ICT Flashcards

1
Q

It deals with the use of different communication technologies such as mobile phones, telephones, internet to locate,
save, send, and edit information.
• It is a study of computers as data processing tools.
• It introduces students to the fundamentals of using computer systems in an internet environment.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

t is an electronic device for storing and processing data, typically in binary
form, according to instructions given to it in variable progra

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The heart of the computer, this is the component that actually executes instructions
organized in programs (“software”) which tell the computer what to do.

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enables a computer to store, at least temporarily, data, programs, and
intermediate results.

A

Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Allows a computer to permanently retain large amounts

of data and programs between jobs. Example is a disk drive.

A

Mass storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Usually a keyboard and mouse, the input device is the conduit through which data and instructions enter
a computer

A

Input device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A display screen, printer, or devices that let you see what the computer has accomplished

A

Output device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A small, single-user computer based on a microprocessor.

A

personal computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful
microprocessor and, in general, a higher-quality monitor.

A

Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A multi-user computer capable of supporting up to hundreds of users simultaneously.

A

Minicomputer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A powerful multi-user computer capable of supporting many hundreds or thousands of users
simultaneously.

A

Mainframe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An extremely fast computer that can perform hundreds of millions of instructions per second

A

Super computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A computer designed to fit comfortably on top of a desk, typically with the monitor sitting on top of
the computer. D

A

Desktop computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An extremely

lightweight personal computer.

A

Notebook computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A small, portable

computer – small enough that it can sit on your lap.

A

Laptop computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A portable computer that is small enough to be held in one’s hand. Although extremely
convenient to carry, handheld computers have not replaced notebook computers because of their small
keyboards and screens. They are also called PDAs (Personal Digital Assistant) and Pocket computers.

A

Hand-held computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An information system on the internet that allows documents to be connected to other documents by hypertext links,
enabling the user to search for information by moving from one document to another

A

WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is a hypertext document connected to the World Wide Web. It is a document that is suitable for the World Wide
Web.

A

Web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A collection of web pages which are grouped together and usually connected together in various ways.

A

Web site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is a computer that hosts a website on the Internet.

A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It refers to the first stage in the world wide web, which was entirely made up of the web pages connected
by hyperlinks.

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

– is known as a flat page or stationary age in the sense that the page is “as is” and cannot be
manipulated by the user. The content is also the same for all users that is referred to as Web 1.0

A

Static Web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
It is the evolution of Web 1.0 
by adding dynamic pages. The user is 
able to see a website differently than 
others. It allows the users to interact 
with the page;
A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

platform is all about
semantic web. It aims to have
machines (or servers) understand the user’s preferences to be able to deliver web content.

A

Web 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
web 2.0 is the evolution of web 1.0 by adding dynamic web pages. The user is able to see website differently than others (example: social networking sites, wikis, video sharing sites)
Dyanamix web pages
26
allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB, Twitter, use tags that start with the sign #, referred to as hashtag.
Folksonomy
27
content is dynamic and is responsive to user’s input
Rich user Experience
28
The owner of the website is not the only one who is able to put content. Others are able to place a content of their own by means of comments, reviews and evaluation e.g. Lazada, Amazon.
User participation
29
services that are offered on demand rather than on a one-time purchase. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet.
Long tail
30
e- users will be subscribe to a software only when needed rather than purchasing them e.g. Google docs used to create and edit word processing and spread sheet.
Software as a service
31
– diverse information sharing through universal web access. Web 2.0’s content is based on people from various cultures.
Mass participation
32
is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use smartphone.
Convergence
33
is a website, application, or online channel that enables web users web users to create, co-create, discuss modify, and exchange user generated content.
Social Media
34
These are sites that allows you to connect with other people with the same interests or background. Once the user creates his/her account, he/she can set up a profile, add people, share content, among others. Example: Facebook and Google+
Social networks
35
Sites that allow you to store and manage links to various website and resources. Most of the sites allow you to create a tag to others. Example: Stumble Upon, Pinterest
Bookmarking site
36
Sites that allow users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be rank. Example: Reddit and Digg
Social news
37
sites that allow you to upload and share media content like images, music and video. Example: Flickr, YouTube and Instagram
Media sharing
38
focus on short updates from the user. Those that subscribed to the user will be able to receive these updates. Example: Twitter and Plurk
Microblogging
39
allow user to post their content. Other users are able to comment on the said topic. Example: Blogger, WordPress and Tumblr
Blogs and Forums
40
s a non- profit service designed to help people who have visual and reading impairments. A database of audio recordings is used to read to the user.
Assistive media
41
distributed computing on internet or delivery of computing service over the internet. Instead of running an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account doesn’t exist on your computer – it’s on the service’s computer cloud
Cloud computing
42
lients are the device that the end user interact with cloud
client computers
43
often servers are in geographically different places, but server acts as if they are working next to each other.
Distributed servers
44
it is a collection of servers where application is placed and is accessed via Internet
Data centers
45
allows systems and services to be easily accessible to the general public. Public cloud may be less secured because of its openness, e.g. e-mail
public cloud
46
allows systems and services to be accessible within an organization. It offers increased security because of its private nature
Private cloud
47
allows systems and services to be accessible by group of organizations
Community cloud
48
is a mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud.
Hybrid cloud
49
s who you are in the cyberspace. It is how you present | yourself to others online
Online identity
50
What you share. It is the layer that you do control. It consists of data you feed into social media and mobile applications.
first layer
51
Made of Behavioral Observations. These are not so much choices you consciously make, but the metadata that gives context to those choice.
second layer
52
: Interpretations of the first and second. It is what the machine thinks about you. Your data are analyzed by various algorithms and compared with other users’ data for meaningful statistical correlations
third layer
53
It is a law approved on September 12, 2012. It aims to address legal issues concerning online interactions in the internet.
Cybercrime Prevention Act of 2012 (Republic Act No. 10175)
54
An individual who uses computer, networking or other skills to overcome a technical problem. It may also refer to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes.
Hackers
55
It is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer security risk
56
An individual with extensive computer knowledge whose purpose is to breach internet security or gain access to software without paying royalties.
Crackers
57
An unskilled individual who use scripts or programs developed by others to attach computer systems and networks and deface websites.
Script kiddies
58
An individual practicing the act or spying to gain secret information on a government or a business competitor through the use of any ICT tools
Corporate spies
59
An individual or group who uses email as an offensive force. They usually send a company a threatening email stating that will exploit a security leak or launch an attack that will harm the company’s network.
Cyberextortionist
60
Individuals who are involved in any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets
Cyberterrorist
61
It is the use of a computer network | without permission.
Unauthorized access
62
. It is the use of a computer or its data for | unapproved or possibly illegal activities.
Unauthorized use
63
It is the act of stealing a computer | equipment.
Hardware theft
64
It is the act of defacing or destroying | computer equipment.
Hardware vandalism
65
. It occurs when someone: a) steals a software media; b) intentionally erases programs; c) illegally copies a program; and d) illegally registers and / or activates a program.
Software theft
66
. It occurs when someone steals personal | or confidential information.
Information theft
67
A program that affects a computer negatively by altering the way the computer works.
Computer virus
68
Copies itself repeatedly, using up resources and possibly shutting down the computer network.
Worm
69
A malicious program that hides within or looks like a legitimate program.
trojan horse
70
A malicious program that hides within or looks like a legitimate program.
rootkit
71
to the growing gap between the underprivileged member of society, especially the poor, rural, elderly, and handicapped portion of the population who do not have access to computers or the internet.
digital divide
72
People who were not born in the digital era and later adopted the new technology
digital immigrants
73
People who were born during or after the | digital era which begins in 1980.
digital natives
74
is the ability to use information and communication technologies to find, evaluate, create, and communicate information, requiring both cognitive and technical skills.
Digital literacy
75
Understanding how internet culture is expressed and transmitted through phenomena such as memes, emojis, and animated gifs.
Cultural:how to behave
76
incorporates what we know of as computer literacy or | IT skills with an understanding of the key concepts.
Cognitive:How to do
77
The constructive element involves knowing what it means to “construct” something in a digital environment.
Constructive: How to use
78
Knowing the purpose of various online tools and how they are different or similar to each other.
Communicative: How to communicate
79
Understanding and capitalizing upon the ways in which online world differs from the offline world
Confident: How to belong
80
It refers to creating new things which add value where the focus is more on the value created rather than the act of creating something new.
Creative:How to make
81
Using reasoning skills to question, analyze, scrutinize, and evaluate digital content, tools, and applications.
Critical:How to evaluate
82
Refers to individuals having the knowledge and ability to use digital environments to selforganize; to be part of a movement bigger than themselves.
Civic: How to participate