Copy - deck_16968565 - Copy Flashcards

(71 cards)

1
Q

use of different communication technologies such as phones &, Internet. to locate, save, send and edit information

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enumerate the general Positive Impacts of ICT

A

Access to information, improved access to education, new tools, new opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cheaper communication, more opportunities for leisure and entertainment, interactions with people all over the world, ability to obtain goods and services from a wider range of sources

A

Access to information, improved access to education, new tools, new opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

distance learning, online tutorials, new learning methods VR & interactive multimedia, job opportunities virtual jobs in the communications industry

A

Improved access to education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Photo or video editing software, printers, laptops, assistive technology for those with disabilities

A

New tools, new opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enumerate the General Negative Impacts of ICT

A

Job loss, reduced personal interaction, reduced physical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

manual work replaced by automation with the ability to do the work of multiple people

A

Job loss, reduced personal interaction, reduced physical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

lack of social interaction due to the replacement of human workforce isolates & often becomes a source of unhappiness

A

Reduced personal interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Less manual work/adoption of a sedentary lifestyle may lead to health problems (obesity, heart disease, eyestrain, etc.)

A

Reduced physical activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enumerate the positive impacts of ICT in Organizatins

A

Communication, information management, security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cast saving with automatized actions (payment, worldwide website reach, flexible response)

A

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access to customer info : better advertising, business, increased income, basis for decision making

A

Information Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fingerprint, iris or facial recognition, or data encryption like 2-factor authentication

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Enumerate the negative impacts of ICT in Organizatins

A

Cost, competition, security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Expensive hardware/software, and quick improvements in tech may make it hard to keep up with

A

Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Loss of customers & income from other competitors offering similar services at a lower price

A

Competition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hacking, viruses, & malware can endanger safe internet connections and secure data

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Increased access to information leads to increased opportunities in education, communication improvement, and the chance to participate in a society,

A

Positive Impact of ICT in Society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Increased access to information can also cause a digital divide, reducing levels of education and understanding from the incorrect/misleading information that further causes moral and ethical problems.

A

Negative Impacts of ICT in Society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When the World Wide Was made, it used to be static/flat pages/stationary pages; cannot be manipulated by users.

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Added dynamic web pages, displays different content for different users like social networking sites, allowed users to interact instead of just reading, and may be able to comment/make an account. Allows usage of web browsers instead of an operating system

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Enumerate the Features of Web 2.0

A

Folksonomy, Rich User Experience, Long Tail, User Participation, Software as Service, Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ability of users to categorize/flassify info by keywords (tagging)- hashtags in social media platforms

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

content is dynamic/responsive to user’s input. Example: Logging into an account modifies what you see on the website.

A

Rich User Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Services are offered on demand rather than on a one-time purchase. Time-based pricing might be better than file-size-based pricing and vice versa
Long Tail
26
 users are also able to put content on a website, like posts, comments, reviews, and evaluation
User Participation
27
Renting instead of purchasing - like monthly payments to google drive, google docs, compared to buying microsoft word.
Software as Service
28
diverse information sharing from universal web access to people from various cultures
Mass Participation
29
a movement led by the World Wide Web Consortium, aims to have machines/servers understand user preferences to deliver web content specifically targeting the user
Web 3.0
30
Another name for Web 3.0
Semantic Web
31
Enumerate the several problems of Web 3.0
Compatability, security, vastness, vagueness, logic
32
Enumerate the ICT trends
Convergence, social media, mobile technologies, assistive media
33
synergy of advancements to work on a similar goal
Convergence
34
allows users to create, discuss, exchange user-generated content through social networks, bookmarking sites, social news, media sharing, microblogging, and blogs and forums
Social Media
35
smartphones and tablets’ capability to do personal computer activities, through operating systems such as iOS & Android, WobOS, Windows Mobile
Mobile Technologies
36
helps people who have visual/reading impairments
Assistive Media
37
Elements of a well-conceptualized website
Usefulness of website, Adherence to Functionality, Usability, Influence, Visual Design
38
it’s important to identify the target audience to show the…?
Usefelness of website
39
comes with the challenge to pay attention to accessibility. Design must have its function
Adherence to Functionality
40
Measure of the simplicity for a user to manipulate the site and the convenience to use on the long term
Usability
41
Maximizing the functionality of the website for advertising to influence customers
Influence
42
content must contribute to the aesthetic of the website to contribute to user experience/online environment
Visual Design
43
AKA Malicious software, like viruses, worms, trojans, spywares, adwares
Malware
44
unwanted emails from bots and advertisements that can be used to send malware without being detected
Spam
45
acquiring sensitive personal info like passwords and credit; sending malicious emails to individuals by impersonation to get personal information card details
Phishing
46
Programs that induce security fraud by using exploits of a system to scare/deceive the user into downloading a program with the promises of removing malware on the system, but ends up installing more malware. Sometimes it ends up in ransomware. Its different names include scareware, fraudware, rogue scanner, and rogue antivirus.
Rogue Security Software
47
monitoring software designed to record a user’s keystrokes/info typed by a user in a website/app to send back to a third party
Keylogger
48
malicious code is installed on a computer to misdirect users into fraud websites without consent. “Phishing without a lure.”
Pharming
49
crime of obtaining personal/financial info of another person to make transactions/purchases
Identity Theft
50
criminal misrepresents themself as another person to avoid a summons/warrant/arrest/convictions
Criminal Identity Theft
51
identifying as another person to obtain free medical care
Medical Identity Theft
52
using another person’s identity/info to get credit, goods, services, benefits. Most common
Financial Identity Theft
53
using a child's identity for personal gain (to obtain residence, employment, etc.)
Child identity theft
54
identifies as a well-known company to “fix issues” by a pretend website asking for credentials
Account Verification Phishing
55
link appears to look like a shared file, directs you to a log-in page in pretend website
Cloud File Sharing Phishing
56
Link will prompt you to sign into view the document, giving attackers control of your inbox
Docusign Phishing
57
has a document presented as an unpaid invoice and claims service will be terminated if invoice is not paid
Fake invoice Phishing
58
appears to come from a popular retail/delivery app, includes notifications with malicious link
Delivery Notifications Phishing
59
Fake government agency claims tax problems and provides means to the issue before legal actions/fines
Tax Scame Phishing
60
gaining of unauthorized access to data in a system or computer
Hacking
61
criminal makes  fake user interface: leads the user to another website instead of the intended website
Cookie Theft
62
replication of website so the user enters information without knowing the problem, which the hacker misuses and seizes
Virus
63
uses cache of another website to direct to a malicious website
DNS Spoofing
64
released into the files of the website once a hacker enters. It corrupts the information on the website
UI Redness
65
Enumerate the Types of Hackers.
Ethical Hacker (White Hat), Cracker (Black Hat), Grey hat, Script Kiddies, Hacktivist
66
hacks systems to identify weaknesses. Testing & Vulnerability assessments
Ethical Hacker (White hat)
67
hacks for personal gain, to steal corporate data, violate privacy rights, transfer bank funds,etc.
Cracker (Black hat)
68
in between white hate and black hat. Breaks into systems without authority to identify and reveal weaknesses to the owner
Grey hat
69
gains access to computer systems with premade tools
Script Kiddies
70
Uses hacking to send messages by hijacking and leaving a message
Hacktivist
71
If you create something—an idea, an invention, a form of literary work, or research, you have the right of how it should be used by others. This is called..?
Intellectual Property