LESSON 1 & 2 Flashcards

TOPICS: ICT in the Context of Global Communication & Online Safety, Security, Ethics, and Etiquette (53 cards)

1
Q

What is the lowest resolution for pictures & videos?

A

480x640

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the HD resolution for pictures & videos?

A

720x1280

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Ultra HD resolution for pictures & videos?

A

1080x1920

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ in ICT refers to the number of pixels that are displayed per inch of an image

A

Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ in ICT refers to the number of images captured by the camera
per second to send in a video format.

A

Framerate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is the standard frames per second

A

30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two types of camera lenses

A

Glass and Plastic Lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of lens captures more light to send brighter and clearer images & is much better quality

A

Glass Lens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Glass lenses have a reflective index of __

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ refers to the load or resistance that a speaker puts on an amplifier output

A

Impedance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is advised to find headphones that has an impedance of _Ω and __Ω

A

4 and 12 Ohms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ohm’s Law Formula

A

V = IR / V =IZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The V in Ohm’s Law represents ___

A

Voltage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The I in Ohm’s Law represents ___

A

Current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The R in Ohm’s Law represents ___

A

Resistance (Direct Current)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Z in Ohm’s Law represents ___

A

Impedance (Alternating Current)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Regular Frequency Response

A

12 - 22 kHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

High Frequency Response

A

20 - 22 kHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ guides or directs network data using packets that contain various kinds of data

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

___ ____ have several layers, one identifying information such as
sender, data type, size, and the destination IP (internet protocol) address

A

Data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The router reads this layer, ____ the data, and chooses the
best route to use for each transmission.

A

Prioritizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ refers to technologies that provide access to information through telecommunications

23
Q

ICT stands for __ ___ ___

A

Information and communication technology

24
Q

Who said, “ ICT focuses primarily on communication technologies. This
includes the internet, wireless networks, cell phones, and other communication
mediums.”?

A

Christensson, 2010

25
ICT is any ___ that telecommunications use
service
26
___ is an electronic device that can accept raw data as input, manipulate, or process it to produce output.
Computer
27
____ are considered computers
Cellphones
28
___ is any tangible component of a computer system. Examples: flash drive, motherboard, speaker, monitor
Hardware
29
___ is any intangible component of a computer system.
Software
30
____ is the user, in which, if either one of the three components is missing, the entire computer system will not function.
Peopleware
31
____ _____ refers to media devices such as mobile phones with operating systems.
Mobile Media
32
____ _____ are defined by OEDC in 2019 as a digital service that facilitates interactions between two or more distinct but interdependent sets of users (whether firms or individuals) who interact through the service via the Internet
Online Platforms
33
Examples of Online Platforms
Google Chrome, WordPress, GCash
34
_____ _____ is a category of business software that adds broad social networking capabilities to work processes
Collaborative Platform
35
Examples of Collaborative Platforms
Microsoft Teams, Google Suites, Monday.com
36
____ _____ which is a component under Assistive technology (AT), which is a generic term used to refer to a group of software or hardware devices by which people with disabilities can access computers
Assistive Media
37
Examples of Assistive Media
Magnifiers, Braille displays, Text to Speech
38
_____ _____ are online versions of information systems, which is “the process of and tools for storing, managing, using, and gathering of data and communications in an organization
Online Systems
39
Examples of Online Systems
DepED LIS (Learner’s Information System), PRC Online Verification
40
A deceptive email designed to trick the recipient into giving away personal information. These scams often appear to be from legitimate sources but are actually fraudulent
Email Scam
41
The act of forging the sender's address on an email so that it appears to come from someone other than the actual source. This is often used in phishing attacks or to spread malware
Email Spoofing
42
A technique used to trick individuals into revealing sensitive information, by masquerading as a trustworthy entity in electronic communications
Pishing / Phishing
43
A cyber attack intended to redirect a website's traffic to a fake website, usually to steal personal information such as login credentials or financial information
Pharming
44
A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. This can corrupt or delete data and spread to other systems
Computer Virus
45
Malicious software designed to gather information about a person or organization without their knowledge, often tracking internet usage and capturing sensitive information
Spyware
46
Unwanted advertisements that appear in a new browse window or tab, usually triggered by certain websites. These can be a nuisance and may also lead to malicious sites
Pop-Ads
47
An individual who uses programming skills to gain unauthorized access to systems or networks
Hacker
48
Hackers that have malicious intent
Black Hat Hackers
49
Hackers that use their skills for ethical purposes, such as testing security
White Hat Hackers
50
____ gives unwanted obsessive attention to a specific person like following, secret surveillance, persistent and manipulative calling and texting, and other means of approaching the victim unexpectedly. Often relies on online technology
Cyberstalking
51
____ takes place over digital devices like cell phones, computers, and tablets. It can occur through SMS, Text, and apps, or online in social media, forums, or gaming where people can view, participate in, or share content
Cyberbullying
52
The act of engaging an underage minor into inappropriate sexual relationships through the internet. Often done through the use of chat rooms or internet forums
Online Predation
53
The act of saying mean things online, usually in ALL CAPS, and often in a public forum with the intention to humiliate
Flaming