EXAM Flashcards

(64 cards)

1
Q

o Belief that technology shapes the culture, values, and social structures of society.

A

Technological Determinism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

o Belief that humans play the main role in shaping technology, not the other way around.

A

Social Constructivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to new technical knowledge used in creating capital goods and machines.

A

Technological Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Technology required for
information processing.

A

ICT (Information and Communication Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The use of scientific knowledge and experience to create and promote processes

A

Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

knowledge of things

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A device used for processing storing and displaying information

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enhances learning through digital tools

A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital platforms for marketing and amusement

A

Ads and Entertainment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Internet provides knowledge globally

A

Information access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An early calculation tool from Babylonia

A

Abacus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A mechanical calculator

A

Arithmometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Known as the father of computer

A

Charles Babbage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first computer programmer

A

Ada Lovelace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One of the first commercial computers

A

UNIVAC (Universal Automatic Computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Year of Pre-Mechanical Era

A

(3000 BC – 1450 AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • Use basic tools such as the Abacus and the tally stick for arithmetic
  • Knowledge recorded, on clay tablets and papyrus, and early writing systems
A

Pre-Mechanical Era (3000 BC - 1450 AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Year of Mechanical Era

A

(1450–1840)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • Invention of mechanical calculation devices like the Pascaline by (Blaise Pascal and Leibniz Calculator)
  • Introduction of gears and levers to automate calculations
A

Mechanical Era (1450–1840)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Year of Electro-Mechanical Era

A

(1840–1940)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Integration of electrical components in mechanical systems.

A

Electro-Mechanical Era (1840–1940)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

One of the first large-scale automated computers.

A

Harvard Mark I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Considered the first programmable computer.

A

Zuse Z3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Year of the First Generation of Computers

A

(1946 -1956)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
• Used vacuum tubes for processing, which made computers large and power-intensive. • Input was done using punch cards, and output was printed. • Example: ENIAC (Electronic Numerical Integrator and Computer)
First Generation of Computers (1946-1956)
26
Year of the Second Generation of Computers
(1956-1963)
27
• Replaced vacuum tubes with transistors, making computers smaller, faster, and more reliable. • Introduction of magnetic tape for storage. • Example: IBM 1401
Second Generation of Computers (1956-1963)
28
Year of the Third Generation of Computers
(1964-1971)
29
• Integrated Circuits (ICs) replaced transistors, further reducing size and increasing efficiency. • Introduction of keyboards and monitors as input and output devices. • Example: IBM System/360
Third Generation of Computers (1964-1971)
30
The Year of the Fourth Generation of Computers
(1971-Present)
31
• Use of microprocessors, which integrate thousands of transistors onto a single chip. • Introduction of Graphical User Interfaces (GUIs), personal computers (PCs), and advanced storage devices. • Example: Apple Macintosh, IBM PC
Fourth Generation of Computers (1971-Present)
32
The largest global network.
Internet
33
A system providing services to other computers.
Server
34
A language for creating web pages.
HTML (Hypertext Markup Language)
35
Static, read-only websites.
Web 1.0
36
Interactive, user-generated content and social media.
Web 2.0
37
Al-driven web with categorized and processed information.
Web 3.0
38
The most common method for digital messaging.
Email
39
Proper online behavior.
Netiquette
40
"Know where you are in cyberspace."
Rule #3 of Netiquette
41
Anti-Bullying Act of the Philippines.
RA 10627
42
Unwanted emails or messages.
Spam
43
Malware that locks data and demands payment.
Ransomware
44
Unauthorized copying of content.
Plagiarism
45
Legal rights over created works.
Copyright
46
Unauthorized use of copyrighted material.
Copyright Infringement
47
Growth of the IT sector.
Industries Due to IT
48
Technology creates job opportunities and affects income.
Jobs & Earnings
49
Hacking, viruses, and malware.
Cybersecurity threats
50
Spread of fake news.
Misinformation
51
Data theft and identity fraud.
Privacy Issues
52
Systems simulating human intelligence.
AI (Artificial Intelligence)
53
Malicious software disrupting systems. • Ransomware Attack - Blocks access until a ransom is paid. • Phishing - Deceptive attempts to steal sensitive information. • Viruses & Worms - Malware that spreads across networks. • Trojan Horse - A harmful program disguised as legitimate software. • Pharming - Redirects users to fraudulent websites. • Adware & Spyware - Tracks user activity without consent. • Eavesdropping - Unauthorized interception of online communications. • Cyber Espionage - Theft of confidential data through digital means. • Cybercrime - Illegal activities involving computers, including hacking and fraud. • Cyberbullying & Cyberstalking - Harassment through digital communication. • Cybercrime Prevention Act of 2012 (RA 10175) - A Philippine law addressing cybersecurity issues.
Malware
54
Blocks access until a ransom is paid.
Ransomware Attack
55
Deceptive attempts to steal sensitive information.
Phishing
56
Malware that spreads across networks.
Viruses & Worms
57
A harmful program disguised as legitimate software.
Trojan Horse
58
Redirects users to fraudulent websites.
Pharming
59
Tracks user activity without consent.
Adware & Spyware
60
Unauthorized interception of online communications.
Eavesdropping
61
Theft of confidential data through digital means.
Cyber Espionage
62
Illegal activities involving computers, including hacking and fraud.
Cybercrime
63
Harassment through digital communication.
Cyberbullying & Cyberstalking
64
A Philippine law addressing cybersecurity issues.
Cybercrime Prevention Act of 2012 (RA 10175)