ETECH WEEK 1 Flashcards

1
Q

deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, and edit information.

A

Information and Communication
Technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is a study of computers as data processing tools. It introduces students to the fundamental of using computer systems in an
internet environment.

A

Information and Communication
Technology (ICT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

introduced Microsoft

A

BILL GATES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

introduced Apple

A

STEVE JOBS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

pioneered Facebook and later bought Instagram

A

MARK ZUCKERBERG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

developed last-minute.com

A

MARTHA LANE FOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Her website relied heavily on online
systems which other websites soon followed suit.

A

MARTHA LANE FOX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

invented the World Wide Web, an Internet-based hypermedia
initiative for global information sharing.

A

TIM BERNERS-LEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

global system of interconnected computer networks
that use the Internet protocol suite to link billions of devices
worldwide

A

INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Top Internet Service Providers in the Philippines

A

1.Converge ICT Solutions
2.One SKY
3.PLDT
4.Globe Broadband/TELECOM
5. RISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an information space where documents and other web
resources are identified by URLs, interlinked by hypertext links, and
can be accessed via the Internet.

A

WORLD WIDE WEB (WWW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a hypertext document connected to the World Wide Web.

A

WEB PAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

document that is suitable for the World Wide Web.

A

WEB PAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

location connected to the Internet that maintains one or more pages on the World Wide Web

A

WEBSITE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a related collection of World Wide Web (WWW) files that includes a beginning file located a home page.

A

WEBSITE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

displays a web page on a monitor or mobile device.

A

WEB BROWSER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a software application for retrieving, presenting, and traversing information
resources on the World Wide Web.

A

WEB BROWSER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is also known as flat page or stationary page because the page is “as is” and cannot be manipulated by the user. The content is also the same for all users

A

WEB 1.0 STATIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

allows users to use web browsers instead of just using their operating system

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Browsers can now be used for their user interface, application software (or web applications), and even for file storage.

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Its examples include social networking sites, blogs, wikis, video sharing sites, hosted services,
and web applications.

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

allows users to interact with the page

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

instead of just reading a page, the user may be able to comment or create a user account

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Browsers can now be used for their user interface, application sotware (or web applications), and even for file storage

A

WEB 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Features of WEB 2.0
1. Folksonomy 2. Rich User Experience 3. User Participation 4. Long Tail 5. Software as a Service
26
allows users to categorize and classify/arrange information using freely chosen keywords ex. tagging (# sign)
FOLKSONOMY
27
content is dynamic and is responsive to user’s input.
RICH USER EXPERIENCE
28
the owner of the website is not the only one who is able to put content.
USER PARTICIPATION
29
services that are offered on demand rather than on a one-time purchase
LONG TAIL
30
users will subscribe to a software only when needed rather than purchasing them.
SOFTWARE AS A SERVICE
31
is a movement led by the World Wide Web Consortium (W3C)
SEMANTIC WEB (WEB 3.0)
32
According to the W3C, "provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries"
SEMANTIC WEB
33
Several problems of WEB 3.0
1. Compatibility 2. Security 3. Vastness 4. Vagueness 5. Logic
34
HTML files and current web browser could not support Web 3.0
COMPATIBILITY
35
user’s security is also in question since the machine is saving his or her preferences
SECURITY
36
The World Wide Web already contains billions of web pages
VASTNESS
37
Certain words are imprecise. The words “old” and “small” would depend on the user.
VAGUENESS
38
Since machines use logic, there are certain limitations for a computer to be able to predict what the user is referring to at a given time.
LOGIC
39
TRENDS IN ICT
1. Convergence 2. Social Media 3. Mobile Technologies 4. Assisstive Media
40
Technological convergence is the synergy of technological advancements to work on a similar goal or task.
CONVERGENCE
41
is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content
SOCIAL MEDIA
42
The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices capability to do tasks that were originally found in personal computers.
MOBILE TECHNOLOGIES
43
6 TYPES OF SOCIAL MEDIA
Social Networks Bookmarking Sites Social News Blogs Media Sharing Microblogging Blogs and Forums
44
KINDS OF OPERATING SYSTEMS
a. IOS b. Android c. Blackberry OS d. Windows Phone OS e. Symbian f. Web OS g. Windows Mobile
45
is a nonprofit service designed to help people who have visual and reading impairments.
Assistive Media
46
CORE RULES OF NETIQUETTE
RULE 1: Remember the human. RULE 2: Adhere to the same standards of behavior online that you follow in real life. RULE 3: Know where you are in cyberspace. RULE 4: Respect other people’s time and bandwidth. RULE 5: Make yourself good online. RULE 6: Share expert knowledge RULE 7: Help keep flame wars under control. RULE 8: Respect other people’s privacy RULE 9: Do not abuse your power. RULE 10: Be forgiving of other people’s mistakes.
47
RULES OF NETIQUETTE
1. Online security, safety and ethics 2. Internet threats 3. Protecting reputations online 4. Copyright 5. Contextualized online search and research skills
48
10 BEST RULES OF NETIQUETTE
>The Golden Rule >No Flaming >Don’t type in ALL CAPS >Follow the TOS (TOS-Term of Service) >Don’t talk with people you do not know >Obey Copyright Laws >Use proper Grammar and Spelling >Be honest/Be yourself >Don’t SPAM >Shop Secure Sites
49
refers to the online security or safety of people and their information when using the internet.
INTERNET SAFETY
50
INTERNET THREATS
Malware Virus Spyware Adware Spam
51
stands for malicious software
MALWARE
52
It is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
MALWARE
53
a malicious program designed to replicate itself and transfer from one computer to another (internet, local networks, FDs, CDs, etc.)
VIRUS
54
a program that runs in the background without you knowing it
SPYWARE
55
It has the ability to monitor what you are currently doing and typing through keylogging
SPYWARE
56
A program designed to send your advertisement, mostly as pop-ups
ADWARE
57
Refers to the transmission of unsolicited messages from various origins using electric messaging systems
SPAM
58
DANGERS ON THE INTERNET
Email Spam Phishing Pharming Spyware Computer worm Trojan Horse Rogue Security Software Hacker
59
Also known as junk email, it is usually unsolicited commercial email sent from one source with identical message sent to multiple recipients.
EMAIL SPAM
60
This is a deceitful practice of trying to get confidential information such as passwords and usernames and credit card details by making it appear as if it comes from a trustworthy source.
PHISHING
61
This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.
PHARMING
62
affect the performance and settings of the computer
SPYWARE
63
This is a dangerous computer program that replicates itself through a network.
COMPUTER WORM
64
it can erase data, can allow access of the victim’s computer, can corrupt files, and can be used in Phishing for bank accounts
TROJAN HORSE
65
tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality, they are not protected at all
ROGUE SECURITY SOFTWARE
66
This is a person who is able to enter and control other people’s computer without authorization.
HACKER