GE ELEC Flashcards

1
Q

ICT

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

encompasses a wide range of technologies that facilitate the gathering, processing, storage, and dissemination of information.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a technology required for information processing the use of electronics such as computers, communication devices and application software to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

plays a crucial role in various aspects of modern society, impacting individuals, businesses, and governments.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

refers to the knowledge obtained in reading, investigation, study or research.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The tools to transmit information are the telephone, television and radio.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

We need information to make decisions and to predict the future.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

knowledge and helps us to fulfill our daily tasks.

A

INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions.

A

COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

through sign or symbols, performing drama or poetry. With the advent of technology, these “older” forms of communication are less utilized as compared to the use of the internet, email or video conferencing.

A

COMMUNICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

use of scientific knowledge, experience and resources to create processes and product that fulfill human needs.

A

TECHNOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 TECHNOLOGY

A

Aiding communication
Spreading information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

15 Examples of ICT

A
  1. Computers and Laptops:
  2. Smartphones and Tablets:
  3. Internet:
  4. Networking Equipment:
  5. Software Applications:
  6. Cloud Computing:
  7. Social Media Platforms:
  8. Video Conferencing Tools:
  9. E-commerce Platforms:
  10. Data Storage Devices:
  11. Information Systems:
  12. Robotics and Automation:
  13. Geographic Information Systems (GIS):
  14. Educational Technologies:
  15. Digital Cameras and Imaging Software:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Personal computers, laptops, and workstations are fundamental ICT devices used for various tasks such as word processing, data analysis, and programming.

A

Computers and Laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile devices play a crucial role in ICT, providing communication, internet access, and a wide range of applications for productivity, entertainment, and more.

A

Smartphones and Tablets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The internet is a key component of ICT, enabling global communication, information sharing, online collaboration, and access to various services.

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Routers, switches, and modems facilitate the creation of computer networks, allowing devices to communicate with each other and access the internet.

A

Networking Equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Various software applications contribute to ICT, including word processors, spreadsheets, databases, graphics editors, and specialized industry-specific applications.

A

Software Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cloud services provide on-demand access to computing resources, storage, and applications over the internet, offering scalability and flexibility for businesses and individuals.

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Platforms like Facebook, Twitter, LinkedIn, and Instagram are examples of ICT tools that facilitate social interaction, content sharing, and networking.

A

Social Media Platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tools like Zoom, Microsoft Teams, and Skype enable real-time communication and collaboration over the internet, supporting remote work and virtual meetings.

A

Video Conferencing Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Websites and applications that facilitate online buying and selling of goods and services, such as Amazon, eBay, and Shopify.

A

E-commerce Platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hard drives, solid-state drives (SSDs), and USB flash drives are examples of devices used for storing and retrieving digital data.

A

Data Storage Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Enterprise Resource Planning (ERP) systems, Customer Relationship Management (CRM) software, and other information systems streamline business processes and data management.

A

Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ICT plays a role in controlling and managing robotic systems for various applications, such as manufacturing, healthcare, and logistics.

A

Robotics and Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

GIS technology helps in capturing, analyzing, and visualizing spatial data, supporting applications in urban planning, environmental monitoring, and more.

A

Geographic Information Systems (GIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

: Learning Management Systems (LMS), e-learning platforms, and educational software contribute to the integration of technology in education.

A

Educational Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Devices for capturing and processing digital images, used in photography, medical imaging, and various other fields.

A

Digital Cameras and Imaging Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

4 What are the uses of ICT in everyday life?

A
  1. EDUCATION
  2. BANKING
  3. INDUSTRY
  4. E-COMMERCE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Teachers use computers to research for teaching materials, participate in online forum and conference

A

EDUCATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Students use computers as reference tools for looking information on the internet.

A

EDUCATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Researchers use computers to collect and process data.

A

EDUCATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

School administrators use computers for administrative purposes to ensure that entire operations run smoothly.

A

EDUCATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Bank administrators can control the entire banking system and banking activities.

A

BANKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

To provide electronic banking services for customers.

A

BANKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Businessmen can save their time by using online services offered by banks.

A

BANKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

To help workers operate machines.

A

INDUSTRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

To help researchers analyze and collect research data for future references.

A

INDUSTRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

To help administrators to oversee and control entire operations in the factory.
To help administrators to oversee and control entire operations in the factory.

A

INDUSTRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

To facilitate production planning and control system.

A

INDUSTRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

To make buying and selling activities faster and more efficient through internet.

A

E-COMMERCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

To connect online customers with suppliers to purchase products.

A

E-COMMERCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

To help employees to communicate with their customers for any inquiries and to get the latest updates inventory to be informed to the customers.

A

E-COMMERCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

15 What are the importance of ICT?

A
  1. Enhanced Communication:
  2. Access to Information:
  3. Education and E-Learning
  4. Business Efficiency
  5. Economic Growth
  6. Healthcare Advancements
  7. Globalization and Trade
  8. Social Connectivity:
  9. Government Services
  10. Research and Innovation
  11. Disaster Management:
  12. Environmental Monitoring
  13. Crisis Response and Humanitarian Aid:
  14. Financial Inclusion:
  15. Personal Productivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

ICT facilitates instant and global communication through email, messaging apps, social media, and video conferencing, breaking down geographical barriers and fostering collaboration.

A

Enhanced Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The internet, a key component of ICT, provides access to vast amounts of information. This enables individuals to stay informed, researchers to conduct studies, and students to access educational resources

A

Access to Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

ICT has transformed education by providing e-learning platforms, digital resources, and interactive learning tools. It enables remote learning, making education accessible to people around the world.

A

Education and E-Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

: ICT tools and systems enhance business operations, streamline processes, and improve overall efficiency. Enterprise Resource Planning (ERP) systems, customer relationship management (CRM), and other business applications contribute to effective management and decision-making.

A

Business Efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

ICT contributes to economic development by fostering innovation, improving productivity, and creating new job opportunities. It enables the growth of technology-driven industries and entrepreneurship.

A

Economic Growth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

ICT is used in healthcare for electronic health records (EHRs), telemedicine, remote patient monitoring, and medical imaging. These technologies improve healthcare delivery, reduce costs, and enhance patient outcomes.

A

Healthcare Advancements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

ICT has facilitated global trade by enabling businesses to communicate and transact internationally. E-commerce platforms and online marketplaces connect buyers and sellers across borders, contributing to economic globalization.

A

Globalization and Trade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Social media platforms and other online communities allow people to connect, share experiences, and build relationships regardless of physical distance. This has social, cultural, and personal implications.

A

Social Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ICT is used in public administration for delivering government services, managing databases, and facilitating e-governance. This enhances transparency, reduces bureaucracy, and improves citizen engagement.

A

Government Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

ICT supports scientific research and innovation by providing tools for data analysis, simulations, and collaboration. High-performance computing, data analytics, and modeling contribute to advancements in various fields.

A

Research and Innovation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

ICT plays a critical role in disaster preparedness, response, and recovery. Communication technologies enable timely dissemination of information, coordination of emergency services, and aid distribution.

A

Disaster Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

ICT is employed in environmental monitoring through remote sensing, sensor networks, and data analytics. This helps in studying climate change, biodiversity, and natural resource management

A

Environmental Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

During crises such as natural disasters or conflicts, ICT is crucial for coordinating humanitarian aid efforts, managing logistics, and ensuring effective communication among relief organizations.

A

Crisis Response and Humanitarian Aid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

ICT has expanded financial services to underserved populations through mobile banking, digital wallets, and online payment systems, contributing to financial inclusion.

A

Financial Inclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

ICT tools, including productivity software and mobile applications, enhance personal and professional productivity by providing tools for organization, time management, and task automation.

A

Personal Productivity:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

has become an integral part of modern life, contributing to social, economic, and technological advancements across diverse sectors. Its continued development and adoption are likely to shape the future of how individuals and societies interact with information and technology.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

5 Life Before Computers

A
  1. The Number System
  2. Computation Tools
  3. The First Place-Value Number System
  4. The Invention of the Abacus
  5. More Major Developments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

When there were no machines for computing yet, people use their ten fingers

The DECIMAL SYSTEM is based from this old practice

The decimal system utilized ten digits: zero through nine, base-10

Computers process numbers using the binary (base-2), the octal (base-8)(0-7), and the hexadecimal (base-16) (0-9,A-F)number systems

A

The Number System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

based from this old practice

A

DECIMAL SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Humans needed to count more items, so they started using other tools for computation like small stones or pebbles, bones with scratches to represent numbers.

A

Computation Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The first known place-value number system is the Babylonian’s SEXAGESIMAL SYSTEM ( base-60).

Used in measuring time (60 seconds, 60 minutes) and in dividing circles (360 degrees)

A

The First Place-Value Number System

66
Q

The first known place-value number system is the Babylonian’s

A

SEXAGESIMAL SYSTEM

67
Q

Not considered a mechanical calculator, but it is one of the first mechanical aids

A

The Invention of the Abacus

68
Q

first actual calculating machine, invented by the Babylonians between 1000 BC and 500 BC, others say it was invented by the Chinese around 1300 AD

A

ABACUS

69
Q

9 More Major Developments

A
  1. Aristotle and the Tree of Porphyry (383 BC – 322 BC)
  2. John Napier’s Bones (1600 AD)
  3. Wilhelm Schickard’s Calculating Clock (1625 AD)
  4. Blaise Pascal’s Arithmetic Machine (1640 AD)
  5. Gottfried Wilhelm von Leibniz’s Stepped Reckoner (1671)
  6. Joseph-Marie Jacquard’s Loom (1804)
  7. Charles Babbage’s Machines (1822)
  8. Binary Arithmetic (1840)
  9. Herman Hollerith’s Tabulating Machine (1890)
70
Q

Used a tree figure (like a family tree) to represent the relationships between (and subdivisions of) things such as species.

A

Aristotle and the Tree of Porphyry

71
Q

a classic device for illustrating a “scale of being”

A

Tree of Porphyry

72
Q

Napier’s Bones was used in the multiplication and division of large numbers

A

John Napier’s Bones

73
Q

The Calculating Clock used wheels to carry out addition and subtraction of numbers up to 6 digits

A

Wilhelm Schickard’s Calculating Clock

74
Q

The Pascaline is mechanical adding machine performed up to 8-digits calculations, it was the first mechanical calculator.

A

Blaise Pascal’s Arithmetic Machine

75
Q

The Stepped Reckoner can perform all four basic arithmetic operations, it could multiply numbers up to 5 and 12 digits to give a 16-digit operand.

A

Gottfried Wilhelm von Leibniz’s Stepped Reckoner

76
Q

The Father of Modern Computers, invented 2 machines: the DIFFERENCE ENGINE (1822) and ANALYTICAL ENGINE (1833).
The Difference Engine performed multiplication and division.
The Analytical Engine had similarities with the modern electronic digital computers. It had a mill and a store which corresponded to the current processor and memory. It used punch cards to print results and to serve as memory.

A

Charles Babbage’s Machines

77
Q

The Loom is a weaving device that could produce intricate designs.

The automatic loom was controlled by punched cards, a technology for storing data that was used in later computers.

A

Joseph-Marie Jacquard’s Loom

78
Q

The Father of Modern Computers, invented 2 machines

A

Charles Babbage’s Machines

79
Q

Hollerith founded the Tabulating Machine Company which later became what?

A

IBM (International Business Machines Corporation)

80
Q

Invented 2 machines o fCharles Babbage’s Machines

A
  1. DIFFERENCE ENGINE (1822)
  2. ANALYTICAL ENGINE (1833).
81
Q

performed multiplication and division.

A

DIFFERENCE ENGINE (1822)

82
Q

had similarities with the modern electronic digital computers. It had a mill and a store which corresponded to the current processor and memory. It used punch cards to print results and to serve as memory.

A

ANALYTICAL ENGINE (1833)

83
Q

Developed by LADY AUGUSTA ADA LOVELACE, used only two numbers, 0 and 1, for computation. She was considered the first programmer.

A

Binary Arithmetic

84
Q

Developed the Tabulating Machine that used cards wherein data was punched.

Hollerith founded the Tabulating Machine Company which later became IBM (International Business Machines Corporation)

A

Herman Hollerith’s Tabulating Machine

85
Q

refers to a computer monitor that functions both as a display screen and an input device.

device is made to be sensitive to pressure so that it will follow a command at a user’s touch.

A

TOUCH SCREEN

86
Q

Technology allows a user to give commands to the computer without touching it.

A

GESTURAL INTERFACES

87
Q

refers to visual technology that showcases a real-life 3D appearance.

This can be viewed on a computer, in print, on TV, or in movies.

A

3D (THREE-DIMENSIONAL) TECHNOLOGY

88
Q

refers to the process of recording movement and translating that movement into a digital model.

It is used in a variety of applications such a video and tv, sports, computer gaming, military and even medical applications.

A

MOTION CAPTURE IN FILGMAKIN

88
Q

are pocket-sized or handheld computers and the most popular of these are the smartphone and tablet.

A

MOBILE DEVICES

89
Q

Continued advancements in AI and ML were transforming various industries, from healthcare to finance, with applications like predictive analytics, natural language processing, and computer vision.

A

Artificial Intelligence (AI) and Machine Learning (ML)

90
Q

The rollout and adoption of 5G networks were gaining momentum, enabling faster and more reliable communication, and paving the way for innovations like the Internet of Things (IoT), augmented reality (AR), and virtual reality (VR).

A

5G Technology

91
Q

With the rise of IoT devices and the need for real-time processing, edge computing was becoming more important.

It involves processing data closer to the source of generation rather than relying solely on centralized cloud servers.

A

Edge Computing

92
Q

As technology advances, so do cybersecurity threats.

There was an increasing focus on enhancing cybersecurity measures, including the use of advanced encryption, biometrics, and AI-driven security solutions.

A

Cybersecurity

93
Q

The COVID-19 pandemic accelerated the adoption of remote work technologies, including collaboration tools, video conferencing, and cloud-based solutions.

A

Remote Work Technologies

94
Q

has become pretty common these days. From coffee shop tables to car dashboards and even mousepads, you’ll find charging pads nearly everywhere. And if you own a compatible device, all you need to do is place it on the marked space.

A

Wireless /Inductive Charging

95
Q

This could be the year the smart ring makes major waves in the wearables market. Withnew smart rings announced at CESthat promise to provide detailed workout recovery data, offer up accurate sleep insights, and track your menstrual cycle, there’s a lot to get excited about within the smart ring realm.

A

Smart Rings

96
Q

That’s right, at CES 2024 we saw headphones that can read your mind. The Naqi Neural Earbuds are designed “as a safe, non-invasive alternative to brain implants” that could offer you full control over a Windows or Mac computer – including browsing the net and playing games – by using gyroscopic, muscle, and brainwave sensors

A

Neural Headphones

97
Q

a vast network that connects computers all over the world.

people can share information and communicate from anywhere with an Internet connection.

A

Internet

98
Q

Robert W. Taylor

A

who led the development of the ARPANET

99
Q

an early prototype of the Internet

A

ARPANET

100
Q

ARPANET

A

Advanced Research Projects Agency Network

101
Q

who developed the Transmission Control Protocol/Internet Protocol (TCP/IP) technologies.

A

Vinton Cerf and Robert Kahn

102
Q

The Internet works through a series of networks that connect devices around the world through telephone lines. Users are provided access to the Internet-by-Internet service providers.

The widespread use of mobile broadband and Wi-Fi in the 21st century has allowed this connection to be wireless.

A

Internet work

103
Q

is a company that provides access to the internet for users via telephone lines or wireless communications

A

Internet Service Provider (ISP)

104
Q

a set of four numbers between 0 to 255 that are separated by periods i.e. 216.239.39.99 (IP address of Google)

A

Internet Address (IP Address)

105
Q

is the text version of the IP Address i.e. www.google.com (domain name of Google)

A

Domain Name

106
Q

Top-level domains are the highest level of domain names of the Internet.

A

gov, edu, com, mil, org, net, and int

107
Q

Who controls the Internet?

A

While the Internet is theoretically decentralized and thus controlled by no single entity, many argue that tech companies such as Amazon, Facebook, and Google represent a small concentration of organizations that have unprecedented influence over the information and money on the Internet. In some countries, certain parts of the Internet are blocked via censorship.

108
Q

by name the Web, the leading information retrieval service of the Internet.

A

WORLD WIDE WEB

109
Q

allows the user to select a word or phrase from text and thereby access other documents that contain additional information pertaining to that word or phrase.

A

Hypertext

110
Q

documents feature links to images, sounds, animations, and movies.

A

Hypermedia

111
Q

an electronic document in the web

A

Web Page

112
Q

a collection of related web pages and associated items stored on a web server

A

Web Site

113
Q

the first page the users see when they enter the web site

A

Home Page

114
Q

refers to the computers that store the HyperText Mark-up Language (HTML) files used on the internet

A

Web Server

115
Q

is a software allows users to view the retrieved documents in the web.

A

Web Browser

116
Q

refers to the global address of documents and other resources on the WWW

A

Uniform Resource Locator (URL)

117
Q

The development of the World Wide Web was begun in 1989 by?

A

Tim Berners-Lee

118
Q

which standardized communication between servers and clients.

A

HyperText Transfer Protocol (HTTP)

119
Q

a web browser, which was developed in the United States

A

Mosaic

120
Q

became the dominant Web browser soon after its release in December 1994

A

Netscape Navigator

121
Q

the first browser with tabs, in which a user could visit another Web site without opening an entirely new window, debuted that same year.

A

InternetWorks

122
Q

Mosaic, a web browser, which was developed in the United States by ?

A

Marc Andreessen

123
Q

web browser developed by Microsoft in 1995 as an add-on to the Windows 95 operating system.

A

Internet Explorer (IE)

124
Q

Apple’s was released in 2003 as the default browser on Macintosh personal computers and later on iPhones (2007) and iPads (2010).

A

Safari

125
Q

(2005) was the first browser with a privacy mode, Private Browsing

A

Safari 2.0

126
Q

Mozilla’s released in 2004, the first serious challenger to IE’s dominance, was designed to address issues with speed and security that had plagued IE

A

Firefox

127
Q

In 2008 Google launched, the first browser with isolated tabs, which meant that when one tab crashed, other tabs and the whole browser would still function.

A

Chrome

128
Q

refers to internet guidelines that advise people on how to communicate and treat others when interacting online. These guidelines can apply to multiple aspects of the internet, such as email, message forums and video chats.

A

Netiquette

129
Q

10 rules for practicing netiquette

A
  1. Practice using empathy.
  2. Use a friendly tone.
  3. Use respectful language.
  4. Send messages if appropriate.
  5. Check for grammar mistakes.
  6. Respect other people’s privacy.
  7. Ensure messages are clear.
  8. Create posts that are appropriate.
  9. Respond to emails on time.
  10. Read content thoroughly.
130
Q

Empathy involves practicing patience and understanding when interacting with others.

For example, if someone says something you disagree with, you can practice empathy by listening actively and asking respectful questions to better understand their point of view.

A

Practice using empathy.

131
Q

Using a kind tone is important for conveying respect online. Tone refers to how your messages sound to your recipients, including your word choice and syntax. If you’re messaging someone online, try to use a kind tone to show that you respect their opinions.

Use phrases like “please” and “thank you”

A

Use a friendly tone.

132
Q

It’s important to use respectful language when communicating with others online because people may evaluate how you treat them based on how you speak to them.

For example, you might use casual language while talking to a coworker online, but you might use more formal, respectful language when speaking with a manager online.

A

Use respectful language.

133
Q

It’s important to send an appropriate amount or number of messages or emails to people online.

For example, you might send only work-related messages to your coworkers or send only school-related messages to your classmates. People might appreciate it if you only send a few emails within a specific timeframe, such as once a week or whenever necessary or appropriate.

A

Send messages if appropriate.

134
Q

spelling mistakes is important for being professional online.

For example, if you need to message your coworkers in an online forum, consider proofreading your message for errors and typos before you send it. You can also read your messages aloud or use grammar-checking software to help you notice potential writing mistakes.

A

Check for grammar mistakes.

135
Q

Valuing people’s privacy online is important when using the internet.

Whether you’re speaking to people on social media, messaging your classmates or emailing your coworkers, you can respect other people’s privacy by asking permission before sharing their information or posting anything about them or with them in it including photos or video.

A

Respect other people’s privacy.

136
Q

Being clear in your communication can help people properly interpret your messages online.

You may try writing simple sentences and defining unfamiliar words or acronyms in your writing so the recipient can understand your message clearly.

A

Ensure messages are clear.

137
Q

Creating appropriate online posts is important for netiquette because your posts can contribute to your online image.

Consider posting things about yourself that help maintain a positive image and that are appropriate for a professional setting.

A

Create posts that are appropriate.

138
Q

Checking emails regularly and responding to them in a timely manner is important because people often use email to communicate ideas and share information with others quickly.

For example, a manager could send important work information to their employees in a mass email. If email is your primary mode of communication, you can prioritize responding to your emails by setting a reminder each day to read and reply to your emails.

A

Respond to emails on time.

139
Q

Reading messages or comments thoroughly is essential for understanding what others are trying to communicate to you. Whether you’re replying to a discussion post for an online class or answering a coworker’s question on your company’s messaging app, try to read comments carefully to ensure that you understand the content of a message before you reply. This can also help you write messages that fully address the recipient’s comments or questions.

A

Read content thoroughly.

140
Q

the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

A

CYBERCRIME

141
Q

also called computer crime

A

CYBERCRIME

142
Q

15 Types of cybercrime

A
  1. Identity theft and invasion of privacy
  2. Cyberbullying
  3. Cyber libel
  4. Internet fraud
  5. ATM fraud
  6. Wire fraud
  7. File sharing and piracy
  8. Counterfeiting and forgery
  9. Child pornography
  10. Hacking
  11. Computer viruses
  12. Denial of service attacks
  13. Spam, steganography, and e-mail hacking
  14. Sabotage
  15. Phishing
143
Q

When criminals steal a firm’s credit card records, they produce two distinct effects. First, they make off with digital information about individuals that is useful in many ways. Second, they might use individual credit card names and numbers to create new identities for other criminals.

A

Identity theft and invasion of privacy

144
Q

Mental abuse of victims using threats and harassment.

A

Cyberbullying

145
Q

Also known as online defamation, this can involve attacking individuals or organizations’ reputations. This can be done through disinformation (deliberate distribution of inaccurate information) or misinformation (mistaken distribution of inaccurate information).

A

Cyber libel

146
Q

receiving an unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their wallets

A

Internet fraud

147
Q

Criminals have developed means to intercept both the data on the card’s magnetic strip as well as the user’s PIN. the information is used to create fake cards that are then used to withdraw funds from the unsuspecting individual’s account.

A

ATM fraud

148
Q

NEVER wire money to a stranger. Once you wire cash (especially overseas), it’s virtually impossible to reverse the transaction or trace the money

A

Wire fraud

149
Q

the illegal act of distributing and or the reproduction of digital files that is traded over the internet. These files include digital books, movies, PC games, hacked software, music and others.

A

File sharing and piracy

150
Q

are crimes of deceit where the criminal act involves tricking another person into receiving property that appears from trustworthy source but is actually an imitation.

A

Counterfeiting and forgery

151
Q

unlawfully exploits children for sexual stimulation
images of children under age 18 engaged in sexual behavior

A

Child pornography

152
Q

the act of compromising digital devices and networks through unauthorized access to an account or computer system

A

Hacking

153
Q

the deliberate release of damaging computer viruses

A

Computer viruses

154
Q

a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network

A

Denial of service attacks

155
Q

a crime against all users of the Internet since it wastes both the storage and network capacities of ISPs

A

Spam, steganography, and e-mail hacking

156
Q

Another type of hacking involves the hijacking of a government or corporation web site. Using the Internet to attack the infrastructure of a nation, by rerouting airline traffic, contaminating the water supply, or disabling nuclear plant safeguards.

A

Sabotage

157
Q

act of sending e-mail that purports to be from a reputable source, such as the recipient’s bank or credit card provider, and that seeks to acquire personal or financial information

A

Phishing

158
Q

Internet-based threats or online threats, are a category of cybersecurity risks that may cause an undesirable event or action via the internet.

A

web threats

159
Q

2 Example of web threats

A
  1. WannaCry ransomware
  2. Celebrity iCloud phishing
160
Q

In May 2017, the WannaCry ransomware spread to many networks and locked down countless Windows PCs. This threat was particularly dangerous because of its worm functionality, allowing it to spread completely autonomously.

A

WannaCry ransomware

161
Q

A spear-phishing attack led to the breach of numerous celebrity iCloud accounts. This breach ultimately resulted in the unauthorized leak of countless private photos from these accounts

A

Celebrity iCloud phishing