Lesson 1: ICT Flashcards

(34 cards)

1
Q

What does ICT stands for?

A

Information and
Communications
Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the
technologies that provide
users access to
information through
telecommunications.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The basic components of
ICT include data,
hardware, information,
people or users,
procedures, and software.

A

ICT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many Filipinos owns a smartphone?

A

44 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many hours does filipinos spend online?

A

10 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many minutes does filipinos spend on social media platforms?

A

144 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Philippines’s rank in cyber security index.

A

61 out of 182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Philippines mobile internet speed rank.

A

89 out of 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ai, automation, autonomous vehicles, extended reality, vr, ar, metavers, iot, cyber security.

A

Trends in ict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As we move through 2024, the trend is
clear: individuals and organisations that
embrace and utilise AI are positioning
themselves for significant advantages over
those that don’t.

A

Artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the application of advanced
technologies to automate
tasks

A

Automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

used in automating repetitive tasks or
jobs
Examples:
• Data Migration
• Payment Processing

A

ROBOTIC PROCESS AUTOMATION (RPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Self Driving

A

Autonomous vehicles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

technologies used to create
more engaging digital
experiences including vr and ar.

A

EXTENDED
REALITY (XR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VR

A

Virtual reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AR

A

Augmented reality

17
Q

will help
you connect with people when you
aren’t physically in the same place and
get us even closer to that feeling of
being together in person.

18
Q

IoT

A

Internet of Things

19
Q

can include
anything with a sensor that is assigned a
unique identifier (UID). The primary goal
of the ___ is to create self-reporting
devices that can communicate with each
other (and users) in real time.

A

Internet of Things(IoT)

20
Q

Investing in cutting-edge security
solutions becomes a strategic
imperative, focusing on adaptive
technologies that can dynamically
respond to evolving threats.

A

Cybersecurity

21
Q

Investing in cutting-edge security
solutions becomes a strategic
imperative, focusing on adaptive
technologies that can dynamically
respond to evolving threats.

A

Cybersecurity

22
Q

embarrassing, harassing,
or bullying a person using
the Internet and
communication
technologies

A

Cyber-bullying

23
Q

act of stalking and
repeatedly harassing
someone else through
internet or other electronic
devices

A

Cyber-stalking

24
Q

act of gaining access to or
controlling one’s account
or computer secretly to
gain something, make a
statement, or challenge
oneself

25
stealing someone’s personal information and using them without permission
Identity Theft
26
include texts, photos, and videos that are illegal, offensive, or inappropriate for some age groups
Inappropriate Content
27
a network of compromised computers controlled by a robot that performs malicious acts for its creator trying to gain access to a computer and add it to their web
Botnets
28
act of deceiving users through fabricated promises or stories, typically, to gain money from the victim
Internet Scams
29
act of pretending to be a legitimate business, a neighbor, or someone else
Spoofing
30
it is done by fraudsters to gain confidence, get access to computers, steal data and money, or spread malware
Spoofing
31
when someone manipulates, exploits, or abuses a minor online.
Online Grooming
32
Victims are often bribed with gifts or money in exchange of sexual images or videos.
Online Grooming
33
unwanted and unsolicited messages, often through e- mail
Spam
34
Internet Etiquette represents the essence of proper manners and behavior online
Netiquette