CS100 (Week 1) (Being a Digital Citizen) Flashcards

1
Q

a machine that allows a user to
perform calculations or
computations.

A

Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What makes a computer a computer?

A

Input
Output
Processing
Storage
Programmability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Receives data

A

Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Displays or produces information

A

Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Manipulates data

A

Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Saves data for later use

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be instructed to perform tasks

A

Programmability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are computers in academic use?

A

To check Learning Management
Systems (Blackboard Learn)
To read reference material
To communicate with peers or
mentors
To write academic or scholarly
materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computers in
Professional Use

A

-Use spreadsheet for budget
tracking + performing other
heavy-duty computations
-Transfer information from one
location to another
-Conduct virtual meetings with
clients and other stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computers in Society

A

Weather Forecasting
Banking and Finance
Accessing Information
Job Search
Entertainment / Gaming
Accessibility for PWD
Healthcare and Public Safety
Others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

History of Computers

A

Ancient and Classical Era
The 19th Century
The 20th Century and Now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ancient and Classical Era

A

The Abacus, Sumer (ca. 2700 – 2300 BC)
The Abacus, China (ca. 1050 – 771 BC)
The Antikythera Mechanism, Greece (ca. 100 BC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The 19th Century

A

The Analytical Engine, Babbage & Lovelace (1837), Swade (2002)
Arithmometer, Payen (1887)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The 20th Century and Now

A

Electronic Numerical Integrator and Computer (ENIAC), Beck & Snyder, 1945
Universal Automatic Computer (UNIVAC), Eckert & Mauchly, 1951
Age of Transistors, 1950s
Age of Integrated Circuits, 1960s
Age of Microprocessors, 1970s
Apple II Computer, Apple, Inc., Jobs & Wozniak, 1978
Age of Personal and Ubiquitous Computers 1980s – 2020s
Age of Quantum Computers, 2030s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who observed Moore’s law?

A

Gordon Moore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Moore’s law

A

It states that Number of transistors on a microchip doubles roughly every two years

17
Q

ISSUES IN COMPUTING

A

Digital divide
Cybercrime
Data Privacy Violations

18
Q

Is the act of effective use of digital tools and resources.

A

Digital Literacy

19
Q

Being digitally literate makes you a __________

A

Digital Citizen

20
Q

Critically evaluating digital information and media.

A

Digital literacy

21
Q

Observing safe and responsible online behavior.

A

Digital literacy

22
Q

despite how progressive society is, there are areas that are being left out

A

Digital divide

23
Q

This results in slow progress, overall leaving a sector / community behind everyone else

A

Digital divide

24
Q

Digital divide factors/Barriers

A

Geographical
Political
Economic
Educational

25
Its impossible to supply power into some areas in the philippines due to their remote location
Geographical
26
Democratic people's republic of korea restricts internet access and computer use to privileged individuals
Political
27
Some people can't afford to purchase computers or have decent internet access
Economic
28
Some cannot even read nor write, what more of using a computer
Educational
29
An act of protecting computer systems and networks from digital attacks.
Cybersecurity
30
Safeguarding confidential data from unauthorized access, use, disclosure, disruption, modification, or destruction
Cybersecurity
31
Implementing security measures to reduce risks and vulnerabilities.
Cybersecurity
32
Ensuring business continuity and resilience against cyber threats.
Cybersecurity
33
are online or computer-based illegal actions.
Cybercrimes
34
This includes actions such as hacking, identity theft, and spreading malware to steal data or disrupt systems, to name a few.
Cybercrimes
35
Protection of personal information from unauthorized access.
Data Privacy
36
Individuals control how their data is collected, used, and shared
Data Privacy
37
occurs when personal information is collected, used, or disclosed without proper authorization or consent.
A data privacy violation
38