security software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It runs in the background without knowing it. It has the ability to monitor what you are currently doing and typing through key logging.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The web page is able to understand the user’s preferences to be able to deliver web content specifically targeting the user.

A

Web 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is used to record the keystroke done by the users. This is done to steal their password or any other sensitive information. It can record email, messages, or any information you type using your keyboard.

A

Keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the key features of Web 2.0?

A
  1. Folksonomy
  2. Rich User Experience
  3. User Participation
  4. Long Tail
  5. Software as a Service
  6. Mass Participation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A program designed to send you advertisements, mostly as pop-ups

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unwanted email mostly from bots or advertisers. It can be used to send malware

22
Q

Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website.

23
Q

A more complicated way of phishing where it exploits the DNS (Domain Name Service) system

24
Q

Allows users to categorize and locate information (ex. Tagging)

25
It is a research method in collecting and gathering information via internet by using search engine such as google.
Internet Research
26
A program that allows users to search for content on internet.
Search Engine
27
Content is dynamic and is affected by the user's input. (ex. a website that shows local content)
Rich User Experience
28
Give example of Search Engine
* Google * Aol Search * Wow * Baidu * Web Crawler * Yahoo! Search * MyWebSearch * Wolframalpha * Bing * Info * Dogpile * DuckDuckGo * Ask * Infospace * Contenko * Internet Archive
28
Give example of Search Engine
* Google * Aol Search * Wow * Baidu * Web Crawler * Yahoo! Search * MyWebSearch * Wolframalpha * Bing * Info * Dogpile * DuckDuckGo * Ask * Infospace * Contenko * Internet Archive
29
The owner of the website isn't the only one who is able to put content, where others are able to place a content of their own by means of comment, review, and evaluation.
User Participation
30
It is a protection given to the owner of the rights in an original work such as books, musical works, films, paintings, and other works, and computer programs.
Copyright
31
Services that are offered on-demand rather than a one-time purchase
Long Tail
32
This happens when the copyrighted work is use by other person without permission of the author or copyright holder.
Copyright Infringement
32
This happens when the copyrighted work is use by other person without permission of the author or copyright holder.
Copyright Infringement
33
It is the use of copyrighted material for comment, teaching, criticism, news reporting, research, scholarship, and other similar purpose is not an infringement of copyright.
Fair Use
34
The formal rules of formulating the statements of a computer language.
Syntax
35
Users will subscribe to a software only when needed than purchasing them, where this is a cheaper option if you don't always need to use a software.
Software as a Service
36
it is a measure of where the first and last data items are in a set.
Range
37
It is a diverse information sharing through universal web access.
Mass Participation
38
Tips in creating an effective presentation
Minimize Clarity Simplicity Visual Consistency Contrast
39
What are the trends in ICT?
1. Convergence 2. Social Media 3. Mobile Technologies 4. Assistive Media
40
A trend in ICT, where technology can do more things than its basic function.
Convergence
41
Formula for Average
=AVERAGE( : )
42
A trend in ICT that is designed to help people who have visual and reading impairments.
Assistive Media
43
Formula for lowest
=MIN( : )
44
What are the different platforms under Social Media?
1. Social Networks 2. Bookmarking Sites 3. Social News 4. Media Sharing 5. Microblogging 6. Blogging and Forums
45
State three examples of mobile technologies.
1. iOS 2. Android 3. Blackberry OS
46
=SUM(A1:A4) What do you call the ," = ", in the formula?
Equal Sign
47
=SUM(A1:A4) What do you call the" SUM ", in the formula?
Function Name
48
=SUM(A1:A4) What do you call the ," A1:A4 ", in the formula?
Range
49
=SUM(A1:A4) What do you call the ," : ", in the formula?
Separator