E-TECH Flashcards

1
Q

this is the physical component

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

refers to use of communication and telecommunication technologies to create, collect, process, transmit, and store information

A

ict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the functions of ict

A

communication, date management, marketing, process improvement, enterprise resource planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is an integrated set of components that collects, processes, stores, and distributes information to support organizations operations and decision-making

A

ict system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is the programs and applications

A

software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the ict components

A

hardware, software, networks, data, information, people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this is the interconnected devices for communication

A

networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this is the raw, unprocessed facts and figures

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this is the virtual in nature and and unbounded unlike our physical environment

A

cyber world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the processed and contexualized data

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

users and IT professionals

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cyber world is also know as

A

cyber space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the features of cyberworld

A

virtual self, sources of information, social interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this is a digital representation/ identity or humans to interact in the virtual world

A

virtual self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the possibility of maliciouos attempt to damage or disrupt a computer network or system

A

cyebrthreat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data that is available to anyone as long as they have internet connection

A

sources of information

14
Q

this is the process of engaging with other through digital platforms, such as social networking sites, where individuals communicate and express themselves through using visual and verbal cues to convey their personality and social status

A

social interaction

15
Q

what are the 5 cyberthreats

A

social engineered trojans, unpatched software, phishing, network travelling worms, advance persistent threats

16
Q

exploitation or harmful activity comitted with the intent of destroying , stealing, or disrupting data, critical systems, and digital life in general

A

cyberattacks

17
Q

this is a program or file that can harm your computer by stealing data or destroying something in your computer

18
Q

types of malware

A

ransomware, spyware, adware, worms, trojans, botnets

19
Q

this is a form of cyberattack to obtain sensitive information like username and password through malicious emails

20
Q

occurs when a malicious actor (hacker) stops legitimate users from gettng into specific computer systems, devices, services or other digital resources

A

denial of service (DOS) atatcks

20
Q

happens when a third party is trying to gain acess to your systems by cracking users pasword

A

password attacks

21
This may happen by impersonating the endpoints in an online information exchange via smartphone to a website.
Man in the Middle(MITHM)
22
are done by malicious actors that upload infected ads to different websites using an advertising network
malvertising
23
pretends as legitimate and necessary security software that will keep your system safe
rogue software
24
individuals who lure children or teenagers to engage in sexual acts
internet predators
25
online act of humiliation and/ or threats that is done with and by children and teenager
cyberbullying is
26
cyber security is also known as
information technology security or electronic information security
27
practice of defending computers, servers, mobile devices, electronic systems, network, and data from malicious attacks
cybersecurity
28
things to consider to avoid cyber attacks
make a strong and unique password, clear cache, turn off save password
29
protects your device from malware from the web and external devices attached to yours
all-inclusive protection
30
it has to conduct regular security scans without user trigger and automatically rejects data from unwanted sources
relaible protection
31
in order fot you to maximize the capabilities of the program, you have to be able to understand all of its components just by navigating it
easy to use
31
some anti virus programs tend to make devices lag thus making it inefficient to sue
performance impact
32
sometimes even if the programs users interface is well done, there are certain things that we still need help with support for the program should always be available and easy to connect
available support