ELIE Flashcards

1
Q

defined ICT (Information & Communication Technology) in a study as related to technologies that facilitate the transfer of information and various types of electronically mediated communication.

A

Zuppo (2012)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It can also be defined as: all the technologies used to handle broadcast media, telecommunications, intelligent building management systems, network-based control and monitoring functions, audio-visual processing and transmission systems and others.

A

INFORMATION AND COMMUNICATION
TECHNOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

APPLICATION OF ICT IN OUR DAILY LIVES

A

COMMUNICATION
JOB OPPORTUNITIES
ENTERTAINMENT
MEDICAL SCIENCE
FINANCE
HOME ELECTRONICS
EDUCATION
SOCIALIZING
AGRICULTURE
BUSINESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An act of transmitting messages; a process of exchange of information between individuals through verbal and non-verbal means.

A

COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Being able to use ICT systems effectively allows employees more time to concentrate on areas of their job role that require soft skills.

A

JOB OPPORTUNITIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(ICT) have impacted entertainment and leisure activities in different ways in which you spend your time.

A

ENTERTAINMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Medical devices and modern equipment have evolved considerably favoring information and communications technology.

A

MEDICAL SCIENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ICT is used daily by financial companies, to trade financial instruments, to report a business’s earnings, and to keep records of personal budgets

A

FINANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

increased access to services, and information that has accompanied in the progress of the Internet.

A

HOME ELECTRONICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Schools use a diverse set of ICT tools to communicate, create, disseminate, store, and manage information.

A

EDUCATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

One of the most significant changes in socializing due to technology is the rise of social media. Platforms like Facebook, Twitter, and Instagram have become ubiquitous in college culture.

A

SOCIALIZING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

One of the most significant ICT applications in agriculture is precision farming.

A

AGRICULTURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The role of ICT in business is to provide tools and systems that enable efficient communication, data management, analysis, and decision-making processes, as well as to enhance productivity, customer engagement, and competitive advantage.

A

BUSINESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who said this “TECHNOLOGY
ISA USEFUL
SERVANT BUT
A DANGEROUS MASTER.”

A

Christian lous lange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed.

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Three principal characteristics of computer

A
  1. It responds to a specific set of instructions in a well-defined manner.
  2. It can execute a pre-recorded list of instructions.
  3. It can quickly store and retrieve large amounts of data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FOUR KINDS OF COMPUTER

A

SUPERCOMPUTERS
MAINFRAME COMPUTERS
MINICOMPUTERS
MICROCOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

any of a class of extremely powerful computers. The term is commonly applied to the fastest high-performance systems available at any given time.

A

SUPERCOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk data processing for tasks such as censuses, industry and consumer statistics, enterprise resource planning, and large-scale transaction processing.

A

MAINFRAME COMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

computer that was smaller, less expensive, and less powerful than a mainframe or supercomputer but more expensive and more powerful than a personal computer.

A

MINICOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is a complete computer on a small scale, designed for use by one person at a time.

A

MICROCOMPUTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Two Classification of Microcomputers

A

PERSONAL COMPUTERS
WORKSTATIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Three key concepts of how computer works

A
  1. Purpose of a computer is to process data into information.
  2. Hardware and Software are two different entities.
  3. There are five basic operations of a computer. All computers use the same five basic operations: input, processing, storage, output, and communications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

are raw facts and figures that are processed into information
– for example, examinees’ score during board exam.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is data that has been summarized or otherwise transformed for use in decision making.
– for example, the average score is used to determine the performance of the examinees.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is a collection of code that drives a computer to perform a related group of tasks.

A

Software, or simply called programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

two types of software:

A

System Software
Application Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

are software run by the computer to manage or control the hardware.

Examples: operating system (OS), Basic Input Output System (BIOS), device driver, and compilers and associated programs.

A

System Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

are software that are related to a specific real-life situation in accomplishing a specific task. We encounter this type of software a lot every day. The smartphone industry calls it “apps”.

Examples: office software, database software, communication software, entertainment software

A

Application Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

five basic operations of a computer.

A

Input Operations.
Processing Operations.
Storage Operations.
Output Operations
Communication Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

is whatever is put in (“input”) to a computer system.

A

Input Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

the set of activities and techniques used to manage and optimize the production of goods and services in an organization.

A

Processing Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

the set of activities and techniques used to manage and optimize the production of goods and services in an organization.

A

Storage Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Two types of Storage Operations

A

Primary Storage and Secondary Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Primary storage is a key component of a computer system that enables it to function. Primary storage includes random access memory (RAM), read only memory (ROM), cache and flash memory.

A

Primary Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Secondary storage, sometimes called auxiliary storage, is non-volatile and is used to store data and programs for later retrieval. There are many kinds of secondary storage, each with advantages and disadvantages. Most storage devices use either magnetic or optical storage media.

A

Secondary Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
A

Output Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Output has two types:

A

Softcopy and Hardcopy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

an electronic copy (or e-copy) of some type of data, such as a file viewed on a computer’s display, one that doesn’t exist in physical form or on paper, but is instead or transmitted as an email attachment.

A

Softcopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

printed on the paper and sometimes it is referred as permanent copy. We can touch the hard copy. We can say it is a physical copy. For example- News Paper, Book, Notebook, printed document files, etc.

A

Hardcopy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

any processes that allow you to communicate which feature a computer or computer program. The computer does this by sending data to one or more other computers, who decode the message and allow the recipient to send a message back.

A

Communication Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The first use of the word “computer” was recorded in ____, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century.

A

1613,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

was an ancient memory aid device to record and document numbers, quantities, or even messages.

A

TALLY STICKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

a mathematical device used to aid an individual in performing mathematical calculations. The abacus was invented in Babylonia in 2400 B.C.

A

ABACUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Also known as Napier’s rod, are numbered rods which can be used to perform multiplication of any number by a 2 – 9, was invented by John Napier in 1614.

A

NAPIER’S BONE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

A hand-operated mechanical calculator consisting of slidable ruler for evaluating mathematical operations and was invented by William Oughtred in 1622 based on Napier’s idea about logarithms.

A

SLIDE RULER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The first calculator or adding machine invented by Blaise Pascal to be produced in any quantity by manipulating its dials.

A

PASCALINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A mechanical calculator invented by Gottfried Wilhelm Leibniz in 1672. The machine that can multiply repeated addition and shifting.

A

STEPPED RECKONER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

is a mechanical loom, which was invented by Joseph Marie Jacquard in 1881. It is as automatic loom controlled by punched cards.

A

JACQUARD LOOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

a mechanical calculator invented by Thomas de Colmar in 1820. This was the first reliable, useful and commercially successful calculating machine.

A

ARITHMOMETER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

were both automatic, mechanical calculator that is designed to tabulate polynomial functions, the first mechanical computer.

A

Difference Engine and Analytical Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Father of the Computer in 1822 and 1834 also invented Difference and Analytical Machine

A

CHARLES BABBAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Considered as the first computer programmer , chiefly known for her work on Charles Babbage’s proposed mechanical general purpose computer, the Analytical Engine.

A

AUGUSTA ADA BYRON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Known as the first printing calculator, by spinning the handle, it automatically calculates and prints out the numbers in logarithmic table

A

SCHEUTZIAN CACLCULATION ENGINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

An electromechanical machine designed to assist in summarizing information stored on punched cards, was invented by Herman Hollerith in 1890

A

TABULATING MACHINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Also known as IBM Automatic Sequence Controlled Calculator (ASCC), was one of the earliest general-purpose electromechanical computers used in the war effort during the last part of World War II.

A

HARVARD MARK I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

was a motor-driven mechanical computer designed by Konrad Zuse . It was a binary electrically driven mechanical calculator with limited programmability, reading instructions from punched celluloid film.

A

Z1 COMPUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

(ABC) was the first automatic electronic digital computer. Conventionally, the ABC would be considered the first electronic ALU (arithmetic logic unit) – which is integrated into every modern processor’s design.

A

ATANASOFF BERRY COMPUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

is the first commercially successful portable computer, released on April 3, 1981 by Osborne Computer Corporation, a portable device since it can be hand-carried when the keyboard is closed.

A

OSBORNE 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

was the world’s first general-purpose electronic computer. is also considered the world’s first programmable computer, although programming the computer was a complex, manual process that could take days.

A

ENIAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

ENIAC

A

(Electronic Numerical Integrator And Computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

was one of the earliest electronic computers. Functionally, was a binary serial computer with automatic addition, subtraction, multiplication, programmed division and automatic checking with an ultrasonic serial memory

A

EDVAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

EDVAC

A

(Electronic Discrete Variable Automatic Computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

was an early British computer. It was the second electronic digital stored-program computer to go into regular service.

A

EDSAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

EDSAC

A

The Electronic Delay Storage Automatic Calculator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

was the first general-purpose electronic digital computer design for business application produced in the United States. It was designed principally by J. Presper Eckert and John Mauchly, the inventors of the ENIAC.

A

UNIVAC 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

UNIVAC 1

A

Universal Automatic Computer I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

The Eckert–Mauchly Computer Corporation (EMCC) was founded by J. Presper Eckert and John Mauchly. It was incorporated on 1947. After building the ENIAC at the University of Pennsylvania, Eckert and Mauchly formed EMCC to build new computer designs for commercial and military applications.

A

EMCC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

EMCC

A

The Eckert–Mauchly Computer Corporation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

is the earliest age of information technology. It can be defined as the time between 3000B.C. and 1450A.D.

A

PREMECHANICAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

is when we first start to see connections between our current technology and its ancestors. The mechanical age can be defined as the time between 1450 and 1840.

A

MECHANICAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

can be defined as the time between 1840 and 1940. These are the beginnings of telecommunication.

A

ELECTROMECHANICAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

is what we currently live in. It can be defined as the time between 1940 and right now.

A

ELECTRONIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

FIVE GENERATION OF COMPUTER

A

First Generation
1946 to 1958
Second Generation
1959 to 1964
Third Generation
1965 to 1970
Fourth Generation
1971 to Today
Fifth Generation
Today to Future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The technology behind the primary generation computers was a fragile glass device, which was called a vacuum tube. These computers were very heavy and really large. First-generation computers were used for calculation, storage, and control purpose.

A

First Generation
1946 to 1958

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

used the technology of transistors rather than bulky vacuum tubes. Another feature was the core storage. A transistor may be a device composed of semiconductor material that amplifies a sign or opens or closes a circuit.

A

Second Generation
1959 to 1964

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

technology envisaged a shift from huge transistors to integrated circuits, also referred to as IC. Here a variety of transistors were placed on silicon chips, called semiconductors. The most feature of this era’s computer was speed and reliability. IC was made from silicon and also called silicon chips

A

Third Generation
1965 to 1970

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

First microprocessors were used, the large-scale of integration LSI circuits built on one chip called microprocessors.
The computers using microchips were called microcomputers. This generation provided even smaller size of computers, with larger capacities

A

Fourth Generation
1971 to Today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

It allows computers to behave like humans. It is often seen in programs like voice recognition, area of medicine, and entertainment. Within the field of game playing also it’s shown remarkable performance where computers are capable of beating human competitors.

A

Fifth Generation
Today to Future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Categories of Software

A

System Software
Application Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

a computer program that is designed to manage computer hardware and application programs.

manage your computers

A

System Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Manages the entire computer system. It provides different types of resource management services such as booting, CPU management, file management, task management, and security management.

simply called for smartphone industry as “apps”.

A

Application Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

is the term coined for the particular processor model and operating system on which a computer system is based

A

Platforms

84
Q

is a software that manages smartphones, tablets, and other devices that can be used while on the move. It is responsible for the way users interact with a device

A

mobile operating system

85
Q

is the program a computer’s microprocessor uses to start a computer system after it is power on.

A

BIOS

86
Q

BIOS

A

Basic Input Output Operation

87
Q

the process of starting a computer as initiated via hardware such as a button or by a software command

A

Boot Program

88
Q

A computer program that operates or controls a particular type of device that is attached to a computer or automation

A

Device Driver

89
Q

a software component that lets the operating system and a device communicate

A

Driver Program

90
Q

a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users.

A

Application Software

91
Q

Source of Application Software

A

Custom software
Custom software
Freeware
Shareware
Public Domain Software
Rental ware
Web application

92
Q

tailor-made software crafted by an individual or team of programmers for a particular function or business purpose

A

Custom software

93
Q

typically contains related programs that can perform different functions. Packaged software comes with a software license.

A

Custom software

94
Q

typically contains related programs that can perform different functions.

A

Packaged Software

95
Q

is a contract in which you agree not to make copies of the software to give away or resell.

A

software license

96
Q

Allows the software to be used on all computers at a specific location

A

Site license

97
Q

Allows a certain number of copies of the software to be used at the same time

A

Concurrent-use license

98
Q

Specifies the number of people who may use the software

A

Multiple-user license

99
Q

Limits software use to one user at a time

A

Single-user license

100
Q

software that is typically proprietary and is offered at no cost to users.

A

Freeware

101
Q

commercial software that is distributed free to users, eventually either requiring or encouraging users to pay for the continued support of the software.

A

Shareware

102
Q

a type of malicious software that secretly installs itself on your device and displays unwanted advertisements and pop-ups.

A

Adware

103
Q

a licensing model that supplies fully operational unrestricted software to the user and requests an optional donation be paid to the programmer or a third-party beneficiary.

A

Donation ware

104
Q

computer software that can be used free of charge for a limited evaluation period.

A

Trial ware

105
Q

computer software that is free for a trial period during which the user is frequently reminded on screen to register and pay for the program in order to continue using it when the trial period is over.

A

Nagware

106
Q

software distributed with reduced functionality with a view to attracting payment for a fully functional version.

A

Cripple ware

107
Q

any software that has no legal, copyright or editing restrictions associated with it.

A

Public Domain Software

108
Q

online software that users lease for a fee and download whenever they want it.

A

Rental ware

109
Q

a software that runs on a remote Internet server rather than on a person’s own personal computer. A web app is typically accessed using a web browser.

A

Web application

110
Q

a flaw, weakness, or error of software. It is usually discovered after the software has been released to the public or the user. May cause a system failure. It can also be a playground for someone who can launch an attack which may lead to unpredictable damages and costs.

A

Software vulnerability

111
Q

is larger collection of interconnected documents or content. It contains hypertext links or highlighted keywords and images that lead to related information

A

World Wide Web

112
Q

A collection of linked Web pages that has a common theme or focus. The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s home page.

A

Website

113
Q

known as ____, is an English engineer and computer scientist best known as the inventor of the World Wide Web.

A

Timothy John Berners-Lee
TimBL

114
Q

THE EVOLUTION OF THE WEB

A
  1. Read Only Static Web or the Web 1.0
  2. Read/Write Interactive Web or Web 2.0
  3. Read-write intelligent web or Web 3.0
115
Q

old internet that only allows people to read from the internet. Web is use as “information portal”. It uses table to positions and align elements on page.

A
  1. Read Only Static Web or the Web 1.0
116
Q

A reader of a blog or a wiki is provided with tools to add a comment or even, in the case of the wiki, to edit the content.

A
  1. Read/Write Interactive Web or Web 2.0
117
Q

Example of Web 2.0 are the following:

A

Social Networking
Video Sharing Sites
Blogs
Wikis

118
Q

refers to using internet-based social media sites to stay connected with friends, family, colleagues, or customers.

A

Social Networking

119
Q

A website that lets people upload and share their video clips with the public at large or to invited guests.

A

Video Sharing Sites

120
Q

(a truncation of “weblog”) is an informational website consisting of discrete, often informal diary-style text entries (posts).

A

Blogs

121
Q

a website or online resource that can be edited by multiple users. Some wikis, such as Wikipedia , are publicly accessible.

A

Wikis

122
Q

Key Features of Web 2.0

A

Folksonomy
Rich user experience
User Participation
Software as a service
Mass Participation

123
Q

free classification of information; allows users to collectively classify and find information (e.g. “tagging” of websites, images, videos or links)

A

Folksonomy

124
Q

dynamic content that is responsive to user input (e.g., a user can “click” on an image to enlarge it or find out more information)

A

Rich user experience

125
Q

information flows two ways between the site owner and site users by means of evaluation, review, and online commenting.

A

User Participation

126
Q

Web 2.0 sites developed APIs to allow automated usage, such as by a Web “app” (software application) or a mashup

A

Software as a service

127
Q

near-universal web access leads to differentiation of concerns, from the traditional Internet user base (who tended to be hackers and computer hobbyists) to a wider variety of users, drastically changing the audience of internet users.

A

Mass Participation

128
Q

is a read-write-interact web (powered by artificial intelligence) where people can read, write and interact with content, including 3D graphics, on websites and apps.

A

Read-write intelligent web or Web 3.0

129
Q

TYPES OF WEBSITE

A

E-Commerce
Business
Entertainment
Portfolio
Social Media
Brochure
Non Profit
Educational
Infopreneur
Personal

130
Q

your digital storefront on the internet. It is the virtual space where you showcase products, and online customers make selections. Your website acts as the product shelves, sales staff, and cash register of your online business channel..

A

E-Commerce

131
Q

a page with your business’s brand and contact details to a complete online store. Some benefits of having a website for your business include: having a digital shop front for your business. reaching a global audience.

A

Business

132
Q

a website that focuses on creating high quality content that is entertaining for the target audience. It could be anything from information pieces and news to videos, films to blog posts, or even films.

A

Entertainment

133
Q

an online representation of work you have created, as well as your skills and experiences. It could be a website, blog, or even a video channel.

A

Portfolio

134
Q

collective term for websites and applications that focus on communication, community-based input, interaction, content-sharing and collaboration.

A

Social Media

135
Q

an informational website that is designed to look and feel like a printed brochure. It contains compelling text and images that advertise a company’s products or services, and typically ranges from one to five pages.

A

Brochure

136
Q

don’t aim to sell products or services to their visitors, but they still need to convince people to support their cause

A

Non Profit

137
Q

a huge interactive platform to present various information for different types of people: future students, current students, teachers, parents, those who want to get a new profession, etc.

A

Educational

138
Q

a hybrid between an informational website and an e-commerce website, and may also have some features of an educational website. It provides free content to attract clients to paid content.

A

Infopreneur

139
Q

A personal website showcases an individual’s personal information, achievements, skills, portfolio, and interests online, allowing you to present yourself professionally, share your work, and connect with others.

A

Personal

140
Q

is the largest computer network in the world that connects billions of computer user. The word internet comes from combination between “interconnection” and “network”.

A

Internet

141
Q

Consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.

A

Network

142
Q

Types of Network

A

Local Area Network
Wide Area Network

143
Q

a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building.

A

Local Area Network

144
Q

connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network.

A

Wide Area Network

145
Q

often referred to as the “Father of the Internet,” played a pivotal role in designing the foundational protocols and architecture that underpin the global network. Sharing this title with TCP/IP co-developer Bob Kahn.

A

Vinton Gray Cerf

146
Q

Major Components of Internet

A

Server
IP Address (Internet Protocol)
Internet Service Provider (ISP)
Browser
Domain Name System (DNS)

147
Q

a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.

A

Server

148
Q

Types of Server

A

Application Server
Web Server
Proxy Server
Mail Server
File Server
Policy Server

149
Q

a server that hosts applications or software that delivers a business application through a communication protocol. For a typical web application, the application server sits behind the web servers

A

Application Server

150
Q

computer software and underlying hardware that accepts requests via HTTP or its secure variant HTTPS.

A

Web Server

151
Q

a system or router that provides a gateway between users and the internet. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.

A

Proxy Server

152
Q

an application that receives incoming e-mail from local users and remote senders and forward outgoing e-mail for delivery

A

Mail Server

153
Q

a security component of a policy-based network that provides authorization services and facilitates tracking and control of files.

A

Policy Server

154
Q

computer responsible for the storage and management of data files so that other computers on the same network can access the files.

A

File Server

155
Q

a unique numerical identifier for every device or network that connects to the internet.

A

IP Address(Internet Protocol Address)

156
Q

is the phonebook of internet. We access information online through domain names.

A

Domain Name System (DNS)

156
Q

is an application program that provides a way to look information on the web.

A

Browser

157
Q

is an organization that provides services for accessing, using or participating in the internet.

A

Internet Service Provider (ISP)

157
Q

uses wire line transmission technology to transmit data over traditional copper telephone lines already installed to homes and businesses.

A

DSL (Digital Subscriber Line)

158
Q

this type of connection uses fiber optics to convert electrical signals that carry data into light and then sends it through transparent glass fibers about the diameter of a human hair

A

Fiber Optic

159
Q

This connection provides the Internet through a radio link between the customer’s location and the service provider’s facility. It can be mobile or fixed.

A

Wireless Broadband

160
Q

Internet in the Philippines first became available on

A

March 29, 1994

161
Q

Internet in the Philippines first became available on March 29, 1994, with the

A

Philippine Network Foundation (PHNet)

162
Q

The early history of the Internet in the Philippines started with the establishment of (BBS) by computer hobbyist and enthusiast.

A

Bulletin Board Systems

163
Q

The Philippine FidoNet Exchange, a local network for communication between several BBSes in Metro Manila, was formed.

A

1987

164
Q

A committee helmed by Arnie del Rosario of the Ateneo Computer Technology Center was tasked with exploring the possibility of creating an academic network of universities and government institutions by the National Computer Center under Dr. William Torres. Recommendations were made but not implemented

A

1990

165
Q

Emergence of email gateways and services in the Philippines, including some from multinational companies like Intel, Motorola, and Texas Instruments, which used a direct Internet connection, X.25, or UUCP protocol. Local firms ETPI, Philcom, and PLDT (Philippine Long Distance Telephone Company) also operated commercial X.25 networks. Another milestone: Local and international email to FidoNet users was introduced.

A

1991-1993

166
Q

With the support of the Department of Science and Technology and the Industrial Research Foundation, the Philnet project (now PHNET) was born that would eventually play a significant role in connecting the Philippines to the global Internet.

A

June 1993

167
Q

Phase one of the Philnet project shifted into full gear after receiving funding from the DOST.

A

June 1993

168
Q

Phase one of the Philnet project shifted into full gear after receiving funding from the DOST.

A

July 1993

169
Q

Kickstart the second phase of Philnet, now led by Dr. Rudy Villarica.

A

November 1993

170
Q

Benjie Tan, who was working for ComNet, a company that supplied Cisco routers to the Philnet project, established the Philippine’s first connection to the Internet at a PLDT network center in Makati City.

A

March 29, 1994

171
Q

As the number of subscribers grew, both PLDT and Globe Telecom rapidly expanded their (TD-LTE) services for Fixed Wireless Broadband.

A

Time-Division Duplex-Long Term Evolution

172
Q

that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life.

A

NETIQUETTE

173
Q

Risks while using Online Services

A

Cybercrime
Cybercriminals

173
Q

Even though you may be interacting with a
computer screen, you are communicating with a real person who will react to your message.

A

THE GOLDEN RULE

174
Q

Ten (10) Commandments of Computer Ethics

A

RULE 1: REMEMBER THE HUMAN
RULE 2: ADHERE TO THE SAME STANDARDS OF BEHAVIOR ONLINE THAT YOU FOLLOW IN REAL LIFE
RULE 3: KNOW WHERE YOU ARE IN CYBERSPACE
RULE 4: RESPECT OTHER PEOPLE’S TIME AND BANDWIDTH
RULE 5: MAKE YOURSELF LOOK GOOD ONLINE
RULE 6: SHARE EXPERT KNOWLEDGE
RULE 7: HELP KEEP FLAME WARS UNDER CONTROL
RULE 8: RESPECT OTHER PEOPLE’S PRIVACY
RULE 9: DON’T ABUSE YOUR POWER
RULE 10: BE FORGIVING OF OTHER PEOPLE’S MISTAKES.

175
Q

is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming and child pornography) is used as a tool to commit an offense.

A

Cybercrime

176
Q

use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.

A

Cybercriminals

177
Q

Common forms of Cybercrimes

A

Copyright Infringement
Plagiarism
Computer addiction

178
Q

the violation, piracy or theft of a copyright holder’s exclusive rights through the unauthorized use of a copyrighted material or work.

A

Copyright Infringement

179
Q

an act or instance of using or closely imitating the language and thoughts of another author without authorization.

A

Plagiarism

180
Q

Criminal Activities

A

Hacking
Identity Theft
Electronic Theft
Cyberbullying
Cybersex
Child Pornography
Cyber Defamation

181
Q

Unauthorized access of or interference with computer systems, servers, or other information and communication systems.

A

Hacking

182
Q

An attempt to obtain sensitive information such as usernames, passwords, and credit card details and (indirectly money), often for malicious reasons.

A

Identity Theft

183
Q

Illegal downloading, Obtaining files that you do not have the right to use from the internet.

A

Electronic Theft

184
Q

The use of electronic communication to bully a person, typically by sending a message of an intimidating or threatening nature.

A

Cyberbullying

185
Q

Willful engagement, maintenance, control, or operation, directly or indirectly of any lascivious exhibition of sexual organs or sexual activity with the aid of a computer system for favor or consideration.

A

Cybersex

186
Q

Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti Child Pornography Act of 2009, committed through a computer system.

A

Child Pornography

187
Q

Is an unprivileged false statement of fact, which tends to harm the reputation of a person or company.

A

Cyber Defamation

188
Q

Internet Threats

A

Malware

189
Q

one of the more common ways to infiltrate or damage your computer.

A

Malware
Pharming
Phishing

190
Q

used most often by cyber criminals because it is easy to execute and can produce the results they are looking for with very little effort.

A

Phishing

191
Q

a common type of online fraud. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL.

A

Pharming

192
Q

a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed.

A

Ransom ware

193
Q

Common Types Ransom ware

A

Lock Screen Ransom ware
Encryption Ransom ware
Spam
Spyware (Spyware & Adware)
Viruses
Wi-Fi Eavesdropping
Worms

194
Q

displays an image that prevents you from accessing your computer

A

Lock Screen Ransom ware

195
Q

encrypts files on your system’s hard drive and sometimes on shared network drives, USB drives, external hard drives, and even some cloud storage drives, preventing you from opening them

A

Encryption Ransom ware

196
Q

one of the more common methods of both sending information out and collecting it from unsuspecting people.

A

Spam

197
Q

Third parties to infiltrate your computer often use Spyware and adware. Software that collects personal information about you without you knowing.

A

Spyware (Spyware & Adware)

198
Q

It may not be a term you are familiar with, but there is a good chance you or someone you know has been affected by one.
A malicious program that is disguised as, or embedded within, legitimate software

A

Trojan Horse

199
Q

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list.

A

Viruses

200
Q

is another method used by cyber criminals to capture personal information.
Virtual “listening in” on information that is shared over an unsecure (not encrypted) Wi-Fi network.

A

Wi-Fi Eavesdropping

201
Q

unlike a virus, goes to work on its own without attaching itself to files or Programs. It lives in your computer memory, does not damage or alter the hard drive and propagates by sending itself to other computers in a network – whether within a company or the Internet itself.

A

Worms

202
Q
A
203
Q
A