Empowerment Technology - 1st Session Examination Flashcards

1
Q

technologies that are used to support the processing, storing, securing and transmitting of information.

A

Information and communications technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

six components of ICT.

A

Software, hardware, information, procedures, people, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following components of information and communications technology includes electronic devices such as the keyboard, mouse, and printer?

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This component of ICT is the output from an ICT system that is useful and meaningful to the people using the system. What is this component?

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to all electronic and communication technologies that enable the management and distribution of information

A

Information and communications technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

individuals who are responsible for the development, improvement, and
maintenance of an ICT system

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

actions performed in a certain order and condition to make sure an ICT system runs smoothly.

A

procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the technical term used to describe physical or tangible parts of an ICT system. If you can touch it, then it is considered hardware.

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the generic term for programs and applications installed on your personal computer, laptop, or smartphone. It is an ICT component that is responsible for providing
sets of instructions that the computer has to follow to accomplish a specific task.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the raw facts or figures that can be processed, stored, and transmitted by an ICT system

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the result of processed, organized, and structured data.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the term used to describe websites or applications that give people the capability to exchange messages, and to share information and media content with one another using their social media account connected to a social network.

A

social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These are social media sites used for communication, where users can communicate via text chat, phone call, or video call.

A

Social Networking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is a social media site used for sharing multimedia contents like photos, images, audio, and videos.

A

Media Sharing Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is a social media site used to facilitate the active exchange of views, comments, and opinions on issues and matters discussed among its participants of the same interest or expertise.

A

Discussion Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This refers to social media sites that aid users in discovering, sharing, and discussing the latest and trending content and media.

A

Bookmarking and Content Curation Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This refers to social media sites that provide its users with the tools that will help them to publish their content in a creative and engaging manner

A

Blogging and Publishing Network Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This is a social media site that provides a way for users to inform other people or organizations about their views regarding a particular product or service.

A

Consumer Review Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

refers to electronic devices that are characterized by their portability or their ability to be carried or transported easily

A

mobile media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

are electronic devices or programs that aim to provide support for people with disabilities. It generally seeks to increase or improve the functional capability of individuals who face mental or physical challenges.

A

assistive media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An assistive media that can convert visual cues to audible sounds is beneficial for persons with

A

speech difficulty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Karen fulfilled her childhood dream of owning a flower shop in Pasig and named it “Pretty Blossoms.” As a newcomer in the flower business, she knew that for her to be a successful entrepreneur, she must learn from people who have the same type of business as hers. What kind of social media can help her connect with other flower shop owners?

A.   social networking sites
B.   media sharing sites
C.   discussion sites
D.   blogging and publishing network sites
E.   bookmarking and content curation sites
F.   customer review networks

A

a and c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It includes text-to-speech devices, reading pens, braille displays, magnifiers, and talking devices.

A

Assistive Media for the Visually Impaired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The assistance is through sound amplification, conversion of sounds into visual cues, and conversion of sounds into sensory signals like vibrations which includes hearing aids, amplified telephones, devices with vibrating alarms, speech-to-text devices, and captioning devices

A

Assistive Media for People with Hearing Impairments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

These devices enable users to communicate with other people or express their thoughts using a system that converts visual cues to audible speech. Included in this category are speech-generating devices, voice amplification devices, stuttering aids, artificial larynx, and communication boards

A

Assistive Media for People with Speech Difficulty

26
Q

These electronic devices or software act as instructional supports for learners to understand their lessons according to their pace or abilities. Memory aids, specialized applications, audiobooks, activity-driven devices, and text-to-speech devices are just a few of the technologies included in this category

A

Assistive Media for People with Learning Difficulty

27
Q

allows us to navigate through a virtual world, interact with other people through the use of the internet, and retrieve data from the vast information available online.

A

cyber world

28
Q

What feature of the cyber world allows us to freely get information on different topics?

A

Information source

29
Q

Which of the following online threats is considered a crime-related danger?

A

phishing

30
Q

This is a malware used by criminals to block the account, files, or system of the victim, then later on ask for money.

A

ransomware

31
Q

Your six-year-old sibling borrowed your tablet to watch Peppa Pig. You opened YouTube and let her watch while you are doing your homework on your laptop. Your sibling is smart and knows how to search different videos. After an hour, you remember that you forgot to change the settings for parental control on your tablet. Which of the following dangers can your sibling encounter?

A.   internet predators
B.   verbal obscenity
C.   hackers
D.   graphic violence

A

B and D

32
Q

There are so many dangers on the internet, one of which is malicious software. Aside from installing an antivirus on your computer, what else could you do to prevent data loss and protect your system from these harmful software?

A.   Avoid clicking suspicious links.
B.   Keep your device updated.
C.   Do not share personal information.
D.   Cover your webcam.

A

A and B

33
Q

refers to the improvements made on electronic devices or gadgets by combining the functions of two or more devices into one gadget.

A

computing technology

34
Q

combines different media formats such as text, pictures, sounds, and videos into one multimedia content.

A

content technology

35
Q

refers to the fastand effective transfer of information through the collaboration of different communication technologies.

A

communication technology

36
Q

characterized by their fixed content, which means that it shows the same content every time the web page is accessed.

A

static web pages

37
Q

are known for being changeable, which means that its content can change each time the web page is accessed.

A

dynamic web pages

38
Q

the first generation of websites that was marked as read-only web.

A

Web 1.0

39
Q

tools used to develop websites under web 1.0.

A

HTML and CSS

40
Q

the second generation of websites that is referred to as the writable web

A

Webs 2.0

41
Q

social web

A

web 2.0

42
Q

the executable web of web evolution

A

web 3.0

43
Q

system that enables computer devices to think and act like human beings

A

artificial intellegence

44
Q

refers to a state where two or more technology entities and functions are combined into one device or system.

A

Technological convergence

45
Q

refers to the individual links or pages of a website that act like the pages of a book.

A

web page

46
Q

A strong password usually contains

A

at least 8 characters

47
Q

is composed of complex interconnected networks that provides a virtual environment for different users to interact with each other

A

cyber world

48
Q

permanent marks of your identity, and activities on the internet that could lead and be traced back to you.

A

digital footprints

49
Q

to keep track of your activities

A

cookies

50
Q

one of the main security risks online. These criminals will try to access private information, accounts, websites, or servers in order to steal, manipulate, destroy, sell or use the information gathered for their own benefit.

A

hacker

51
Q

one of the main security risks online. These criminals will try to access private information, accounts, websites, or servers in order to steal, manipulate, destroy, sell or use the information gathered for their own benefit.

A

identity theft

52
Q

the criminal sends you a personalized message accompanied by a shortened link asking you to provide personal information or bank account details

A

phishing

53
Q

individuals who lure children or teenagers into engaging to sexualacts or relationship online.

A

internet predators

54
Q

an online form of bullying with the aid of the internet and other technology-based communication

A

cyberbullying

55
Q

malicious software, is created to invade and destroy the computer system.

A

malware

56
Q

software that inserts its code into files and programs infecting other softwares
inside the computer system

A

virus

57
Q

software that can rapidly spread from one computer to another by replicating
itself through the computer network even without human interaction

A

worms

58
Q

secretly invades your computer and targets sensitive information.

A

spyware

59
Q

dangers are associated with attackers that want to gather information about you in order for them to benefit through stealing money or engaging vulnerable victims into doing inappropriate things

A

crime related

60
Q

dangers are usually caused by carelessness of the user or intended
access of an external attacker to harm your reputation.

A

Privacy-related

61
Q

dangers are caused by software that are installed or passed
on to your computer through networks or opening unsafe links.

A

Malicious software related

62
Q

an informal term which is short for “internet etiquette.”

A

Netiquette