ICT- 1st Quarter Flashcards

1
Q

ICT stands for

A

Information and Communication Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

an umbrella term referring to communication hardware and software that allows the access, storage, transmission and manipulation of information.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

in terms of hardware, it specifically encompasses radio, television, communication devices (smart and non-smart phones), desktop computer, laptops, and network technologies

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

it also comprised of software, applications and platforms that allows information to be accessed, stored, transmitted, and manipulated

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is when multiple devices combine into a single gadget because of technological advancement

A

Convergent Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These are software, applications or platforms that allow users to communicate in an online social communities or network

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is a term for devices that are easily carried and allows fast means of communications

A

Mobile Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the system that enables people to access information over the internet

A

WWW (World Wide Web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the actual interconnections of computers and other networks

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The user can only read whatever online content the creator has made.

A

Web 1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

refers for the ability of the user to add content through posting, sharing, commenting or rating. This allows interaction not only in between the user and the creator but also other users. Examples are sites like Facebook, Youtube, Twitter, and Reddit

A

Web 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a concept of how the web will evolve. The keyword for this is executable, which refers to the capability of accepting a request from the user will execute a solution or suggestion considering the behavioral data the user. It is not fully realized and is still developing, the full concept can still change.

A

Web 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Web 1.0?

A

“read-only web”
“static website”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Web 2.0?

A

“read-write”
“dynamic”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Web 3.0?

A

“semantic”
“executable”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Features of Web 2.0

A

Folksonomy
Rich User Experience
User Participation
Long Tail
Software as a Service
Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it allows user to categorize and classify or arrange information using freely chosen keywords which uses sign (#) also referred to as hashtag. e.g, tagging in Facebook/Twitter

A

Folksonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

its content is dynamic and is responsive to user’s input. Example, a website that shows local content or in case of social networking sites, when you are logged on, your account is used to modify what you see in their website.

A

Rich User Experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the owner of the website is not only who is able to put content. Others are able to place a content of their own by means of comments, review, and evaluation. e.g, Amazon.com, online stores

A

User Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

services that are offered on demand rather than on a one-time purchase. In certain cases, time-based pricing is better than file size-based pricing or vice versa. This is synonymous to subscribing to a data plan that charges you for the amount of time you spent in the internet, or a data plan that charges you for the amount of bandwidth you used.

A

Long Tail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Users will subscribe to a software only when needed rather than purchasing them. This is a cheaper option if you do not always need to use a software. For instance, Google Docs is a free web-based application that allows user to create and edit word processing and spreadsheet documents online.

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

diverse information sharing through universal web access. Since most users can use the Internet, Web 2.0’s content is based on people from various cultures.

A

Mass Participation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is a website, application, or online channel that enables web users to create, co-create, discuss, modify, and exchange user-generated content.

A

Social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Types of Social Media: (6)

A

Social Networks
Bookmarking Sites
Social News
Media Sharing
Microblogging
Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

These are sites that allow you to connect with other people with the same interests or background. Once a user creates his or her account, he or she can set up a profile, add people, create groups, and share content.
e.g., Facebook and Google+

A

Social Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

These sites that allow you to store and manage links to various websites and resources. Most of these sites allow you to create a tag that allows you and others to easily search or share them.
e.g., Pinterest

A

Bookmarking Sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

These are sites that allows users to post their own news items or links to other news sources. The users can also comment on the post and comments may also be ranked. They are also capable of voting on these news articles of the website. Those who get the most amount of votes are shown most prominently.
e.g., Reddit and Digg

A

Social News

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

These are sites that allow you to upload and share media content like images, music, and video. Most of these sites have additional social features like liking, commenting, and having user profiles.
e.g., Youtube and Instagram

A

Media Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

These are sites that focus on short updates from the user. Those subscribed to the user will be able to receive these updates.
e.g., Twitter

A

Microblogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

These websites allow users to post their content. Other users are able to comment on the said topic. There are several free blogging platforms like Blogger, Wordpress, and Tumblr. On the other hand, forums are typically part of a certain website or web service.

A

Blogs and Forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Is a nonprofit service designed to help people who have visual and reading impairments.

A database of audio recordings is used to read to the user.

A

Assistive Media

32
Q

It is a movement led by the World Wide Web Consortium (W3C)

A

Semantic Web

33
Q

The term W3C was coined by the inventor of the World Wide Web

A

Tim Berners-Lee

34
Q

The aim of this is to have machines (or servers) understand the user’s preferences to be able to deliver web content specifically targetting the user (aims to do better)

A

Web 3.0

35
Q

Web 3.0 is yet to be fully realized because of several problems:

A

Compatibility
Security
Vastness
Vagueness
Logic

36
Q

HTML files and current web browsers could not support Web 3.0.

A

Compatibility

37
Q

The user’s security is also in question since the machine is saving his or her preferences.

A

Security

38
Q

The World Wide Web already contains billions of web pages.

A

Vastness

39
Q

Certain words are imprecise. The words “old” and “small” would depend on the user.

A

Vagueness

40
Q

Since machines use logic, there are certain limitation for a computer to be able to predict what the user is referring to at a given time.

A

Logic

41
Q

Trends in ICT:

A

Convergent Technologies
Social Media
Mobile Technologies
Assistive Media

42
Q

It is the synergy of technological advancements to work on a similar goal or task. For example, besides using your personal computer to create word documents, you can now use your smartphone. It can also use cloud technologies to sync files from one device to another while also using LTE technology which means you can access your files anytime, anywhere.

It is using several technologies to accomplish a task conveniently.

A

Convergent Technologies

43
Q

The popularity of smartphones and tablets has taken a major rise over the years. This is largely because of the devices’ capability to do tasks that were originally found in personal computers. Several of these devices are capable of using high-speed internet.

A

Mobile Technologies

44
Q

Mobile Devices use different operating systems: (7)

A

IOS
Android
Blackberry OS
Windows Phone OS
Symbian
WebOS
Windows Mobile

45
Q

used in Apple devices such as the iPhone and iPad

A

IOS

46
Q

an open source operating system developed by Google. Being open source means several mobile phone companies use this OS for free.

A

Android

47
Q

used in Blackberry devices.

A

Blackberry OS

48
Q

a closed source and proprietary operating system developed by Microsoft

A

Windows Phone OS

49
Q

the original smartphone OS; used by Nokia devices.

A

Symbian

50
Q

originally used for smartphones; now used for smart TVs.

A

Web OS

51
Q

developed by Microsoft for smartphones and pocket PC’s

A

Windows Mobile

52
Q

There is still a risk in sharing this. Chances are, a hacker already knows plenty of stuff about you even if you only give this out. You cannot just walk in a room and start introducing yourself to everyone. You do not know whom you can come across.

A

First Name

53
Q

If sharing your first name is a small risk, having both your first and last is more risky. You will be vulnerable to being searched for using search engines, which include image search. Matching a name with a face can lead to several cybercrimes like identity theft.

A

Last Name

54
Q

Sharing this is probably not the most risky of these shared information, but sharing your entire full name would be.

A

Middle Name

55
Q

Most people who steal identities study their subject. They can use this information for verification purposes.

A

Current and Previous School

56
Q

Should never be posted over the internet. The Internet is a public place. It is the same as posting your number on a billboard.

A

Your cellphone number

57
Q

Risky yet not as risky as posting their full names, especially your mother’s maiden name. Many websites require your mother’s maiden name as an answer to a secret question whenever you lose your password.

A

The name of your father and mother

58
Q

This is a huge risk, especially if you have younger siblings. Strangers may pretend or use their identity to dupe you.

A

The name of your siblings

59
Q

Giving the internet your phone number is one thing, giving them this is a whole other level. It would be much easier for the criminals to find you.

A

Your address

60
Q

This shared information is riskier than sharing your personal phone number. Scams usually this information to deceive you, one of which is when a stranger pretends to be your parents or pretends to be you.

A

Your home phone number

61
Q

Letting people know this is probably a must if you want to get as many gifts as possible. But having this in your profile makes you vulnerable to identity theft.

A

Your birthday

62
Q

The internet is defined as the ___________ ___________. This means anyone has access to this highway, can place information, and can grab that information. This is why some website continues to improve their security features. The threat of cybercrime is very real. Whatever information we share today could affect our future.

A

Information Superhighway

63
Q

3 Kinds of Internet Threats:

A
  1. Malware
  2. Spam
  3. Phishing
64
Q

6 Types of Malware:

A
  1. Virus
  2. Worm
  3. Trojan
  4. Spyware
  5. Adware
  6. Ransomware
65
Q

Or malicious software, is any program or file that is harmful
to a computer.

A

Malware

66
Q

is a type of malware that, when executed,
replicates itself by modifying other computer
programs and inserting its own code into those
programs. If this replication succeeds, the affected
areas are then said to be “infected” with a
computer virus, a metaphor derived from
biological viruses.

A

Virus

67
Q

is a standalone malware computer program that
replicates itself in order to spread to other
computers. It often uses a computer network to
spread itself, relying on security failures on the
target computer to access it. It will use this
machine as a host to scan and infect other
computers. Ex: ILOVEYOU virus

A

Worm

68
Q

is a type of malware that disguises itself as
legitimate code or software. Once inside the
network, attackers are able to carry out any
action that a legitimate user could perform, such
as exporting files, modifying data, deleting files or
otherwise altering the contents of the device.

A

Trojan

69
Q

malicious software that enters a user’s computer,
gathers data from the device and user, and sends
it to third parties without their consent. A
commonly accepted definition is a strand
of malware designed to access and damage a
device without the user’s consent. Ex: Keylogger

A

Spyware

70
Q

(or advertising software) is the term used for
various pop-up advertisements that show up on
your computer or mobile device. It has the
potential to become malicious and harm your
device by slowing it down, hijacking your browser
and installing viruses and/or spyware.

A

Adware

71
Q

a malware designed to deny a user or organization
access to files on their computer. By encrypting
these files and demanding a ransom payment for
the decryption key, cyber-attackers place
organizations in a position where paying the
ransom is the easiest and cheapest way to regain
access to their files.

A

Ransomware

72
Q

unsolicited and unwanted
junk email sent out in bulk to
an indiscriminate recipient
list. Typically, it is sent
for commercial purposes. It
can be sent in massive
volume by botnets, networks
of infected computers.

A

Spam

73
Q

a type of cybercrime in which victims are
contacted by email, telephone, or text
message by an attacker posing as a
trustworthy entity in order to obtain
sensitive information or data, such as
login credentials, credit card details, or
other personally identifiable information.

A

Phishing

74
Q

It is the use of works protected by copyright law without
permission for a usage where such permission is required.

A

Copyright Infringement

75
Q

Here are some tips that could help avoid copyright infringement:

A
  1. Always assume that the work is copyrighted.
  2. Do not copy, share or alter without seeking permission.
  3. Review and retain licensing agreements.
  4. Consider buying content.
  5. Give credit to the original author of the page or information.